SlideShare a Scribd company logo
1 of 6
Download to read offline
NOTE-06
Topic: OSI Model & CSMA
Course Code: CSE317
Course Title: Computer Networks
Submitted To
Pranab Bandhu Nath
Senior Lecturer, Department of CSE
City University
Submitted By
Md.Mejbah Uddin Rafi
BSc in CSE (Day)
Batch: 49th (B)
ID: 1834902584
OSI Model
The OSI Model (Open Systems Interconnection Model) is a
conceptual framework used to describe the functions of a networking
system. The OSI model characterizes computing functions into a
universal set of rules and requirements in order to support
interoperability between different products and software. In the OSI
reference model, the communications between a computing system
are split into seven different abstraction layers: Physical, Data Link,
Network, Transport, Session, Presentation, and Application.
Created at a time when network computing was in its infancy, the OSI
was published in 1984 by the International Organization for
Standardization (ISO). Though it does not always map directly to
specific systems, the OSI Model is still used today as a means to
describe Network Architecture.
The 7 Layers of the OSI Model
Physical Layer
The lowest layer of the OSI Model is concerned with electrically or
optically transmitting raw unstructured data bits across the network
from the physical layer of the sending device to the physical layer of
the receiving device. It can include specifications such as voltages,
pin layout, cabling, and radio frequencies. At the physical layer, one
might find “physical” resources such as network hubs, cabling,
repeaters, network adapters or modems.
Data Link Layer
At the data link layer, directly connected nodes are used to perform
node-to-node data transfer where data is packaged into frames. The
data link layer also corrects errors that may have occurred at the
physical layer.
The data link layer encompasses two sub-layers of its own. The first,
media access control (MAC), provides flow control and multiplexing
for device transmissions over a network. The second, the logical link
control (LLC), provides flow and error control over the physical
medium as well as identifies line protocols.
Network Layer
The network layer is responsible for receiving frames from the data
link layer, and delivering them to their intended destinations among
based on the addresses contained inside the frame. The network layer
finds the destination by using logical addresses, such as IP (internet
protocol). At this layer, routers are a crucial component used to quite
literally route information where it needs to go between networks.
Transport Layer
The transport layer manages the delivery and error checking of data
packets. It regulates the size, sequencing, and ultimately the transfer
of data between systems and hosts. One of the most common
examples of the transport layer is TCP or the Transmission Control
Protocol.
Session Layer
The session layer controls the conversations between different
computers. A session or connection between machines is set up,
managed, and termined at layer 5. Session layer services also include
authentication and reconnections.
Presentation Layer
The presentation layer formats or translates data for the application
layer based on the syntax or semantics that the application accepts.
Because of this, it at times also called the syntax layer. This layer can
also handle the encryption and decryption required by the application
layer.
Application Layer
At this layer, both the end user and the application layer interact
directly with the software application. This layer sees network
services provided to end-user applications such as a web browser or
Office 365. The application layer identifies communication partners,
resource availability, and synchronizes communication.
Carrier-sense multiple access (CSMA)
CSMA is a media access control (MAC) protocol in which a node
verifies the absence of other traffic before transmitting on a shared
transmission medium, such as an electrical bus or a band of the
electromagnetic spectrum.
It is divided into two part:
Collision Detection (CSMA/CD)
In this method, a station monitors the medium after it sends a frame
to see if the transmission was successful. If successful, the station is
finished, if not, the frame is sent again.
Advantages Disadvantages
It has low overhead.
Collisions degrade network
performance.
Utilizes all available bandwidth
when possible.
Priorities cannot be assigned to
certain nodes. Performance
degrades exponentially as
devices are added.
Collision Avoidance (CSMA/CA)
Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)
is a network protocol for carrier transmission that operates in the
Medium Access Control (MAC) layer. In contrast to CSMA/CD
(Carrier Sense Multiple Access/Collision Detection) that deals with
collisions after their occurrence, CSMA/CA prevents collisions prior
to their occurrence.
Advantages Disadvantages
Helps prevent data collisions Longer waiting times
Thanks to feedback, no data is
unnoticeably lost
Causes additional traffic
Avoids unnecessary data traffic
with the RTS/CTS extension
Solves the hidden station
problem only by using RTS/CTS
extension
Difference between CSMA/CA and CSMA/CD:-
CSMA/CD CSMA/CA
CSMA / CD is effective after a
collision.
Whereas CSMA / CA is effective
before a collision.
CSMA / CD is used in wired
networks.
Whereas CSMA / CA is
commonly used in wireless
networks.
It only reduces the recovery
time.
Whereas CSMA/ CA minimizes
the possibility of collision.
CSMA / CD is used in 802.3
standard.
While CSMA / CA is used in
802.11 standard.
It is more efficient than simple
CSMA(Carrier Sense Multiple
Access).
While it is similar to simple
CSMA(Carrier Sense Multiple
Access).
Reference:
1. https://www.forcepoint.com/cyber-edu/osi-model
2. https://www.geeksforgeeks.org/carrier-sense-multiple-access-csma/
3. https://en.wikipedia.org/wiki/Carrier-sense_multiple_access
4. https://www.google.com/search?q=advantage+%26+disadvantage+of+CSMA%2FCD
&rlz=1C1UEAD_enBD931BD931&oq=advantage+%26+disadvantage+of+CSMA%2FCD
&aqs=chrome..69i57j69i58.20422j0j7&sourceid=chrome&ie=UTF-8
5. https://www.tutorialspoint.com/csma-with-collision-avoidance-csma-ca
6. https://www.google.com/search?q=Advantage+%26+disadvantage+of+Collision+Avo
idance+(CSMA%2FCA)&rlz=1C1UEAD_enBD931BD931&oq=Advantage+%26+disadva
ntage+of+Collision+Avoidance+(CSMA%2FCA)&aqs=chrome..69i57.7528j0j7&sourcei
d=chrome&ie=UTF-8
7. https://www.geeksforgeeks.org/difference-between-csma-ca-and-csma-cd/?ref=rp

More Related Content

What's hot

What's hot (20)

open system interconnection
open system interconnectionopen system interconnection
open system interconnection
 
Pipelining approach
Pipelining approachPipelining approach
Pipelining approach
 
Dynamic interconnection networks
Dynamic interconnection networksDynamic interconnection networks
Dynamic interconnection networks
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
 
Transport layer (computer networks)
Transport layer (computer networks)Transport layer (computer networks)
Transport layer (computer networks)
 
Basic communication operations - One to all Broadcast
Basic communication operations - One to all BroadcastBasic communication operations - One to all Broadcast
Basic communication operations - One to all Broadcast
 
Transport layer services
Transport layer servicesTransport layer services
Transport layer services
 
Distributed Operating System,Network OS and Middle-ware.??
Distributed Operating System,Network OS and Middle-ware.??Distributed Operating System,Network OS and Middle-ware.??
Distributed Operating System,Network OS and Middle-ware.??
 
Transport layer
Transport layerTransport layer
Transport layer
 
ARM7-ARCHITECTURE
ARM7-ARCHITECTURE ARM7-ARCHITECTURE
ARM7-ARCHITECTURE
 
Leaky bucket algorithm
Leaky bucket algorithmLeaky bucket algorithm
Leaky bucket algorithm
 
Multiple Access in Computer Network
Multiple Access in Computer NetworkMultiple Access in Computer Network
Multiple Access in Computer Network
 
Ch3 2 Data communication and networking
Ch3 2  Data communication and networkingCh3 2  Data communication and networking
Ch3 2 Data communication and networking
 
Data link layer
Data link layer Data link layer
Data link layer
 
Shortest path algorithm
Shortest  path algorithmShortest  path algorithm
Shortest path algorithm
 
Chapter 8 Embedded Hardware Design and Development (third portion)
Chapter 8 Embedded Hardware Design and Development (third portion)Chapter 8 Embedded Hardware Design and Development (third portion)
Chapter 8 Embedded Hardware Design and Development (third portion)
 
Ch 26
Ch 26Ch 26
Ch 26
 
Lan Switching[1]
Lan Switching[1]Lan Switching[1]
Lan Switching[1]
 
Design Issues In Adhoc Wireless MAC Protocol
Design Issues In Adhoc Wireless MAC ProtocolDesign Issues In Adhoc Wireless MAC Protocol
Design Issues In Adhoc Wireless MAC Protocol
 
Ppt 11 - netopeer
Ppt   11 - netopeerPpt   11 - netopeer
Ppt 11 - netopeer
 

Similar to Note 6

Network Advantages And Disadvantages
Network Advantages And DisadvantagesNetwork Advantages And Disadvantages
Network Advantages And Disadvantages
Renee Jones
 
BAPANKAR15800121011 SOFT.pptx
BAPANKAR15800121011 SOFT.pptxBAPANKAR15800121011 SOFT.pptx
BAPANKAR15800121011 SOFT.pptx
BapanKar2
 
006 Osi Model
006 Osi Model006 Osi Model
006 Osi Model
BELKA08
 

Similar to Note 6 (20)

Osi model in networking
Osi model in networkingOsi model in networking
Osi model in networking
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Network Advantages And Disadvantages
Network Advantages And DisadvantagesNetwork Advantages And Disadvantages
Network Advantages And Disadvantages
 
Osi model and tcpip model.
Osi model and tcpip model.Osi model and tcpip model.
Osi model and tcpip model.
 
Assignment3
Assignment3Assignment3
Assignment3
 
OSI Model and TCP/IP Model.
OSI Model and TCP/IP Model.OSI Model and TCP/IP Model.
OSI Model and TCP/IP Model.
 
Osi model
Osi modelOsi model
Osi model
 
OSI Layer
OSI LayerOSI Layer
OSI Layer
 
Class work4
Class work4Class work4
Class work4
 
THE OSI MODEL
THE OSI MODELTHE OSI MODEL
THE OSI MODEL
 
OSI MODEL
OSI MODELOSI MODEL
OSI MODEL
 
Module 2 lan,data link layer
Module 2 lan,data link layerModule 2 lan,data link layer
Module 2 lan,data link layer
 
OSI Reference Model
OSI Reference ModelOSI Reference Model
OSI Reference Model
 
Presentation on osi layer
Presentation on osi layerPresentation on osi layer
Presentation on osi layer
 
BAPANKAR15800121011 SOFT.pptx
BAPANKAR15800121011 SOFT.pptxBAPANKAR15800121011 SOFT.pptx
BAPANKAR15800121011 SOFT.pptx
 
COMPUTER NETWORK_OSI & TCP/IP
COMPUTER NETWORK_OSI & TCP/IPCOMPUTER NETWORK_OSI & TCP/IP
COMPUTER NETWORK_OSI & TCP/IP
 
006 Osi Model
006 Osi Model006 Osi Model
006 Osi Model
 
Osi model
Osi modelOsi model
Osi model
 
Osi model
Osi model Osi model
Osi model
 
The osi model layers
The osi model layersThe osi model layers
The osi model layers
 

More from MejbahUddinRafi (6)

Note 5
Note 5Note 5
Note 5
 
Note 04
Note 04Note 04
Note 04
 
Note 03
Note 03Note 03
Note 03
 
Note 01
Note 01Note 01
Note 01
 
Note -02
Note -02Note -02
Note -02
 
Assignment 01
Assignment 01Assignment 01
Assignment 01
 

Recently uploaded

Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
jaanualu31
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
AldoGarca30
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
chumtiyababu
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 

Recently uploaded (20)

data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 

Note 6

  • 1. NOTE-06 Topic: OSI Model & CSMA Course Code: CSE317 Course Title: Computer Networks Submitted To Pranab Bandhu Nath Senior Lecturer, Department of CSE City University Submitted By Md.Mejbah Uddin Rafi BSc in CSE (Day) Batch: 49th (B) ID: 1834902584
  • 2. OSI Model The OSI Model (Open Systems Interconnection Model) is a conceptual framework used to describe the functions of a networking system. The OSI model characterizes computing functions into a universal set of rules and requirements in order to support interoperability between different products and software. In the OSI reference model, the communications between a computing system are split into seven different abstraction layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application. Created at a time when network computing was in its infancy, the OSI was published in 1984 by the International Organization for Standardization (ISO). Though it does not always map directly to specific systems, the OSI Model is still used today as a means to describe Network Architecture. The 7 Layers of the OSI Model Physical Layer The lowest layer of the OSI Model is concerned with electrically or optically transmitting raw unstructured data bits across the network from the physical layer of the sending device to the physical layer of the receiving device. It can include specifications such as voltages, pin layout, cabling, and radio frequencies. At the physical layer, one might find “physical” resources such as network hubs, cabling, repeaters, network adapters or modems.
  • 3. Data Link Layer At the data link layer, directly connected nodes are used to perform node-to-node data transfer where data is packaged into frames. The data link layer also corrects errors that may have occurred at the physical layer. The data link layer encompasses two sub-layers of its own. The first, media access control (MAC), provides flow control and multiplexing for device transmissions over a network. The second, the logical link control (LLC), provides flow and error control over the physical medium as well as identifies line protocols. Network Layer The network layer is responsible for receiving frames from the data link layer, and delivering them to their intended destinations among based on the addresses contained inside the frame. The network layer finds the destination by using logical addresses, such as IP (internet protocol). At this layer, routers are a crucial component used to quite literally route information where it needs to go between networks. Transport Layer The transport layer manages the delivery and error checking of data packets. It regulates the size, sequencing, and ultimately the transfer of data between systems and hosts. One of the most common examples of the transport layer is TCP or the Transmission Control Protocol. Session Layer
  • 4. The session layer controls the conversations between different computers. A session or connection between machines is set up, managed, and termined at layer 5. Session layer services also include authentication and reconnections. Presentation Layer The presentation layer formats or translates data for the application layer based on the syntax or semantics that the application accepts. Because of this, it at times also called the syntax layer. This layer can also handle the encryption and decryption required by the application layer. Application Layer At this layer, both the end user and the application layer interact directly with the software application. This layer sees network services provided to end-user applications such as a web browser or Office 365. The application layer identifies communication partners, resource availability, and synchronizes communication. Carrier-sense multiple access (CSMA) CSMA is a media access control (MAC) protocol in which a node verifies the absence of other traffic before transmitting on a shared transmission medium, such as an electrical bus or a band of the electromagnetic spectrum. It is divided into two part: Collision Detection (CSMA/CD)
  • 5. In this method, a station monitors the medium after it sends a frame to see if the transmission was successful. If successful, the station is finished, if not, the frame is sent again. Advantages Disadvantages It has low overhead. Collisions degrade network performance. Utilizes all available bandwidth when possible. Priorities cannot be assigned to certain nodes. Performance degrades exponentially as devices are added. Collision Avoidance (CSMA/CA) Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) is a network protocol for carrier transmission that operates in the Medium Access Control (MAC) layer. In contrast to CSMA/CD (Carrier Sense Multiple Access/Collision Detection) that deals with collisions after their occurrence, CSMA/CA prevents collisions prior to their occurrence. Advantages Disadvantages Helps prevent data collisions Longer waiting times Thanks to feedback, no data is unnoticeably lost Causes additional traffic Avoids unnecessary data traffic with the RTS/CTS extension Solves the hidden station problem only by using RTS/CTS extension
  • 6. Difference between CSMA/CA and CSMA/CD:- CSMA/CD CSMA/CA CSMA / CD is effective after a collision. Whereas CSMA / CA is effective before a collision. CSMA / CD is used in wired networks. Whereas CSMA / CA is commonly used in wireless networks. It only reduces the recovery time. Whereas CSMA/ CA minimizes the possibility of collision. CSMA / CD is used in 802.3 standard. While CSMA / CA is used in 802.11 standard. It is more efficient than simple CSMA(Carrier Sense Multiple Access). While it is similar to simple CSMA(Carrier Sense Multiple Access). Reference: 1. https://www.forcepoint.com/cyber-edu/osi-model 2. https://www.geeksforgeeks.org/carrier-sense-multiple-access-csma/ 3. https://en.wikipedia.org/wiki/Carrier-sense_multiple_access 4. https://www.google.com/search?q=advantage+%26+disadvantage+of+CSMA%2FCD &rlz=1C1UEAD_enBD931BD931&oq=advantage+%26+disadvantage+of+CSMA%2FCD &aqs=chrome..69i57j69i58.20422j0j7&sourceid=chrome&ie=UTF-8 5. https://www.tutorialspoint.com/csma-with-collision-avoidance-csma-ca 6. https://www.google.com/search?q=Advantage+%26+disadvantage+of+Collision+Avo idance+(CSMA%2FCA)&rlz=1C1UEAD_enBD931BD931&oq=Advantage+%26+disadva ntage+of+Collision+Avoidance+(CSMA%2FCA)&aqs=chrome..69i57.7528j0j7&sourcei d=chrome&ie=UTF-8 7. https://www.geeksforgeeks.org/difference-between-csma-ca-and-csma-cd/?ref=rp