Random Access or Contention Methods || Lesson 37 || Computer Networks || Learning Monkey ||
Автор: Learning Monkey
Загружено: 14 апр. 2021 г.
Просмотров: 7 335 просмотров
Here we will understand Random Access or Contention Methods
In the shared medium when the connected compute are treated equally
No computer is superior to the other
All have an equal right to transfer the data into the network whenever they are willing to.
This process of transferring the data at any random point of time is called random access.
In random access, the computers will go for contention.
The challenge that is faced in random access is a collision.
Whenever two computers are willing to transfer the data at the same period of time they collide with each other and will get destroyed.
The following are the protocols for random access.
1. Aloha
2. CSMA/CD
3. CSMA/CA
Link for playlists:
/ @learningmonkey
Link for our website: https://learningmonkey.in
Follow us on Facebook @ / learningmonkey
Follow us on Instagram @ / learningmonkey1
Follow us on Twitter @ / _learningmonkey
Mail us @ [email protected]

Доступные форматы для скачивания:
Скачать видео mp4
-
Информация по загрузке: