Professional Documents
Culture Documents
Presentation
TABLE OF CONTENT
Access control Protocol
Types
Reservation
Polling
Token Access
CONTROLLED
ACCESS
PROTOCOL
• IN A CONTROLLED ACCESS PROTOCOL, ALL STATIONS LOOK
FOR INFORMATION FROM EACH OTHER. SO THAT THEY CAN
FIND THE STATION THAT HAS THE RIGHT TO TRANSMIT THE DATA
ON THE MEDIUM.
RESERVATION
POLLING
TOKEN PASSING
Reservation
IN THIS METHOD OF CONTROLLED ACCESS
PROTOCOL, FIRST OF ALL, THE STATION IS
REQUIRED TO MAKE A RESERVATION, THEN ONLY
IT CAN TRANSMIT THE DATA ON THE SHARED
MEDIUM.
THERE ARE TWO TYPES OF PERIODS IN
THE TIMELINE
FIRST, THERE IS A FIXED TIME LENGTH IN THE
INTERVAL OF RESERVATION.
THE SECOND IS THE DATA TRANSMISSION PERIOD
OF THE VARIABLE FRAME THE INTERVAL OF THE
RESERVATION DEPENDS ON THE NUMBER OF
STATIONS ON THAT PARTICULAR MEDIUM.
Explanation
• Suppose there are M stations, then the reservation interval is divided into an equal number
of M slots. There is one separate slot for each station.
• Suppose station 1 wants to transmit a frame to another station, then it can send only 1 bit
during slot1. During this period, no other station can transmit the data on the medium.
• Suppose the ith station wants to send a frame by adding one bit into the ith slot then after
checking all the N number of slots, each station will learn which station wants to transmit
the data.
• The station can transfer the frame according to the sequence in which they reserved the slot.
• If the transmission period expires then a new interval reservation starts.
• There is no chance of collision if the station agrees on the thought of which station is next
to transfer the frame.
Example
Let us take an example, through which we learn how reservations work.
Suppose there are 5 stations and also 5 mini slot reservation frames. If in the
first interval, only the 2nd,3rd, and 5th stations are allowed to make the
reservation and then after that in the second interval only the second station is
allowed to make the reservation.
Polling
• Generally, the polling method is used in those types of topology where one device is
served as a primary station and other devices are served as the secondary station.
• In this method, all data needs to be transmitted through the primary device even though
its final destination is the secondary device.
• The primary device is acting as an initiator and always controls the link.
• On the other hand, secondary devices must follow the instructions of the primary device.
• This is the responsibility of the primary device to decide which particular secondary
device is allowed to access the channel for how much time.
• Data frame transmission is done by the primary device and also contains the address of
the secondary device that has been chosen for granting access.
• All secondary devices can receive the data but the device that is addressed can only be
allowed to respond to that data and transmit data if has any to send.
• Otherwise, if there is no data to send then, it transmits a poll reject (NAK) frame to the
primary device.
• Thus to impose order on a network that is of independent users, and in order to establish
one station in the network that will act as a controller and periodically polls all other
stations is simply referred to as polling.
EFFICIENCY
Suppose the time for Polling is Tpoll and Tt will be
the time needed for the transferring of data.
Then,
Efficiency=Tt/Tt+Tpoll
Polling function
• In case if primary devices want to receive the data, then it usually asks the secondary
devices if they have anything to send. This is commonly known as Poll Function.
• There is a poll function that is mainly used by the primary devices in order to solicit
transmissions from the secondary devices.
• When the primary device is ready to receive the data then it must ask(poll) each secondary
device in turn if it has anything to send.
• If the secondary device has data to transmit then it sends the data frame, otherwise, it sends
a negative acknowledgment (NAK).
• After that in case of the negative response, the primary then polls the next secondary, in the
same manner until it finds the one with the data to send. When the primary device received
a positive response that means (a data frame), then the primary devices reads the frame and
then returns an acknowledgment (ACK )frame,
Select function
• In case, if the primary device wants to send the data then it tells the secondary devices in order
to get ready to receive the data. This is commonly known as the Select function.
• Thus the select function is used by the primary device when it has something to send.
• We had already told you that the primary device always controls the link.
• Before sending the data frame, a select (SEL ) frame is created and transmitted by the primary
device, and one field of the SEL frame includes the address of the intended secondary.
• The primary device alerts the secondary devices for the upcoming transmission and after that
wait for an acknowledgment (ACK) of the secondary devices.
Advantages DISADVANTAGES