Collision, Computer Network Security

 

COLLISION:The receiver can get simultaneous requests, which gives in collision at receivers and both service lost and in this way no transmitter accepts reservations and both use retry and back off. The receiver can receive nearly spaced requests. It chooses one of them and then the selected transmitter sends packet and the transmitter not chosen uses retries and back off.

 

234_collision.png

Posted Date: 7/30/2012 7:34:44 AM | Location : United States







Related Discussions:- Collision, Assignment Help, Ask Question on Collision, Get Answer, Expert's Help, Collision Discussions

Write discussion on Collision
Your posts are moderated
Related Questions
QUESTION Testing of a Business Continuity Plan (BCP) does not need to be costly or to interrupt the daily operations of the business. The result of the test should also be look

implementing password policy in organisation

how would land elevation have canged if coronado had traveled 150 miles due west from what is today arizona instead of west toward new mexico

Problem 1: What is the function of AUC in the GSM architecture? Explanation of HLR(AUC) Architecture of GSM Problem 2: Show the layered architecture of t

Question (a) Estimate the average throughput between two hosts given that the RTT for a 100 bytes ICMP request-reply is 1 millisecond and that for a 1500 bytes is 2 millisecon

Host-Based IDS A host-based IDS (HIDS) resides on a particular computer or server and monitors activity only on that system. HIDS also called as system integrity verifiers as th

Wireless Networks The origin of wireless networks and their ubiquity in the technological environment poses a new type of exposure and vulnerability for network security. Cont

Dynamic Packet Filtering Dynamic Packet Filtering is also referred to as stateful firewalling. Here the firewall maintains the status of connections as well. When a connection

Question : (a) How does a 2-key rollover differ from the N-key rollover? (b) Why is isolation so important in interfacing? (c) Explain what is software debouncing.

Question: (a) i. Explain what is meant by Discretionary Access Control and Mandatory Access Control ii. Which method would be the most effective to ensure that users do