In statistical time division multiplexing, contention is a media access method that is used to share a broadcast medium. In contention, any computer in the network can transmit data at any time (first come-first served).
This system breaks down when two computers attempt to transmit at the same time. This is known as a collision. To avoid collisions, a carrier sensing mechanism is used. Here each computer listens to the network before attempting to transmit. If the network is busy, it waits until network quiets down. In carrier detection, computers continue to listen to the network as they transmit. If computer detects another signal that interferes with the signal it is sending, it stops transmitting. Both computers then wait for a random amount of time and attempt to transmit. Contention methods are most popular media access control method on LANs.
One method to handle collisions in a contention based system is to optimize collision detection and subsequent recovery.
A collision can be detected by listening to the shared medium immediately after transmitting and identifying collision characteristics ; or by capturing data from the medium and performing error detection.
For recovery, some systems simply cause senders to re-transmit collided data (perhaps with backing-off algorithms which reduce the sender's re-transmit rate when collisions keep occurring) or use Error Correction techniques such as FEC.
An alternative method to handle collisions in a contention-based system is to attempt to avoid them. Some systems may utilize a strict scheduling guideline to identify who may use which resources when. Other systems may have the senders listen to the channel immediately prior to transmitting and determine suitable times to transmit.
Collisions are a condition that arises when two or more data stations attempt to transmit at the same time over a shared channel, or when two data stations attempt to transmit at the same time in a half duplex communication link.
This page is automatically generated and may contain information that is not correct, complete, up-to-date, or relevant to your search query. The same applies to every other page on this website. Please make sure to verify the information with EPFL's official sources.
Telecommunication, often used in its plural form, is the transmission of information by various types of technologies over wire, radio, optical, or other electromagnetic systems. It has its origin in the desire of humans for communication over a distance greater than that feasible with the human voice, but with a similar scale of expediency; thus, slow systems (such as postal mail) are excluded from the field.
Token Ring is a computer networking technology used to build local area networks. It was introduced by IBM in 1984, and standardized in 1989 as IEEE 802.5. It uses a special three-byte frame called a token that is passed around a logical ring of workstations or servers. This token passing is a channel access method providing fair access for all stations, and eliminating the collisions of contention-based access methods. Token Ring was a successful technology, particularly in corporate environments, but was gradually eclipsed by the later versions of Ethernet.