Collision detection, Computer Network Security

COLLISION DETECTION

The signals from two devices will interfere with each other and the overlapping of frames is known a collision. It does not cause to the hardware but data from each frames is grabbled.

ETHERNET CD:

 To check the collision, Ethernet interfaces add hardware to detect transmission. It acts two operations:

  • It monitors sender signals.
  • Grabbled signal is interpreted as a collision.

After collision is detected computers stop transferring. So Ethernet needs CSMA/CD to coordinate transmission.

 

RECOVERY FROM COLLISION:

 Computer that find a collision sends special signal to force all other interfaces to find collision.

 Computer then waits for other to be idle before transfer. But if both devices wait for same length of time, packet frames will collide again. So the standard specifies largest delay and both devices select random delay, which is lesser. After waiting, devices use carrier sense to avoid subsequence collision. The device with shorter delay will go first and other computer may transfer later.

EXPONENTIAL BACK OFF:

 Even with random delays, collision may happen especially likely with busy code segments. Computers double delay with every subsequent collision. It replace likely hood of sequence of collision.

 

 

Posted Date: 7/30/2012 7:24:36 AM | Location : United States







Related Discussions:- Collision detection, Assignment Help, Ask Question on Collision detection, Get Answer, Expert's Help, Collision detection Discussions

Write discussion on Collision detection
Your posts are moderated
Related Questions
what is relation ship between computer security goals?

In this section, you should create a program that emulates a GBN node. Two GBN nodes will be running to send packets to each other through the UDP protocol. For emulation purpose,

Problem 1 Solve the following Caesar cipher by showing your working: EM KIUM EM AIE EM KWVYCMZML Problem 2 Compare and contrast between block and stream ciphers, listin

Question: (a) Explain how the Diffie-Hellman key establishment protocol works. (b) Prove that the Diffie-Hellman key establishment protocol is vulnerable to a `man in the mi

Information System Security 1. Write about: a. Potential Risks to Information Systems b. Factors to be addressed for making information systems more secure 2. Write about t

QUESTION An analog sensor is used to monitor the temperature of sea water at different depth. The sensor is fitted to a buoy and incorporates a wireless transmitter that send

Risk Management Discussion Points Organizations should define level of risk it can live with Risk appetite: it defines quantity and nature of risk which organizations are wil


Normal 0 false false false EN-US X-NONE X-NONE

QUESTION: a) Below is a capture of an Ethernet II frame which has an IPv4 packet and a segment. Provide the source MAC address in hexadecimal; the source IP address, the length