883 views
0 votes
0 votes

https://gateoverflow.in/117681/mock-3-28 Question asked in this link is:

Two CSMA/CD stations are each trying to transmit large files of multiple frames. After each frame is sent, they contend for the channel using the binary exponential back-off algorithm.

The probability that the contention ends in round 3 is _____  (up to 3 decimal points).

why 2/4 * 4/16 * 56/64 = 0.109 is incorrect?

 

1 Answer

0 votes
0 votes

1) Inititally both stations starts transmitting at random time and get collide , As it is first collsion ,So

For Station 1 ==> (0,2^1 - 1) ==>(0,1)

For Station 2 ==> (0,2^1 - 1) ==>(0,1)

Hence probability of collision in 2nd Try/given that collsion in 1st Try is either 00 /  11 ==> 2/4

2) In second attempt also stations collide .So

For Station 1 ==> (0,2^2 - 1) ==>(0,1,2,3)

For Station 2 ==> (0,2^2 - 1) ==>(0,1,2,3)

Hence probability of NO collision in 3rd Try/given that collision in first 2 try  is  12/16

It is given collsion resolved in 3rd round hence

P(Collsion in 1st round) * P(Collsion in 2nd round) * P(No Collsion in 3rd round)  = 1* 2/4 * 12/16 = 0.375

Here we assumed collsion always occurs in Round 1

Related questions

0 votes
0 votes
0 answers
1
gateexplore asked Dec 7, 2023
194 views
Which topology covers security robust and eliminating traffic factors?a. Meshb. Ringc. Stard. bus i am confused with mesh or star or bus option. please give clarificati...
0 votes
0 votes
1 answer
2
viral8702 asked Dec 2, 2023
237 views
In fragmentation, if any fragment gets lostthen in which case whole packet will be sent again?and in which case only that fragment will be sent again?
0 votes
0 votes
0 answers
3
Dknights asked Nov 28, 2023
172 views
Suppose that in an IP-over-Ethernet network, machine X wishes to find the MAC address of another machine Y which is not in its subnet. How can we find it?
0 votes
0 votes
0 answers
4
rexritz asked Nov 24, 2023
166 views
Is LAN technologies (Ethernet) part of syllabus?Where to study Ethernet bridging?