Why is CSMA/CA needed in a wireless network?

What will be an ideal response?


In wireless networks there is a hidden terminal/station problem, where some stations may
not see/detect the transmission between some other parties. To ensure that all stations share the
transmission media correctly, wireless LANs use a modified access protocol known as Carrier Sense
Multiple Access With Collision Avoidance (CSMA/CA). Instead of depending on all other computers to
receive all transmissions, the CSMA/CA used with wireless LANs triggers a brief transmission from the
intended receiver before transmitting a packet. The idea is that if both the sender and receiver
transmit a message, all computers within range of either will know a packet transmission is
beginning.

Computer Science & Information Technology

You might also like to view...

Which of the following statements best describes why an evaluator must validate the results of an evaluation performed using analytical models?

a) Systems are often too complex to model accurately, so the results of analytical models are often erroneous. b) The evaluator needs the results of other performance evaluations to build the model in the first place. c) Analytical models are useful in the development process, but many consumers distrust or do not understand analytical models. A vendor must validate the results of an analytical model before presenting the results to potential customers. d) In general, it is a good idea to use multiple techniques to test a system. Additionally, because an evaluator often must make simplifying assumptions to model complex systems, other evaluations should be done to verify that these assumptions are valid.

Computer Science & Information Technology

All of the following are examples of Sketch filters EXCEPT ____.

a. Chrome b. Bas Relief c. Charcoal d. Sharpen

Computer Science & Information Technology

____________________ can be included in a network anytime there is a situation with measurable criteria that needs precise, automatic, and continual monitoring.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which of the following is the MOST secure way to prevent malicious changes to a firewall?

A. SNMPv2 access only B. TELNET access only C. SSH access only D. Console access only

Computer Science & Information Technology