💡
Network Fundamentals
  • About This Site
  • Network
  • Medium
  • Types of Network:
  • LAN
  • MAN
  • WAN
  • Internet
  • Types of Internet Connections
  • Cable Connection
  • DSL Connection
  • Internet Standard & Protocols
  • Internet Networking Model
  • SNA Networking Model
  • OSI Networking Model
  • TCP-IP Networking Model
  • TCP-IP Layers
  • Application Layer
  • HTTP (Hyper Text Transfer Protocol)
  • Transport Layer
  • TCP (Transmission Control Protocol)
  • Network Layer
  • IP (Internet Protocol)
  • IPv4:
  • IPv4 Address parts
  • IPv4 Address Classes
  • IPv6:
  • Data-Link Layer
  • Physical Layer
  • An Ethernet
  • A SOHO LAN Network
  • An Enterprise LAN Network
  • Physical Layer Standards
  • Data-Link Layer Standards
  • Transmitting Data over Ethernet UTP
  • Transmitting Data over Fiber Optic Cable (using Hot-Pluggable Transceivers)
  • Cabling Pinouts (Ethernet UTP)
  • Cabling Pinouts (Fiber Optic)
  • Ethernet Standards (UTP)
  • Ethernet Standards (Fiber Optic)
  • LAN Data-Link Layer Protocols
  • Ethernet Addressing (MAC)
  • Types of Networking Devices
  • HUB
  • SWITCH
  • CSMA/CD (Carrier Sense Multiple Access / Collision Detection):
  • Lease-Line WAN
  • WAN Data-Link Layer Protocols
  • HDLC Encapsulating and Re-encapsulating
  • Ethernet WAN (EoMPLS)
  • IP Routing (BIG FLOW)
  • Router
  • Subnetting
  • Binary Rules
  • Binary Method Example 1
  • Binary Method Example 2
  • Binary Method Example 3
  • Subnetting Quick Method Rules
  • Subnetting Quick Method Example 1
  • Subnetting BEST Method Rules
  • Subnetting BEST Method Example 1
  • Subnetting BEST Method Example 2
  • Subnetting BEST Method Example 3a
  • Subnetting BEST Method Example 3b
  • Subnetting BEST Method Example 3c
  • Subnetting BEST Method Example 4
  • Dynamic Routing Protocol
  • DNS (Domain Name System)
  • ARP (Address Resolution Protocol)
  • PING (Packet Internet Groper)
  • Cisco OS (IOS)
  • Memory Types
  • Cisco CLI
  • Console Port:
  • Telnet Access (Teletype network) (P No. 23):
  • SSH (Secure Shell) (P No. 22)
  • Console Cabling
  • CLI Modes
  • Securing User Mode and Privileged Mode
  • Securing User & Privileged Mode For Console Users
  • Securing User & Privileged Mode For Telnet Users
  • Securing User & Privileged Mode For SSH Users
  • AAA (Authentication, Authorization and Accounting) Server
  • AAA 802.1x Protocols(Radius & TACACS+)
  • Ethernet LAN Switching
  • VLAN
  • Configuring VLAN
  • VTP (Vlan Trunking Protocol)
  • Trunk Port
  • Trunking Protocol (802.1Q)
  • DTP (Dynamic Trunking Protocol)
  • Voice VLAN
  • Why STP?
  • What STP Does?
  • How STP works?
  • STP Messages (BPDU)
  • Electing a RB (Root Bridge/Switch)
  • Electing One Root Port (on each Non RB)
  • Elect One/Multiple Designated Ports on each Non RB:
  • Changing the STP Settings:
  • STP (Spanning Tree Protocol)
  • STP Convergence (if something changes/link fails):
  • STP (Spanning Tree Protocol) Versions
  • STP/RSTP States:
  • PortFast
  • BPDU Guard
  • RSTP (Rapid Spanning Tree)
  • Port Roles in RSTP
  • RSTP Port States
  • Ether Channel
  • Switched Virtual Interface
  • Half Duplex
  • Full Duplex
  • Autonegotiation
  • Duplex Mismatch:
  • Verifying Duplex Mismatch
  • Number History
  • 10 to the power of x
  • 2 to the power of x
Powered by GitBook
On this page

CSMA/CD (Carrier Sense Multiple Access / Collision Detection):

PreviousSWITCHNextLease-Line WAN

Last updated 4 years ago

Two more computers or communicating devices can get connected over the same Medium.

  • All the computers can communicate whenever they feel as if they are in a democratic world.

  • But before a computer communicate it has to sense the medium if available & not used by others it can put its frame on the wire, when computers frame it son wire for that instance it is the owner of that entire medium.

  • At that instance, no other computer can talk. When a computer talks all the other computers will listen & only that computer will reply for whom a frame is sent for.

  • If the two computers put their frames on the wire on the same instance then these frames will get converted into an electrical signal which is a form of energy that cannot be created nor destroyed but will get distorted. These distorted signals will not vanish off but will be resonated back to all the computers on that link.

  • Computers that were sending the signal will start realizing whatever they are sending is getting corrupted & will immediately back off & the computer that detected the corruption first will start pumping jamming pattern on wire & on receiving jamming pattern all the computers will back off & release the medium.

  • After releasing the Medium computers will enter the integral wait state. As these wait states are integral so each computer can increase or decrease the wait state depending on the collision.

  • If too many communicating devices wanting to communicate so as a good citizen computer will increase its wait state thereby allowing other communicating devices to finish off their communication. If lesser collisions are happening the computers may reduce their wait state.

  • These wait states are in the multiple of 51.2 microseconds.

  • When is enabled it enables CSMA/CD because one can either send/receive at a time in Half Duplex settings.

Reference:

  • RST Notes

Half Duplex