Question

In: Computer Science

Computer Networks IT 210 Please Use your own words . sorry No handwriting no copy paste...

Computer Networks IT 210
Please Use your own words .
sorry No handwriting
no copy paste
Explain the difference between hub and switch in term of traffic management.
thank you for time and effort

Solutions

Expert Solution

Hub: Hub transfers the info or data to every port. e.g If there are 4 computers connected by a hub and A sends data to the hub, it is sent to every connected computer. Whoever is the receiver, receives the data/info and the other computer ignores the info/data. It doesn't store the addresses of the ports. There is no control or security on data/info. Data or info flows freely to every port. It works on layer 1 of the OSI model i.e. physical layer. It is usually used to connect ethernets to work as a single unit.

Switch: switch has better traffic management than the hub. Switch knows the address of every port. So if any data or info arrives at it, it read the destination address of that info/data and sends info/data to that address. So there is one to one connection(kind of). Switches are usually used to connect different computers using LAN. There is restrictions on data flow, It flows only in one direction and reaches only its destination. A switch is part of the data link layer. Switches know mac addresses of each computer that is connected to it


Related Solutions

Computer Networks IT 210 Please Use your own words . sorry No handwriting no copy paste...
Computer Networks IT 210 Please Use your own words . sorry No handwriting no copy paste Noise is one of the causes of transmission impairment. There are several types of noise, mention three and explain them briefly in your own words. thank you for time and effort
Please, Use your own words . sorry No handwriting. COURSE: Human Computer Interaction Usability testing is...
Please, Use your own words . sorry No handwriting. COURSE: Human Computer Interaction Usability testing is a significant aspect for effective interface development. List and briefly describe any four methods of usability testing. N.B. The question asks about methods of usability testing not tools used in usability testing (surveys are an example of tools).
1. Don't use handwriting,please. 2. Don't copy and paste use your own words. 3. I need...
1. Don't use handwriting,please. 2. Don't copy and paste use your own words. 3. I need Reference link . (important) Q1:What is the difference between a population and a sample in statistics? (in details) Q2. How to interpret confidence intervals and confidence levels?(in details) Q3. Why the p-value is important?(in details)
**Please don't use handwriting **Please don't copy and paste use your own word Q1:What are the...
**Please don't use handwriting **Please don't copy and paste use your own word Q1:What are the roles of a project sponsor and the approval committee during the different SDLC phases? Part 2: Assume the following scenario: A small company needs to develop an information system for the Finance and Accounting Department. As an analyst which process model would you prefer and why? Part 3:There are three techniques which help users discover their needs for the new system, list and compare...
1. Don't use handwriting. 2. Don't copy and paste (((use your own words.)))) Q1:What is the...
1. Don't use handwriting. 2. Don't copy and paste (((use your own words.)))) Q1:What is the difference between a population and a sample in statistics? (in details) (((use your own words.)))) Q2. How to interpret confidence intervals and confidence levels?(in details) (((use your own words.)))) Q3. Why the p-value is important?(in details) (((use your own words.))))
Web Technologies IT230 Please Use your own words . sorry No handwriting. Users prefer to stream...
Web Technologies IT230 Please Use your own words . sorry No handwriting. Users prefer to stream high quality videos (e.g., watch YouTube) without lagging (i.e., slow loading). In this context, explain how UDP is better than TCP when streaming videos? thank you
need new and unique answers, please. (Use your own words, don't copy and paste), Please Use...
need new and unique answers, please. (Use your own words, don't copy and paste), Please Use your keyboard (Don't use handwriting) Thank you.. PHC 231 1.   Discuss Central Line-Associated Bloodstream Infection (CLABI) "or" Ventilator-Associated Pneumonia (VAP) outbreak in long-term acute care hospital settings. Address the following in your report: a)   Characterize the epidemiology and microbiology b)   Describe the agent, and identify the host and the environment that is favorable for the infection. c)   Discuss how the infections spread and the...
need new and unique answers, please. (Use your own words, don't copy and paste), Please Use...
need new and unique answers, please. (Use your own words, don't copy and paste), Please Use your keyboard (Don't use handwriting) Thank you.. The data warehouse is one of the most important business intelligence tools a business needs to have. It turns the massive amount of data generated from multiple sources into a format that is easy to understand. Discuss the data warehouse concept?
need new and unique answers, please. (Use your own words, don't copy and paste), Please Use...
need new and unique answers, please. (Use your own words, don't copy and paste), Please Use your keyboard (Don't use handwriting) Thank you.. Q3: You have been hired to design a database for prescriptions for RX pharmacies and your first job now is to design an ER model for this database using the following description of that world. i. patients are identified by their SSN and have other attributes as names, addresses, and ages. ii. Doctors are identified by their...
Please use your own words, don't copy and paste Any implementation of IoT is going to...
Please use your own words, don't copy and paste Any implementation of IoT is going to have risks associated with it. Risks could range from fairly insignificant to very destructive depending on the market, equipment, number of people affected, and numerous other factors. Please discuss the following: what are some of the known vulnerabilities in the healthcare industry? what type of data is being transmitted or stored? what is the security risk with the data being compromised? Is the security...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT