Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

Random Access or Contention Methods || Lesson 37 || Computer Networks || Learning Monkey ||

Random Access or Contention Methods

random access

randon access in computer networks

random acces in data link layer

contention methods

contention methods in random access

contention methods in medium access control

computer networks

data link layer

data link layer in computer networks

learning monkey

learning monkey computer networks

learning monkey gate cse free full course

gate cse

gate computer networks

gate cse free online coaching

gate cse lectures

Автор: Learning Monkey

Загружено: 14 апр. 2021 г.

Просмотров: 7 335 просмотров

Описание:

Here we will understand Random Access or Contention Methods
In the shared medium when the connected compute are treated equally
No computer is superior to the other
All have an equal right to transfer the data into the network whenever they are willing to.
This process of transferring the data at any random point of time is called random access.
In random access, the computers will go for contention.
The challenge that is faced in random access is a collision.
Whenever two computers are willing to transfer the data at the same period of time they collide with each other and will get destroyed.
The following are the protocols for random access.
1. Aloha
2. CSMA/CD
3. CSMA/CA


Link for playlists:
   / @learningmonkey  


Link for our website: https://learningmonkey.in

Follow us on Facebook @   / learningmonkey  

Follow us on Instagram @   / learningmonkey1  

Follow us on Twitter @   / _learningmonkey  

Mail us @ [email protected]

Random Access or Contention Methods || Lesson 37 || Computer Networks || Learning Monkey ||

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

Pure Aloha || Lesson 38 || Computer Networks || Learning Monkey ||

Pure Aloha || Lesson 38 || Computer Networks || Learning Monkey ||

Pure Aloha

Pure Aloha

Но что такое нейронная сеть? | Глава 1. Глубокое обучение

Но что такое нейронная сеть? | Глава 1. Глубокое обучение

How does Bluetooth Work?

How does Bluetooth Work?

CSMA/CD protocol in computer networks | Carrier Sense Multiple Access With Collision Detection  | CN

CSMA/CD protocol in computer networks | Carrier Sense Multiple Access With Collision Detection | CN

Deep House Mix 2024 | Deep House, Vocal House, Nu Disco, Chillout Mix by Diamond #3

Deep House Mix 2024 | Deep House, Vocal House, Nu Disco, Chillout Mix by Diamond #3

DHCP Explained - протокол динамической конфигурации хоста

DHCP Explained - протокол динамической конфигурации хоста

КАК УСТРОЕН TCP/IP?

КАК УСТРОЕН TCP/IP?

Lec-35: Carrier Sense Multiple Access/ Collision Detection | CSMA/CD | Computer Networks

Lec-35: Carrier Sense Multiple Access/ Collision Detection | CSMA/CD | Computer Networks

Multiple Access Protocols

Multiple Access Protocols

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]