What is the problem and its solution in multiple access transmission in networking?

1 Answer

Answer :

that of determining who gets to talk (i.e., transmit into the channel), and when.Computer networks similarly have protocols - so-called multiple access protocols - by which nodes regulate their transmission onto the shared broadcast channel.

Related questions

Description : Satellite-Switched Time-Division Multiple Access (SS/TDMA) is A. the method of determining whichdevice has access tothe transmission medium at any time. B. a medium access control technique for ... switching is used to dynamically changethechannel assignments D. All of theabove E. None of the above

Last Answer : a form of TDMA in which circuit switching is used to dynamically changethechannel assignments

Description : Transmission protocol, PRMA stands for _________ a) Pocket reservation multiple access b) Packet register multiple access c) Pocket register multiple access d) Packet reservation multiple access

Last Answer : d) Packet reservation multiple access

Description : WAN is a most used abbreviation in Networking, what is its full form? A) WAP Area Network B) Wide Area Network C) Wide Array of Network D) Wireless Access Network

Last Answer : Answer : B

Description : Rearranging and allocating space in memory to provide for multiple computing tasks is called (1) Networking (2) Multiprogramming (3) Multitasking (4) Memory Management

Last Answer : Memory Management

Description : Wireless Access Points For Home Networking?

Last Answer : To improve or expand an existing home or office wireless internet network, an access point comes in handy. A wireless access point basically allows additional Ethernet and Wi-Fi ready ... capabilities, and encryption security. In general, access points cost less than wireless internet routers.

Description : What is the benefit of the Networking? A. File Sharing B. Easier access to Resources C. Easier Backups D. All of the Above

Last Answer : D. All of the Above

Description : Attempting to gain access to a network using an employee’s credentials is called the _____________ mode of ethical hacking. a. Local networking b. Social engineering c. Physical entry d. Remote networking

Last Answer : d. Remote networking

Description : I need to utilize a "Social Networking" bolt on solution...

Last Answer : answer:You would go to an SEO marketing group. this San Diego based group does a fine job. They are called SEO HAUS. They are going forward and passing up SEO into the next generation of ... Twitter, Tumblr, YouTube Account etc and have you firing on all cylinders in a subtle and consistent manner!

Description : How to solve networking problem -- one wireless and one wired pc to talk to each other on a network?

Last Answer : answer:A permissions problem? Something odd about the driver on the XP side? Try downloading a free program from Cisco called Network Magic. It helps people set up small home networks just like the one you are describing. Edit: Are the drives explicitly shared?

Description : Can someone help me with a networking problem?

Last Answer : Welcome to Fluther. This is a great example of what a Fluther question should be. GQ to you for that. Unfortunately I have no idea how to set up such networks. You'll have to wait for some of the ... it for free). Edit: I checked your account to realise that you're not that new after all. Whoopsie.

Description : Modulation means A. Varying of information B. Utilization of a single transmission channel to carry multiple signals C. Varying of some parameters of a carrier such as its amplitude to transmit information D. Transmit pulses in DC form on a copper wire

Last Answer : C. Varying of some parameters of a carrier such as its amplitude to transmit information

Description : Which ARQ mechanism deals with the transmission of only damaged or lost frames despite the other multiple frames by increasing the efficiency & its utility in noisy channels? a. GoBackN ARQ b. Selective Repeat ARQ c. StopandWait ARQ d. All of the above

Last Answer : b. Selective Repeat ARQ

Description : Where should I put a game on my mac so that multiple accounts can access it?

Last Answer : answer:Finder>Home>Shared That should do the trick.

Description : What is S-Band Multiple Access (SMA) ?

Last Answer : S-Band Multiple Access (SMA) is a technology used by the Tracking and Data Relay Satellite System (TDSS) to provide S-band services. TDRSS provides S-band service through SMA phased arrays. ... gain antenna beams at ground terminals. Material subsets are used to transmit TDRS forward links to users.

Description : A multiple access technique used in GSM cellular system A. TACS B. FDMA C. TDMA D. CDMA

Last Answer : C. TDMA

Description : ________is a multiple-access method in which the available bandwidthof a link is shared in time, frequency, or through code, between different stations. A) Random access B) Controlledaccess C) Channelization D) none of the above

Last Answer : Channelization

Description : Which of the following is the multiple access protocol for channel access control? a. CSMA/CD b. CSMA/CA c. Both CSMA/CD & CSMA/CA d. HDLC

Last Answer : c. Both CSMA/CD & CSMA/CA

Description : Which of the following is the multiple access protocol for channel access control? A. CSMA/CD B. CSMA/CA C. Both CSMA/CD & CSMA/CA D. HDLC

Last Answer : C. Both CSMA/CD & CSMA/CA

Description : You want to understand if users use their mobile phone to access your site. Which of the following approach is preferable? A. Ask "Are you using a mobile phone to access our site?" ... report Audience/Mobile/Overview D. This cannot be known because people use multiple devices to browse the Web

Last Answer : C. Look at the report Audience/Mobile/Overview

Description : Point out the correct statement. a) A client can request access to a cloud service from any location b) A cloud has multiple application instances and directs requests to an instance based on ... a set of virtual machines with each machine being assigned a workload d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) A client can request access to a cloud service from any location b) A cloud has multiple application instances and directs requests to an instance based on ... a set of virtual machines with each machine being assigned a workload d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) A client can request access to a cloud service from any location b) A cloud has multiple application instances and directs requests to an instance based on ... a set of virtual machines with each machine being assigned a workload d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) A client can request access to a cloud service from any location b) A cloud has multiple application instances and directs requests to an instance based on ... a set of virtual machines with each machine being assigned a workload d) All of the mentioned

Last Answer : All of the mentioned

Description : Write about Channel Access on links. Multiple Access Techniques Frequency Division Multiple Access

Last Answer : ∙ In frequency-division multiple access (FDMA), the available bandwidth is divided into frequency bands. ∙ Each station is allocated a band to send its data. ∙ When any one frequency level is ... called chips. ∙ Chips will be added with the original data and it can be transmitted through same

Description : Which of these statements highlights a valid privacy concern when working with large data sets? I. Data from multiple sources could be linked together to discover someone's identity. II. For access to location-based services, a ... . I and II only B. I only C. I and III only D. I, II and III

Last Answer : B. I only

Description : It is better to use files than a DBMS when there are (A) Stringent real-time requirements. (B) Multiple users wish to access the data. (C) Complex relationships among data. (D) All of the above.

Last Answer : (B) Multiple users wish to access the data.

Description : Which of the following multiple access techniques are used by second generation cellular systems? a) FDMA/FDD and TDMA/FDD c c) FDMA/FDD and CDMA/FDD d) FDMA/FDD only

Last Answer : b) TDMA/FDD and CDMA/FDD

Description : UMTS use which multiple access technique? a) CDMA b) TDMA c) FDMA d) SDMA

Last Answer : a) CDMA

Description : In wireless distribution system __________ a) multiple access point are inter-connected with each other b) there is no access point c) only one access point exists d) access points are not required

Last Answer : a) multiple access point are inter-connected with each other

Description : Which multiple access technique is used by IEEE 802.11 standard for wireless LAN? a. ALOHA b. CSMA/CA c. CDMA d. none of the mentioned

Last Answer : b. CSMA/CA

Description : List the various multiple access techniques.

Last Answer : 1. Frequency Division Multiple Access (FDMA) 2. Time Division Multiple Access (TDMA) 3. Code Division Multiple Access (CDMA) 4. Space Division Multiple Access (SDMA)

Description : Diamonds are glittering and attractive because light incident on them undergoes – (1) highest refraction (2) multiple internal reflections (3) multiple surface reflections (4) hundred percent transmission

Last Answer : (2) multiple internal reflections Explanation: Diamond has remarkable optical characteristics. Because of its extremely rigid lattice, it can be contaminated by very few types of impurities, such as boron and ... ), brown (lattice defects), green (radiation exposure), purple, pink, orange or red.

Description : ________is the set of techniques that allows the simultaneous transmission of multiple signalsacrossa single data link. A) Demodulating B) Multiplexing C) Compressing D) None of the above

Last Answer : Multiplexing

Description : Diamonds are glittering and attractive because light incident on them undergoes (1) highest refraction (2) multiple internal reflections (3) multiple surface reflections (4) hundred percent transmission

Last Answer : multiple internal reflections

Description : Which of the following is required to communicate between two computers? a. communications software b. protocol c. communication hardware d. all of above including access to transmission medium

Last Answer : all of above including access to transmission medium

Description : What is not a role of encryption? a)It is used to protect data from unauthorized access during transmission. b)It is used to ensure user authentication c)It is used to ensure data integrity d)It is used to ensure data corruption does not happens

Last Answer : d)It is used to ensure data corruption does not happens

Description : Which of the following is required to communicatebetween two computers? A. communications software B. protocol C. communicationshardware D. access to transmission medium E. All of theabov

Last Answer : All of theabov

Description : Secure communication means a. Protect transmission of credit card number b. Guarantee privacy of customer c. Unauthorized access of payment details d. All the above

Last Answer : d. All the above

Description : Which is the protocol for performing RPCs between applications in a language and system independent way? (A) Hyper Text Transmission Protocol (HTTP) (B) Simple Network Management Protocol (SNMP) (C) Simple Object Access Protocol (SOAP) (D) Simple Mail Transfer Protocol (SMTP)

Last Answer : (C) Simple Object Access Protocol (SOAP)

Description : . A dilute aqueous solution is to be concentrated in an evaporator system. High pressure steam is available. Multiple effect evaporator system is employed, because (A) Total heat transfer area of ... in a single effect is much lower than that in any effect in a multi-effect system

Last Answer : (B) Total amount of vapor produced per Kg of feed steam in a multiple effect system is much higher than in a single effect

Description : For evaporation of viscous solution in a multiple effect evaporator, the preferred feeding scheme is (A) Forward (B) Backward (C) Parallel (D) None of these

Last Answer : (B) Backward

Description : Third component of a planning system is to ___________ a) Detect when a solution has been found b) Detect when solution will be found c) Detect whether solution exists or not d) Detect whether multiple solutions exist

Last Answer : a) Detect when a solution has been found

Description : Pick out the wrong statement. (A) The value of hydrostatic head increases with increase in vacuum in the effect in a multiple effect evaporator system (B) Entering velocity of the liquid in ... a multiple effect evaporation system, the number of effects is limited by the total boiling point rise

Last Answer : (C) Duhring's plot is used for calculating the concentration of solution

Description : A Solution to overcome the challenge to support a large number of application service consumers from around the world, cloud infrastructure providers (i.e., IaaS providers) have established data ... ) Global exchange of cloud resources b) Resource provisioning c) Cloud security d) Resource sharing

Last Answer : Global exchange of cloud resources

Description : Have you been trolled on a social networking site?

Last Answer : Someone set up a clone of my Facebook page and tried to establish friendships with those in my friends list. I reported it to Facebook who took down the bogus site within 4 hours.

Description : How do I start a social networking website with some technical knowledge?

Last Answer : ask-public is powered by Python. can learn that.

Description : Which are the social networking sites you use other than Facebook?

Last Answer : If I take your details, then I really don't have anything else other than Facebook. Facebook is something really big here (Twister isn't so popular) and as long as people have connection, almost ... important notification. I don't like Facebook but I have to admit that without Facebook, I'm done.

Description : When someone says 'Use Bridging' in a networking context, do they mean Windows adapter bridging or Router bridging?

Last Answer : Since it is a VPN set up by windows I would guess windows adapter bridging.

Description : Any advice on networking for the first time at an event?

Last Answer : I think dressing fairly professionally would be a good way to go. As this is meeting people in a possible business capacity, it is important to look the part. I think if you just go up and introduce ... being asked for their advice. These after all, are the best people to give their advice to you.