Search

Network Access Methods, CSMA/CD, CSMA/CA and Token Passing, Difference between CSMA/CD CSMA/CA and Token Passing

CSMA/CD (Carrier Sense Multiple Access/Collision Detection)

In CSMA/CD (Carrier Sense Multiple Access/Collision Detection) Access Method, every host has equal access to the wire and can place data on the wire when the wire is free from traffic. When a host want to place data on the wire, it will “sense” the wire to find whether there is a signal already on the wire. If there is traffic already in the medium, the host will wait and if there is no traffic, it will place the data in the medium. But, if two systems place data on the medium at the same instance, they will collide with each other, destroying the data. If the data is destroyed during transmission, the data will need to be retransmitted. After collision, each host will wait for a small interval of time and again the data will be retransmitted, to avoid collision again.

CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance)

In CSMA/CA, before a host sends real data on the wire it will “sense” the wire to check if the wire is free. If the wire is free, it will send a piece of “dummy” data on the wire to see whether it collides with any other data. If it does not collide, the host will assume that the real data also will not collide.

Token Passing

In CSMA/CD and CSMA/CA the chances of collisions are there. As the number of hosts in the network increases, the chances of collisions also will become more. In token passing, when a host want to transmit data, it should hold the token, which is an empty packet. The token is circling the network in a very high speed. If any workstation wants to send data, it should wait for the token. When the token has reached the workstation, the workstation can take the token from the network, fill it with data, mark the token as being used and place the token back to the network.

Related Tutorials
Introduction to Computer Networking
Responsibilities of a network engineer
What is a Computer Network?
Why we need computer networks?
Different types devices used to create a computer network
Client Operating Systems and Network Operating Systems (NOS)
Common Network Application Software
Local Area Networks (LAN) and Wide Area Networks (WAN)
Campus Area Networks (CAN) and Metropolitan Area Network (MAN)
Logical Classification of Computer Networks - Peer to Peer Networks and Client/Server Networks
Logical Classification of Computer Networks - Centralized and Distributed Computer Network Models
Internetworks, Internet, Intranet and Extranet
What is a Network Protocol
Difference between Proprietary and Standard Protocols
What are RFCs (Request for Comments)
Organizations which control Internet, Network Protocols and Standards
What is network topology
Difference between physical topology and logical topology
Network Topologies - Bus Topology
Network Topologies - Star Topology
Network Topologies - Mesh, Ring and Hybrid Topologies
Network Topologies - Partial-Mesh Topology
Network Topologies - Full-Mesh Topology
Advantages and disadvantages of full-mesh topology
Network Topologies - Ring Topology
Network Topologies - Dual Ring Topology
Network Topologies - Hybrid Topology
Network Topologies - Tree Topology
Point-to-point Topology and Point-to-multipoint Topology
What are wireless networks? Advantages and disadvantages of wireless networks.
Ad hoc Wireless Topology
Infrastructure Wireless Topology
Wireless Mesh Topology
Network Infrastructure Devices and Icons
Network Infrastructure Devices - What is a Hub?
Network Infrastructure Devices - What are Bridges and Switches?
Network Infrastructure Devices - What is a Router?
Network Infrastructure devices - What is a Firewall
Main office (Head Office) and Branch Office Networks
Site-to-Site Network Topologies - Hub and Spoke Toplogy
Site-to-Site Network Topologies - Partial-Mesh Toplogy
Site-to-Site Network Topologies - Full Mesh Topology
What is NIC (Network Interface Card)
Common Network Cable types
Differences between STP and UTP twisted pair cables
Twisted pair cable bandwidth and frequency range
Different types of shields used in STP (shielded twisted pair cable)
TIA/EIA 568A and TIA/EIA-568B standards
Straight-Through and Cross-Over cables
What is Auto-MDIX feature in ethernet switches
Difference between Baseband and Broadband
IEEE (Institute of Electrical and Electronics Engineers)
IEEE 802 Standards
IEEE 802.11 Standards
LAN Technologies - Ethernet
Ethernet Media Standards
100Base-TX Ethernet Media Standard
100Base-FX Ethernet Media Standard
4D-PAM5 encoding in Gigabit Ethernet
1000Base-T Ethernet Media Standard
1000Base-SX Ethernet Media Standard
1000Base-LX Ethernet Media Standard
10GBase-T 10 Gigabit Ethernet Media Standard
10GBase-SR 10 Gigabit Optical Fiber Ethernet Media Standard
Meaning of 10/100/1000 Ethernet
Twisted pair Cable categories for 1 Gigbit and 10 Gigabit networks
Broadband over Power Line (IEEE 1901-2010 standard)
What is Power over Ethernet (PoE)
What is PoE (Power over Ethernet) Switch
LAN Technologies - Token Ring
Advantages and disadvantages of Fiber optic cable
Structure of fiber optic cable (FOC)
Single Mode Fiber Optic Cable (SMF fiber cable)
Multimode Fiber Optic Cable (MMF fiber cable)
Different types of fiber optic cables
Fiber optic transceivers
Fiber optic connectors
LAN Technologies - Fibre Distributed Data Interface (FDDI)