Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Explain the terms topology used in LANs.
(i) LAN topologies: This network topology is a physical schematic that shows interconnection of the several users. There are four fundamental topologies as follows:
(a) One to all topology or direct connection
(b) Star topology
(c) Bus Topology
(d) Ring topology
(ii) Access methods utilized in LAN:
i. Switched access
ii. Multiple accesses
iii. Token passing access
(iii) CSMA/CD: this is an access method used mainly with LANs configured in a bus topology. Along with CSMA/CD, any station (node) can send a message to another station (or stations) as long as the transmission medium is free of transmissions from another station. Stations monitor (listen to) the line to find out if the line is busy. If the station has a message to transmit but the line is busy, this waits for an idle condition before transmitting message of this. If two stations transmit at similar time, collisions arise. When this occurs, the station first sensing the collision sends a special jamming signal to all other stations on the network. All stations then cease transmitting (back off) and wait a random period of time before attempting a retransmission. The random delay times for all stations are different, and therefore, permit for prioritizing the stations on the network. If successive collisions happen, the back off period for every station is twice. Along with CSMA/CD stations should contend for the network. A station has not guaranteed access to the network. To notice the occurrence of a collision, a station must be capable of transmitting and receiving simultaneously. CSMA/CD is used with most LANs configured in a bus topology. Ethernet is an illustration of a LAN which uses CSMA/CD.
a. Explain Standard Streams and file streams. Differentiate among two types of stream. b. Write a program in C++ that inputs characters from the keyboard and prints them in reve
When Workday opened in 2005, the company had no idea it would be regarded as the most successful IPO of 2012. The introduction of cloud computing into the HR and financial systems
Q. Criteria for selecting a theme for a project? Topics for projects as we indicated earlier should emerge from the children's world. Teaching often becomes boring and unintere
draw a binary tree from its inorder and preorder traversal sequences given as follows: inorder: d b g e h a c n f preorder: a b d e g h c f n
The process of entering data into a ROM is called ? Ans. The process of entering data in ROM is termed as programming the ROM.
Discuss the mount and unmount system calls. The privileged mount system call is used to join a file system to a directory of another file system; the unmount system call detach
Which digital logic family has minimum power dissipation ? Ans. The minimum power dissipation of digital logic family is CMOS. CMOS being an unipolar logic family, occupy a to
How many TCP connections are in the "Established" state? Contain relevant output. For one of the established TCP connections, what are the IP address and port number at the remote
Binary Search Now that the basic framework is working, it is time to begin implementing a few alternative search functions. Each of these search algorithms have strengths and
What is the advantage of caching in a web browser? Like other application browsers utilize a cache to enhance document access. The browser places a copy of all items it retriev
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd