BCN Unit - 3
BCN Unit - 3
Unit-3
Multi-Access Mechanism and Ethernet Standards
multiple access protocols :multiple users might be communicating through the same channel.
Multiple Access Protocols
• Many protocols have been defined to handle the access to shared link.
• These protocols are organized in three different groups.:
A. Random Access Protocols
B. Controlled Access Protocols
C. Channelization Protocols
A. Random Access Protocols
• It is also called Contention Method. In this method, there is no control
station.
• The random access protocols consist of the following characteristics:
i. There is no time restriction for sending the data (you can talk to your friend without
a time restriction).
ii. There is a fixed sequence of stations which are transmitting the data.
• Any station can send the data. The station can make a decision on whether or
not to send data.
• This decision depends on the state of the channel, i.e. channel is busy or idle.
• There is no scheduled time for a stations to transmit. They can transmit in
random order.
• There is no rule that decides which station should send next. If two
stations transmit at the same time, there is collision and the frames
are lost.
• The various random access methods are:
1. ALOHA
2. CSMA (Carrier Sense Multiple Access)
3. CSMA/CD (Carrier Sense Multiple Access with Collision Detection)
4. CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance)
1. ALOHA
3. Acknowledgment
• Despite all the precautions, collisions may occur and destroy the data.
• Positive acknowledgement and the time-out timer helps guarantee that the
receiver has received the frame
B. Controlled Access Protocol
• In this method, the stations consult each other to find which station has
a right to send.
• A station cannot send unless it has been authorized by other station.
• The different controlled access methods are:
1. Reservation
2. Polling
3. Token Passing
1. Reservation
• In this method, a station needs to make a reservation before sending data.
• The time is divided into intervals. In each interval, a reservation frame
precedes the data frames sent in that interval.
• If there are N stations, then there are exactly N reservation slots in the
reservation frame.
• Each slot belongs to a station.
• When a station needs to send a frame, it makes a reservation in its own slot.
• The stations that have made reservations can send their frames after the
reservation frame
2. Polling
• Polling method works in those networks where primary and secondary
stations exist.
• All data exchanges are made through primary device even when the final
destination is a secondary device.
• Primary device controls the link and secondary device follow the instructions.
3. Token Passing
• Token passing method is used in those networks where the stations are
organized in a logical ring.
• In such networks, a special packet called token is circulated through the ring.
• Station that possesses the token has the right to access the channel.
• Whenever any station has some data to send, it waits for the token. It
transmits data only after it gets the possession of token.
• After transmitting the data, the station releases the token and passes it to the
next station in the ring. If any station that receives the token has no data to
send, it simply passes the token to the next station in the ring
C. Channelization Protocol
• Channelization is a multiple access method in which the available
bandwidth of a link is shared in time, frequency or code between different
stations.