Collision, Computer Network Security

 

COLLISION:The receiver can get simultaneous requests, which gives in collision at receivers and both service lost and in this way no transmitter accepts reservations and both use retry and back off. The receiver can receive nearly spaced requests. It chooses one of them and then the selected transmitter sends packet and the transmitter not chosen uses retries and back off.

 

234_collision.png

Posted Date: 7/30/2012 7:34:44 AM | Location : United States







Related Discussions:- Collision, Assignment Help, Ask Question on Collision, Get Answer, Expert's Help, Collision Discussions

Write discussion on Collision
Your posts are moderated
Related Questions
Problem: (a) Use a simple example to explain what is meant by a finite state machine. (b) Describe the time limit problem in an interrupt-driven system. (c) A certain m

Categories of Controls Controlling risk through mitigation, avoidance or transference is accomplished by implementing controls. There are 4 effective approaches to select the co

UDP COMMUNICATION SEMANTICS:  UDP needs IP for all delivery, that is, similar best effort delivery as IP. To use UDP, an application have to either be immune to the causes or

I have an assignment of Computer Security to submit. Will you guys help me making my assignment???

Question An organization is planning to connect its networks to the Internet. The network is located within a four story building. A web server supporting online sales is also

ADDRESS MASKS To identify receiver, network apply address mask to receiver address and calculate to network address in routing table. It can use Boolean 'and' to calculate the

Example 3: Logic bombs In the year 2000, Timothy Lloyd was found responsible of causing $10 million and $12 million of damage to Omega Engineering, an American company specializ

Problem 1 . Show various features of a 1G network Total three features for each feature of 1G Problem 2. Describe how a cellular network works with functional block diagram

Question 1: (a) Differentiate between symmetric and asymmetric encryption system. (b) Describe how a digital signature is created. (c) Explain briefly what SSL (secure so

RING topology all computers are connected in loop. A ring topology is a network topology in which every node connects to exactly two other devices, forming a single continuous pa