You are on page 1of 25

•Random Access: ALOHA,

CSMA protocols;
Controlled Access:
Polling, Reservation,
Token Passing;
A Taxonomy of Mechanisms for Multi-Access

• How do multiple, independent computers


coordinate access to a shared medium?
• There are three broad approaches:
– Predetermined Assignment
(also called Channel Allocation)
– Demand Assignment
(also called Controlled Access)
– Contention Access
(also called Random Access)
Multiple Access

Multiple hosts sharing the same medium


Random Access
Frames in a pure ALOHA network

ALOHA - Additive Links On-line Hawaii Area


Frames in a slotted ALOHA network
CSMA technique is used in wired and wireless
systems.

In this technique, nodes intending to transmit first


senses the medium before transmission.

If medium is idle, it transmits the frame.


If medium is busy, it waits for random period of
time and transmits the frame.
Behavior of three persistence methods
Flow diagram for three persistence methods
There are two types of CSMA viz.

CSMA/CD and CSMA/CA.


CSMA/CD
• CSMA/CD is used in wired networks (as per
802.3) and it is effective after a collision.
• CSMA/CA is used in wireless networks (as per
802.11 WLAN series) and it is effective before
a collision.
Controlled Access
Reservation access method
Select and poll functions in polling access method
Logical ring and physical topology in token-passing access method

You might also like