1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
irina [24]
3 years ago
6

During the data transmission there are chances that the data bits in the frame might get corrupted. This will require the sender

to re-transmit the frame and hence it will increase the re-transmission overhead. By considering the scenarios given below, you have to choose whether the packets should be encapsulated in a single frame or multiple frames in order to minimize the re-transmission overhead.
Justify your answer with one valid reason for both the scenarios given below.

Scenario A: Suppose you are using a network which is very prone to errors.

Scenario B: Suppose you are using a network with high reliability and accuracy.
Computers and Technology
1 answer:
user100 [1]3 years ago
8 0

The packets would be encapsulated in single frame in scenario A. In scenario B, it should be in multi frames.

In <u>scenario A</u>, given that this network has been said to be prone to error, the packets should be encapsulated in single frames.

The reason for this is because, using a single frame helps to decrease error. We have been told already that it is prone to error. If you use the multi frame, there would be very high likelihood of errors occurring.

In <u>scenario B</u>, given that the network is accurate and very reliable, the best packet is the multi frame.

It would give a quicker transmission and the likelihood of errors occurring is also low.

Read more on brainly.com/question/24373056?referrer=searchResults

You might be interested in
Maintenance is an essential task that is often considered to be dull. In information security, penetration testing may be wrongl
RideAnS [48]

<u>Explanation:</u>

It is important to bear in mind that a penetration tester (analyst) performs a risk management role of a firm's internal system by attempting to break into an IT system.

Here are the benefits to internal systems;

  • They help detect security loopholes before a cyberattack.
  • They determine how vulnerable a network or computer program is.
  • They advise the IT firm's security teams on how to mitigate vulnerabilities detected.

7 0
3 years ago
Examples of email use that could be considered unethical include _____.
AfilCa [17]

Answer:

"Denying receiving an e-mail requesting that you work late "

"Sending a quick message to your friend about last weekend "

"Sharing a funny joke with other employees"

Explanation:

Based off of the questions, I assume it means while you are at work. If you're at home or something, all of these are fine.

3 0
3 years ago
Read 2 more answers
---------------is a systematic review of a person’swork and achievements over a recent period, usually leading toplans for the f
Rama09 [41]

Answer:

Performance appraisal

Explanation:

Performance appraisal is a systematic review of a person’swork and achievements over a recent period, usually leading toplans for the future.

8 0
3 years ago
1. Which tool is used for hardware to stand on to prevent static
GalinKa [24]

Answer:

An anti-static mat tool.

Explanation:

To prevent, static electricity from building up an anti-static mat tool is used. This is the tool that is used to prevent static electricity from building up. However, if you don't have the anti-static mat, an antistatic wrist strap can be used.

5 0
2 years ago
The ____ directory contains executables, which are the programs needed to start the system and perform other essential system ta
elixir [45]
The System Directory
6 0
3 years ago
Other questions:
  • What is a motherboard?
    6·2 answers
  • Consider the following relational schema, where the primary keys are Bold,
    7·1 answer
  • A computer with a domain name is called a what
    15·2 answers
  • What includes two or more private, public, or community clouds, but each cloud remains separate and is only linked by technology
    11·1 answer
  • Which of the following statements is correct? Group of answer choices An object of type Employee can call the setProjectName met
    11·1 answer
  • Java variable is the name of a Group of answer choices numeric data value stored in memory data value stored in memory that can
    15·1 answer
  • When you create new document, you have the option to create a blank document or a predifined
    7·1 answer
  • Select the correct answer.
    13·1 answer
  • BRAINLY, WHY CAN'T I COMMENT ANYMORE(what did I do to deserve this)
    9·2 answers
  • To create an SSL connection, a Web server requires a ________, which is an electronic document that confirms the identity of a w
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!