answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mandarinka [93]
2 years ago
5

There are two methods of enforcing the rule that only one device can transmit. In the centralized method, one station is in cont

rol and can either transmit or allow a specified other station to transmit. In the decentralized method, the stations jointly cooperate in taking turns.
What do you see as the advantages and disadvantages of the two methods?
Computers and Technology
1 answer:
Levart [38]2 years ago
3 0

Answer:

In centralized method, the authorized sender is known, but the transmission line is dominated by the control station, while in decentralized method, one station can not dominate the line but collision on the transmission line may occur.

Explanation:

Centralized method of communication requires for a control station to manage the activities if other stations in the network. It assigns turns to one known station at a time, for transmission.

Decentralized method allows stations in a network to negotiate and take turns in transmitting data. When a station is done with the transmission line, another station on the queue immediately claims the line.

You might be interested in
When does the narrator of "EPIC 2015" say the "road to 2015" began?
Zigmanuir [339]

Answer:

The answer is "In the late 20th century"

Explanation:  

EPIC 2015 is a short movie released in 2005 by Robin Sloan and Matt Thompson, In this film, there are some forecasts for 2015, which are very tech. In 2008, Google and Amazon were added as an alternate timeline, together with the frightfully "Google."

  • This film is also known as Animated Flash video because in this film there is full use of animation.
  • In this film, the narrator tells about "road to 2015", in the late 20 century.

8 0
2 years ago
Read 2 more answers
How many solutions exist for the given equation?
vovikov84 [41]
Infinity amount of answers because each side can be simplified to x making any solution correct
6 0
2 years ago
Why would you copy an individual instead of listing that name on the to line?
leva [86]
When the person is not directly involved in the message but has a need to know about it.
8 0
2 years ago
Read 2 more answers
Which programming element is used by a game program to track and display score information?
lubasha [3.4K]
I think is Variablesss
7 0
2 years ago
Read 2 more answers
Which of the following is not a characteristic of a good value log entry
Stolb23 [73]
What are we supposed to find? Help us
6 0
1 year ago
Other questions:
  • In three to five sentences, describe whether or not files should be deleted from your computer.
    13·2 answers
  • In the State of Florida, the penalties for DUI become progressively more severe depending upon the number of convictions and the
    6·3 answers
  • A mistake programmers often make with loops is that they ____.
    15·1 answer
  • The ________ method is based on simple arithmetic. The process involves dividing the bits of a frame into equal segments, adding
    11·1 answer
  • Write a program in c or c++ to perform different arithmeticoperation using switch statement .the program will take two inputinte
    10·1 answer
  • Peter accumulated many photos from his visit to Wisconsin. He wants to upload these photos to a social networking site. Which fi
    12·1 answer
  • 1. (1 point) Which flag is set when the result of an unsigned arithmetic operation is too large to fit into the destination? 2.
    13·1 answer
  • A program is divided into 3 blocks that are being compiled on 3 parallel computers. Each block takes an Exponential amount of ti
    6·1 answer
  • Lucy is completing a project as part of a science class using materials she found online. Which of the following is MOST LIKELY
    5·1 answer
  • A video game character can face toward one of four directions: north, south, east, and west. Each direction is stored in memory
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!