Why does csma/cd use a random delay




















If, however, a collision is detected, the participant immediately interrupts the transmission and instead sends an interference signal JAM signal so that all other stations can also detect the collision. Now the participant waits for a random amount of time backoff before trying the transmission again.

Since both stations select a random value, the probability that both of them will start a transport attempt at the same time is quite low. The transmission attempts are counted.

If the following attempts also fail and the maximum number of attempts 16 is reached, the station reports the error to the next higher network layer and then terminates the transmission permanently.

Since it is highly unlikely that a network participant will reach the maximum number of attempts during a normal process, it can be assumed that a system error has occurred. The Ethernet collision resolution mechanism binary exponential backoff is used to mitigate permanent collisions. The participant must wait a while before starting a new attempt after a collision.

This duration is always a random multiple of the so-called slot time. The slot time depends on the transmission rate and is a few microseconds long. The range of possible multiples doubles with each failed attempt so that the probability of simultaneous transmission becomes exponentially lower. To detect whether a collision has occurred, the station simultaneously checks whether the transmitted signal is identical to that on the transmission medium.

If this is not the case, another station carries out a transmission simultaneously and falsifies the signal on the bus. Collisions like these occur regularly and are part of the normal operation of a local area network LAN.

However, the size of the network also increases the probability of collisions. In this case, size refers not only to the number of participants, but also to the length of the transmission paths. This also leads to more collisions and slows down the network overall. A collision domain is the area of a network in which participants share a transmission medium.

However, the collision domain must not exceed a certain size : Networks cannot be enlarged indefinitely if the collision procedure is to remain effective. The reason for this is the speed of the transmission and the distance it must travel. Network protocols can be divided into seven abstract layers according to the OSI reference model. The top layer the application layer provides features for applications, allowing users to enter and output data.

These include layers for transport where you can find TCP, for example and switching where the internet protocol is located. In the lowest layer the physical layer , the task is to translate the binary digits of the computer into a physical signal that matches the transmission medium. The collision domain is also located at this level. Otherwise the station will not realize that the transmitted data is already damaged and will consider the transmission to be success, while the data packet will be lost.

With this knowledge and the information about the network technology being used, the maximum size of a collision domain can be calculated. The smallest data package, which accordingly takes the shortest time for complete transmission, and is the most extreme case, has a size of bits 64 bytes.

This results in a slot time of The slot time describes the length of time a signal may take to the end of the collision domain and back again. Data in networks, however, is not sent through empty space at the speed of light. Let's say you are talking to your friend using a mobile phone. This means there is a link established between you and him.

This means multiple users might be communicating through the same channel. How is that possible? The reason behind this is the multiple access protocols. If you refer to the OSI model you will come across the data link layer. Now divide the layers into 2 parts, the upper part of the layer will take care of the data link control , and the lower half will be taking care in resolving the access to the shared media , as shown in the above diagram.

The following diagram classifies the multiple-access protocol. In this article, we are going to cover Random Access Protocol. Once again, let's use the example of mobile phone communication. Whenever you call someone, a connection between you and the desired person is established, also anyone can call anyone. So here we have all the users stations at an equal priority, where any station can send data depending on medium's state whether it is idle or busy, meaning that if you friend is talking to someone else through the mobile phone, then its status is busy and you cannot establish a connection and since all the users are assigned equal priority you can not disconnect your friend's ongoing call and connect yours.

There is no time restriction for sending the data you can talk to your friend without a time restriction. As in the above diagram you might have observed that the random-access protocol is further divided into four categories, which are:. The ALOHA protocol or also known as the ALOHA method is a simple communication scheme in which every transmitting station or source in a network will send the data whenever a frame is available for transmission.

If we succeed and the frame reaches its destination, then the next frame is lined-up for transmission. But remember, if the data frame is not received by the receiver maybe due to collision then the frame is sent again until it successfully reaches the receiver's end.

Whenever we talk about a wireless broadcast system or a half-duplex two-way link, the ALOHA method works efficiently. But as the network becomes more and more complex e. Now here in the ethernet, the system involves multiple sources and destinations which share a common data path or channel, then the conflict occurs because data-frames collide, and the information is lost. So, to minimize these collisions and to optimize network efficiency as well as to increase the number of subscribers that can use a given network, the slotted ALOHA was developed.

This system consists of the signals termed as beacons which are sent at precise time intervals and inform each source when the channel is clear to send the frame. Stations can transmit the data randomly i. Till now we have understood that when 2 or more stations start sending data, then a collision occurs, so this CSMA method was developed to decrease the chances of collisions when 2 or more stations start sending their signals over the data link layer.

But how do they do it? Packet collisions occur when packets are transmitted from different host at the same time. If no other hosts are transmitting packets, the sender begins sending the frame. The sender also monitors the wire to make sure no other hosts begin transmitting. However, if another host begins transmitting at the same time and a collision occur, the transmitting host sends a jam signal that causes all hosts on the network segment to stop sending data.

After a random period of time, hosts retransmit their packets. Consider the following example:.



0コメント

  • 1000 / 1000