Lec 08
Lec 08
Lecture Handout
Computer Networks
Lecture No. 8
COLLISION DETECTION:
As explained above, the signals from two computers will interfere with each other
and the overlapping of frames is called a collision.
It does not harm to the hardware but data from both frames is grabbled.
ETHERNET CD:
To detect the collision, Ethernet interfaces include hardware to detect
transmission. It performs two operations:
______________________________________________________________________________________
Page 1of 5
© Copyright Virtual University of Pakistan
CS610-Computer Networks Lecture No.8
Figure 8.1
CSMA/CA:
Wireless uses collision avoid ness rather than collision detection. Transmitting
computer sends very short message to receiver. Receiver responds with short message
reserving slot for transmitter. The response from receiver is broadcast, so all potential
transmitters receive reservation.
COLLISION:
The receiver may receive simultaneous requests, which results in collision at
receivers and both requests lost and in this way no transmitter receives reservations and
both use back off and retry. The receiver may receive closely spaced requests. It selects
one of them and then the selected transmitter sends message and the transmitter not
selected uses back off and retries.
______________________________________________________________________________________
Page 2of 5
© Copyright Virtual University of Pakistan
CS610-Computer Networks Lecture No.8
LOCAL TALK:
Apple invented the LAN technology that uses bus topology. Its interface is
included with all Macintosh computers.
It has relatively low speed i.e. 230.4Kbps. Also it is of low cost and we can get a free
with a Macintosh, which is easy to install and connect. It uses CSMA/CA.
TOKEN RING:
Many LAN technologies that are ring topology use token passing for
synchronized access to the ring. The ring itself is treated as a single shared
communication medium. Both pass from transmitter passed by other computers and are
copied by destination.
Hardware must be designed to pass token ever if attached computer powered
down. This is shown in figure below.
Figure 8.2
______________________________________________________________________________________
Page 3of 5
© Copyright Virtual University of Pakistan
CS610-Computer Networks Lecture No.8
FDDI: Fiber distributed data interconnect (FDDI) is another ring technology. Its most
important features are:
It uses fiber optics between stations and transmits data at 100Mbps.
It uses pair of fibers to form two concentric rings.
In case of fiber a station failure, remaining stations loop back and reroute data through
spare ring. In this way all stations automatically configure loop back by monitoring data
ring. It is shown in figure below
______________________________________________________________________________________
Page 4of 5
© Copyright Virtual University of Pakistan
CS610-Computer Networks Lecture No.8
ATM DETAILS:
• It transmits data at over 100Mbps.
• It uses fiber optics to connect computer to switch.
• Each connection includes two fibers.
• It is also shown in figure.
Figure 8.5
______________________________________________________________________________________
Page 5of 5
© Copyright Virtual University of Pakistan