Finding the length of cable in the lan

Assignment Help Operating System
Reference no: EM1379584

In designing Ethernet, we must make sure that the length of cable in the LAN is shorter than the length of the shortest possible message that can be sent. Otherwise, a collision could go undetected.

a. Suppose that the smallest possible message is sixty-four bytes (including the 33 byte overhead). If we use 10BaseT, how long (in meters) is a 64-byte message? While electricity in the cable travels a bit slower than the speed of light, once you include delays in the electrical equipment in transmitting and receiving the signal, the effective speed is only about 40 million meters per second. (Hint: first calculate the number of seconds it would take to transmit the message then calculate the number of meters the signal would travel in that time, and you have the total length of the message).

b. If we use 10GbE, how long (in meters) is a 64-byte message?

c. The answer in part b is the maximum distance any single cable could run from a switch to one computer in a switched Ethernet LAN. How would you overcome the problem implied by this?

 

Reference no: EM1379584

Questions Cloud

Relational database architecture from a network : Determine what would make a corporation or organization migrate to a relational database architecture from a network or hierarchical architecture?
Discuss technology related ethical issue : Discuss and explain a technology related ethical issue. Determine the issue and its possible outcomes? How can the issue be resolved?
Encoding the data using the generator polynomial : Encode the data bit sequence 10011011100 using the generator polynomial and provide the code word.
Comparison of wireless lan and lan : Assume your local hospital has decided to extend their offices to another department of the building where it is difficult to have cables installed.
Finding the length of cable in the lan : Suppose that the smallest possible message is sixty-four bytes. If we use 10BaseT, how long is a sixty-four byte message?
Objectives of database management systems : Discuss the objectives of database management systems, Integrating databases; sharing information; maintaining integrity; reducing redundancy and enabling database evolution
Difference between an exclusive lock and a shared lock : Describe the difference between an exclusive lock and a shared lock. Define deadlock and how can it be avoided? How can it be resolved once it occurs?
Identify various hardware components and network topologies : VaryNet Corporation wishes to create 4-individual offices across the globe. They wish to be able to connect these offices over the internet, and they want to make sure that each network is available to each other,
Analyze concepts of cryptography : You have been asked through the Training Manager to present a lunch and learn seminar on an area within your field of expertise. You select cryptography.

Reviews

Write a Review

Operating System Questions & Answers

  Program to compute the signature

Assume Fred sees your RSA signaure on m1 and m2, (i.e., he sees (md1 mod n) and (md2 mod n).

  Operating system interfaces questions

Select one of the programs that comes with Vista in which you think your classmates would be interested. Determine what does the program do?

  Ethical issues of web site design

Analyze the user interaction interface of a typical website that you might wish to improve and design in terms of any ethical considerations that might require to be addressed.

  One page document describing security

Analyze the Internet and construct a one page document describing how security is maintained while transacting business over the Internet.

  Specify the order in which processes execute

Specify the order in which processes execute and determine the mean process turnaround time for each of the scheduling algorithms.

  What percentage of memory-s total operating time refreshes

Consider a dynamic RAM that must be given a refresh cycle 64 times per ms. What percentage of the memory's total operating time must be given to refreshes?

  Identify the costs associated with security requirement

A year after your 1st visit to credit union the manager calls you once again. His business is experiencing tremendous growth and requires to either open another branch office.

  Interactions with the systems

Think about a typical day in your life and discuss all the instances when your activities get recorded

  Central role of information systems in organisations

Information systems have become so integrated into the UK society and economy that the cashless society is a realistic possibility within the next 25 years.

  Question about lan operating systems

Assume you are network administrator for a new corporation that has ten users and plans to add five more users within a year. The files require to be accessed by all ten users and each user must have different security rights.

  Explain page trace analysis using fifo

Increase size of memory so it contains four page frames for public use. Using same page request as above and FIFO, do another page trace analysis and calculate the failure and success ratio.

  Securing standard telecommunications line vs voip connection

Determine the difficulty(s) of securing a standard telecommunications line vs. securing a VOIP connection?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd