1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Maru [420]
3 years ago
14

Suppose there are 4 nodes sharing a broadcast channel using TDMA protocol. Suppose at time t=0: • Node 1 has 6 frames to transmi

t, • Node 2 has 4 frames to transmit, • Node 3 has 8 frames to transmit, • Node 4 has 3 frames to transmit. Maximum number of frames which can be transmitted by a node in a time slot = 3 The time required to transmit one frame = 1 Second Explain how TDMA protocol works to complete this task? How much time will it take to transmit all frames?
Computers and Technology
1 answer:
Yakvenalex [24]3 years ago
8 0

Answer:

Following are the description of the given nodes:

Explanation:

The Multiple Access frequency - division facilitates control by granting every node a fixed time slot. Also, every slot seems to be identical in width. Its whole channel bandwidth is often used in every channel node. Compared to FDMA it takes more time.  

Time slot=3 frames for all the above scenario

  • In the first point, It is reserved the node 1, and as well as 3 frames were also transmitted 1.  
  • In the second point, It is reserved the node 2, and as well as 3 frames are transmitted.
  • In the third point, It is reserved 3 nodes, and as well as 3 frames were transmitted.  
  • In the fourth point, It is reserved 4 slots and the transmit 3 frames.  
  • In the fifth point, It stores the slot 1 and the transmit 3 frames.  
  • In the sixth point, It stores the slot 2 and the transmit 1 frame.  
  • In the seventh point, It stores the slot 3  and the transmit 3 frames.  
  • In the Eight points, It stores the slot 3 and the transmit 2 frames.  

Time interval = number of frames in first slot Time to send 1 frame number of images  

                      = 8 \times 3 \times 1 \\\\  = 8 \times 3 \\\\= 24 \ seconds

You might be interested in
_____ transparency exists when the end user or programmer must specify the database fragment names but does not need to specify
madam [21]

Answer:

The correct answer to the following question will be "Local mapping".

Explanation:

  • A data independence standard in global DBMSs where questions can be constructed without understanding the local formats. Knowledge of quotas of pieces and components is however important.
  • With the transparency of local mapping, the user wants to determine both fragment location and name of data items, keeping in mind any replication that may occur.
  • This is clearly a more complicated and time-consuming question for all the users to answer than the first. A program that only offers it the amount of transparency would be unlikely to be satisfactory to later part-users.

Therefore, "Local mapping" is the right answer.

6 0
3 years ago
um I'm new and I just sign up like right now and brainly says I've reached my daily limit for my questions why?
Natalija [7]

Answer:

Im not sure why but maybe you can find a way to contact the people who own it and see if they know because that hasn't happened to me. How many questions have you asked

Explanation:

7 0
3 years ago
Which devices are managed through device management?
Ratling [72]
Answer:
computers and Mobile phones ( including game consoles and tablets) are managed through device management
Explanation:
Device management includes a type of security software used to monitor,secure and manage systems such as mobile phones computer laptops and desktops, Tablets and smart televisions as well as Game consoles. It as well involves the management,operation and maintenance of the physical aspect of the systems from external threats/intruders
Anti virus software is an example of a device management software used to protect systems from malware, by detecting and removing them and also by preventing them.
Firewall is a complete device management tool because it detects and prevents intruders and virus from penetrating the system software
7 0
2 years ago
What naming scheme identifies the rows in a worksheet?
masha68 [24]
The naming scheme that identifies the rows in a worksheet is B. 1, 2, 3.
Rows are horizontal, and they are identified by numbers in an Excel worksheet. On the other hand, columns are vertical, and they are identified by letters in the same Excel worksheet. 
7 0
3 years ago
Read 2 more answers
What type of ospf packet is used to actually send lsas between neighbors?
Marrrta [24]
<span>LSU OSPF packets are used to send LSAs between neighbors. </span>
<span /><span>
</span><span>Adjacencies are first formed by the OSPF neighbors before the LSAs are shared. When two OSPF neighbors exchange their known LSAs with the OSPF Database Description packets, the device does not know the actual LSAs. These are sent using Link Status Update pockets.</span>



3 0
3 years ago
Other questions:
  • Which string method counts the number of characters in a string?
    5·1 answer
  • What types of issues can you most likely resolve by knowing how to access and use the control Panel?
    15·1 answer
  • How do social media sites illustrate kindness?
    15·1 answer
  • Why is peer answer always not working? just wondering idk why
    7·2 answers
  • A type of indent where the first line of text starts at the left margin and the second and succeeding lines of text are indented
    7·2 answers
  • A ___________ is similar to Computer Integrated Manufacturing, but is based much more on standard reusable application software
    5·1 answer
  • Universal Containers (UC) uses a custom object called Vendor. The Vendor custom object has a Master-Detail relationship with the
    10·1 answer
  • The ________ view in access looks similar to an excel spreadsheet.
    5·1 answer
  • A domain name is used to: *
    15·1 answer
  • Ultraportable computers will often use ___ technology exclusively, even though their storage capacity is lower than that of a tr
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!