1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
serg [7]
3 years ago
12

A broadcast network is one in which a transmission from any one attached station is received by all other attached stations over

a shared medium. Examples are a bus-technology local area network, such as Ethernet, and a wireless radio network. Discuss the need or lack of need for a network layer (OSI layer 3) in a broadcast network.
Computers and Technology
1 answer:
love history [14]3 years ago
8 0

Answer:

In a broadcast network such as radio network for example a walkie talkie, the broadcasted transmission is received equally by all receivers indiscriminately which may lead to dissemination of classified information to an unauthorized receiver, therefore, the network layer is required is needed to ensure proper routing of the information

Similarly, when the all the broadcasters in one location are each trying to send messages to different receivers at another given location, there would be potential for network congestion and it would be difficult to send information through the network

When there is need for priority service the presence of a network layer is needed in the network

However, when the above functions performed by the network layer is not required, then, the network layer can be excluded, such as the communication between layers 4 - 7 of the OSI model

Explanation:

You might be interested in
How will you create a blog using Wordpress?​
levacccp [35]

Answer:

yes

Explanation:

8 0
3 years ago
Read 2 more answers
The _________ attack exploits the common use of a modular exponentiation algorithm in RSA encryption and decryption, but can be
lions [1.4K]

Answer:

chosen ciphertext

Explanation:

Chosen ciphertext attack is a scenario in which the attacker has the ability to choose ciphertexts C i and to view their corresponding decryptions – plaintexts P i . It is essentially the same scenario as a chosen plaintext attack but applied to a decryption function, instead of the encryption function.

5 0
3 years ago
Question # 4 Dropdown Finish the code for this function. ​
DaniilM [7]

Answer:

==

Explanation:

I did it on edge 2021

8 0
3 years ago
Read 2 more answers
Stella has captured this candid photograph of a man who was reunited with his son. She has used facial retouching in each of the
riadik2000 [5.3K]

Answer: The last picture it looks better.

Explanation: Welcome!

8 0
3 years ago
Read 2 more answers
Joe is a computer service technician. People in his neighborhood usually depend on his suggestions for purchasing any computer a
ser-zykov [4K]

Answer:

C

Explanation:

Because he's knowledge ,everyone asking he's opinion if i am not wrong.

I hope i did help you on this questions

8 0
4 years ago
Read 2 more answers
Other questions:
  • The permissions of a file in a Linux system are split into three sets of three permissions: read, write, and execute for the own
    13·1 answer
  • Which of the following C++ statements displays a random number in the range 1 through 10?
    12·1 answer
  • With a chart , illustrate the stage of wood processing plsss help I will mark u as brainliest plss help pls and I will follow yo
    15·1 answer
  • Maggie is preparing a business report. Which types of keys will she use to type out words and numbers?
    9·1 answer
  • 6.10.1: Modify a C string parameter. Complete the function to replace any period by an exclamation point. Ex: "Hello. I'm Miley.
    8·1 answer
  • Using ________ as a promotion method will bring return visitors to your site.
    8·1 answer
  • Cómo mi dificar el aspecto del texto​
    12·2 answers
  • In video game development, the person who oversees and directs the entire design team and is the key vision keeper is
    13·1 answer
  • Kyle has a notebook for each of his 5 classes. He puts 6 stickers on each notebook. There are 10 stickers on each sheet. How man
    11·2 answers
  • A help desk technician determines that a user's issue is caused by a corrupt file on their computer. What is the fastest way to
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!