Collision detection, Computer Network Security

COLLISION DETECTION

The signals from two devices will interfere with each other and the overlapping of frames is known a collision. It does not cause to the hardware but data from each frames is grabbled.

ETHERNET CD:

 To check the collision, Ethernet interfaces add hardware to detect transmission. It acts two operations:

  • It monitors sender signals.
  • Grabbled signal is interpreted as a collision.

After collision is detected computers stop transferring. So Ethernet needs CSMA/CD to coordinate transmission.

 

RECOVERY FROM COLLISION:

 Computer that find a collision sends special signal to force all other interfaces to find collision.

 Computer then waits for other to be idle before transfer. But if both devices wait for same length of time, packet frames will collide again. So the standard specifies largest delay and both devices select random delay, which is lesser. After waiting, devices use carrier sense to avoid subsequence collision. The device with shorter delay will go first and other computer may transfer later.

EXPONENTIAL BACK OFF:

 Even with random delays, collision may happen especially likely with busy code segments. Computers double delay with every subsequent collision. It replace likely hood of sequence of collision.

 

 

Posted Date: 7/30/2012 7:24:36 AM | Location : United States







Related Discussions:- Collision detection, Assignment Help, Ask Question on Collision detection, Get Answer, Expert's Help, Collision detection Discussions

Write discussion on Collision detection
Your posts are moderated
Related Questions
Question: (a) Give 2 benefits of using IPsec. (b) IPSec uses two protocol for security: Authentication Header protocol (AH) and the Encapsulated Security Header Protocol (

How does the POP functions? What are the advantages/benefits of IMAP over POP? POP stands for Post Office Protocol, version 3 (POP3) is one of the easiest message access protoc

QUESTION : a) A datagram of 3000 bytes has to travel over a network with a MTU size of 1000 bytes. Describe how fragmentation can be used to solve this problem. You should pr

Question requires you to submit a proposal based on the research report topic you will be addressing in the second assignment.  Note:  before commencing research on the topic, y

Techniques for combating Spam mails Many anti spam products are commercially available in market. But it should also be noted that no  one technique is a complete solution to

(a) Describe how CSMA/CD operates and explain how Ethernet deals with collisions. (b) Describe how the subsequent protocols work: i. ARP ii. DHCP iii. DNS iv. SMTP (c) The

1. For this project, assume that an organization has five servers. Server 1 has a TCO of $25,000, Servers 2 and 3 have a TCO of $37,000 each, and the remaining two servers— Servers

PARSING IPv6 HEADERS Base header is fixed in size i.e. 40 octets. NEXT HEADER field in the base header describe kind of header and it seems at end of fixed-size base header. S

Repeater known as regenerator ; it is an electronic machine that performs only at physical layer. It gets the signal in the network before it becomes loss or weak, recreates the

Government funding has been given to a university consortium establishing a repository of resources for school teachers. They have engaged you to develop a search facility for teac