Explaining bus collision avoidance protocol

Assignment Help Computer Networking
Reference no: EM1345937

Q1) Before effective Ethernet switching existed, some network designers used alternative bus collision avoidance protocol known as the token bus protocol. With the token bus protocol, a ''token'' made up of a short, standard string of 1s and 0s was circulated constantly in a round robin fashion among the Network Interface Units (NIUs) attached to the bus. NIUs did not hold the token; they simply passed it without delay to the next NIU in the chain. An NIU was only allowed to place a message on the bus when it possessed the token. After the message was delivered, the token was again put into circulation. No NIU was allowed to use the token again until the token had circulated to every other NIU at least once.

(a) Under what conditions would this protocol perform more satisfactorily than CSMA/CD? Explain.

Reference no: EM1345937

Questions Cloud

Explain what would the induced emf : In a certain time period a coil of wire is rotated from one orientation to another regarding a uniform 0.38-T magnetic field. The emf induced in the coil is 3.5 V. Other things being equal, what will the induced emf be if the field had a magnitude..
Illustrate what metrics would you propose to help in making : Illustrate what metrics would you propose to help in making the determination. Elucidate what historical data might be useful.
Definition and implication of portfolio theory : Give a brief explanation and implication of portfolio theory, and then argue both sides of portfolio theory, both limits and benefits.
Explain how do you suppose the tickets were rationed : Explain how do you suppose the tickets were rationed. Sketch supply and demand curves for the tickets to each of the two games.
Explaining bus collision avoidance protocol : Some network designers used alternative bus collision avoidance protocol known as the token bus protocol.
Explain why a relatively high value for the former : HPM 522, 1. Consider variables: Pr_Prob and Pr SIDE.   Explain why a relatively high value for the former and a relatively low value for the latter are the input values for the BEST case.
Find the share price : A trader purchase 200 shares of a stock on margin. The price of the stock is 20 dollar. The initial margin is 60 percent and the maintenance margin is 30%.
Define why covalent bonds are formed : A hydraulic lift consists of two pistons that connect to each other by an incompressible fluid. If one piston has an area of 0.49 m^2 and the other an area of 6.2m^2, how big a mass can be raised by a force of 220N exerted on the smaller piston.
Writing code in client program to enter score : Write down code in a client program to perform the following: prompt user to enter score and set score data member for player1.

Reviews

Write a Review

Computer Networking Questions & Answers

  Ways to stop interference from arc welders

Provided that both the design shop and front office utilizes areas? What medium guarantees immunity from the interference?

  Explaining reconnaissance tools

Write down some popular reconnaissance tools?

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Explaining security countermeasures against dos attacks

Suppose a future where security countermeasures against DoS attacks are much more widely implemented than at present.

  Self regulating norms of social networking business model

Do you think that the current Social Networking business model can sustain, given these generally self regulating norms?

  Receiving uart transfering incoming character to buffer

How long [in micro-seconds (µs)] does receiving UART have to transfer an incoming character to buffer or to the main computer before next character arrives?

  Networking beneficial to a professional in career field

How is networking beneficial to a professional in any career field?

  Evaluating principal physical characteristics for biometric

The security manager is to estimate principal physical characteristics used for biometric user authentication,  concepts of enrollment.

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Benefits and drawbacks of using social networking

What are some benefits and drawbacks of using social networking?

  Computing ip addresses per subnet

How many IP addresses would they have per subnet?

  Explaining security-aware caching resolver

Suppose a security-aware caching resolver receives DNS RRset at time t0 with signatures on it which expire at time t1 (where t0

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd