Carrier sense multiple access (csma), Computer Network Security

CARRIER  SENSE MULTIPLE ACCESS (CSMA)

There is no central access management when computers transfer on Ethernet. For this solution the Ethernet employs CSMA to coordinate transmission across multiple attached devices. CSMA is a coordination function that describe how to lead turns using a shared cable.

 A computer listen to the codes i.e. it senses the carrier. If the cable is idle it starts transferring and if the cable is in use then it waits. If simultaneous transmission happens, the frames interfere with each other and this phenomenon is known collision.

 

 

2307_CSMA.png

Posted Date: 7/30/2012 7:18:28 AM | Location : United States







Related Discussions:- Carrier sense multiple access (csma), Assignment Help, Ask Question on Carrier sense multiple access (csma), Get Answer, Expert's Help, Carrier sense multiple access (csma) Discussions

Write discussion on Carrier sense multiple access (csma)
Your posts are moderated
Related Questions
Problem 1: List measurable entities on which the quality of service in a data communication network depends Problem 2: Show the features of a typical Network Management


Problem (a) Below is a capture of an Ethernet II frame which contains an IPv4 packet and a TCP segment. The second screen capture is from the data portion of the frame.

(a) Consider the subsequent authentication options: A. Using password. B. Using pin and fingerprint Which option A or B provides stronger security and why? (b) Give

crack the secret message and explain how the code works. The clue is that it has something to do with the computer keyboard. J-Q-H-6 Q-E-F-Q-H-D-3-W 8-H 5-Y-3 7-W-3 9-R--D-9-J

Question: a. State briefly three reasons why computer networks are used? b. Differentiate between simplex, half-duplex and full-duplex mode of transmission. c. State any

Netfilter Firewall Netfilter is the popular name for the packet filtering system installed by default in the Linux kernel. The filtering system can be used as a very effective

BALANCING SECURITY AND ACCESS Even with best planning and implementation, it is impossible to obtain perfect security, that is, it is a process, not an absolute. Security should

discuss the merits and demerits of computers freezing

LOCAL TALK Apple discovered the LAN technology that uses bus topology. Its interface is added with all Macintosh computers. It has very low speed i.e. 230.4Kbps. Also it is ch