Explain the operation of a token ring topology for a lan, Computer Networking

Assignment Help:

Question:

(a) Show by means of a diagram the Ethernet frame structure and describe the six fields of the Ethernet frame structure.

(b) Explain the operation of the Carrier Sense Multiple Access/Collision Detection (CSMA/CD) contention technique used by Ethernet.

(c) Explain the characteristics of CSMA/CD in terms of:

i. Order of transmission.
ii. Length of wait time before transmission takes place.
iii. Network saturation.
iv. Capture effect.

(d) What is the purpose of the terminator at each end of a bus in a bus topology.

(e) Explain the operation of a Token Ring topology for a LAN. Your answer should include

i. A description of the token passing process.
ii. The specific IEEE standard.
iii. The problems inherent with a ring topology.


Related Discussions:- Explain the operation of a token ring topology for a lan

Describe circuit switching, Circuit switching is a term used in communicati...

Circuit switching is a term used in communication where the communicating nodes will be connected through a dedicated channel before any communication may take place. The methodolo

#titlenetwork, importance of mail server ,proxy server ,modem ,intranet and...

importance of mail server ,proxy server ,modem ,intranet and web site

Types of Networking, How can I identify the difference types of networks

How can I identify the difference types of networks

Use of two-layer switch, Q. Use of Two-Layer Switch? - Performs at the ...

Q. Use of Two-Layer Switch? - Performs at the physical as well as data link layer - A bridge with many ports designed for faster performance - Allocates unique port to ea

Explain different protocols of internet, WEB TECHNOLOGY 1. Explain diff...

WEB TECHNOLOGY 1. Explain different protocols of internet. 2. Differentiate between DHTML and HTML. 3. What do you understand by Event-driven Programming? Classify differ

Address space, Internet addresses are divided in five distinct types of cla...

Internet addresses are divided in five distinct types of classes. The classes were designated A by E. class A address space lets a small number of networks although a large number

What is beaconing, Normal 0 false false false EN-IN X...

Normal 0 false false false EN-IN X-NONE X-NONE MicrosoftInternetExplorer4

Security impact of not having a public key infrastructure, (a) You are pro...

(a) You are provided with the following: A. An RSA facility complete with public/private key pair B. A CBC (cipher block chaining) facility incorporating the IDEA block ciph

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd