Controlled access protocols determine which station has the right to transmit data. There are three main methods: reservation, where stations reserve time slots; polling, where a primary station polls secondary stations for requests to transmit; and token passing, where a token is passed between stations in a logical ring granting transmission rights.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
222 views14 pages
5 Mac-2
Controlled access protocols determine which station has the right to transmit data. There are three main methods: reservation, where stations reserve time slots; polling, where a primary station polls secondary stations for requests to transmit; and token passing, where a token is passed between stations in a logical ring granting transmission rights.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 14
Controlled Access Protocol
In this method, the stations consult each
other to find which station has a right to send.
A station cannot send unless it has been
authorized by other station.
The different controlled access methods are:
-Reservation -Polling -Token Passing 1)Reservation In this method, a station needs to make a reservation before sending data.
The time is divided into intervals. If there are N
stations, then there are exactly N reservation slots in the reservation frame. Each slot belongs to a station.
When a station needs to send a frame, it sends in
its own reserved slot.
The stations that have made reservations can
send their frames after the reservation frame. 2)Polling
Polling method works in those networks
where primary and secondary stations exist.
A station cannot send unless it has been
authorized by primary station.
All the stations wants to transmit will
participate in polling, the primary station finds who is authorized to send.
Primary device controls the link and secondary
device follow the instructions 3)Token Passing Token passing method is used in those networks where the stations are organized in a logical ring. In such networks, a special packet called token is circulated through the ring. Station that possesses the token has the right to access the channel. Whenever any station has some data to send, it waits for the token. It transmits data only after it gets the possession of token. After transmitting the data, the station releases the token and passes it to the next station in the ring. If any station that receives the token has no data to send, it simply passes the token to the next station in the ring. Channelization Protocol
Channelization is a multiple access method in
which the available bandwidth of a link is shared in time, frequency or code between different stations.
There are three basic channelization protocols:
-Frequency Division Multiple Access (FDMA) -Time Division Multiple Access (TDMA) -Code Division Multiple Access (CDMA) 1)FDMA In FDMA, the available bandwidth is divided into frequency bands. Each station is allocated a band to send its data. This band is reserved for that station for all the time.
The frequency bands of different stations are
separated by small bands of unused frequency. These unused bands are called guard bands that prevent station interferences.
FDMA is different from FDM (Frequency Division
Multiplexing). FDM is a physical layer technique, whereas, FDMA is an access method in the data link layer. 2)TDMA In TDMA, the bandwidth of channel is divided among various stations on the basis of time.
Each station is allocated a time slot during which
it can send its data.
Each station must know the beginning of its time
slot.
TDMA is also different from TDM. TDM is a
physical layer technique, whereas, TDMA is an access method in data link layer. 3)CDMA Unlike TDMA, in CDMA all stations can transmit data simultaneously.
CDMA allows each station to transmit over the
entire frequency spectrum all the time.
Multiple simultaneous transmissions are
separated using coding theory.
In CDMA, each user is given a unique code
sequence. 11 Working of CDMA: Let us assume that we have four stations: 1, 2, 3 and 4 that are connected to the same channel.
The data from station 1 is d1, from station 2 is d2
and so on. The code assigned to station 1 is c1, station 2 is c2 and so on.
These assigned codes have two properties:
-If we multiply each code by another, we get 0. -If we multiply each code by itself, we get 4, (no. of stations). When these four stations send data on the same channel, then station 1 multiplies its data by its code i.e. d1.c1,
station 2 multiplies its data by its code
i.e. d2.c2 and so on.
The data that goes on the channel is the sum of
all these terms: d1.c1 + d2.c2 + d3.c3 + d4.c4
Any station that wants to receive data from the channel
multiplies the data on the channel by the code of the sender. Example: suppose station 2 wants to receive data from station1.
It multiplies the data on the channel by c1, (code
of station 1).
Because (c1.c1) is 4, but (c2.c1), (c3.c1) and
(c4.c1) are all 0s, station 2 divides the result by 4 to get the data from station 1.