Carrier sense multiple access (csma), Computer Network Security

CARRIER  SENSE MULTIPLE ACCESS (CSMA)

There is no central access management when computers transfer on Ethernet. For this solution the Ethernet employs CSMA to coordinate transmission across multiple attached devices. CSMA is a coordination function that describe how to lead turns using a shared cable.

 A computer listen to the codes i.e. it senses the carrier. If the cable is idle it starts transferring and if the cable is in use then it waits. If simultaneous transmission happens, the frames interfere with each other and this phenomenon is known collision.

 

 

2307_CSMA.png

Posted Date: 7/30/2012 7:18:28 AM | Location : United States







Related Discussions:- Carrier sense multiple access (csma), Assignment Help, Ask Question on Carrier sense multiple access (csma), Get Answer, Expert's Help, Carrier sense multiple access (csma) Discussions

Write discussion on Carrier sense multiple access (csma)
Your posts are moderated
Related Questions
Information asset classification-risk management A number of organizations have data classification schemes (for instance confidential, internal, public data). The classificat

You see two IP addresses. The IP address 192.168.58.130 is the one of Bt4. The IP address 192.168.58.133 has ports 135 and 445 open; which indicates that it is a Windows machine. S

Simplex data exchange Simplex communication defines to communication that happens in one direction only. Two definitions have made over time: a common definition, which is des

How much would it cost to have a project completed by tomorrow night?

which is best algorithm

WFABilling project in Java:  Project Title: WFABilling   Role                      : Developer Domain                 : Tele-Com Environment          : Java, J2EE, S

In Star topology all computers are connected using a central device known as hub. Star networks are one of the most general computer network topologies. In its simplest way, a

Problem (a) IT Service Support within the ITIL framework is divided in a number of processes. Compare and contrast the following processes: i. Incident Management and Problem M

Consider the details of the X.509 certificate shown below. a. Identify the key elements in this certificate, including the owner''s name and public key, its validity dates, the nam

Risk Determination For purpose of relative risk assessment, risk equals probability of vulnerability occurrence TIMES value MINUS percentage risk already controlled PLUS an elem