Carrier sense multiple access (csma), Computer Network Security


There is no central access management when computers transfer on Ethernet. For this solution the Ethernet employs CSMA to coordinate transmission across multiple attached devices. CSMA is a coordination function that describe how to lead turns using a shared cable.

 A computer listen to the codes i.e. it senses the carrier. If the cable is idle it starts transferring and if the cable is in use then it waits. If simultaneous transmission happens, the frames interfere with each other and this phenomenon is known collision.




Posted Date: 7/30/2012 7:18:28 AM | Location : United States

Related Discussions:- Carrier sense multiple access (csma), Assignment Help, Ask Question on Carrier sense multiple access (csma), Get Answer, Expert's Help, Carrier sense multiple access (csma) Discussions

Write discussion on Carrier sense multiple access (csma)
Your posts are moderated
Related Questions
VIRTUAL PACKETS These data packets serve same reason in Internet as frames on LAN. Every packet has a header. Routers, which are normally gateways, transfer packets between ph

IDS RESPONSE BEHAVIOR Once IDS detects an anomalous network situation, it has a number of options. IDS responses to external stimulation can be classified as active or passive.

Problem a) Give three reasons why traditional Network Design approach is less appropriate for many of today's networks? b) The network requires of users are organized into m

Cost Benefit Analysis (CBA) The common approach for information security controls is economic feasibility of implementation. CBA is begun by evaluating the worth of assets which

BUS TOPOLOGY In a bus topology all devices are attached to a single long cable and any device can send data to any other device. For this function, coordination is needed to d

Question 1:  Describe the functioning of cloud computing. Question 2: Discuss on "Platform as a Service". Question 3: Discuss the steps involved in effective co

QUESTION (a) What do you meant by data spoliation? (b) Justify the following statement: "Disk imaging differs from creating a standard backup of disk." (c) Why do yo

The three primary types of network protection are the same as the three primary areas where a network can be attacked. Every network needs protection against people-related, hardwa

Categories of Controls Controlling risk through mitigation, avoidance or transference is accomplished by implementing controls. There are 4 effective approaches to select the co