Collision detection, Computer Network Security

COLLISION DETECTION

The signals from two devices will interfere with each other and the overlapping of frames is known a collision. It does not cause to the hardware but data from each frames is grabbled.

ETHERNET CD:

 To check the collision, Ethernet interfaces add hardware to detect transmission. It acts two operations:

  • It monitors sender signals.
  • Grabbled signal is interpreted as a collision.

After collision is detected computers stop transferring. So Ethernet needs CSMA/CD to coordinate transmission.

 

RECOVERY FROM COLLISION:

 Computer that find a collision sends special signal to force all other interfaces to find collision.

 Computer then waits for other to be idle before transfer. But if both devices wait for same length of time, packet frames will collide again. So the standard specifies largest delay and both devices select random delay, which is lesser. After waiting, devices use carrier sense to avoid subsequence collision. The device with shorter delay will go first and other computer may transfer later.

EXPONENTIAL BACK OFF:

 Even with random delays, collision may happen especially likely with busy code segments. Computers double delay with every subsequent collision. It replace likely hood of sequence of collision.

 

 

Posted Date: 7/30/2012 7:24:36 AM | Location : United States







Related Discussions:- Collision detection, Assignment Help, Ask Question on Collision detection, Get Answer, Expert's Help, Collision detection Discussions

Write discussion on Collision detection
Your posts are moderated
Related Questions

Scenario: A network with individual hosts (really, virtual machines) can run HTTP (web) servers that are available to the outside. (Here, available means the ability to read and wr

Example : UCSF Medical Center In the year 2002, the University of California, San Francisco (UCSF) Medical Center received an email message from someone who claimed to be a doct

Simplex data exchange Simplex communication defines to communication that happens in one direction only. Two definitions have made over time: a common definition, which is des

Attacker's Motives behind the Cyber Attack Before adapting the necessary measures to deal with the problem, understanding and evaluating the blogger's psyche and his motivation

Let me know the details of protocol tcp/ip

Base lining •    Organizations do not have any contact to each other •    No two organizations are identical to each other •    The best practices are a moving target •    K

Problem a) Give the destination IP address, upper layer protocol, TTL in decimal and header checksum in hexadecimal; the source port number and the destination port number in deci

how can you enter the ASVAB practice test on line?

UDP INTERACTION  UDP follows four kinds of interaction 1-to-1: One application can interact with one application. 1-to-many: One application can interact with many