Discussion: CSMA/CD and CSMA/CA
Discussion: CSMA/CD and CSMA/CA
Discussion: CSMA/CD and CSMA/CA
Permalink: https://collepals.com/discussion-descr…a-cd-and-csma-ca/
1. Chapter 9. Question 1
Answer the two video case study questions for this assignment. Use an MS Word document with your name, the module number, and title of the assignment on the page. Your answers must be 300-500 words in length, in paragraph form, grammatically sound, and free of spelling errors.
2. Chapter 9. Question 21
Describe the differences between CSMA/CD and CSMA/CA. Provide one real
life example where CSMA/CD is used. Provide one real life example where
CSMA/CA is used.
3. Chapter 10. Question 4
Several levels of file access were discussed in this chapter, including read/
write, read-only, execute-only, and no access. Assume you maintain a
database containing confidential patient information and need to restrict
UPDATE to only 5 individuals, allow only 15 others to view the database,
and disallow any database access to all other users. Which access level would
you assign to the 20 individuals in the first two groups and to the remaining
users? For each of the three groups, describe every type of access granted to
each one.
4. Chapter 10. Question 8
Deadlocks are discussed in Chapter 5. Describe how a DO/S Processor
Manager could attempt to avoid them in a real-life network. Then describe
how it could try to recover gracefully if one should occur.
5. Chapter 10. Question 14
Describe the top 10 critical duties of a network administrator for a distributed
operating system. Identify which level of access would be needed by the
administrator for each duty and explain why.
6. Chapter 11. Question 1
Imagine that you are the manager of a small business computing center. List at
least three techniques that you would use to convince a busy, reluctant night
operator to perform regular backups. Explain the best and worst possible
technique to assure your success.
7. Chapter 11. Question 4
Describe the advantages and disadvantages of password generator software.
Would you recommend the use of such software for your own system? Explain
why or why not.
8. Chapter 11. Question 7
Given multi-network access, it’s not unusual for users to have multiple
user identifications and passwords. How would you manage these multi-
password situations? Describe both the advantages and disadvantages of
your solution.
9. Chapter 12. Question 6
Review the system with one CPU and four drives below:
• CPU W = 4 ms (the average time to execute 1,000 instructions)
• Drive A = 45 ms (average data access speed)
• Drive B = 3 ms (average data access speed)
• Drive C = 17 ms (average data access speed)
• Drive D = 10 ms (average data access speed)
Calculate I/O access speed using this CPU and each of the four disk drives as
they evaluate the following track requests in this order: 0, 31, 20, 15, 20, 31, 15.
Then, in each case, calculate the access speeds after the track requests are
reordered and rank the four disk drives before and after reordering.
10. Chapter 12. Question 11
Calculate the reliability of a hard disk drive with an MTBF of 2,499 hours
during the last 40 hours of this month. Assume e = 2.71828 and use the
formula:
Reliability(t) =e -(1/MTBF)(t)
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.