Data Link Layer-III Multiple Access, Random Access, and Channelization
Data Link Layer-III Multiple Access, Random Access, and Channelization
Data Link Layer-III Multiple Access, Random Access, and Channelization
By
Deepika
Assistant Professor
Multi Access
In the random access, there is no such station that is superior to another station and
none is assigned control over the other. No station permits another station to send.
Each station can transmit whenever it desires on the condition that it follows the
predefined procedure that includes the testing state of the medium.
Given below are the protocols that lie under the category of Random Access
protocol:
• ALOHA
• CSMA(Carrier sense multiple access)
• CSMA/CD(Carrier sense multiple access with collision detection)
• CSMA/CA(Carrier sense multiple access with collision avoidance)
ALOHA Random Access Protocol
It is designed for wireless LAN (Local Area Network) but can also be
used in a shared medium to transmit data. Using this method, any
station can transmit data across a network simultaneously when a data
frameset is available for transmission.
Pure Aloha
CSMA (Carrier Sense Multiple
Access
The same frequency bandwidth into the shared channel by dividing the signal into
various time slots to transmit it. However, TDMA has an overhead of synchronization
that specifies each station's time slot by adding synchronization bits to each slot.
CDMA
• For example, there are multiple users in a room that are continuously speaking.
Data is received by the users if only two-person interact with each other using the
same language. Similarly, in the network, if different stations communicate with
each other simultaneously with different code language.
Controlled Access Protocol
• Reservation
• In the reservation method, a station needs to make a
reservation before sending data.
• The time line has two kinds of periods:
• Reservation interval of fixed time length
• Data transmission period of variable frames.
• If there are M stations, the reservation interval is divided
into M slots, and each station has one slot.
• Suppose if station 1 has a frame to send, it transmits 1 bit
during the slot 1. No other station is allowed to transmit
during this slot.
Token passing
• A token is a special bit pattern or a small message, which
circulate from one station to the next in some predefined order.
• In Token ring, token is passed from one station to another
adjacent station in the ring whereas incase of Token bus, each
station uses the bus to send the token to the next station in some
predefined order.
• In both cases, token represents permission to send. If a station
has a frame queued for transmission when it receives the token,
it can send that frame before it passes the token to the next
station. If it has no queued frame, it passes the token simply.
Polling
• Polling process is similar to the roll-call performed in class. Just like the
teacher, a controller sends a message to each node in turn.
• In this, one acts as a primary station(controller) and the others are
secondary stations. All data exchanges must be made through the
controller.
• The message sent by the controller contains the address of the node
being selected for granting access.
• Although all nodes receive the message but the addressed one responds
to it and sends data, if any. If there is no data, usually a “poll
reject”(NAK) message is sent back.