CSMA protocols; Controlled Access: Polling, Reservation, Token Passing; A Taxonomy of Mechanisms for Multi-Access
• How do multiple, independent computers
coordinate access to a shared medium? • There are three broad approaches: – Predetermined Assignment (also called Channel Allocation) – Demand Assignment (also called Controlled Access) – Contention Access (also called Random Access) Multiple Access
Multiple hosts sharing the same medium
Random Access Frames in a pure ALOHA network
ALOHA - Additive Links On-line Hawaii Area
Frames in a slotted ALOHA network CSMA technique is used in wired and wireless systems.
In this technique, nodes intending to transmit first
senses the medium before transmission.
If medium is idle, it transmits the frame.
If medium is busy, it waits for random period of time and transmits the frame. Behavior of three persistence methods Flow diagram for three persistence methods There are two types of CSMA viz.
CSMA/CD and CSMA/CA.
CSMA/CD • CSMA/CD is used in wired networks (as per 802.3) and it is effective after a collision. • CSMA/CA is used in wireless networks (as per 802.11 WLAN series) and it is effective before a collision. Controlled Access Reservation access method Select and poll functions in polling access method Logical ring and physical topology in token-passing access method