Data Link Layer-III Multiple Access, Random Access, and Channelization

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 18

Multiple Access,

Random Access, and


Channelization 

By
Deepika
Assistant Professor
Multi Access

• The Data link layer can be considered as two sublayers,


where the upper sublayer is mainly responsible for the
data link control and the lower layer is responsible for
resolving the access to the shared media.
• If there is a dedicated channel in that case there is no
need for the lower sublayer.
• The main objectives of the multiple access protocols
are the optimization of the transmission time,
minimization of collisions, and avoidance of the
crosstalks.
Data Link Layer:

• The upper sublayer of the data link layer is mainly responsible


for the flow control and error control and is also referred to as
Logical link control(LLC); while the lower layer is mainly
responsible for the multiple-access resolution and thus is known
as Media Access control (MAC) layer.
Multi Access:

• Multiple Access protocols mainly


allow a number of nodes to
access the shared network
channel.
• Several data streams originating
from several nodes are
transferred via the multi-point
transmission channel.
• The Multiple access protocols are
categorized as:
Random Access Protocol

In the random access, there is no such station that is superior to another station and
none is assigned control over the other. No station permits another station to send.

Each station can transmit whenever it desires on the condition that it follows the
predefined procedure that includes the testing state of the medium.

Given below are the protocols that lie under the category of Random Access
protocol:
• ALOHA
• CSMA(Carrier sense multiple access)
• CSMA/CD(Carrier sense multiple access with collision detection)
• CSMA/CA(Carrier sense multiple access with collision avoidance)
ALOHA Random Access Protocol
It is designed for wireless LAN (Local Area Network) but can also be
used in a shared medium to transmit data. Using this method, any
station can transmit data across a network simultaneously when a data
frameset is available for transmission.
Pure Aloha
CSMA (Carrier Sense Multiple
Access

• It is a carrier sense multiple access based on media


access protocol to sense the traffic on a channel (idle or
busy) before transmitting the data. It means that if the
channel is idle, the station can send data to the channel.
Otherwise, it must wait until the channel becomes idle.
Hence, it reduces the chances of a collision on a
transmission medium.
• CSMA/ CD
• It is a carrier sense multiple access/ collision detection network protocol to transmit data
frames. The CSMA/CD protocol works with a medium access control layer. Therefore, it first
senses the shared channel before broadcasting the frames, and if the channel is idle, it transmits a
frame to check whether the transmission was successful. If the frame is successfully received, the
station sends another frame. If any collision is detected in the CSMA/CD, the station sends a jam/
stop signal to the shared channel to terminate data transmission. After that, it waits for a random
time before sending a frame to a channel.
• CSMA/ CA
• It is a carrier sense multiple access/collision avoidance network protocol for carrier
transmission of data frames. It is a protocol that works with a medium access control layer. When
a data frame is sent to a channel, it receives an acknowledgment to check whether the channel is
clear. If the station receives only a single (own) acknowledgments, that means the data frame has
been successfully transmitted to the receiver. But if it gets two signals (its own and one more in
which the collision of frames), a collision of the frame occurs in the shared channel. Detects the
collision of the frame when a sender receives an acknowledgment signal.
Channelization is another method used for
multiple access in which the available bandwidth
of the link is shared in the time, frequency, or
through the code in between the different stations.

Three channelization protocols used are as


follows;

• FDMA(Frequency-division Multiple Access)


Channelization • TDMA(Time-Division Multiple Access)

Protocols • CDMA(Code-Division Multiple Access)


FDMA

• It is a frequency division multiple access (FDMA)


method used to divide the available bandwidth into
equal bands so that multiple users can send data through
a different frequency to the subchannel. Each station is
reserved with a particular band to prevent the crosstalk
between the channels and interferences of stations.
TDMA :-
Time Division Multiple Access (TDMA) is a channel access method. It allows the
same frequency bandwidth to be shared across multiple stations. And to avoid
collisions in the shared channel, it divides the channel into different frequency slots
that allocate stations to transmit the data frames.

The same frequency bandwidth into the shared channel by dividing the signal into
various time slots to transmit it. However, TDMA has an overhead of synchronization
that specifies each station's time slot by adding synchronization bits to each slot.
CDMA

• The code division multiple access (CDMA) is a channel access method. In


CDMA, all stations can simultaneously send the data over the same channel. It
means that it allows each station to transmit the data frames with full frequency
on the shared channel at all times. It does not require the division of bandwidth
on a shared channel based on time slots. If multiple stations send data to a
channel simultaneously, their data frames are separated by a unique code
sequence. Each station has a different unique code for transmitting the data over a
shared channel.

• For example, there are multiple users in a room that are continuously speaking.
Data is received by the users if only two-person interact with each other using the
same language. Similarly, in the network, if different stations communicate with
each other simultaneously with different code language.
Controlled Access Protocol

• While using the Controlled access protocol the


stations can consult with one another in order to find
which station has the rights to send the data.
• Any station cannot send until it has been authorized
by the other stations.
• The three main controlled access methods are as
follows;
1. Reservation
2. Polling
3. Token Passing
Reservation

• Reservation
• In the reservation method, a station needs to make a
reservation before sending data.
• The time line has two kinds of periods:
• Reservation interval of fixed time length
• Data transmission period of variable frames.
• If there are M stations, the reservation interval is divided
into M slots, and each station has one slot.
• Suppose if station 1 has a frame to send, it transmits 1 bit
during the slot 1. No other station is allowed to transmit
during this slot.
Token passing
• A token is a special bit pattern or a small message, which
circulate from one station to the next in some predefined order.
• In Token ring, token is passed from one station to another
adjacent station in the ring whereas incase of Token bus, each
station uses the bus to send the token to the next station in some
predefined order.
• In both cases, token represents permission to send. If a station
has a frame queued for transmission when it receives the token,
it can send that frame before it passes the token to the next
station. If it has no queued frame, it passes the token simply.
Polling

• Polling process is similar to the roll-call performed in class. Just like the
teacher, a controller sends a message to each node in turn.
• In this, one acts as a primary station(controller) and the others are
secondary stations. All data exchanges must be made through the
controller.
• The message sent by the controller contains the address of the node
being selected for granting access.
• Although all nodes receive the message but the addressed one responds
to it and sends data, if any. If there is no data, usually a “poll
reject”(NAK) message is sent back.

You might also like