Communication
Networks
Access Control
in datalink layer
[Controlled Access Methods]
Overview of Module - 2
• Framing
• What is Framing
• Types of Framing
• Methods for identifying the
boundaries
• Flow Control
• What is flow control
• Types of flow control
• Access Control
• What is access control
• Types of access control
• Ethernet – IEEE 802.3
• Evolution of Ethernet
• Frame Format of Ethernet
• Access Control for Ethernet
• Performance Evaluation of Ethernet
• WLAN – IEEE 802.11
• Architecture
• Bluetooth
• WIFI
• Zigbee
• 6LowPan
• Network Layer Services
• IPv4
• Packet switching
• Network Layer Protocols
Visit www.youtube.com/GURUKULA for Lecture Videos
Classification of Access Control Mechanism
Visit www.youtube.com/GURUKULA for Lecture Videos
2.A - Reservation
• This method is similar to the passenger reserving a seat in
bus or train to travel from one place to another
• In the reservation method, a station needs to make a reservation
before sending data. Time is divided into intervals. In each interval, a
reservation frame precedes the data frames sent in that interval.
Visit www.youtube.com/GURUKULA for Lecture Videos
2.B - Polling
This method is similar to MASTER – SLAVE concept. Server acts as
MASTER and Clients acts as SLAVE.
• Polling works with topologies in which
one device is designated as a primary
station and the other devices are
secondary stations.
• All data exchanges must be made through
the primary device.
• Select function and Poll functions are used
to send and receive frames.
Visit www.youtube.com/GURUKULA for Lecture Videos
2.C – Token Passing
• In the token-passing method, the stations in
a network are organized in a logical ring.
• In other words, for each station, there is a
predecessor and a successor.
• The current station is the one that is
accessing the channel now. The right to this
access has been passed from the predecessor
to the current station.
• The right will be passed to the successor
when the current station has no more data to
send.
This method is similar to passing a MIC among the audience attending the seminar.
The mic will be circulating among the audience continuously, if a person has to raise a
question, he should wait until the mic reached him. Once he finished asking questions,
he can pass on the mic to next person.
Visit www.youtube.com/GURUKULA for Lecture Videos
Session Summary
• Controlled Access Methods [Following a systematic
approach]
• Reservation – Similar to Reserving the seats in Bus or
train
• Polling – Similar to Master Slave Concept
• Token Passing – Similar to passing a Mic among the
audience in seminar
Visit www.youtube.com/GURUKULA for Lecture Videos
References:
• Behrouz A. Forouzan, ―Data communication and Networking, Fifth
Edition, Tata McGraw – Hill, 2013
• Larry L. Peterson, Bruce S. Davie, ―Computer Networks: A Systems
Approach, Fifth Edition, Morgan Kaufmann Publishers, 2011.
• Few online References (Will be Mentioned in the description Section)
Thank You…

2.4 access control controlled access methods

  • 1.
    Communication Networks Access Control in datalinklayer [Controlled Access Methods]
  • 2.
    Overview of Module- 2 • Framing • What is Framing • Types of Framing • Methods for identifying the boundaries • Flow Control • What is flow control • Types of flow control • Access Control • What is access control • Types of access control • Ethernet – IEEE 802.3 • Evolution of Ethernet • Frame Format of Ethernet • Access Control for Ethernet • Performance Evaluation of Ethernet • WLAN – IEEE 802.11 • Architecture • Bluetooth • WIFI • Zigbee • 6LowPan • Network Layer Services • IPv4 • Packet switching • Network Layer Protocols Visit www.youtube.com/GURUKULA for Lecture Videos
  • 3.
    Classification of AccessControl Mechanism Visit www.youtube.com/GURUKULA for Lecture Videos
  • 4.
    2.A - Reservation •This method is similar to the passenger reserving a seat in bus or train to travel from one place to another • In the reservation method, a station needs to make a reservation before sending data. Time is divided into intervals. In each interval, a reservation frame precedes the data frames sent in that interval. Visit www.youtube.com/GURUKULA for Lecture Videos
  • 5.
    2.B - Polling Thismethod is similar to MASTER – SLAVE concept. Server acts as MASTER and Clients acts as SLAVE. • Polling works with topologies in which one device is designated as a primary station and the other devices are secondary stations. • All data exchanges must be made through the primary device. • Select function and Poll functions are used to send and receive frames. Visit www.youtube.com/GURUKULA for Lecture Videos
  • 6.
    2.C – TokenPassing • In the token-passing method, the stations in a network are organized in a logical ring. • In other words, for each station, there is a predecessor and a successor. • The current station is the one that is accessing the channel now. The right to this access has been passed from the predecessor to the current station. • The right will be passed to the successor when the current station has no more data to send. This method is similar to passing a MIC among the audience attending the seminar. The mic will be circulating among the audience continuously, if a person has to raise a question, he should wait until the mic reached him. Once he finished asking questions, he can pass on the mic to next person. Visit www.youtube.com/GURUKULA for Lecture Videos
  • 7.
    Session Summary • ControlledAccess Methods [Following a systematic approach] • Reservation – Similar to Reserving the seats in Bus or train • Polling – Similar to Master Slave Concept • Token Passing – Similar to passing a Mic among the audience in seminar Visit www.youtube.com/GURUKULA for Lecture Videos
  • 8.
    References: • Behrouz A.Forouzan, ―Data communication and Networking, Fifth Edition, Tata McGraw – Hill, 2013 • Larry L. Peterson, Bruce S. Davie, ―Computer Networks: A Systems Approach, Fifth Edition, Morgan Kaufmann Publishers, 2011. • Few online References (Will be Mentioned in the description Section) Thank You…