Explain about CSMA/CD, Computer Engineering

Assignment Help:

Explain about CSMA/CD

It is an access method used mainly with LANs configured in a bus topology. With CSMA/CD, any station (node) can transmit a message to any other  station  (or  stations)  as  long  as  transmission  medium  is  free  of transmissions  from  other  stations.  Stations monitor (listen to) line to determine if line is busy. If the station has a message to send though the line is busy, it waits for an idle condition before sending its message. If two stations transmit at the same instance, a collision takes place. When this happens, station  first  sensing  the   collision  sends  a  special  jamming  signal  to  all other  stations  on  the  network.  All  stations  then  cease  transmitting  (back  off) and  wait  a  random  period  of  time  before  attempting  a  retransmission.  Random delay time for every station is different and thus, allows for prioritizing the stations on the network. If successive collisions take place, back off period for each station is doubled. With CSMA/CD stations should contend for the network. A station isn't guaranteed access to network. To detect the occurrence of a collision, a station should be capable of receiving and transmitting simultaneously. CSMA/CD is used by most LANs configured in a bus topology. Ethernet is an example of a LAN which uses CSMA/CD.

 


Related Discussions:- Explain about CSMA/CD

Project, give sample prepaired software?

give sample prepaired software?

Difference between finite automata and turing machine, What are the differe...

What are the difference between finite automata and Turing Machines?  Turing machine can alter symbols on its tape, while the FA cannot change symbols on tape.  Also  TM  has  a

Explain about the network security, Explain about the network security. ...

Explain about the network security. Network security implies the protection of networks and their services through unauthorized access, destruction or disclosure, modificati

Forward chaining, Forward Chaining: Now we have suppose we have a set ...

Forward Chaining: Now we have suppose we have a set of axioms that we know are true statements about the world. Whether we set these to each be an initial state of the segoal

Assembly directives and pseudo-ops, Assembly directives and pseudo-ops: ...

Assembly directives and pseudo-ops: Assembly directives are which instructions that executed by the assembler at assembly time, not by the CPU at run time. They can build the

Explain dynamic server creation briefly, Explain dynamic server creation br...

Explain dynamic server creation briefly. Dynamic Server Creation: If only one server handles one request at a time, each client should wait while the server fulfils the on

Differentiate between adaptive and non-adaptive routing, Differentiate betw...

Differentiate between adaptive and non-adaptive routing. Adaptive routing defines the ability of a system, by which routes are characterised through their destination, to cha

Compute minimum value of the horizontal force, Compute minimum value of the...

Compute minimum value of the horizontal force: Block A of weight 520N rest on horizontal top of block B having weight of 700N as shown in the figure given below. Block A

Layered architecture of edi, Layered Architecture of EDI: EDI is most c...

Layered Architecture of EDI: EDI is most commonly applied in the implementation and settlement phases of the trade cycle. In implementation of a simple trade exchange, the cust

DSP, Assignment of Analog to digital Ssignal Processing

Assignment of Analog to digital Ssignal Processing

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd