1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ber [7]
3 years ago
8

During the data transmission there are chances that the data bits in the frame might get corrupted. This will require the sender

to re-transmit the frame and hence it will increase the re-transmission overhead. By considering the scenarios given below, you have to choose whether the packets should be encapsulated in a single frame or multiple frames in order to minimize the re-transmission overhead.
Justify your answer
Scenario A: Suppose you are using a network which is very prone to errors.

Scenario B: Suppose you are using a network with high reliability and accuracy.
Computers and Technology
1 answer:
pashok25 [27]3 years ago
5 0

1. Based on Scenario A, the packets should be encapsulated in multiple frames to minimize the re-transmission overhead.

This is because there will be the need to re-transmit the packets because the network environment is not reliable and accurate.  Therefore, a single frame may be too costly when the need for re-transmission arises.

2. Based on Scenario B, the packets should be encapsulated in a single frame because of the high level of network reliability and accuracy.  

There will not be further need to re-transmit the packets in a highly reliable and accurate network environment.  This environment makes a single frame better.

Encapsulation involves the process of wrapping code and data together within a class so that data is protected and access to code is restricted.

With encapsulation, each layer:

  • provides a service to the layer above it
  • communicates with a corresponding receiving node

Thus, in a reliable and accurate network environment, single frames should be used to enhance transmission and minimize re-transmission overhead.

Learn more about data encapsulation here: brainly.com/question/23382725

You might be interested in
The ____ command is used to disconnect a datatable object from the database. (
lisabon 2012 [21]
The delete from command I think
7 0
3 years ago
Read 2 more answers
Give three general reasons for the importance of computer networking.
LiRa [457]
I think the First reason is; it provides the best way of business communication.
Second reason, streamline communication
Third reason cost effective resource sharing :) (hope this helps)
5 0
2 years ago
Consider the following program:
Nostrana [21]

Answer:

this would be answer D

Explanation:

7 0
3 years ago
____ is suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.
Levart [38]

Answer: a. RADIUS

Explanation:

RADIUS as developed with the idea of allowing its users or clients to be able to authenticate to a dial-in access server. So basically it is a client server protocol and he client here is the firebox and the server is the RADIUS server.  

The authentication mechanism start by user who sends a message to the RADIUS server. Then the RADIUS server upon receiving the message accept or denies it. It accepts if the client is configured to the server.

A large amount of additional information can be sent by the RADIUS server in its Access-Accept messages with users so we can say that RADIUS is uitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.

3 0
3 years ago
A user profile has a login hour restrictions set to. Monday through A user profile has login hour restrictions set to. Monday th
Savatey [412]

Answer:

D

Explanation:

The user will be logged out and any unsaved work-in-progress will be lost.

In a computer program if a user has login hour restrictions this means that such a user will not be able to continue with his/her work when its past the restriction time.

Therefore at 5.01 pm the user will be logged out and any unsaved work-in-progress will be lost.

8 0
3 years ago
Other questions:
  • Trevor got home from work and suddenly realized that he needed to edit a certain file stored in the company network's server. ho
    11·1 answer
  • Which type of system must you connect to and use to make changes to Active Directory?
    15·1 answer
  • Universal Containers is setting up an external Business Intelligence (BI) system and wants to extract 1,000,000 Contact records.
    11·1 answer
  • 11. John wants to share resources and move a large volume of data quickly over the Internet. John should use which of the follow
    14·1 answer
  • In which step of writing a program does a programmer first use a<br> compiler?<br> documentin
    6·1 answer
  • A computer processes data using only 1s and 0s true or false?
    9·2 answers
  • Describe five examples of civil engineering projects.
    6·1 answer
  • Use the {blank} to view your presentation the way an audience will see it.
    13·2 answers
  • Which of the following best describes contextual design?
    10·1 answer
  • a radio frequency identification (rfid) tag provides a generic identification for a credit or debit card carrying the tag.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!