E-Notes 2.0
E-Notes 2.0
E-Notes 2.0
When nodes or stations are connected and use a common link, called a multipoint or
broadcast link, we need a multiple-access protocol to coordinate access to the link.
The problem of controlling the access to the medium is similar to the rules of speaking
in an assembly. The procedures guarantee that the right to speak is upheld and ensure
that two people do not speak at the same time, do not interrupt each other, do not
monopolize the discussion, and so on.
The situation is similar for multipoint networks. Many formal protocols have been devised
to handle access to a shared link. We categorize them into three groups. Protocols belonging
to each group are shown below.
In random access or contention methods, no station is superior to another station and none is
assigned the control over another. No station permits, or does not permit, another station to send.
At each instance, a station that has data to send uses a procedure defined by the protocol
to make a decision on whether or not to send. This decision depends on the state of the medium
(idle or busy).
Each station can transmit when it desires on the condition that it follows the predefined
procedure, including the testing of the state of the medium. Two features give this method its name.
First, there is no scheduled time for a station to transmit. Transmission is random among the
stations. That is why these methods are called random access. Second, no rules specify which
station should send next. Stations compete with one another to access the medium. That is why
these methods are also called contention methods.
In a random access method, each station has the right to the medium without being controlled
by any other station. However, if more than one station tries to send, there is an access conflict-
collision-and the frames will be either destroyed or modified. ALOHA, is a very simple procedure
called multiple access (MA). The method was improved with the addition of a procedure that
forces the station to sense the medium before transmitting. This was called carrier sense
multiple access. This method later evolved into two parallel methods: carrier sense multiple access
with collision detection (CSMA/CD) and carrier sense multiple access with collision avoidance
(CSMA/CA). CSMA/CD tells the station what to do when a collision is detected. CSMA/CA tries
to avoid the collision.
1.1 ALOHA:
ALOHA, the earliest random access method, was developed at the University of Hawaii in early
1970. It was designed for a radio (wireless) LAN, but it can be used on any shared medium.
There are potential collisions in this arrangement. The medium is shared between the stations.
When a station sends data, another station may attempt to do so at the same time. The data from
the two stations collide and become garbled.
1.1.1 Pure ALOHA
The original ALOHA protocol is called pure ALOHA. This is a simple, but elegant protocol.
The idea is that each station sends a frame whenever it has a frame to send. However, since there
is only one channel to share, there is the possibility of collision between frames from different
stations. Fig. 1 shows an example of frame collisions in pure ALOHA.