Discuss the csma/cd and csma/ca protocols, Computer Engineering

Assignment Help:

Discuss the CSMA/CD and CSMA/CA protocols.

CSMA/CD: this is an access method used mainly with LANs configured in a bus topology. Along with CSMA/CD, any station (node) can send a message to another station (or stations) as long as the transmission medium is free of transmissions from another station. Stations monitor (listen to) the line to find out if the line is busy. If the station has a message to transmit but the line is busy, this waits for an idle condition before transmitting message of this. If two stations transmit at similar time, collisions arise. When this occurs, the station first sensing the collision sends a special jamming signal to all other stations on the network. All stations then cease transmitting (back off) and wait a random period of time before attempting a retransmission. The random delay times for all stations are different, and therefore, permit for prioritizing the stations on the network. If successive collisions happen, the back off period for every station is twice. Along with CSMA/CD stations should contend for the network. A station has not guaranteed access to the network. To notice the occurrence of a collision, a station must be capable of transmitting and receiving simultaneously. CSMA/CD is used with most LANs configured in a bus topology. Ethernet is an illustration of a LAN which uses CSMA/CD.

CSMA/CA: this belongs to a class of protocols termed as multiple access methods. CSMA/CA stands for: Carrier Sense Multiple Access with Collision Avoidance. In Carrier Sense Multiple Access, a station wishing to transmit has to primary listen to the channel for a predetermined amount of time therefore as to check for any activity on the channel. If the channel is sensed "idle" then the station is allowed to transmit. If the channel is sensed like "busy" the station has to defer its transmission. It is the essence of both CSMA/CA and CSMA/CD. In CSMA/CA (Local Talk), a station sends a signal telling all other stations not to transmit only one time the channel is clear then sends its packet. In Ethernet 802.3, the station carries on to wait for a time and checks to observe if the channel is even free. If this is free, the station transmits, and waits for an acknowledgment signal which the packet was received.


Related Discussions:- Discuss the csma/cd and csma/ca protocols

Example of calculate maximum access time & cost of switch, Calculate the ma...

Calculate the maximum access time that can be permitted for the data and control memories in a TSI switch with a single input and single output trunk multiplexing 2500 channels. Al

Determine the disadvantages of fact finding, Determine the Disadvantages of...

Determine the Disadvantages of fact finding -  People are usually uncomfortable being watched and may work in a different way -  What they are watching may not be represent

Define elimination of common sub expression, Explain Elimination of common ...

Explain Elimination of common sub expression during code optimization An optimizing transformation is a regulation for rewriting a segment of a program to enhance its execution

What are the exceptions encountered for fp operation, What are the exceptio...

What are the exceptions encountered for FP operation? The exceptions encountered for FP operation are overflow, underflow. /0, inexact and invalid values.

What is data in computers, Q. What is data in computers? In modern digi...

Q. What is data in computers? In modern digital computers data is signified in binary form by employing two symbols 0 and 1. These are known as binary digits or bits however da

Define internet infrastructure, As we know how packets travel from one comp...

As we know how packets travel from one computer to another over the Internet. However what's in-between? Actually what makes up the Internet infrastructure or backbone? Fi

Determine about the virtual private networks, Virtual Private Networks (VPN...

Virtual Private Networks (VPN) In order to encrypt/decrypt all the communication network traffic that passes through the Internet or Intranet, a VPN uses software or hardware.

Secondary memory and characteristics, It is desirable that operating speed ...

It is desirable that operating speed of primary storage of a computer system be as fast as possible since most of the data transfer to and from processing unit is via main memory.

What is the function of an ip packet screening router, What is the function...

What is the function of an IP packet screening Router? Explain with the help of a diagram. Function of an IP Packet Screening Router: A screening router is the most fund

What is organizational structure, What is Organizational Structure? A b...

What is Organizational Structure? A business organization may be structured in many dissimilar ways, depending upon the environment within which it handles.  There is always

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd