Name the protocol responsible for finding the mac address , Computer Networking

Assignment Help:

a)  What does the "CD" mean in the CSMA/CD? How is it implemented in the Ethernet?  

b)  Consider an Ethernet hub with 8 ports and an Ethernet switch with 8 ports. In both cases (hub and switch), each port is rated at 100 Mbps. Assume that you use either the hub or the switch to create a small home network of 8 hosts. Which of the two networks (hub-based or switch-based) will be able to achieve a greater total network throughput (the total throughput is defined here as the sum of individual throughputs over all simultaneous communications between the hosts connected to the network)?  Why?  

c)  Name the protocol (i.e. give its well-known acronym and full name) responsible for finding the MAC address of a host from its IP address.


Related Discussions:- Name the protocol responsible for finding the mac address

Network laye - fundamentals of networks , Network Laye The network  la...

Network Laye The network  layer provides  communication  between the multiple networks. Whereas the  data link  layer provides the  communication between  two systems on the s

Define the concept of repeaters, Can you define the concept of Repeaters, H...

Can you define the concept of Repeaters, Hubs, Bridges, Switches and Routers?

Importance of clientsin intranet server, Importace of Clientsin intranet se...

Importace of Clientsin intranet server The most interesting thing is that almost every computer can be connected as a client to the Intranet server. The client could be based

What are reasons behind using layered protocols, What are reasons behind us...

What are reasons behind using layered protocols  Reasons for using layered protocols, using them leads to breaking up design problem into smaller more manageable pieces and lay

Deadlock avoidance or prevention, Deadlock Avoidance To avoid deadlock...

Deadlock Avoidance To avoid deadlocks two types of strategies are used: 1) Static prevention: It uses V and P operators and Semaphores to allocate and deallocate shared res

Standard ip access-list use as test criteria, What does a Standard IP Acces...

What does a Standard IP Access-list use as test criteria Ans) Standard IP access list use only source address.

Explain about switching networks, Question 1: a. Differentiate between ...

Question 1: a. Differentiate between the several types of switching networks together with illustration. b. With the help of a diagram explain the two modes of operation un

Maximum packet lifetime, Take the maximum packet lifetime, T.  It's stated ...

Take the maximum packet lifetime, T.  It's stated that T must be big enough to make sure the packet and its ACK have vanished.  Why do we have to have the ACK?

Describe the importance of backups, Question: (a) Describe the importa...

Question: (a) Describe the importance of backups and the use of antivirus software. (b) With the help of an example/ illustration, explain the term encryption and explain

Key features of spontaneous networking, QUESTION a) Give a detailed exp...

QUESTION a) Give a detailed explanation of the following: Some dynamics systems can be built as variations on the client server model. b) Give one main drawback of the "Thin

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd