
- DCN Tutorial
- Data Comm & Networks Home
- DCN - Overview
- DCN - Computer Network Types
- DCN - Network LAN Technologies
- DCN - Computer Network Topologies
- DCN - Computer Network Models
- DCN - Computer Network Security
- Physical Layer
- DCN - Physical Layer Introduction
- DCN - Digital Transmission
- DCN - Analog Transmission
- DCN - Transmission media
- DCN - Wireless Transmission
- DCN - Multiplexing
- DCN - Network Switching
- Data Link Layer
- DCN - Data Link Layer Introduction
- DCN - Error detection and Correction
- DCN - Data Link Control & Protocols
- Network Layer
- DCN - Network Layer Introduction
- DCN - Network Addressing
- DCN - Routing
- DCN - Internetworking
- DCN - Network Layer Protocols
- Transport Layer
- DCN - Transport Layer Introduction
- DCN - Transmission Control Protocol
- DCN - User Datagram Protocol
- Application Layer
- DCN - Application Layer Introduction
- DCN - Client-Server Model
- DCN - Application Protocols
- DCN - Network Services
- DCN Useful Resources
- DCN - Quick Guide
- DCN - Useful Resources
What are different types of multiple access protocols?
Multiple access protocols are generally used to coordinate access to link, here nodes can regulate their transmission onto the shared broadcast channels by using multiple access protocol, It is used on both wired and wireless LAN and satellite network.
Multiple nodes can transmit frames at the same time, if so the transmitted frame collides at the entire receiver. When there is a collision, there is no acknowledgement to the receiver that the frame is transmitted or not.
Thus, all frames involved in the collision are lost, and the broadcast channel is wasted during the collision interval. To rectify this problem Multiple Access protocol is implemented.
Various Multiple access channels are − Shared wire (Ethernet), shared wireless, satellite.
Multiple access protocols arise not only in the communications systems but as well in a lot of other systems such as the computer system, the storage facility or the server of any kind, where the resources are shared through the number of independent users.
Classification of Multiple Access Protocol
The multiple access protocol is classified into following types −
Random access MAC protocols
The random access MAC protocols are explained below in a stepwise manner.
Step 1 − In a random access MAC protocol, the transmitting node always transmits at full strength of the channel.
Step2 − When there is a collision, each node that is involved in the collision repeatedly retransmits its frame until the frame gets through without a collision.
Step 3 − But when a node experiences a collision, it does not necessarily retransmit the frame right away. Instead, it waits a random delay before retransmitting the frame.
Step 4 − Each node involved in a collision chooses independent random delays. Because after a collision the random delays are independently chosen, it is possible that one of the nodes will pick a delay that is sufficiently less than the delays of the other colliding nodes, and will therefore be able to transmit its frame into the channel without a collision.
Step 5 − Such a system is more random and there is no guarantee that a station will be able to transmit in the given medium due to more possibilities of collisions.
Step 6 − But there are certain protocols that help to reduce the collisions.
The protocols used here are as follows −
- ALOHA
- SLOTTED ALOHA
- CSMA(Carrier Sense Multiple Access)
- CSMA-CD(CSMA with Collision Detection)
- CSMA-CA(CSMA with Collision avoidance)
Channel Partitioning Protocols or conflict free protocol
The channel partitioning or conflict free protocols are explained below in stepwise manner.
Step 1 − The protocols used in his format is Time Division Multiplexing (TDM) and Frequency Division Multiplexing (FDM) the other is Code Division Multiple Access (CDMA) here, as the name says, the channel is partitioned on the basis of frequency, time depending on the protocol used and each participant/sender uses the channel in the time or frequency slot assigned specifically for them.
Step 2 − This type of partitioning ensures that each user has a predefined time/frequency slot to use the medium.
Step 3 − Suppose there are n nodes in TDM. The transmission time is divided into n nodes, and each node would be given a particular slot to transmit over the medium.
Step 4 − In FDM the frequency bandwidth is divided into certain slots and each node would send its transmission in that particular frequency.
Step 5 − In CDMA each node is assigned a unique code to transmit so that multiple transmissions can take place between different nodes, without the danger of collision.
Functions of MAC
The functions performed by Medium Access Protocol are given below −
It delimits and recognizes the frames
It is responsible for addressing at layer 2
Error checking by using frame check sequences (FCS)
Physical transmission medium's access control
- Related Articles
- What is carrier sense multiple access protocols?
- Multiple Access Protocols in Computer Networks
- What are different types of access modifiers available in C#?
- What are different types of RAM (Random Access Memory) in computer architecture?
- What are the different types of DOM available to access and modify content in JavaScript?
- Types of Authentication Protocols
- What are different types of interrupts?
- What are Different Types of Testing?
- What are different types of Respiration?
- What are different types of plant?
- What are Different Types of Mutagenesis?
- What are different types of eating disorders?
- What are the different types of psychotherapy?
- What are different types of finite automata?
- What are the different types of DBMS?
