Discuss the csma/cd and csma/ca protocols, Computer Engineering

Assignment Help:

Discuss the CSMA/CD and CSMA/CA protocols.

CSMA/CD: this is an access method used mainly with LANs configured in a bus topology. Along with CSMA/CD, any station (node) can send a message to another station (or stations) as long as the transmission medium is free of transmissions from another station. Stations monitor (listen to) the line to find out if the line is busy. If the station has a message to transmit but the line is busy, this waits for an idle condition before transmitting message of this. If two stations transmit at similar time, collisions arise. When this occurs, the station first sensing the collision sends a special jamming signal to all other stations on the network. All stations then cease transmitting (back off) and wait a random period of time before attempting a retransmission. The random delay times for all stations are different, and therefore, permit for prioritizing the stations on the network. If successive collisions happen, the back off period for every station is twice. Along with CSMA/CD stations should contend for the network. A station has not guaranteed access to the network. To notice the occurrence of a collision, a station must be capable of transmitting and receiving simultaneously. CSMA/CD is used with most LANs configured in a bus topology. Ethernet is an illustration of a LAN which uses CSMA/CD.

CSMA/CA: this belongs to a class of protocols termed as multiple access methods. CSMA/CA stands for: Carrier Sense Multiple Access with Collision Avoidance. In Carrier Sense Multiple Access, a station wishing to transmit has to primary listen to the channel for a predetermined amount of time therefore as to check for any activity on the channel. If the channel is sensed "idle" then the station is allowed to transmit. If the channel is sensed like "busy" the station has to defer its transmission. It is the essence of both CSMA/CA and CSMA/CD. In CSMA/CA (Local Talk), a station sends a signal telling all other stations not to transmit only one time the channel is clear then sends its packet. In Ethernet 802.3, the station carries on to wait for a time and checks to observe if the channel is even free. If this is free, the station transmits, and waits for an acknowledgment signal which the packet was received.


Related Discussions:- Discuss the csma/cd and csma/ca protocols

How do you recognize the performance bottlenecks, Performance Bottlenecks c...

Performance Bottlenecks can be identified by using monitors. These monitors might be application server monitors, database server monitors, web server monitors and network monitors

Numbers square, Your professor wants you to fill a two-dimensional N by N m...

Your professor wants you to fill a two-dimensional N by N matrix with some numbers by following a specific pattern. According to his explanation as in the figure below, you have to

Explain the matlab working environment, This is the set of tools and facili...

This is the set of tools and facilities that you work with as the MATLAB user or programmer. It contains facilities for managing the variables in your workspace and importing and e

Opcode field of an instruction, For this machine there can be two more poss...

For this machine there can be two more possible addressing modes in addition to direct andimmediate.   Opcode field of an instruction is a group of bits which define various pro

#project, how to build PVR set-top box using raspberry

how to build PVR set-top box using raspberry

Describe the types of flip-flops and latches, Describe the types of flip-fl...

Describe the types of flip-flops and latches. Flip-flops are of two types as illustrated below: a. Positive edge triggered b.  negative edge triggered Latches are

Indian standard code for information interchange, The ISCII is an 8-bit cod...

The ISCII is an 8-bit code which contains standard ASCII values till 127 from 128-225 it contains characters necessary in ten Brahmi-based Indian scripts. It is defined in IS 13194

Advantages & disadvantages of public-key cryptography, Advantages & Disadva...

Advantages & Disadvantages Enhanced security and convenience: private keys never require be transmitting or revealing to anyone.  They can givce a method for digital signatu

Design the communication protocol, Design, write, and implement distributed...

Design, write, and implement distributed networked application using Java Design the communication protocol (message format and exchange procedure) that your application will re

Eliminating hazards - computer architecture, Eliminating hazards of pipeli...

Eliminating hazards of pipeline -  computer architecture: We can delegate the work of eliminating data dependencies to the compiler, which can fill up in suitable number of NO

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd