Collision detection, Computer Network Security

COLLISION DETECTION

The signals from two devices will interfere with each other and the overlapping of frames is known a collision. It does not cause to the hardware but data from each frames is grabbled.

ETHERNET CD:

 To check the collision, Ethernet interfaces add hardware to detect transmission. It acts two operations:

  • It monitors sender signals.
  • Grabbled signal is interpreted as a collision.

After collision is detected computers stop transferring. So Ethernet needs CSMA/CD to coordinate transmission.

 

RECOVERY FROM COLLISION:

 Computer that find a collision sends special signal to force all other interfaces to find collision.

 Computer then waits for other to be idle before transfer. But if both devices wait for same length of time, packet frames will collide again. So the standard specifies largest delay and both devices select random delay, which is lesser. After waiting, devices use carrier sense to avoid subsequence collision. The device with shorter delay will go first and other computer may transfer later.

EXPONENTIAL BACK OFF:

 Even with random delays, collision may happen especially likely with busy code segments. Computers double delay with every subsequent collision. It replace likely hood of sequence of collision.

 

 

Posted Date: 7/30/2012 7:24:36 AM | Location : United States







Related Discussions:- Collision detection, Assignment Help, Ask Question on Collision detection, Get Answer, Expert's Help, Collision detection Discussions

Write discussion on Collision detection
Your posts are moderated
Related Questions
Systems-Specific Policy (SysSP) SysSPs are codified as standards and procedures which are used when configuring or maintaining systems. Systems specific policies fall into 2 g

Your rules should ensure that Internet access will be restricted to the following: Only the following services will be permitted as OUTBOUND traffic (to the Internet from the DM

Computer networks are defined by four factors which are as given below: 1) NETWORK SIZE: According to the size of networks. 1) Local Area Network ( LAN) 2) Wide Area Ne

IDS Intrusion is a attack on information assets in which instigator attempts to gain entry into or disrupt normal system with harmful intent Incident response is an identificatio

QUESTION: (a) Ethernet has grown in popularity in the recent years and is now used in LANs. Give three reasons for the success behind Ethernet. (b) Ethernet uses the CSMA/CD

Describe the process a proposed standard goes through to become an RFC

Australian government sites were mandated to conform to at least single 'A' level of the World Wide Web Consortium (W3C) Web Accessibility Initiative (WAI) standards, by the end of

ADDRESS RESOLUTION AND PROTOCOL ADDRESSES Address resolution (ARP) is a network interface layer protocol. Protocol addresses are used in all upper layers. Address resolution s

Problem (a) Describe RSA algorithm with an example. (b) Answer the following RSA encryption, given the values of the primes are: p = 17, q = 11 and choosing e = 7. (c)

Question (a) Inspect the following ifconfig output of an IPv6 interface: i. What is the hidden Hardware Address of the interface on Line #1? ii. What is the hidden subn