The vulnerable timefor CSMA is the ________propagationtime.
A)
the sameas
B)
two times
C)
three times
D)
none of the above

1 Answer

Answer :

the sameas

Related questions

Description : Inslotted ALOHA, the vulnerable time is ______ the frame transmissiontime. A) the sameas B) two times C) three times D) none of the above

Last Answer : the sameas

Description : In pure ALOHA, the vulnerable time is ______the frame transmissiontime. A) the sameas B) two times C) three times D) none of the above

Last Answer : two times

Description : Given two sine waves A and B, if the frequency of A is twicethat of B, thenthe period of B is ________ thatof A. A) one-half B) twice C) the sameas D) indeterminate from

Last Answer : twice

Description : The minimum bandwidth of Manchester and differential Manchester is ____that of NRZ. A) the sameas B) twice C) thrice D) none of the above

Last Answer : twice

Description : In_______, collisions are avoidedthrough theuse of three strategies: the interframe space, the contention window,and acknowledgments. A) CSMA/CA B) CSMA/CD C) either (a)or (b) D) both (a) and (b)

Last Answer : CSMA/CA

Description : In _______, collisions are avoided through the use of three strategies: the interframe space, the contention window, and acknowledgments. A. CSMA/CA B. CSMA/CD C. either (a) or (b) D. both (a) and (b)

Last Answer : A. CSMA/CA

Description : The RTS and CTS frames in CSMA/CA ____ solvethe hidden stationproblem. The RTS and CTS frames in CSMA/CA ____ solve the exposed station problem. A) can; cannot B) cannot; can C) can; can D) cannot; cannot

Last Answer : can; cannot

Description : In IEEE 802.11, the access method used in the DCF sublayer is _________. A) ALOHA B) CSMA/CA C) CSMA/CD D) none of the above

Last Answer : CSMA/CA

Description : Toavoid collisions on wireless networks, ________was invented. A) CSMA/CA B) CSMA/CD C) either (a)or (b) D) both (a) and (b)

Last Answer : CSMA/CA

Description : In ________,a station monitors the medium after it sends a frame to see if the transmission was successful. If so, the station is finished. If, however, there is a collision, the frameis sentagain. A) CSMA/CA B) CSMA/CD C) either (a)or (b) D) both (a) and (b)

Last Answer : CSMA/CD

Description : __________ augments the CSMA algorithm todetect collision. A) CSMA/CA B) CSMA/CD C) either (a)or (b) D) both (a) and (b

Last Answer : CSMA/CD

Description : ________ requires that each station first listento the medium before sending. A) MA B) CSMA C) FDMA D) CDMA

Last Answer : CSMA

Description : In ______, the chanceof collisioncan be reduced if a station senses the medium beforetrying touse it. A) MA B) CSMA C) FDMA D) CDMA

Last Answer : CSMA

Description : The _____sublayer is responsible for the operation of the CSMA/CD access method and framing. A) LLC B) MII C) MAC D) none of the above

Last Answer : MAC

Description : The IEEE 802.3 Standard defines _________ CSMA/CD as the access method for first-generation 10-Mbps Ethernet. A) 1-persistent B) p-persistent C) non-persistent D) none of the above

Last Answer : 1-persistent

Description : In Ethernet CSMA/CD, the special bit sequence transmitted by media access management to handle collision is called a. Preamble b. Postamble c. Jam d. None of the above

Last Answer : c. Jam

Description : The minimum frame size required for a CSMA/CD based computer network running at 1 Gbps on a 200m cable with a link speed of 2 × 108m/s is a. 125 bytes b. 250 bytes c. 500 bytes d. None of these

Last Answer : b. 250 bytes

Description : Which of the following statements is TRUE about CSMA/CD a. IEEE 802.11 wireless LAN runs CSMA/CD protocol b. Ethernet is not based on CSMA/CD protocol c. CSMA/CD is not suitable for a high propagation delay network like satellite network d. There is no contention in a CSMA/CD network

Last Answer : CSMA/CD is not suitable for a high propagation delay

Description : Consider a CSMA/CD network that transmits data at a rate of 100 Mbps (108 bits per second) over a 1 km (kilometre) cable with no repeaters. If the minimum frame size required for this network is 1250 bytes, what is the signal speed (km/sec) in the cable? a. 8000 b. 10000 c. 16000 d. 20000

Last Answer : d. 20000

Description : Which of the following is the multiple access protocol for channel access control? a. CSMA/CD b. CSMA/CA c. Both CSMA/CD & CSMA/CA d. HDLC

Last Answer : c. Both CSMA/CD & CSMA/CA

Description : Which of the following is the multiple access protocol for channel access control? A. CSMA/CD B. CSMA/CA C. Both CSMA/CD & CSMA/CA D. HDLC

Last Answer : C. Both CSMA/CD & CSMA/CA

Description : Explain CSMA/CD and CSMA/CA.

Last Answer : CSMA- resolving the media contention. Carrier Sense Multiple Access with Collision Detection (CSMA/CD) Listen for Data Transmission on Cable (Carrier Sense) When Medium is free a) Transmit ... time, and transmit again. Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) Nov/Dec

Description : What is CSMA/CA?

Last Answer : ∙ CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) is a protocol for carrier transmission in 802.11 networks. ∙ CSMA/CA acts to prevent collisions before they happen. ∙ In CSMA/CA, as soon as a node receives a packet that is to be sent, it checks to be sure the channel is clear.

Description : What is CSMA/CD?

Last Answer : Carrier Sense Multiple Access with Collision Detection (CSMA/CD) When a station has a frame to transmit: 1) Listen for Data Transmission on Cable (Carrier Sense) 2) When Medium is Quiet (no ... for Collision. b) If collision is heard, stop transmitting, wait random time, and transmit again.

Description : Transmission system for a multidrop network A. Taken passing B. Polling C. Switching D. CSMA/CD

Last Answer : B. Polling

Description : Ethernet is baseband system using CSMA/CD operating at A. 20 Mbps B. 10 Mbps C. 30 Mbps D. 40 Mbps

Last Answer : B. 10 Mbps

Description : Explain the terms topology and access methods used in LANs. Discuss the CSMA/CD and CSMA/CA protocols.

Last Answer : (i) LAN topologies: Network topology is a physical schematic which shows interconnection of the many users. There are four basic topologies as under:  (a) Direct Connection or one to all ... it is free, the station transmits, and waits for an acknowledgment signal that the packet was received

Description : The reason a CSMA/CD network has a minimum length for packets is:

Last Answer : to make sure all other nodes hear a collision in progress

Description : LAN? a) CDMA b) CSMA/CA c) ALOHA d) CSMA/CD

Last Answer : b) CSMA/CA

Description : Which IEEE standard is developed for CSMA/CD a. IEEE 802.1 b. IEEE 802.2 c. IEEE 802.3 d. IEEE 802.4

Last Answer : c. IEEE 802.3

Description : Which multiple access technique is used by IEEE 802.11 standard for wireless LAN? a. ALOHA b. CSMA/CA c. CDMA d. none of the mentioned

Last Answer : b. CSMA/CA

Description : Have you ever admitted to someone you love them so much you're vulnerable to them?

Last Answer : I have been so open about my love for my wife Sandra. We have an amazing relationship and I feel no risk at all in making myself vulnerable to her. I did this very early in our relationship and it has never given me cause to feel regret. We are together over 11 years.

Description : What makes you feel vulnerable?

Last Answer : The idea that my life is now entirely in my own hands and that I don’t have a partner to help or hinder me. How do I deal with it? Sometimes with planning: sometimes with Xanax.

Description : When do you feel most vulnerable?

Last Answer : Right now…

Description : What do you suppose happens, in the end, to a person who is vulnerable and also courageous at the same time?

Last Answer : She dies. We all do. What else can be said?

Description : Should Hepatitis B carriers be prevented from working with "vulnerable population"?

Last Answer : answer:Hep B is acquired through blood transmition. Maybe you can catch it during the brith process, but I had not been aware of that. Now, you are talking about what is legal in terms of ... I think itis fine to discriminate and not allow people who are infected to do certain types of jobs.

Description : Is the United States becoming more vulnerable, to the rest of the World?

Last Answer : Yes. We were possessed of “overkill” ability and a smaller, modernized and well maintained nuclear arsenal is more to be desired.

Description : Do you feel vulnerable if you wear a skirt and heels while out by yourself?

Last Answer : i do. jiggles pelvis, winks

Description : I am a thing of eternal paradox. My courage is fueled by righteous anger, but I am blinded by consuming rage, fed from my grudges. My empathy makes me vulnerable to others grief, but in the end, it is ... that my entire world will one day fade into dust, I am overwhelmed with joy. Who am I? -Riddles

Last Answer : This answer was deleted by moderators

Description : What are Vulnerable species ? Give four examples. -SST 10th

Last Answer : These are the species whose population has declined to levels from where it is likely to move into the endangered category in the near future if the negative factors continue to operate such species. The examples of such species are Blue sheep, Asiatic elephant, Gangetic dolphin, etc.

Description : What is meant by ‘ Vulnerability’ to poverty? Which economic categories are more vulnerable to poverty in India. -Economics 9th

Last Answer : Economic categories more vulnerable to poverty in India: Schedule tribes, urban casual labourers, rural agriculture labourers, scheduled castes are major economic groups, which are more vulnerable to poverty ... tribes contribute to 51% of poverty in India which average Indian poverty ratio is 26.

Description : Why is this family vulnerable? -Economics 9th

Last Answer : Examples of circumstances that might lead to vulnerability are poverty, single parenting, unemployment, relationship problems, illness, frequent family relocation, family violence, alcohol and other drug use, racism and other forms of discrimination, and social isolation.

Description : The Weimar constitution had some inherent defects, which made it unstable and vulnerable to dictatorship.”LIST 2 such defects. -History 9th

Last Answer : The inherent defects of Weimar Republic were: The system of proportional representation made it difficult for a one party to achieve a majority. This lead to a rule by coalitions. Article 48 ... on an average 239 days. As a result, Weimar Republic was unstable and vulnerable to dictatorship.

Description : The Weimar constitution had some inherent defects, which made it unstable and vulnerable to dictatorship.”LIST 2 such defects. -History 9th

Last Answer : The Weimar Constitution had some inherent defects, which made the government weak and unstable and vulnerable to dictatorship.

Description : “The Weimar constitution had some inherent defects, which made it unstable and vulnerable to dictatorship.”LIST 2 such defects. -History 9th

Last Answer : Weimar Republic was very fragile. After the defeat of Germany in the First World War, Germans held the new Weimar Republic responsible for not only the defeat in the war but also the disgrace at Versailles.The ... , which seemed to offer no solutions. Hence, it led to the rise of Nazism in Germany.

Description : Why are pandas vulnerable?

Last Answer : Red Pandas are vunerable, because their natural habitat is beingchopped down.

Description : Why Clouded Leopards are VULNERABLE?

Last Answer : Feel Free to Answer

Description : Why are staghorn vulnerable?

Last Answer : Feel Free to Answer

Description : Why does the author believe that writers are vulnerable and tense?

Last Answer : Need answer

Description : Why are pandas vulnerable?

Last Answer : Red Pandas are vunerable, because their natural habitat is beingchopped down.