0% found this document useful (0 votes)
222 views14 pages

5 Mac-2

Controlled access protocols determine which station has the right to transmit data. There are three main methods: reservation, where stations reserve time slots; polling, where a primary station polls secondary stations for requests to transmit; and token passing, where a token is passed between stations in a logical ring granting transmission rights.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
222 views14 pages

5 Mac-2

Controlled access protocols determine which station has the right to transmit data. There are three main methods: reservation, where stations reserve time slots; polling, where a primary station polls secondary stations for requests to transmit; and token passing, where a token is passed between stations in a logical ring granting transmission rights.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 14

Controlled Access Protocol

In this method, the stations consult each


other to find which station has a right to send.

A station cannot send unless it has been


authorized by other station.

The different controlled access methods are:


-Reservation
-Polling
-Token Passing
1)Reservation
In this method, a station needs to make a
reservation before sending data.

The time is divided into intervals. If there are N


stations, then there are exactly N reservation slots in
the reservation frame. Each slot belongs to a station.

When a station needs to send a frame, it sends in


its own reserved slot.

The stations that have made reservations can


send their frames after the reservation frame.
2)Polling

Polling method works in those networks


where primary and secondary stations exist.

A station cannot send unless it has been


authorized by primary station.

All the stations wants to transmit will


participate in polling, the primary station finds
who is authorized to send.

Primary device controls the link and secondary


device follow the instructions
3)Token Passing
Token passing method is used in those networks
where the stations are organized in a logical ring.
In such networks, a special packet called token is
circulated through the ring. Station that possesses the
token has the right to access the channel.
Whenever any station has some data to send, it
waits for the token. It transmits data only after it gets
the possession of token.
After transmitting the data, the station releases
the token and passes it to the next station in the ring.
If any station that receives the token has no data
to send, it simply passes the token to the next station
in the ring.
Channelization Protocol

Channelization is a multiple access method in


which the available bandwidth of a link is shared in
time, frequency or code between different
stations.

There are three basic channelization protocols:


-Frequency Division Multiple Access (FDMA)
-Time Division Multiple Access (TDMA)
-Code Division Multiple Access (CDMA)
1)FDMA
In FDMA, the available bandwidth is divided into
frequency bands.
Each station is allocated a band to send its data.
This band is reserved for that station for all the time.

The frequency bands of different stations are


separated by small bands of unused frequency. These
unused bands are called guard bands that prevent
station interferences.

FDMA is different from FDM (Frequency Division


Multiplexing).
FDM is a physical layer technique, whereas, FDMA
is an access method in the data link layer.
2)TDMA
In TDMA, the bandwidth of channel is divided
among various stations on the basis of time.

Each station is allocated a time slot during which


it can send its data.

Each station must know the beginning of its time


slot.

TDMA is also different from TDM. TDM is a


physical layer technique, whereas, TDMA is an access
method in data link layer.
3)CDMA
Unlike TDMA, in CDMA all stations can transmit
data simultaneously.

CDMA allows each station to transmit over the


entire frequency spectrum all the time.

Multiple simultaneous transmissions are


separated using coding theory.

In CDMA, each user is given a unique code


sequence.
11
Working of CDMA:
Let us assume that we have four stations: 1, 2, 3
and 4 that are connected to the same channel.

The data from station 1 is d1, from station 2 is d2


and so on.
The code assigned to station 1 is c1, station 2 is
c2 and so on.

These assigned codes have two properties:


-If we multiply each code by another, we get 0.
-If we multiply each code by itself, we get 4, (no. of
stations).
When these four stations send data on the same
channel, then station 1 multiplies its data by its code
i.e. d1.c1,

station 2 multiplies its data by its code


i.e. d2.c2 and so on.

The data that goes on the channel is the sum of


all these terms:
d1.c1 + d2.c2 + d3.c3 + d4.c4

Any station that wants to receive data from the channel


multiplies the data on the channel by the code of the
sender.
Example:
suppose station 2 wants to receive data from
station1.

It multiplies the data on the channel by c1, (code


of station 1).

Because (c1.c1) is 4, but (c2.c1), (c3.c1) and


(c4.c1) are all 0s, station 2 divides the result by 4 to
get the data from station 1.

data = (d1.c1 + d2.c2 + d3.c3 + d4.c4).c1


= d1.c1.c1 + d2.c2.c1+ d3.c3.c1+ d4.c4.c1
= d1.4 + 0 + 0 + 0
= (d1.4) / 4 = d1

You might also like