answersLogoWhite

0


Best Answer

1)Time taken to error correcting is less than doing detection and retransmission.

Bandwidth use will be less.

2) In detection and retransmission if back messaging occurs the bandwidth will be more

User Avatar

Wiki User

11y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Give two reasons why network might use an error correcting code instead of error detection and retransmission?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about Engineering

What is an analog network?

a network that is analog.


Which network topology is the best for school network?

Star


What does network virtualization include?

Network Virtualization (NV) refers to abstracting network resources that were traditionally delivered in hardware to software. NV can combine multiple physical networks to one virtual, software-based network, or it can divide one physical network into separate, independent virtual networks.


What are the classifications of computer networks?

The different types of network are Personal Area Network(PAN), Local Area Network (LAN), Campus Area Network(CAN), Metropolitan Area Network (MAN), Wide Area Network (WAN), and Global Area Network (GAN).by Rhaine


What is NUFNET as a classification of computer network?

nufnet as a computer network

Related questions

4 Give two reasons why network might use an error correcting code instead of error detection and retransmission?

1)Time taken to error correcting is less than doing detection and retransmission. Bandwidth use will be less. 2) In detection and retransmission if back messaging occurs the bandwidth will be more


Which tcp ip model layer creates additional overhead on network resources due to acknowledgements tracking and retransmission of data?

transport


Where can one find Network intrusion detection software?

One can find Network intrusion detection software offered by a number of companies. It can be acquired from 'White Helm', 'SANS', 'Sourcefire' and 'Snort'.


Which network component has the primary function of detecting and logging attacks made against the network?

intrusion detection system


Which service in Windows 2000 Server facilitates intrusion detection of potentially conflicting network addresses on the network?

enhanced monitoring service


What is detection in computer science?

Intrusion Detection and Prevention (IDP) is finding security flaws in your network or computer and patching them or find flaws that have been exploited and tracing them.


How does the lighting detection network work?

it works by using certain tools to predict the weather.


Is Fault detection and performance management are the two types of network management products?

yes


What are the differences between logical link control and media access control sub layers?

MAC function is framing of packets and LLC functions are protocol multiplexing, flow control, detection, and error control through a retransmission of dropped packets.LLC acts as an interface between MAC and Network Layer.The following definitions are also true:Logical Link Control (LLC). This sublayer is responsible for the data transmission between computers or devices on a network.Media Access Control (MAC). On a network, the network interface card (NIC) has an unique hardware address which identifies a computer or device. The physical address is utilized for the MAC sublayer addressing.


Which cisco command configures static route when correcting an IP routing problem at the network layer?

ip route prefix mask address


Which network devices reduce the size collision domains and provide error detection?

switches and your mama.!! lol haha


What is meant by network congestion?

When too many packets are present in a subnet, performance degrades. This situation is called Congestion. Update: In any network when there is too much the data traffic at a node that the network slows down or starts loosing data, it is known as network congestion. It degrades quality of service and also can lead to delays, lost data or e.g. dropped calls on a telephone network. - Neeraj Sharma when excess of data travels in a subnet or in node there will be a loss of data, this excess flow is know as network congestion.This demotes the performance in network e.g.improper delivery of fax