Access Methods Individual Assignment
Access Methods Individual Assignment
In networking, to access a resource is to be able to use that resource. The set of rules that defines
how a computer puts data onto the network cable and takes data from the cable is called an
access method. Once data is moving on the network, access methods help to regulate the flow of
network traffic.
If data is to be sent over the network from one user to another, or accessed from a server, there
must be some way for the data to access the cable without running into other data (a collision).
And the receiving computer must have reasonable assurance that the data has not been destroyed
in a data collision during transmission.
Access methods need to be consistent in the way they handle data. If different computers were to
use different access methods, the network would fail because some methods would dominate the
cable. Access methods prevent computers from gaining simultaneous access to the cable. By
making sure that only one computer at a time can put data on the network cable, access methods
ensure that the sending and receiving of network data is an orderly process.
Demand priority
Demand priority is a relatively new access method. Figure 3. 2 show a demand priority network.
Hubs or repeaters manage network access by searching for requests to send data from all nodes
on the network. The hub is responsible for noting all addresses and links and verifying that they
are all functioning. As in CSMA/CD, two computers using the demand-priority access method
can cause contention by transmitting at exactly the same time. However, with demand priority, it
is possible to implement a scheme in which certain types of data will be given priority if there is
contention. If the hub or repeater receives two requests at the same time, the highest priority
request is serviced first. If the two requests are of the same priority, both requests are serviced by
alternating between the two.
In a demand-priority network, there is communication only between the sending computer, the
hub, and the destination computer. This is more efficient than CSMA/CD, which broadcasts
transmissions to the entire network.
Demand
Feature/function CSMA/CD CSMA/CA Token passing
priority
Type of Broadcast Broadcast
Token based Hub based
communication based based
Type of access
Contention Contention Non-contention Contention
method
Feature Description
Physical topology Star
Logical topology Ring
Type of communication Baseband
Access method Token passing
Transfer speeds 4-16 Mbps
Cable type STP or UTP
Hardware for token ring networks is centered on the hub, which houses the actual ring. This
combination of a logical ring and a physical star topology is sometimes referred to as a “star-
shaped ring”. A token ring network can have multiple hubs. STP or UTP cabling connects the
computers to the hubs. Fiber-optic cable, together with repeaters, can be used to extend the range
of token ring networks. Token ring networks are not that commonly used these days.
The Ethernet
Ethernet has become the most popular way of networking desktop computers and is still very
commonly used today in both small and large network environments.
Standard specifications for Ethernet networks are produced by the Institute of Electronic and
Electrical Engineers (IEEE) in the USA, and there have been a large number over the years. The
original Ethernet standard used a bus topology, transmitted at 10 Mbps, and relied on CSMA/CD
to regulate traffic on the main cable segment. The Ethernet media was passive, which means it
required no power source of its own and thus would not fail unless the media is physically cut or
improperly terminated. More recent Ethernet standards have different specifications.
Packets in Ethernet networks are referred to as frames. The format of an Ethernet frame has
remained largely the same throughout the various standards produced by the IEEE, and is shown
below.
Each frame begins with a 7-byte preamble. Each byte has the identical pattern 10101010, which
is used to help the receiving computer synchronies with the sender. This is followed by a 1-byte
start frame delimiter (SFD), which has the pattern 10101011. Next are the source and destination
addresses, which take up 6 bytes each. The data can be of variable length (46-1500 bytes), so
before the data itself there is a 2-byte field that indicates the length of the following data field.
Finally, there is a 4byte frame check sequence, used for cyclic redundancy checking. Therefore,
the minimum and maximum lengths of an Ethernet frame are 72 bytes and 1526 bytes
respectively.
Although there have been a number of different standards for the Ethernet architecture over the
years, a number of features have remained the same the table below summarizes the general
features of Ethernet LANs.
Feature Description
Traditional topology Linear bus
Other topologies Star bus
Type of communication Baseband
Access method CSMA/CD
Transfer speeds 10/100/1000 Mbps
Cable type Thicknet/thinnet coaxial or UTP
The first phase of Ethernet standards had a transmission speed of 10Mbps. Three of the most
common of these are known as 10Base2, 10Base5 and 10BaseT. The following table summarizes
some of the features of each specification.
Ethernet standards
10Base2 10Base5 10BaseT
Topology Bus Bus Star bus
UTP (Cat. 3 or
Cable type Thinnet coaxial Thicknet coaxial
higher)
Simplex/half/full
Half duplex Half duplex Half duplex
duplex
Manchester, Manchester, Manchester,
Data encoding
asynchronous asynchronous asynchronous
Connector BNC DIX or AUI RJ45
Max. segment length 185 metres 500 metres 100 metres
Note that although the 10BaseT standard uses a physical star-bus topology, it still used a logical
bus topology. This combination is sometimes referred to as a “starshaped bus”. In addition to
these three, a number of standards existed for use with fiber-optic cabling, namely 10BaseFL,
10BaseFB and 10BaseFP.
The next phase of Ethernet standards was known as fast Ethernet, and increased transmission
speed up to 100Mbps. Fast Ethernet is probably the most common standard in use today. The
Manchester encoding technique used in the original Ethernet standards is not well suited to high
frequency transmission so new encoding techniques were developed for fast Ethernet networks.
Three of the most common fast Ethernet standards are summarized below, although others do
exist (e.g. 100BaseT2).
Finally, the IEEE has also published a number of standards for wireless Ethernet networks. The
original standard was known as 802.11, was very slow (around 2Mbps) and was quickly
superseded by more efficient standards. 802.11 now usually refers to the family of standards that
followed after this original standard.
Wireless ethernet standards
802.11b 802.11a 802.11g
Max. speed 11Mbps 54Mbps 54Mbps
Ave. speed 4.5Mbps 20Mbps 20Mbps
Max. distance
120m 30m 30m
outdoors
Max. distance
60m 12m 20m
indoors
Broadcast
2.4Ghz 5Ghz 2.4Ghz
frequency
The CSMA/CA access method has become the standard access method for use in wireless
networking.