Skip to Content
Computer Networks, Fifth Edition
book

Computer Networks, Fifth Edition

by David J. Wetherall, Andrew S. Tanenbaum
September 2010
Intermediate to advanced
960 pages
31h 54m
English
Pearson
Content preview from Computer Networks, Fifth Edition

4THE MEDIUM ACCESS CONTROL SUBLAYER

Network links can be divided into two categories: those using point-to-point connections and those using broadcast channels. We studied point-to-point links in Chap. 2; this chapter deals with broadcast links and their protocols.

In any broadcast network, the key issue is how to determine who gets to use the channel when there is competition for it. To make this point, consider a conference call in which six people, on six different telephones, are all connected so that each one can hear and talk to all the others. It is very likely that when one of them stops speaking, two or more will start talking at once, leading to chaos. In a face-to-face meeting, chaos is avoided by external means. For example, at a ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Computer Networks, Fourth Edition

Computer Networks, Fourth Edition

Andrew S. Tanenbaum
Computer Networks, 5th Edition

Computer Networks, 5th Edition

Larry L. Peterson, Bruce S. Davie

Publisher Resources

ISBN: 9780133485936Purchase book