Multiple Access Protocol - CSU359 - Shoolini University

Multiple Access Protocol

Multiple Access Protocols

Multiple Access Protocols are methods that allow multiple devices to share a communication channel efficiently, ensuring data is transmitted without collision or interference. These protocols are crucial in networks where multiple devices need to communicate over a shared medium, such as Ethernet or wireless networks.

The protocols can be categorized into three main types: Channel Partitioning, Random Access, and Controlled Access.

1. Channel Partitioning Protocols

Channel partitioning divides the communication channel into distinct segments to allocate resources efficiently. These protocols are deterministic and ensure fair access but may lead to underutilization if devices do not fully use their allocated slots.

1.1 Time Division Multiple Access (TDMA)

The channel is divided into time slots, and each device is assigned a specific slot to transmit data. Devices transmit in a synchronized manner to avoid collisions.

1.2 Frequency Division Multiple Access (FDMA)

The channel is divided into frequency bands, with each device assigned a unique band for communication.

1.3 Code Division Multiple Access (CDMA)

Devices transmit over the entire frequency spectrum using unique codes to distinguish transmissions.

2. Random Access Protocols

In random access protocols, devices transmit without pre-coordination. Collisions may occur, and mechanisms are needed to detect and recover from these collisions.

2.1 ALOHA

Devices transmit whenever they have data to send. If a collision occurs, devices wait for a random time and retransmit.

2.2 Carrier Sense Multiple Access (CSMA)

Devices sense the channel before transmitting to avoid collisions.

3. Controlled Access Protocols

Controlled access protocols ensure orderly access to the channel by coordinating the transmission among devices.

3.1 Polling

A central controller polls devices sequentially to grant them the right to transmit.

3.2 Token Passing

A token circulates in the network, and only the device holding the token can transmit.

Applications of Multiple Access Protocols

These protocols are essential in various network types: