Collision detection, Computer Network Security


The signals from two devices will interfere with each other and the overlapping of frames is known a collision. It does not cause to the hardware but data from each frames is grabbled.


 To check the collision, Ethernet interfaces add hardware to detect transmission. It acts two operations:

  • It monitors sender signals.
  • Grabbled signal is interpreted as a collision.

After collision is detected computers stop transferring. So Ethernet needs CSMA/CD to coordinate transmission.



 Computer that find a collision sends special signal to force all other interfaces to find collision.

 Computer then waits for other to be idle before transfer. But if both devices wait for same length of time, packet frames will collide again. So the standard specifies largest delay and both devices select random delay, which is lesser. After waiting, devices use carrier sense to avoid subsequence collision. The device with shorter delay will go first and other computer may transfer later.


 Even with random delays, collision may happen especially likely with busy code segments. Computers double delay with every subsequent collision. It replace likely hood of sequence of collision.



Posted Date: 7/30/2012 7:24:36 AM | Location : United States

Related Discussions:- Collision detection, Assignment Help, Ask Question on Collision detection, Get Answer, Expert's Help, Collision detection Discussions

Write discussion on Collision detection
Your posts are moderated
Related Questions
QUESTION (a) Consider the following authentication options A. Using password B. Using pin and fingerprint Which option A or B provides stronger security and why? (b

RING TOPOLOGY In this topology of network the devices are connected to each other in packed loop. In this network first computer passes data packet to the second and then seco

Gateways They transfer packets among network machines that have different protocols (e.g. between a WAN and a LAN). They access a packet formatted for one protocol and change

"Using the CNSS Model, examine each of the cells and write a brief statement on how you would address the components respesented in that cell"

Problem 1 . Show various features of a 1G network Total three features for each feature of 1G Problem 2. Describe how a cellular network works with functional block diagram

How much would it cost to have a project completed by tomorrow night?

RING topology all computers are connected in loop. A ring topology is a network topology in which every node connects to exactly two other devices, forming a single continuous pa

Evaluations, Assessment, and Maintenance of Risk Controls When the control strategy has been implemented, it should be monitored and measured on an ongoing basis to determine ef

Packet Filtering Firewall Packet filtering is a network security mechanism that works by controlling what data can flow in and out of the network. The basic device that interco

FIREWALL ANALYSIS TOOLS There are a number of tools automate remote discovery of firewall rules and assist the administrator in analyzing rules Administrators who feel wary of u