Carrier sense multiple access (csma), Computer Network Security

CARRIER  SENSE MULTIPLE ACCESS (CSMA)

There is no central access management when computers transfer on Ethernet. For this solution the Ethernet employs CSMA to coordinate transmission across multiple attached devices. CSMA is a coordination function that describe how to lead turns using a shared cable.

 A computer listen to the codes i.e. it senses the carrier. If the cable is idle it starts transferring and if the cable is in use then it waits. If simultaneous transmission happens, the frames interfere with each other and this phenomenon is known collision.

 

 

2307_CSMA.png

Posted Date: 7/30/2012 7:18:28 AM | Location : United States







Related Discussions:- Carrier sense multiple access (csma), Assignment Help, Ask Question on Carrier sense multiple access (csma), Get Answer, Expert's Help, Carrier sense multiple access (csma) Discussions

Write discussion on Carrier sense multiple access (csma)
Your posts are moderated
Related Questions
Question : (a) What do you meant by the term "Bastion Host"? What is its use? (b) "Hostile" Java applets will do undesirable actions. Mention two problems caused by Hosti

GROWTH OF LAN TECHNOLOGY The production of shared communication channels (LANs) started in 1960s and early 1970. The basic idea behind was to reduce the number of connectio

Feasibility Studies Before deciding on strategy, all information of economic or non economic consequences of vulnerability of information asset should be explored. A number of w

Question: (a) Which type of attacker represents the most likely and most damaging risk to your network? (b) What is the basic reason that social engineering attacks succeed?


DATAGRAM REASSEMBLY Recreation of original datagram is known as reassembly. Ultimate receiver acts reassembly as given below.Fragments can reach out of order. Header bit check

Problem (a) As a forensic investigator, you are needed to trace the source of an email. It is suspected that the email header has been forged. Show how you would proceed to

Question: (a) Draw the waveform for an asynchronous transmission with the following specifications: Character "H", one even parity bit, one start bit, one stop bit, and a b

(a) Describe RSA encryption. (b) For an RSA encryption the values of the primes are: p=29, q=31. select e=11, evaluate the public and private keys. (c) How can RSA be used fo

TCP-RELIABLE TRANSPORT SERVICE INTRODUCTION:  TCP is the major transport protocol architecture in the TCP/IP suite. It uses unreliable datagram function offered by IP whe