Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Explain about CSMA/CD
It is an access method used mainly with LANs configured in a bus topology. With CSMA/CD, any station (node) can transmit a message to any other station (or stations) as long as transmission medium is free of transmissions from other stations. Stations monitor (listen to) line to determine if line is busy. If the station has a message to send though the line is busy, it waits for an idle condition before sending its message. If two stations transmit at the same instance, a collision takes place. When this happens, station first sensing the collision sends a special jamming signal to all other stations on the network. All stations then cease transmitting (back off) and wait a random period of time before attempting a retransmission. Random delay time for every station is different and thus, allows for prioritizing the stations on the network. If successive collisions take place, back off period for each station is doubled. With CSMA/CD stations should contend for the network. A station isn't guaranteed access to network. To detect the occurrence of a collision, a station should be capable of receiving and transmitting simultaneously. CSMA/CD is used by most LANs configured in a bus topology. Ethernet is an example of a LAN which uses CSMA/CD.
Q. Show the conflict in register? All micro-operations written on a line are to be executed at same time provided the statements or a group of statements to be implemented toge
Write the truth table for a clocked J-K flip-flop that is triggered by the positive-going edge of the clock signal. Ans. Logic diagram of JK flip flop Truth T
Problem: (a) What are the two main advantages of sound? (b) UTMDigitlab ltd, specialized in digitizing sound, converts an audio stream of the latest album of Britney Spea
Define underflow and overflow. Underflow: If the result the arithmetic operation including n-bit numbers is too small to show by n-bits, underflow is said to occur. Overflow
Now let's define range which a normalised mantissa can signify. Let's presume that our present representations has normalised mantissa so left most bit can't be zero so it has to b
Class Program { static void Main() { int[] MyPrimeNumbers = {1,2,3,5,7}; // Use the Count() and Sum() Standard Query Operators to // compute the count an whole su
Q. VLSI Implementation of Control Unit? A main potential advantage of RISC is VLSI implementation of microprocessor. VLSI Technology has decreased the delays of transfer of inf
Translating from English to First-Order Logic: Still we have now seen some of examples of first order sentences, than you should practice writing down English sentences in fir
Name the Numerous household devices Numerous household devices now use microprocessors to control their different functions. The following is just a sample of common devices (d
What are Sequential Algorithms? The central assumption of the RAM model is that instructions are implemented one after another, one operation at a time. Accordingly, algorith
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd