SlideShare a Scribd company logo
1 of 26
CONTROLLED ACCESS
PROTOCOLS
CONTROLLED ACCESS
 In controlled access, the stations consults each
other to find which station has right to send.
 Controlled access protocols grants permission to
send only one node at a time, to avoid collision of
messages on the shared medium.
 A station cannot send data unless it is authorized
by the other stations.
CONTROLLED ACCESS
 Now we will discuss three named controlled access
methods.
 1. Reservation.
Ex: cable modem, DQDB
 2.Polling
 Ex: HDLC(normal response mode)
 3.Token Passing
 Ex: Token Ring, Token Bus.
1.RESERVATION
RESERVATION
 In the reservation method, a station needs to make
a reservation before sending data.
 Time is divided into intervals.
 In each interval, a reservation frame precedes the
data frames sent in that interval
RESERVATION
 If there are N stations in the system, there are
exactly N reservation mini slots in the reservation
frame.
 Each mini slot belongs to a station. When a station
needs to send a data frame, it makes a reservation
in its own mini slot.
 The stations that have made reservations can send
their data frames after the reservation frame
RESERVATION
 a situation with five stations and a five minislot
reservation frame.
2.POLLING
 To impose order on a network of independent users
and to establish one station in the network as a
controller that periodically polls all other stations which
is called Polling.
 There are two general polling policies:
i. Round Robin Order
ii. Priority Order
 It works with topologies in which one device is
designated as a Primary Station and the other
devices are Secondary Stations.
 The Primary device controls the link, where as the
secondary follows it’s instructions.
 Exchange of data must be made through the
primary device even though the final destination is
secondary.
SELECT FUNCTION:
 Whenever primary has something to send, it sends
the message to each node.
 Before Sending the data, it creates and transmits a
Select(SEL) frame, one field of it includes the
address of the intended secondary.
 While sending, the primary should know whether the
target device is ready to receive or not.
 Hence, it alerts the secondary for the upcoming
transmission and wait for an acknowledgement
(ACK) of secondary’s status.
POLL FUNCTION:
 When the primary is ready to receive data, it must
ask (poll) each device if it has anything to send.
 If the secondary has data to transmit, it sends the
data frame. Otherwise, it sends a negative
acknowledgement(NAK) .
 The primary then polls the next secondary. When
the response is positive (a data frame), the primary
reads the frame and returns an acknowledgment
(ACK).
 There are two possibilities to terminate the
transmission: either the secondary sends all data,
finishing with an EOT frame, or the primary says
timer is up.
Advantages:
 Priorities can be assigned to ensure faster access
from some secondary .
 Maximum and minimum access times and data
rates on the channel are predictable and fixed.
Drawbacks:
 High dependence on the reliability of the controller.
 Increase in turn around time reduces the channel
data rate under low loads and it’s throughput.
3.TOKEN PASSING
FEATURES:
 A Station is authorized to send data when it receives a
special frame called a Token.
 Stations are arranged around a ring (physically or
logically)
- A Token circulates around a ring
 If a station needs to send data ,it waits for the token
 The Station captures the token and sends one or more
frames as long as the allocated time has not expired
 It releases the token to be used by the successor
station.
Token
Station Interface is in two states :
o Listen state: Listen to the arriving bits and check the
destination address to see if it is its own address. If yes the
frame is copied to the station otherwise it is passed through
the output port to the next station.
o Transmit state: station captures a special frame called free
token and transmits its frames. Sending station is responsible
for reinserting the free token into the ring medium and for
removing the transmitted frame from the medium.
bits are copied to the output bits
with a one bit delay Bits are inserted by the station
listen mode
1 bit delay
transmit mode
delay
to station from station
input
from
ring
output
to
ring
to station from station
TOKEN PASSING FLOW CHART :
Token Management :
 We need token management , if there is a loss of token or it
is destroyed when a station fails
 We can assign priorities as which station can receive the
token.
Network Topology :
o The way in which different systems and nodes are
connected and communicate with each other is
determined by topology of the network.
 Topology can be physical or logical.
Physical Topology is the physical layout of nodes,
workstations and cables in the network
logical topology is the way information flows between
different components.
TYPES OF LOGICAL RINGS :
 Physical Ring Topology
The way that the workstations are connected to the
network through the actual cables that transmit data is
same as the physical structure of the network .
DUAL RING TOPOLOGY :
 A network topology in which two concentric rings
connect each node on a network
 Typically, the secondary ring in a dual-ring topology is
redundant.
 It is used as a backup in case the primary ring fails.
 In these configurations, data moves in opposite
directions around the rings.
BUS RING TOPOLOGY :
 All the nodes are connected to the single cable called
bus. Every workstation communicates with the other
device through this Bus.
 A signal from the source is broadcasted and it travels to
all workstations connected to bus cable.
 only the intended recipient, whose MAC address or IP
address matches, accepts it.
 If the MAC /IP address of machine doesn’t match with the
intended address, machine discards the signal.
STAR TOPOLOGY :
 In Star topology, all the components of network are
connected to the central device called “hub” which
may be a hub, a router or a switch.
 Hub acts as a junction to connect different nodes
present in Star Network, and at the same time it
manages and controls whole of the network.
MESH TOPOLOGY :
 In a mesh network topology, each of the network node,
computer and other devices, are interconnected with
one another.
 Every node not only sends its own signals but also
relays data from other nodes.
TREE TOPOLOGY :
 Tree Topology integrates the characteristics of Star and
Bus Topology.
 number of Star networks are connected using Bus.

More Related Content

What's hot

Point To Point Protocol
Point To Point ProtocolPoint To Point Protocol
Point To Point ProtocolPhan Vuong
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference ModelMukesh Tekwani
 
data-link layer protocols
data-link layer protocols  data-link layer protocols
data-link layer protocols BE Smârt
 
Ethernet Computer network
Ethernet Computer networkEthernet Computer network
Ethernet Computer networkmiteshppt
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networksguesta81d4b
 
Computer network switches & their structures
Computer network switches & their structuresComputer network switches & their structures
Computer network switches & their structuresSweta Kumari Barnwal
 
Signals and Antennas in mobile computing
Signals and Antennas in mobile computingSignals and Antennas in mobile computing
Signals and Antennas in mobile computingMadhuri Badgujar
 
Error Detection And Correction
Error Detection And CorrectionError Detection And Correction
Error Detection And CorrectionRenu Kewalramani
 
ALOHA Protocol (in detail)
ALOHA Protocol (in detail)ALOHA Protocol (in detail)
ALOHA Protocol (in detail)Hinal Lunagariya
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionShubham Khedekar
 
Transport protocols
Transport protocolsTransport protocols
Transport protocolsOnline
 
Synchronous and Asynchronous Transmission
Synchronous and Asynchronous TransmissionSynchronous and Asynchronous Transmission
Synchronous and Asynchronous TransmissionAdeel Rasheed
 
Congestion control
Congestion controlCongestion control
Congestion controlAman Jaiswal
 

What's hot (20)

Point To Point Protocol
Point To Point ProtocolPoint To Point Protocol
Point To Point Protocol
 
Framing in data link layer
Framing in data link layerFraming in data link layer
Framing in data link layer
 
Multiple access protocol
Multiple access protocolMultiple access protocol
Multiple access protocol
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
 
data-link layer protocols
data-link layer protocols  data-link layer protocols
data-link layer protocols
 
Csma
CsmaCsma
Csma
 
Ethernet Computer network
Ethernet Computer networkEthernet Computer network
Ethernet Computer network
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
 
Distance vector routing
Distance vector routingDistance vector routing
Distance vector routing
 
Computer network switches & their structures
Computer network switches & their structuresComputer network switches & their structures
Computer network switches & their structures
 
Signals and Antennas in mobile computing
Signals and Antennas in mobile computingSignals and Antennas in mobile computing
Signals and Antennas in mobile computing
 
Error Detection And Correction
Error Detection And CorrectionError Detection And Correction
Error Detection And Correction
 
Stop and-wait protocol
Stop and-wait protocolStop and-wait protocol
Stop and-wait protocol
 
ALOHA Protocol (in detail)
ALOHA Protocol (in detail)ALOHA Protocol (in detail)
ALOHA Protocol (in detail)
 
Circuit Switching
Circuit SwitchingCircuit Switching
Circuit Switching
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer Description
 
Transport layer
Transport layerTransport layer
Transport layer
 
Transport protocols
Transport protocolsTransport protocols
Transport protocols
 
Synchronous and Asynchronous Transmission
Synchronous and Asynchronous TransmissionSynchronous and Asynchronous Transmission
Synchronous and Asynchronous Transmission
 
Congestion control
Congestion controlCongestion control
Congestion control
 

Similar to Controlled Access Protocols

Cotrolled access
Cotrolled accessCotrolled access
Cotrolled accessMaha S
 
multiacess protocol
multiacess protocolmultiacess protocol
multiacess protocolKanwal Khan
 
Wireless LAN in Data Communication & Networking
Wireless LAN in Data Communication & NetworkingWireless LAN in Data Communication & Networking
Wireless LAN in Data Communication & NetworkingSweta Kumari Barnwal
 
TOKEN BUS & TOKEN RING.ppt
TOKEN BUS & TOKEN RING.pptTOKEN BUS & TOKEN RING.ppt
TOKEN BUS & TOKEN RING.pptshanthishyam
 
4-Topology and Categories of Network-06-01-2024.PPT
4-Topology and Categories of Network-06-01-2024.PPT4-Topology and Categories of Network-06-01-2024.PPT
4-Topology and Categories of Network-06-01-2024.PPTvedhatrioathi100
 
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptxComputer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptxPravinbhargav
 
Lecture2 networkclassification
Lecture2 networkclassificationLecture2 networkclassification
Lecture2 networkclassificationH K
 
Ethernet and switches
Ethernet and switchesEthernet and switches
Ethernet and switchesBhavik Vashi
 
Network Topologies
Network TopologiesNetwork Topologies
Network TopologiesJason Hando
 
FDDI and SONET by Er.Anup-(IOE)
FDDI and SONET  by Er.Anup-(IOE)FDDI and SONET  by Er.Anup-(IOE)
FDDI and SONET by Er.Anup-(IOE)Anup Bista
 
Multiple Access Methods
Multiple Access MethodsMultiple Access Methods
Multiple Access MethodsPrateek Soni
 
Some Ccna basic detail
Some Ccna basic detailSome Ccna basic detail
Some Ccna basic detailmuneebalisyed
 
Lecture 2 Connecting LANs, Backbone Networks, and Virtual LANs.ppt
Lecture 2   Connecting LANs, Backbone Networks, and Virtual LANs.pptLecture 2   Connecting LANs, Backbone Networks, and Virtual LANs.ppt
Lecture 2 Connecting LANs, Backbone Networks, and Virtual LANs.pptabdnazar2003
 

Similar to Controlled Access Protocols (20)

Cotrolled access
Cotrolled accessCotrolled access
Cotrolled access
 
multiacess protocol
multiacess protocolmultiacess protocol
multiacess protocol
 
Data link control notes
Data link control notesData link control notes
Data link control notes
 
Wireless LAN in Data Communication & Networking
Wireless LAN in Data Communication & NetworkingWireless LAN in Data Communication & Networking
Wireless LAN in Data Communication & Networking
 
TOKEN BUS & TOKEN RING.ppt
TOKEN BUS & TOKEN RING.pptTOKEN BUS & TOKEN RING.ppt
TOKEN BUS & TOKEN RING.ppt
 
4-Topology and Categories of Network-06-01-2024.PPT
4-Topology and Categories of Network-06-01-2024.PPT4-Topology and Categories of Network-06-01-2024.PPT
4-Topology and Categories of Network-06-01-2024.PPT
 
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptxComputer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptx
 
Week15 lec1
Week15 lec1Week15 lec1
Week15 lec1
 
ch
chch
ch
 
Lecture2 networkclassification
Lecture2 networkclassificationLecture2 networkclassification
Lecture2 networkclassification
 
Ethernet and switches
Ethernet and switchesEthernet and switches
Ethernet and switches
 
Network Topologies
Network TopologiesNetwork Topologies
Network Topologies
 
FDDI and SONET by Er.Anup-(IOE)
FDDI and SONET  by Er.Anup-(IOE)FDDI and SONET  by Er.Anup-(IOE)
FDDI and SONET by Er.Anup-(IOE)
 
Multiple Access Methods
Multiple Access MethodsMultiple Access Methods
Multiple Access Methods
 
dcn.pdf
dcn.pdfdcn.pdf
dcn.pdf
 
Some Ccna basic detail
Some Ccna basic detailSome Ccna basic detail
Some Ccna basic detail
 
Lecture 2 Connecting LANs, Backbone Networks, and Virtual LANs.ppt
Lecture 2   Connecting LANs, Backbone Networks, and Virtual LANs.pptLecture 2   Connecting LANs, Backbone Networks, and Virtual LANs.ppt
Lecture 2 Connecting LANs, Backbone Networks, and Virtual LANs.ppt
 
Computer network
Computer networkComputer network
Computer network
 
Presentation on control access protocol
Presentation on control access protocolPresentation on control access protocol
Presentation on control access protocol
 
CN UNIT I.pptx
CN UNIT I.pptxCN UNIT I.pptx
CN UNIT I.pptx
 

Recently uploaded

Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 

Recently uploaded (20)

Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 

Controlled Access Protocols

  • 2. CONTROLLED ACCESS  In controlled access, the stations consults each other to find which station has right to send.  Controlled access protocols grants permission to send only one node at a time, to avoid collision of messages on the shared medium.  A station cannot send data unless it is authorized by the other stations.
  • 3. CONTROLLED ACCESS  Now we will discuss three named controlled access methods.  1. Reservation. Ex: cable modem, DQDB  2.Polling  Ex: HDLC(normal response mode)  3.Token Passing  Ex: Token Ring, Token Bus.
  • 5. RESERVATION  In the reservation method, a station needs to make a reservation before sending data.  Time is divided into intervals.  In each interval, a reservation frame precedes the data frames sent in that interval
  • 6. RESERVATION  If there are N stations in the system, there are exactly N reservation mini slots in the reservation frame.  Each mini slot belongs to a station. When a station needs to send a data frame, it makes a reservation in its own mini slot.  The stations that have made reservations can send their data frames after the reservation frame
  • 7. RESERVATION  a situation with five stations and a five minislot reservation frame.
  • 9.  To impose order on a network of independent users and to establish one station in the network as a controller that periodically polls all other stations which is called Polling.  There are two general polling policies: i. Round Robin Order ii. Priority Order
  • 10.  It works with topologies in which one device is designated as a Primary Station and the other devices are Secondary Stations.  The Primary device controls the link, where as the secondary follows it’s instructions.  Exchange of data must be made through the primary device even though the final destination is secondary.
  • 11. SELECT FUNCTION:  Whenever primary has something to send, it sends the message to each node.  Before Sending the data, it creates and transmits a Select(SEL) frame, one field of it includes the address of the intended secondary.  While sending, the primary should know whether the target device is ready to receive or not.
  • 12.  Hence, it alerts the secondary for the upcoming transmission and wait for an acknowledgement (ACK) of secondary’s status.
  • 13. POLL FUNCTION:  When the primary is ready to receive data, it must ask (poll) each device if it has anything to send.  If the secondary has data to transmit, it sends the data frame. Otherwise, it sends a negative acknowledgement(NAK) .  The primary then polls the next secondary. When the response is positive (a data frame), the primary reads the frame and returns an acknowledgment (ACK).
  • 14.  There are two possibilities to terminate the transmission: either the secondary sends all data, finishing with an EOT frame, or the primary says timer is up.
  • 15. Advantages:  Priorities can be assigned to ensure faster access from some secondary .  Maximum and minimum access times and data rates on the channel are predictable and fixed. Drawbacks:  High dependence on the reliability of the controller.  Increase in turn around time reduces the channel data rate under low loads and it’s throughput.
  • 17. FEATURES:  A Station is authorized to send data when it receives a special frame called a Token.  Stations are arranged around a ring (physically or logically) - A Token circulates around a ring  If a station needs to send data ,it waits for the token  The Station captures the token and sends one or more frames as long as the allocated time has not expired  It releases the token to be used by the successor station. Token
  • 18. Station Interface is in two states : o Listen state: Listen to the arriving bits and check the destination address to see if it is its own address. If yes the frame is copied to the station otherwise it is passed through the output port to the next station. o Transmit state: station captures a special frame called free token and transmits its frames. Sending station is responsible for reinserting the free token into the ring medium and for removing the transmitted frame from the medium. bits are copied to the output bits with a one bit delay Bits are inserted by the station listen mode 1 bit delay transmit mode delay to station from station input from ring output to ring to station from station
  • 20. Token Management :  We need token management , if there is a loss of token or it is destroyed when a station fails  We can assign priorities as which station can receive the token. Network Topology : o The way in which different systems and nodes are connected and communicate with each other is determined by topology of the network.  Topology can be physical or logical. Physical Topology is the physical layout of nodes, workstations and cables in the network logical topology is the way information flows between different components.
  • 21. TYPES OF LOGICAL RINGS :  Physical Ring Topology The way that the workstations are connected to the network through the actual cables that transmit data is same as the physical structure of the network .
  • 22. DUAL RING TOPOLOGY :  A network topology in which two concentric rings connect each node on a network  Typically, the secondary ring in a dual-ring topology is redundant.  It is used as a backup in case the primary ring fails.  In these configurations, data moves in opposite directions around the rings.
  • 23. BUS RING TOPOLOGY :  All the nodes are connected to the single cable called bus. Every workstation communicates with the other device through this Bus.  A signal from the source is broadcasted and it travels to all workstations connected to bus cable.  only the intended recipient, whose MAC address or IP address matches, accepts it.  If the MAC /IP address of machine doesn’t match with the intended address, machine discards the signal.
  • 24. STAR TOPOLOGY :  In Star topology, all the components of network are connected to the central device called “hub” which may be a hub, a router or a switch.  Hub acts as a junction to connect different nodes present in Star Network, and at the same time it manages and controls whole of the network.
  • 25. MESH TOPOLOGY :  In a mesh network topology, each of the network node, computer and other devices, are interconnected with one another.  Every node not only sends its own signals but also relays data from other nodes.
  • 26. TREE TOPOLOGY :  Tree Topology integrates the characteristics of Star and Bus Topology.  number of Star networks are connected using Bus.