Discuss the csma/cd and csma/ca protocols, Computer Engineering

Assignment Help:

Discuss the CSMA/CD and CSMA/CA protocols.

CSMA/CD: this is an access method used mainly with LANs configured in a bus topology. Along with CSMA/CD, any station (node) can send a message to another station (or stations) as long as the transmission medium is free of transmissions from another station. Stations monitor (listen to) the line to find out if the line is busy. If the station has a message to transmit but the line is busy, this waits for an idle condition before transmitting message of this. If two stations transmit at similar time, collisions arise. When this occurs, the station first sensing the collision sends a special jamming signal to all other stations on the network. All stations then cease transmitting (back off) and wait a random period of time before attempting a retransmission. The random delay times for all stations are different, and therefore, permit for prioritizing the stations on the network. If successive collisions happen, the back off period for every station is twice. Along with CSMA/CD stations should contend for the network. A station has not guaranteed access to the network. To notice the occurrence of a collision, a station must be capable of transmitting and receiving simultaneously. CSMA/CD is used with most LANs configured in a bus topology. Ethernet is an illustration of a LAN which uses CSMA/CD.

CSMA/CA: this belongs to a class of protocols termed as multiple access methods. CSMA/CA stands for: Carrier Sense Multiple Access with Collision Avoidance. In Carrier Sense Multiple Access, a station wishing to transmit has to primary listen to the channel for a predetermined amount of time therefore as to check for any activity on the channel. If the channel is sensed "idle" then the station is allowed to transmit. If the channel is sensed like "busy" the station has to defer its transmission. It is the essence of both CSMA/CA and CSMA/CD. In CSMA/CA (Local Talk), a station sends a signal telling all other stations not to transmit only one time the channel is clear then sends its packet. In Ethernet 802.3, the station carries on to wait for a time and checks to observe if the channel is even free. If this is free, the station transmits, and waits for an acknowledgment signal which the packet was received.


Related Discussions:- Discuss the csma/cd and csma/ca protocols

Explain derived equations and models, Each student will be assigned a binar...

Each student will be assigned a binary system. The experimental references and the conditions are indicated in the table below. The student should make use of software available on

What is ram parity, RAM parity checking is the storing of a redundant parit...

RAM parity checking is the storing of a redundant parity bit showing the parity odd or even of a small amount of computer data typically one byte stored in random access memory, an

What are the restrictions on subscreens, What are the restrictions on Subsc...

What are the restrictions on Subscreens? Subscreens have various restrictions.  They cannot: Set their own GUI status Have a named OK code Call another screen

Object oriented and structured oriented programming, What is the difference...

What is the difference among object oriented and structured oriented programming? Ans) ? Object Oriented means programme will be there in terms of Class and Object connection w

Loadrunner would you use to record a script, What Component of LoadRunner w...

What Component of LoadRunner would you use to record a Script? Ans) The Virtual User Generator (VuGen) component is used to record a script. It enables you to make Vuser scripts

Describe critical directive in fortan, Q. Describe Critical Directive in FO...

Q. Describe Critical Directive in FORTAN? The critical directive permits one thread executes associated structured block. When one or more threads attain critical directive the

Determine the features of keyboards, Determine the features of keyboards ...

Determine the features of keyboards Common features on general-purpose keyboards are cursor-control keys. Functions keys are used to enter frequently used operations in a singl

An algorithm, find cos(x) and sin(x) an pseudocode (while loop

find cos(x) and sin(x) an pseudocode (while loop

Explain network security, Explain network security. Network security me...

Explain network security. Network security means the security of networks and their services from unauthorized access, changes, destruction or disclosure. It gives for assuranc

Show division and multiplication operation, Q. Show Division and multiplica...

Q. Show Division and multiplication operation? These operations can be represented as x + y = (N x   × 2 Ex-Ey + N y ) × 2 Ey and x-y = (N x × 2 Ex-Ey -N y ) × 2 Ey

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd