Which is the protocol used in ethernet. (CSMA/CD) Why is it
called so ?




Answers were Sorted based on User's Feedback



Answer / vijaysivadas

CSMA/CD -Its called the carrier Sense Multiple
Access /Collision Detection

Each interface must wait until there is no signal on the
channel, then it can begin transmitting. If some other
interface is transmitting there will be a signal on the
channel, which is called carrier. All other interfaces must
wait until carrier ceases before trying to transmit, and
this process is called Carrier Sense.

All Ethernet interfaces are equal in their ability to send
frames onto the network. No one gets a higher priority than
anyone else, This is what is meant by Multiple Access.
Since signals take a finite time to travel from one end of
an Ethernet system to the other, the first bits of a
transmitted frame do not reach all parts of the network
simultaneously. Therefore, it's possible for two interfaces
to sense that the network is idle and to start transmitting
their frames simultaneously. When this happens, the
Ethernet system has a way to sense the "collision" of
signals and to stop the transmission and resend the frames.
This is called Collision Detect.

Is This Answer Correct ?    5 Yes 1 No

Answer / anil

CSMA/CD is a media access control mechanism used in Ethernet
to recover from frame collision. The following steps are
followed to recover from a collision.
Step 1: Before an Ethernet device sends a frame on the
Ethernet cable, it listens to find if another device is
already transmitting a frame (Carrier Sense).
Step 2: Once the device finds that other devices are not
transmitting any frame, it starts transmitting the frame. If
two devices detect that the Ethernet cable is free at the
same time, then both will start transmitting the frames
(Multiple Access). This will result in collision.
Step 3: The Ethernet devices while transmitting the frames,
also listen for the collision. (Collision Detect).
Step 4: If they detect a collision, both the devices stop
sending the frame (back off).
Step 5: They retry the transmission after a logarithmic
time-out period. This process is repeated till the frame is
transmitted successfully, for a maximum of 16 times. The
frame is discarded after the 16th retry.

Is This Answer Correct ?    4 Yes 1 No

Post New Answer




More Networking AllOther Interview Questions

Question What is datagram, datagram packets and datagram sockets?

0 Answers   UAF,


x.25 protocol encapsulates the follwing layers a)network b)datalink c)physical d)all of the above e)none of the above

4 Answers   Infosys, Siemens,


1. What is LAN segmentation? Why it is used? What are the different techniques to create LAN segments?

0 Answers  


what is disk interleaving? why is disk interleaving adopted?

0 Answers  


Which is better Router or Layer 3 switch?How.

4 Answers  


What is Device Manager?

1 Answers  


Explain CSMA/CD

0 Answers  


How data flow from source to destination, Explain each step from layer to layer?

5 Answers   Satyam, Juniper Networks,


how do u scan the client machine from server (AVG, McAfee & NAV)?

2 Answers  


what is computer.

4 Answers   Samsung, 4soft solutions,


i want to known about the ubuntu enumerate the various costs associated with the performance, security, support, and maintenance Thanks. please reply the saiwoontip9@gmail.com

0 Answers  


Difference between Network and Networking ?

1 Answers  




Categories
  • Networking Protocols (296)
  • Networking Administration (888)
  • Networking Security (70)
  • Networking AllOther (386)