Carrier sense multiple access (csma), Computer Network Security

CARRIER  SENSE MULTIPLE ACCESS (CSMA)

There is no central access management when computers transfer on Ethernet. For this solution the Ethernet employs CSMA to coordinate transmission across multiple attached devices. CSMA is a coordination function that describe how to lead turns using a shared cable.

 A computer listen to the codes i.e. it senses the carrier. If the cable is idle it starts transferring and if the cable is in use then it waits. If simultaneous transmission happens, the frames interfere with each other and this phenomenon is known collision.

 

 

2307_CSMA.png

Posted Date: 7/30/2012 7:18:28 AM | Location : United States







Related Discussions:- Carrier sense multiple access (csma), Assignment Help, Ask Question on Carrier sense multiple access (csma), Get Answer, Expert's Help, Carrier sense multiple access (csma) Discussions

Write discussion on Carrier sense multiple access (csma)
Your posts are moderated
Related Questions
a) Wireless local area network (WLAN) technologies constitute a fast-growing market introducing the flexibility of wireless access into office, home, or production environments. G

Question: A regional police force has the following corporate objectives: ? to reduce crime and disorder; ? to promote community safety; ? to contribute to delivering just

'Near Field Communication' (NFC) technologies are expected to become commonplace in the near future. Some relevant features are these: A suitable device (such as a mobile pho

QUESTION a) Determine the RTT (round trip time) between a client requesting a web page of 1024 bytes in size from an internal web server on a 100 Base-T Ethernet. Consider a o

Question: (a) State whether the following statements are TRUE or FALSE. Justify your answer. i. A good site security policy will require that users use computer generated p

Question: a) Give two reasons why the building-block approach is favoured to the traditional network design approach. b) With reference to network monitoring parameters, dis

Government funding has been given to a university consortium establishing a repository of resources for school teachers. They have engaged you to develop a search facility for teac

ADDRESS RESOLUTION WITH CLOSED-FORM COMPUTATION For networks use reliable addressing, it is possible to select an address that creates closed-form address resolution possible.

Da t a compre s sion and the trans p ort s e rvices,   The main purpose of the transport layer is to provide services which are efficient, reliable and cost-effecti

Question: (a) Which of the following is not a goal of security: i) detection ii) prevention iii) recovery iv) prosecution (b) You are an honest student. One day you