Discuss advantages and disadvantages of ethernet technology

Assignment Help Basic Computer Science
Reference no: EM13991147

Question 1

The fiber link specification 10baseFL:

is implemented exclusively in hub-to-hub connections.

uses Manchester encoding techniques.

is also called the FOIRL (fiber optic repeater link specification).

has a maximum segment length of 1000 meters.

Question 2

FDDI-II (hybrid ring control) supports voice, video, and other multimedia applications through the addition of __________ to the original packet- switching technique.

circuit-switching capability

frame relay transmission

convergence enabling software

12 byte frame check sequencing

Question 3

A Frame Check Sequence (FCS) is performed:

every 9.6 microseconds.

before an Ethernet frame is transmitted.

to correct packet loss on Voice over IP applications.

to determine the validity of a received Ethernet frame.

Question 4

All "Fast Ethernet" implementations:

rely on CSMA/CA (collision avoidance).

use Manchester encoding techniques.

use hubs and repeaters rather than switches and routers.

are referred to as 100baseT technologies.

Question 5

Nodes in an ARCnet network are organized in a __________.

physical ring

physical ring with token passing

logical ring

wireless RF topology

Question 6

The topology of a Bluetooth network is called __________.

IEEE 802.3z

IEEE 802.5

NanoNet

Piconet

Question 7

A __________ is a portion of a LAN (or the entire LAN) where two or more stations transmitting at the same time will interfere with each other.

collision domain

CSMA/CD

repeater segment

port on "Switch A" mapped to a port on "Router B"

Question 8

Token-bus (IEEE 802.4) is available in speeds of __________.

10, 100, and 1000 Mbps

512Kbps, 1 Mbps, 2Mbps, and 5Mbps

1, 5, 10, and 100Mbps

1, 5, 10, and 20Mbps

Question 9

Ethernet exhibits poor performance when its utilization:

is 60% or more.

exceeds 24 nodes per LAN segment.

includes all high payload frames.

includes multiple cyclic redundancy checks (CRCs).

Question 10

Broad-band LAN technology divides the available bandwidth of the cable system into multiple channels using a technique called __________.

Frequency Division Multiplexing (FDM)

Quadrature Amplitude Modulation (QAM)

Time Division Multiplexing (TDM)

Phase Shift Keying (PSK)

Question 11

Discuss the advantages and disadvantages of Ethernet technology with other available networking architectures.

Question 12 What would be the best network topology to implement for a MAN linking multiple locations in a city? Why?

Reference no: EM13991147

Questions Cloud

Predict how perturbing a system affects : Predict how perturbing a system affects the actual free energy (both mathematically and conceptually).
Compelling public need for legislatures to enact laws : Discuss whether or not you believe there is a compelling public need for legislatures to enact laws that define police powers in order to prevent the use of excessive force. Provide a rationale to support your response.
Tax effects for jonas of the proposal : Dipper's owner is willing to pay to have the improvements made if Jonas will reduce the monthly rent on the build- ing to $4,000 for one year. Write a letter to Jonas explaining the tax effects for Jonas of the proposal by Dipper's owner.
Explain in conceptual terms the relationship : Explain in conceptual terms the relationship between dynamic steady state and equilibrium.
Discuss advantages and disadvantages of ethernet technology : Broad-band LAN technology divides the available bandwidth of the cable system into multiple channels using a technique called
The official power to make legal decisions and judgments : It is common knowledge that jurisdiction, the official power to make legal decisions and judgments, is vitally important to the adversarial legal system. Discuss the importance of having either subject matter jurisdiction or personal jurisdiction ove..
Protein peptide bond with alkaline copper sulfate : In which of the following assays for quantification of protein concentration, the colored product is as a result of coordination of protein peptide bond with alkaline copper sulfate
Damages awards ultimately mean lower costs of goods-services : Large damages awards in tort litigation have to be paid by someone. If the defendant is insured, then the insurance companies foot the bill. Ultimately, though, high insurance rates are passed on to consumers of goods and services in the United State..
Explore concepts like defense mechanisms : The case studies are very subjective but can be useful to explore concepts like defense mechanisms. When might this concept be important for clinical use? Use an example of something a patient may present that could lead you to explore the idea of..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What are the steps in negotiating a contract

What are the steps in negotiating a contract? What should the auditor look for?

  Explain how to configure a switch and router in a 350- to

bull describe how to configure a switch and router in a 350- to 750-word paper in apa format. be sure to include the

  Design a program that will read a file of employee records

Design a program that will read a file of employee records containing employee number, employee name, hourly pay rate, and regular hours worked and overtime hours worked. The company pays its employees weekly, according to the following rules:Regular..

  Explain the concept of supply chain management

Explain the concept of supply chain management. Although R/Way offers services rather than products, could that concept apply to the design of R/Way's new system? If so, how?

  Wrtie an alter table statement that adds two new check

Wrtie an Alter Table statement that adds two new check constraints to the invoices table of the ap database.

  Algorithms for finding possible winers-analysing complexity

Create algorithms for finding the possible winers and the Condorcet winner with analysing its complexity.

  Describe how the digital forensics function complements

Describe how the digital forensics function complements the overall security efforts of the organization. Evaluate the operational duties of digital forensic personnel and how these help qualify the integrity of forensic investigations within the e..

  It managing organizational risk

No longer than a decade ago, IT security professionals had to work hard to persuade organizational leaders about the importance of developing effective risk management plans.

  Solve problem by using a system of linear equations

Solve this problem by using a system of linear equations. Clearly show how many variables you are using and how you are forming the matrices.

  Explain bec corporate is department

If you were the system analyst in BEC corporate IS department and you had recieved call from Carrie douglas about her Project idea,what would you suggest to Carrie?

  Use of basic and advanced sql queries

This laboratory provides practice in the creation and use of basic and advanced SQL queries involving one table in a DB schema.

  Create a gui panel using radio buttons to display

Create a GUI panel using radio buttons to display and select the flags and text information.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd