answersLogoWhite

0

Because CSMA/CD does not prevent Hidden terminal problem. so it is onlly applicable in Wired networks.

User Avatar

Wiki User

13y ago

What else can I help you with?

Related Questions

What is ad hoc networks?

Mobile ad hoc networks refer to the networks that cellphones and other mobile devices are connected to. Laptops and computers may also connect to such networks by means of tethering to a mobile device.


What is the difference between wireless mesh networks and mobile ad hoc networks?

A wireless mesh network is a type of ad hoc network. The difference would be that clients on mesh networks are dedicated to the role of routing by relying on an infrastructure of sorts, while ad hoc clients are generally user to user and not fixed to any kind of infrastructure.


What is infrastructureless network?

Probably the most quickly developing areas in wireless networks is wireless ad hoc networks. A wireless ad hoc network is an autonomous system consisting of nodes, which might can become mobile, connected with wireless links and without using pre-existing communication infrastructure or central control. Ad hoc networking is expected to play an important role in future wireless mobile networks because of the widespread use of mobile and hand-held devices. Mobile Ad hoc Networks (MANETs) and Wireless Sensor Networks (WSNs) are two prominent classes of these infrastructerless wireless networks. While MANETs exhibit dynamic topology changes due to free node mobility, WSNs have unreplinishible energy limitations. Hence, topology control, Quality of Service (QoS) routing, and power control become challenging issues.


Ad hoc netwrork?

Wireless Ad Hoc Networks has been ongoing for decades. The history of wireless ad hoc networks can be traced back to the Defense Advanced Research Project Agency (DAPRPA) packet radio networks (PRNet), which evolved into the survivable adaptive radio networks (SURAD) program [11]. Ad hoc networks have play an important role in military applications and related research efforts, for example, the global mobile information systems (GloMo) program [12] and the near-term digital radio (NTDR) program [13]. Recent years have seen a new spate of industrial and commercial applications for wireless ad hoc networks, as viable communication equipment and portable computers become more compact and available. Since their emergence in 1970's, wireless networks have become increasingly popular in the communication industry. These networks provide mobile users with ubiquitous computing capability and information access regardless of the users' location. There are currently two variations of mobile wireless networks: infrastructured and infrastructureless networks. The infrastructured networks have fixed and wired gateways or the fixed Base-Stations which are connected to other Base-Stations through wires. Each node is within the range of a Base-Station. A "Hand-off" occurs as mobile host travels out of range of one Base-Station and into the range of another and thus, mobile host is able to continue communication seamlessly throughout the network. Example applications of this type include wireless local area networks and Mobile Phone. The other type of wireless network, infrastructureless networks, is knows as Mobile Ad-hoc Networks (MANET). These networks have no fixed routers, every node could be router. All nodes are capable of movement and can be connected dynamically in arbitrary manner. odeavesdropping, spoofing and denial-of-service attacks in these networks.


What has the author Shahid Bashir written?

Shahid Bashir has written: 'Effective and efficient resource discovery protocols for mobile ad hoc networks'


What is the difference between wireless ad hoc networks and mobile ad hoc networks?

A mobile ad hoc network (MANET) is a self-configuring infrastructureless network of mobile devices connected by wireless.Each device in a MANET is free to move independently in any direction, and will therefore change its links to other devices frequently. Each must forward traffic unrelated to its own use, and therefore be a router. The primary challenge in building a MANET is equipping each device to continuously maintain the information required to properly route traffic. Such networks may operate by themselves or may be connected to the larger Internet.MANETs are a kind of wireless ad hoc networks that usually has a routable networking environment on top of a Link Layer ad hoc network.A wireless ad hoc network is a decentralized type of wireless network.[1] The network is ad hoc because it does not rely on a preexisting infrastructure, such as routers in wired networks oraccess points in managed (infrastructure) wireless networks. Instead, each node participates in routing by forwarding data for other nodes, so the determination of which nodes forward data is made dynamically on the basis of network connectivity.


What has the author Mounir Frikha written?

Mounir Frikha has written: 'Ad hoc networks' -- subject(s): Ad hoc networks (Computer networks), TECHNOLOGY & ENGINEERING / Telecommunications


What has the author E Cayirci written?

E. Cayirci has written: 'Security in wireless ad hoc and sensor networks' -- subject(s): Ad hoc networks (Computer networks), Security measures


Will ad-hoc networks contain access points?

An ad-hoc network does not require an access point. Typically, if an access point is involved then it is not strictly an ad-hoc network, but would be an infrastructure network.


What are the advantages and disadvantages of adhoc networks?

Advantage: Easy to set up Cheap Disadvantage: Lack of security. Thus ad-hoc network is also called unsecure networks.


What is the advantages of efficient anomaly intrusion detection system in adhoc networks by mobile agents?

An efficient anomaly intrusion detection system (AIDS) in ad hoc networks using mobile agents enhances security by enabling real-time monitoring and rapid response to potential threats. Mobile agents can autonomously traverse the network to collect data and analyze patterns, improving detection accuracy and reducing communication overhead. This decentralized approach allows for scalability and adaptability in dynamic environments, making it well-suited for the often fluctuating topology of ad hoc networks. Ultimately, it enhances the resilience of the network against intrusions while minimizing resource consumption.


What is the past tense of 'ad hoc'?

It is an adjective so it doesn't have a past tense - only verbs do.