[go: up one dir, main page]

0% found this document useful (0 votes)
37 views2 pages

Multiple Access Protocols in Computer Networks

Multiple access protocols are essential for managing how multiple nodes access a shared network channel, focusing on optimizing transmission time and minimizing collisions. They are categorized into random access protocols, controlled access protocols, and channelization methods, each with distinct mechanisms for data transmission. Key examples include ALOHA, CSMA, and TDMA, which illustrate the varying approaches to managing access and reducing interference in network communications.

Uploaded by

hadhiyamol
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
37 views2 pages

Multiple Access Protocols in Computer Networks

Multiple access protocols are essential for managing how multiple nodes access a shared network channel, focusing on optimizing transmission time and minimizing collisions. They are categorized into random access protocols, controlled access protocols, and channelization methods, each with distinct mechanisms for data transmission. Key examples include ALOHA, CSMA, and TDMA, which illustrate the varying approaches to managing access and reducing interference in network communications.

Uploaded by

hadhiyamol
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Multiple Access Protocols in Computer

Networks
Multiple access protocols are a set of protocols operating in the Medium Access
Control sublayer (MAC sublayer) of the Open Systems Interconnection (OSI)
model. These protocols allow a number of nodes or users to access a shared
network channel. Several data streams originating from several nodes are
transferred through the multi-point transmission channel.
The objectives of multiple access protocols are optimization of transmission
time, minimization of collisions and avoidance of crosstalks.

Categories of Multiple Access Protocols


Multiple access protocols can be broadly classified into three categories -
random access protocols, controlled access protocols and channelization
protocols.

Random Access Protocols


Random access protocols assign uniform priority to all connected nodes. Any
node can send data if the transmission channel is idle. No fixed time or fixed
sequence is given for data transmission.
The four random access protocols are−
 ALOHA
 Carrier sense multiple access (CMSA)
 Carrier sense multiple access with collision detection (CMSA/CD)
 Carrier sense multiple access with collision avoidance (CMSA/CA)

 ALOHA is a basic and early random access protocol where devices can transmit data at
any time without checking if the communication channel is free. This simplicity leads to
frequent collisions when multiple devices transmit simultaneously, resulting in data loss
and the need for retransmission. Two versions exist: Pure ALOHA, which allows
transmission at any time, and Slotted ALOHA, which divides time into slots to reduce
collisions and improve efficiency.

 Carrier Sense Multiple Access (CSMA) improves upon ALOHA by requiring each
device to first sense the channel to determine if it is idle before transmitting. If the
channel is busy, the device waits until it becomes free. However, CSMA is still prone to
collisions due to propagation delays, as two devices might sense the channel as idle and
transmit at the same time.
 Carrier Sense Multiple Access with Collision Detection (CSMA/CD), used mainly in
wired Ethernet networks, further enhances CSMA by detecting collisions while data is
being transmitted. If a collision is detected, the device stops transmitting, sends a jam
signal to inform other devices, and waits for a random backoff time before attempting to
retransmit. This reduces wasted bandwidth and improves overall efficiency.
 Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) is designed for
wireless networks like Wi-Fi, where detecting collisions during transmission is not
feasible. Instead, CSMA/CA tries to avoid collisions by using random backoff timers and
optional control messages like RTS (Request to Send) and CTS (Clear to Send) before
transmitting. Using random backoff timers means that after a device senses the channel
is busy (or after a collision is detected or avoided), it waits for a random amount of time
before trying to transmit again. Using random backoff timers means that after a device
senses the channel is busy (or after a collision is detected or avoided), it waits for a
random amount of time before trying to transmit again. This method minimizes the
chance of collision, especially in environments where some devices may not detect others
(hidden node problem).

Controlled Access Protocols


Controlled access protocols allow only one node to send data at a given time.
Before initiating transmission, a node seeks information from other nodes to
determine which station has the right to send. This avoids collision of messages
on the shared channel.
The station can be assigned the right to send by the following three methods−
 Reservation
 Polling
 Token Passing

Channelization
Channelization are a set of methods by which the available bandwidth is divided
among the different nodes for simultaneous data transfer.
The three channelization methods are−
 Frequency division multiple access (FDMA)
 Time division multiple access (TDMA)
 Code division multiple access (CDMA)

You might also like