According to the figure in the attachment,
a. Which node, B or D, first realizes a collision has happened?
b. If B's packet is addressed to A, does A realize that a collision has happened? Explain!
c. What is the jamming signal and who is going to generate it?
d. Draw a graph scenario where a collision does happen, yet only A manages to receive the whole packet.
e. Draw a graph scenario where a collision does not happen altogether.
f. What would happen if the backoff is not exponential? Give an example.
The solution includes detailed responses to each of the 6 parts in the question, including clearly labeled graphs for (d) and (e).
Networks - Access Protocols/PKI
1. Provide the different access protocols, such as Carrier Sense Multiple Access (CSMA), Carrier Sense Multiple Access with Collision Detection (CSMA/CD) and Wavelength Division Multiplexing Access (WDMA). Where would these types of protocols would be used? Explain the situations with examples.
2. Describe an example of the Public Key Infrastructure that would explain the differing usages of symmetric and asymmetric encryption and how these encryption methods might use either a substitution or a transposition cipher.View Full Posting Details