136:. To avoid collisions, a carrier sensing mechanism is used. Here each computer listens to the network before attempting to transmit. If the network is busy, it waits until network quiets down. In carrier detection, computers continue to listen to the network as they transmit. If computer detects another signal that interferes with the signal it is sending, it stops transmitting. Both computers then wait for a random amount of time and attempt to transmit. Contention methods are most popular media access control method on LANs.
25:
165:
An alternative method to handle collisions in a contention-based system is to attempt to avoid them. Some systems may utilize a strict scheduling guideline to identify who may use which resources when. Other systems may have the senders listen to the channel immediately prior to transmitting and
249:
applies specifically to the number of people connected to an ISP who share a set amount of bandwidth. Typical values would be 50:1 for home users (that is to say that 50 people or lines will vie for the same bandwidth) and 20:1 for business users. It is for this reason that the shortfall between
151:
For recovery, some systems simply cause senders to re-transmit collided data (perhaps with backing-off algorithms which reduce the sender's re-transmit rate when collisions keep occurring) or use Error
Correction techniques such as
148:
A collision can be detected by listening to the shared medium immediately after transmitting and identifying collision characteristics ; or by capturing data from the medium and performing error detection.
250:
supplier-claimed access speeds and those experienced by the consumer once signed-up to a contract is particularly bad at just those times when most consumers actually want to use the service.
129:
is a media access method that is used to share a broadcast medium. In contention, any computer in the network can transmit data at any time (first come-first served).
606:
573:
596:
346:
42:
426:
389:
89:
431:
61:
474:
712:
68:
261:. In contention, each station must monitor the signals and wait for a quiescent condition before initiating a bid for master status.
591:
214:
707:
733:
122:
75:
502:
339:
144:
One method to handle collisions in a contention based system is to optimize collision detection and subsequent recovery.
57:
406:
376:
611:
469:
312:
108:
621:
401:
464:
384:
332:
484:
195:
133:
46:
738:
601:
517:
441:
418:
208:
82:
699:
616:
680:
132:
This system breaks down when two computers attempt to transmit at the same time. This is known as a
675:
271:
183:
153:
324:
304:
35:
685:
670:
359:
355:
292:
654:
8:
394:
293:
553:
649:
563:
367:
308:
254:
226:
636:
536:
246:
242:
258:
203:
191:
727:
187:
644:
186:, or when two data stations attempt to transmit at the same time in a
626:
24:
558:
459:
354:
238:
229:, the term contention also has the following less usual meanings:
454:
492:
449:
300:
234:
290:
568:
194:(multiple access) protocol is a protocol where data packet
179:
175:
174:
Collisions are a condition that arises when two or more
139:
49:. Unsourced material may be challenged and removed.
725:
340:
241:at the same time. This may also be known as
198:may occur. Examples of such protocols are:
347:
333:
291:Paul Goransson; Raymond Greenlaw (2007).
178:stations attempt to transmit at the same
109:Learn how and when to remove this message
215:Multiple Access with Collision Avoidance
190:communication link. A contention-based
726:
166:determine suitable times to transmit.
160:
123:statistical time division multiplexing
328:
58:"Contention" telecommunications
47:adding citations to reliable sources
18:
13:
169:
14:
750:
295:Secure Roaming in 802.11 Networks
220:
257:when no station is designated a
140:Collision detection and recovery
23:
253:A contention can occur in data
34:needs additional citations for
284:
1:
734:Telecommunications techniques
664:Delay and disruption tolerant
277:
209:Carrier Sense Multiple Access
7:
265:
10:
755:
233:Competition by users of a
698:
663:
635:
582:
544:
535:
516:
501:
483:
440:
417:
375:
366:
272:Contention free pollable
686:Dynamic Source Routing
356:Channel access methods
16:Channel access method
739:Media access control
360:media access control
237:for use of the same
43:improve this article
584:Collision avoidance
161:Collision avoidance
546:Collision recovery
721:
720:
700:Duplexing methods
694:
693:
531:
530:
227:telecommunication
119:
118:
111:
93:
746:
542:
541:
373:
372:
349:
342:
335:
326:
325:
319:
318:
298:
288:
247:contention ratio
243:oversubscription
114:
107:
103:
100:
94:
92:
51:
27:
19:
754:
753:
749:
748:
747:
745:
744:
743:
724:
723:
722:
717:
690:
659:
631:
578:
527:
512:
497:
479:
436:
413:
362:
353:
323:
322:
315:
289:
285:
280:
268:
223:
172:
170:Common examples
163:
142:
115:
104:
98:
95:
52:
50:
40:
28:
17:
12:
11:
5:
752:
742:
741:
736:
719:
718:
716:
715:
710:
704:
702:
696:
695:
692:
691:
689:
688:
683:
678:
673:
667:
665:
661:
660:
658:
657:
652:
647:
641:
639:
637:Collision-free
633:
632:
630:
629:
624:
619:
614:
609:
604:
599:
594:
588:
586:
580:
579:
577:
576:
571:
566:
561:
556:
550:
548:
539:
533:
532:
529:
528:
526:
525:
522:
520:
514:
513:
511:
510:
507:
505:
499:
498:
496:
495:
489:
487:
481:
480:
478:
477:
472:
467:
462:
457:
452:
446:
444:
438:
437:
435:
434:
429:
423:
421:
415:
414:
412:
411:
410:
409:
399:
398:
397:
392:
381:
379:
370:
364:
363:
352:
351:
344:
337:
329:
321:
320:
313:
282:
281:
279:
276:
275:
274:
267:
264:
263:
262:
259:master station
255:communications
251:
222:
221:Other examples
219:
218:
217:
212:
206:
204:Aloha protocol
192:channel access
182:over a shared
171:
168:
162:
159:
158:
157:
149:
141:
138:
117:
116:
31:
29:
22:
15:
9:
6:
4:
3:
2:
751:
740:
737:
735:
732:
731:
729:
714:
711:
709:
706:
705:
703:
701:
697:
687:
684:
682:
679:
677:
674:
672:
669:
668:
666:
662:
656:
653:
651:
648:
646:
643:
642:
640:
638:
634:
628:
625:
623:
620:
618:
615:
613:
610:
608:
605:
603:
600:
598:
595:
593:
590:
589:
587:
585:
581:
575:
572:
570:
567:
565:
562:
560:
559:Slotted ALOHA
557:
555:
552:
551:
549:
547:
543:
540:
538:
534:
524:
523:
521:
519:
515:
509:
508:
506:
504:
500:
494:
491:
490:
488:
486:
482:
476:
473:
471:
468:
466:
463:
461:
458:
456:
453:
451:
448:
447:
445:
443:
439:
433:
430:
428:
425:
424:
422:
420:
416:
408:
405:
404:
403:
400:
396:
393:
391:
388:
387:
386:
383:
382:
380:
378:
374:
371:
369:
368:Channel-based
365:
361:
357:
350:
345:
343:
338:
336:
331:
330:
327:
316:
314:9780750682114
310:
306:
302:
297:
296:
287:
283:
273:
270:
269:
260:
256:
252:
248:
244:
240:
236:
232:
231:
230:
228:
216:
213:
210:
207:
205:
201:
200:
199:
197:
193:
189:
185:
181:
177:
167:
155:
150:
147:
146:
145:
137:
135:
130:
128:
124:
113:
110:
102:
91:
88:
84:
81:
77:
74:
70:
67:
63:
60: –
59:
55:
54:Find sources:
48:
44:
38:
37:
32:This article
30:
26:
21:
20:
583:
545:
537:Packet-based
294:
286:
245:. The term
224:
173:
164:
143:
131:
126:
120:
105:
99:January 2009
96:
86:
79:
72:
65:
53:
41:Please help
36:verification
33:
303:. pp.
188:half duplex
728:Categories
645:Token Ring
278:References
196:collisions
127:contention
69:newspapers
650:Token bus
627:CSMA/CARP
134:collision
655:MS-ALOHA
460:TD-SCDMA
266:See also
239:facility
607:CSMA/CA
574:CSMA/CD
564:R-ALOHA
493:HC-SDMA
475:MC-CDMA
470:FH-CDMA
465:DS-CDMA
455:TD-CDMA
427:MF-TDMA
395:SC-FDMA
184:channel
83:scholar
450:W-CDMA
311:
301:Newnes
235:system
211:(CSMA)
85:
78:
71:
64:
56:
676:VANET
671:MANET
597:MACAW
569:AX.25
554:ALOHA
432:STDMA
390:OFDMA
90:JSTOR
76:books
602:CSMA
592:MACA
518:PAMA
503:PDMA
485:SDMA
442:CDMA
419:TDMA
407:WDMA
377:FDMA
358:and
309:ISBN
202:The
180:time
176:data
62:news
713:FDD
708:TDD
681:DTN
622:HCF
617:PCF
612:DCF
402:WDM
385:FDM
225:In
154:FEC
121:In
45:by
730::
307:.
305:74
299:.
125:,
348:e
341:t
334:v
317:.
156:.
112:)
106:(
101:)
97:(
87:·
80:·
73:·
66:·
39:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.