Русские видео

Сейчас в тренде

Иностранные видео




Если кнопки скачивания не загрузились НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием, пожалуйста напишите в поддержку по адресу внизу страницы.
Спасибо за использование сервиса savevideohd.ru



Random Access or Contention Methods || Lesson 37 || Computer Networks || Learning Monkey ||

Here we will understand Random Access or Contention Methods In the shared medium when the connected compute are treated equally No computer is superior to the other All have an equal right to transfer the data into the network whenever they are willing to. This process of transferring the data at any random point of time is called random access. In random access, the computers will go for contention. The challenge that is faced in random access is a collision. Whenever two computers are willing to transfer the data at the same period of time they collide with each other and will get destroyed. The following are the protocols for random access. 1. Aloha 2. CSMA/CD 3. CSMA/CA Link for playlists:    / @learningmonkey   Link for our website: https://learningmonkey.in Follow us on Facebook @   / learningmonkey   Follow us on Instagram @   / learningmonkey1   Follow us on Twitter @   / _learningmonkey   Mail us @ [email protected]

Comments