answersLogoWhite

0

actually in wireless networks, collision detection does not work. The radio is a half-duplex channel, so it can not send and detect for the collision at the same time. Moreover the the sender can't necessarily hear what receiver is receiving, so it can't tell if collision has occurred. Instead CSMA with collision avoidance is used. So, the sender only sends when it senses the channel is free and reserves the channel by sending RTS and CTS to avoid collisions.

User Avatar

Wiki User

17y ago

What else can I help you with?

Related Questions

Why wireless cannot use csma CD?

because in a wireless system, collision detection is not possible and there is no way to do error correction so collision avoidance is the only method


What is Instruction Detection System?

When you go to the bathroom. ^ Dont waste people's time. Do you mean Intrusion Detection System? If so, an Intrusion Detection System, or IDS for short, is a physical device, or a piece of software that monitors networks or systems for malicious activities.


What is the CCD in auto troubleshooting codes?

Chrysler Collision Detection. It is a fancy name for the computer communication system on the vehicle.


What are the three tools for conducting wireless security testing?

Three popular tools for conducting wireless security testing are Aircrack-ng, Kismet, and Wireshark. Aircrack-ng is a suite of tools for assessing the security of Wi-Fi networks, focusing on packet capturing and WEP/WPA/WPA2 cracking. Kismet is a wireless network detector, sniffer, and intrusion detection system that can identify hidden networks. Wireshark is a powerful network protocol analyzer that allows users to capture and interactively browse traffic on a computer network, including wireless communications.


What is bcmwls32?

bcmwls32.exe is the Broadcom Wireless Network Card Utility. It is accompanied by the system drivers for a Broadcom wireless card. It replaces the Windows Wireless Zero Configuration Service as your interface for configuring and connecting to wireless networks.


What is systemic instruction?

When you go to the bathroom. ^ Dont waste people's time. Do you mean Intrusion Detection System? If so, an Intrusion Detection System, or IDS for short, is a physical device, or a piece of software that monitors networks or systems for malicious activities.


What is infrastructureless network?

Probably the most quickly developing areas in wireless networks is wireless ad hoc networks. A wireless ad hoc network is an autonomous system consisting of nodes, which might can become mobile, connected with wireless links and without using pre-existing communication infrastructure or central control. Ad hoc networking is expected to play an important role in future wireless mobile networks because of the widespread use of mobile and hand-held devices. Mobile Ad hoc Networks (MANETs) and Wireless Sensor Networks (WSNs) are two prominent classes of these infrastructerless wireless networks. While MANETs exhibit dynamic topology changes due to free node mobility, WSNs have unreplinishible energy limitations. Hence, topology control, Quality of Service (QoS) routing, and power control become challenging issues.


How can I make sure that my computer is connected to the internet system at my work?

You can look at the bottom right corner of your taskbar. Or you could hit the start button, hit wireless and networks, and check your wireless network connection status.


What type of software does Extreme Networks produce?

Extreme Networks produces Wireless Management Software as well as their own operating system called ExtremeXOS. They also produce a Network and Service Management Tool that is called Ridgeline.


What is a palindrome for detection system using radar waves?

"Radar detection system: madam rotor" is a palindrome for detection system using radar waves.


How do telephone companies use networks?

they used to exchange data in a wireless system. also, so that data will be group and connect each other in one communication


What does intrusion detection system ids do?

Intrusion systems ids records and reports activities on computers. It is used to detect malicious activities and attacks on networks and computers. They were primary developed for military.