answersLogoWhite

0

What else can I help you with?

Continue Learning about Engineering

What is the backoff algorithm?

In a single channel contention based medium access control (MAC) protocols, whenever more than one station or node tries to access the medium at the same instant of time, it leads to packet collisions. If the collided stations tries to access the channel again, the packets will collide as the nodes are synchrozied in time. So the nodes need to be displaced in time. To displace them temporally, a backoff algorithm is used (example binary exponential backoff (BEB)). For example, in BEB algorithm, whenever a node's transmission is involved in a collision with another node's transmission, both nodes will choose a random waiting time and wait for this amoiunt of time before attempting again. If they are not successful in this attempt, they double their contention window and choose a randoim waiting time before transmitting again. This process will be repeated for certain number of attempts. If the nodes are not successful in their transmission after this limit, the packets will be dropped from their queue. Answered by C. Rama Krishna, NITTTR, Chandigarh, India on 03.12.2008 at 11.40 AM (IST)


What is algorithm to write algorithm to the program to access a pointer variable in structure?

Here is the algorithm of the algorithm to write an algorithm to access a pointer in a variable. Algorithmically.name_of_the_structure dot name_of_the _field,eg:mystruct.pointerfield


Which algorithm is more efficient lamport bakery algorithm or black and white bakery algorithm?

Black and White bakery algorithm is more efficient.


What is proprietary algorithm?

A proprietary algorithm is a sequence of steps or rules performed to achieve a specific goal, belonging to a commercial company as it has been trademarked or patented by its owner. An example is a search engine ranking algorithm for one of the commercial web search engines - some of the details may be readily available to the public but the source code is not freely available to protect company interests and prevent misuse.


List down the names of any three parameters on which you analyze an algorithm?

what is algorithm and its use there and analyze an algorithm

Related Questions

What is a backoff?

In computing, a backoff is a situation where an algorithm or process refrains from taking an action which it would have otherwise taken.


After an Ethernet collision when the backoff algorithm is invoked which device has priority to transmit?

any device in the collision domain whose backoff timer expires first


Is backoff one word or two?

"Backoff" is typically written as one word. However, it can also be written as "back off" if used as a verb in a sentence.


What is elasticity example?

The energy produce due to collosion


What is elastic energy example?

The energy produce due to collosion


Improving security in real time wireless networks through packet scheduling?

In the present network we have not a security of your data so you can do develop a some algorithm,that is useful to protect the packets in dynamically,but now used algorithms can't protect the packets,so we can develop spss algorithm,this algorithm is more protect the packets compare to other algorithms.......


How does one say backoff in spanish?

apartate from the verb apartarse.


What is the backoff algorithm?

In a single channel contention based medium access control (MAC) protocols, whenever more than one station or node tries to access the medium at the same instant of time, it leads to packet collisions. If the collided stations tries to access the channel again, the packets will collide as the nodes are synchrozied in time. So the nodes need to be displaced in time. To displace them temporally, a backoff algorithm is used (example binary exponential backoff (BEB)). For example, in BEB algorithm, whenever a node's transmission is involved in a collision with another node's transmission, both nodes will choose a random waiting time and wait for this amoiunt of time before attempting again. If they are not successful in this attempt, they double their contention window and choose a randoim waiting time before transmitting again. This process will be repeated for certain number of attempts. If the nodes are not successful in their transmission after this limit, the packets will be dropped from their queue. Answered by C. Rama Krishna, NITTTR, Chandigarh, India on 03.12.2008 at 11.40 AM (IST)


How should you handle a total stranger who starts biccering with you about your private health information when it is circulating against your will?

Say backoff moron!


How do you calculate back-off time on an Ethernet link after a collision?

calculate backoff time on an Ethernet link after a collision? Select one:


What is algorithm to write algorithm to the program to access a pointer variable in structure?

Here is the algorithm of the algorithm to write an algorithm to access a pointer in a variable. Algorithmically.name_of_the_structure dot name_of_the _field,eg:mystruct.pointerfield


Which algorithm is more efficient lamport bakery algorithm or black and white bakery algorithm?

Black and White bakery algorithm is more efficient.