Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Explain about CSMA/CD
It is an access method used mainly with LANs configured in a bus topology. With CSMA/CD, any station (node) can transmit a message to any other station (or stations) as long as transmission medium is free of transmissions from other stations. Stations monitor (listen to) line to determine if line is busy. If the station has a message to send though the line is busy, it waits for an idle condition before sending its message. If two stations transmit at the same instance, a collision takes place. When this happens, station first sensing the collision sends a special jamming signal to all other stations on the network. All stations then cease transmitting (back off) and wait a random period of time before attempting a retransmission. Random delay time for every station is different and thus, allows for prioritizing the stations on the network. If successive collisions take place, back off period for each station is doubled. With CSMA/CD stations should contend for the network. A station isn't guaranteed access to network. To detect the occurrence of a collision, a station should be capable of receiving and transmitting simultaneously. CSMA/CD is used by most LANs configured in a bus topology. Ethernet is an example of a LAN which uses CSMA/CD.
Parallelism Conditions As discussed earlier, parallel computing needs the segments to be executed in parallel should be independent of each other. So before executing paralleli
PRAM is one among the models which are used for designing the parallel algorithm as shown in Figure. The PRAM model comprises the following components: i) A group of identical
Q. Binary floating-point number range? Smallest Negative number Maximum mantissa and maximum exponent = - (1 -2 -24 ) × 2 127 Largest negative number
How does VB.NET/C# achieve polymorphism? VB.Net / C# give polymorphism through the following mechanisms: 1. Inheritance - base class gives overridable methods which are re-
Discuss about Simple Mail Transfer Protocol briefly. SMTP: It is sands for Simple Mail Transfer Protocol, is a protocol for sending e-mail messages among servers. Most e-
What are the Features of CISC Processors The standard features of CISC processors are listed below: CISC chips have a large amount of dissimilar and complex instructions.
E-brokerage. An e-brokerage is an investment house that permits you to buy and sell stocks and get investment information from its Web site.
The year is 2199. For many generations, the robotic Cyleth have faithfully served humanity. However, under the direction of the computerized superintelligence Skyweb, they have tur
Hard disk Architecture: A hard disk drive having the platters and motor hub removed indicating the copper colored stator coils surrounding a bearing at the cen
Define word length? Every group of n bits is referred to as a word of information and n is known as the word length.
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd