Question

In: Electrical Engineering

How does Wireless Ethernet architecture, prevents the hidden node problem? Ding real time transmission Handshaking after...

  1. How does Wireless Ethernet architecture, prevents the hidden node problem?
    1. Ding real time transmission
    2. Handshaking after transmission of data
    3. Handshaking before transmission of data
    4. Acknowledgement of every packet transmitted

  1. What is the purpose of the Network Address Translation (NAT)?
  1. To divide the network into subnet works
  2. To receive all data sent to private networks
  3. Allow private IP addresses to work
  4. Convert private IP addresses to public IP addresses

  1. The binary number 1011111 is equivalent to which decimal number below
  1. 125
  2. 65
  3. 128
  4. 95

  1. Which word or phrase below best describes a subnet mask
  1. A thing you put on your face
  2. A filter
  3. Creates the IP address for the network
  4. Determines the path of data to the sub-network

  1. The packet by which data is transmitted on ethernet architecture is called a frame. How many bytes is the length of that frame?
    1. 47 – 1500 bytes
    2. 46 – 1500 bits
    3. 46 – 1500 bytes
    4. Too many bytes to count

  1. In ethernet architecture the most common topology used is
    1. Bus
    2. Extended star
    3. Wireless
    4. star

Solutions

Expert Solution

1) option C is the correct answer. The wireless ethernet architecture prevents the hidden node problem by hand shaking before transmission of data. The wireless ethernet architecture is the best method for two way communication.

2) option C is the correct answer.NAT stands for network address translation. The purpose of NAT is to allow a private IP network which have unregistered IP address to connect to the internet easily. That means it allows private IP addresses to work.

3) option d is the correct answer. The decimal equivalent of the binary number 1011111 is 95.

4) option C is the correct answer. Subnet Mask is a numerical number which assigns the range of IP address for a given network. Therefore we can say it creates the IP addresses for the network.

5) option C is the correct answer. Size of the frame in Ethernet data transmission is 45-1500 bytes.

6) option A is the correct answer. The most common topologies used in Ethernet network is a bus topology. Star topology is also good choice for operation in Ethernet connection.


Related Solutions

What is the hidden-terminal problem as it relates to CSMA in wireless sensor networks?
What is the hidden-terminal problem as it relates to CSMA in wireless sensor networks?
Explain what is RTS/CTS scheme. How can they mitigate the exposed node and hidden node problems?
Explain what is RTS/CTS scheme. How can they mitigate the exposed node and hidden node problems?
How does the "hidden" curriculum impact one's college education?
How does the "hidden" curriculum impact one's college education?
How does a capacitance affect Long Transmission lines? If the receiving end of the long transmission...
How does a capacitance affect Long Transmission lines? If the receiving end of the long transmission is open circuited, is there a current flow at the sending end?
Does treatment planning involve so much paperwork and time that it prevents counselors from providing adequate...
Does treatment planning involve so much paperwork and time that it prevents counselors from providing adequate attention to clients?
Why does TCP operate poorly in Wireless Networks? Given an example to illustrate the problem.
Why does TCP operate poorly in Wireless Networks? Given an example to illustrate the problem.
Computer Architecture Theme: External Memory (DISK/CD) Define rotational delay, access time and transfer time. Does the...
Computer Architecture Theme: External Memory (DISK/CD) Define rotational delay, access time and transfer time. Does the hard drive/CDROM run on CLV or CAV? Why is the capacity of DVD more than a CD?
What are real time devices important for patient monitoring after discharge
What are real time devices important for patient monitoring after discharge
How much time does an algorithm take to solve a problem of size n if this...
How much time does an algorithm take to solve a problem of size n if this algorithm uses 2n2 + 2n operations, each requiring 10-8 seconds, with these values of n? a) 10: b) 20: c) 50: d) 100
How does root system architecture change in response to phosphorus deficiency?
How does root system architecture change in response to phosphorus deficiency?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT