1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mandarinka [93]
4 years ago
5

There are two methods of enforcing the rule that only one device can transmit. In the centralized method, one station is in cont

rol and can either transmit or allow a specified other station to transmit. In the decentralized method, the stations jointly cooperate in taking turns.
What do you see as the advantages and disadvantages of the two methods?
Computers and Technology
1 answer:
Levart [38]4 years ago
3 0

Answer:

In centralized method, the authorized sender is known, but the transmission line is dominated by the control station, while in decentralized method, one station can not dominate the line but collision on the transmission line may occur.

Explanation:

Centralized method of communication requires for a control station to manage the activities if other stations in the network. It assigns turns to one known station at a time, for transmission.

Decentralized method allows stations in a network to negotiate and take turns in transmitting data. When a station is done with the transmission line, another station on the queue immediately claims the line.

You might be interested in
HELP PLEASE ⚠️⚠️⚠️⚠️⚠️⚠️⚠️❗❗❗❗❓❓❓<br> Why does it matter that we protect African Wild Dogs?
pshichka [43]

Explanation:

African wild dogs are among the most effective predators in the world. They use extraordinary cooperation and teamwork to pursue, overhaul and bring down their prey.African wild dogs are struggling to cope with the rapid increase in human settlements and infrastructure development that are encroaching on their traditional range. They are perfectly adapted to their natural environment, but require vast territories to survive – much larger than most other carnivore species. This increased exposure to human contact poses numerous threats to the wild dogs’ survival.

If you have any questions revolving around this topic,feel free to ask me and I will be glad to help,Good luck!

4 0
3 years ago
Read 2 more answers
What does the following code print?double[] myList = {1, 5, 5, 5, 5, 1};double max = myList[0];int indexOfMax = 0;for (int i = 1
Liula [17]

Answer:

This code will print: 4

Explanation:

Following is the step-by-step explanation for the given code:

  • Given is the array of data type double named myList, it has entries, 1, 5, 5, 5,5, 1:

                    double[] myList = {1, 5, 5, 5, 5, 1};

  • Now the first element of the array (1) with index 0 will be stored in the variable max (data type double).

                 double max = myList[0];  

  • A variable indexOfMax having datatype int will be initiated as 0.

                 int indexOfMax = 0;

  • Now for loop will be used to find the maximum number of the array. The variable i will be put as index for each element to compare with first element. If the checked element is greater than or equal to the integer in max, it will be replaced. So at the end the variable max will have value 5 that will be at index i = 4.

                    for (int i = 1; i < myList.length; i++)

                            { if (myList[i] >= max)

                               { max = myList[i];

  • Now the variable i that is the index for max value will be stored in the variable indexOfMax (indexOfMax = 4).

                  indexOfMax = i; }}

  • At end the value stored in variable indexOfMax will be printed, so 4 will be printed as output.

              System.out.println(indexOfMax);

i hope it will help you!

7 0
3 years ago
Who plays rocket league?
Rashid [163]

Answer:

I dont

Explanation:

8 0
3 years ago
Read 2 more answers
5. Bits are sent over a communications channel in packets of 12. (a) If the probability of a bit being corrupted over this chann
user100 [1]

Answer:

0.889

Explanation:

7 0
4 years ago
A Network Attached Storage device is good for _____.
igomit [66]

Answer:

sharing data across multiple workstations on the same network

Explanation:

A Network Attached Storage device is good for sharing data across multiple workstations on the same network.

3 0
3 years ago
Read 2 more answers
Other questions:
  • . When you have multiple graphics positioned on a page, you can _______________ them so that they are a single graphic instead o
    9·1 answer
  • On most computers, the default font size in word is ____. 8 11 14 16
    8·2 answers
  • Alkane is a Variety of which fruit
    6·1 answer
  • Write a program that finds the largest in a series of numbers entered by the user.The program must prompt the user to enter numb
    12·1 answer
  • What is an input periphal
    8·2 answers
  • Given a link with a maximum transmission rate of 18 Mbps. Only two computers, X and Y, wish to transmit starting at time t = 0 s
    14·1 answer
  • Which of the following statements is not true? Group of answer choices
    9·1 answer
  • A new employee has reported that print jobs are printing as garbled text. Which of the following is MOST likely the reason for t
    8·1 answer
  • Select the education and qualifications that are most helpful for Insurance Services careers. Check all that apply.
    14·2 answers
  • Which is an example of an operating system? (5 points)
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!