SlideShare une entreprise Scribd logo
1  sur  29
COMPUTER NETWORKS
TOPIC CONTROLLED ACCESS IN MAC
BY
S.MAHALAKSHMI
[AUTHOR DATA COMMUNICATIONS AND
NETWORKING
FOROUZAN]
Here stations consult one another
to find which station has the right
to send.
A station can not send unless it
has been authorized by other
stations.
CONTROLLED ACCESS
RESERVATION
 In the reservation method ,a station
needs to make a reservation before
sending data.
 Time is divided into intervals In each
interval,a reservation frame proceeds
the data frames sent in the interval
 If there are N stations in the system
,there are exacty N reservation
minislots in the reservation frame.
RESERVATION
 Each mini slot belongs to a station
 When a station needs to send a data frame, it
makes a reservation in its own minislot.
 The stations that have made reservations can
send their data frames after the reservation
frame
Reservation
 Fig 12.18 shows a situation with five
stations and a five minislot
reservation frame.
 In the first interval only stations
1,3,4 have made reservations .
 In the second interval only station 1
has made reservation
Polling
 Polling works with topologies in which one
device is designated as a primary slot and the
other devices are secondary stations
 All data exchanges must be made through the
primary device even the ultimate destination
is a secondary device.
 The primary device controls the link and the
secondary devices follow it’s instructions.
 It is up to the primary device to determine
which device is allowed to use the channel
at a given time
POLLING
 The primary device therefore is the
initiator of a session.
 This method uses poll and select
functions to prevent collisions.
 And the drawback is if the primary
station fails the system goes down.
SELECT
 This function is used whenever the primary device
has something to send.
 If the primary is neither sending nor received the
data,it knows the link is available.
 What it does not know ,however is whether the
target device is prepared to receive.
 So the primary must alert the secondary to the
upcoming transmission and wait for an
acknowedgement Of the secondary’s ready status
 Before sending data the primary creates and
transmits a select frame ,one field of which
includes the address of the intended secondary.
POLL
 The poll function used by the primary device to
solicit transmissions from the secondary devices
 When the primary is ready to receive data it must
ask each device in turn if it has anything to send.
 When the first secondary is approached it responds
either with the NAK frame if it has nothing to send
or with data if it does
 If the response is negative then the primary polls
the next secondary in the same manner until it finds
one with data to send.
 When the response is positive ,the primary reads
the frame and returns an acknowledge verifying its
receipt
Token passing
 Here the stations in a networ are organized in a
logical ring.
 For each station there is a predecessor and a
successor
 The predecessor is the station which is logically
before the station in the ring.
 The successor is the station which is after the
station in the ring
 The current station is the one that is accessing the
channel Now.
Token passing
 The right to this access has been passed from
the predecessor to the current station
 The right will be passed to the successor
when the current station has no more data to
send.
 IN this method a special packet called a toen
circulates through the ring.
 This toen gives the station the right to access
the channel and send its data.
Token passing
 When the station has no more data to send it
releases the token passing it to the next
logical station in the ring.
 Tha station can not send data until it receives
the token again in the next round
 Stations must be limited in the time they can
have possessio of the token.
 The token must be monitored to ensure that
it has not been lost or destroyed
Token passing
 For example if a station that is holding the
token fails the token will disappear from the
networ k.
 Another func tion of token management is to
assign priorities to the stations and to the
types of data being transmitted
 And finally token management is needed to
make low priority stations releases the token
to high priority stations
LOGICAL RING
 In token passing network station do
not have to be physically connected in
the ring
 The ring can be logical one
 Fig 12.20 shows physical topologies
that can create logical ring
Physical ring Topology
 In the physical ring topology when a station
sends the toe to its successor the token can
not be seen by other stations
 The successor is the next one in line
 This means that the token does not have to
have the address of the next successor
 The problem with this topology is that if one
of the links-the medium between two
adjacent stations –fails the whole system
fails
Dual Ring
 This topology uses a second ring which
operates in the reverse direction compared
with the main ring.
 The second ring is for emergencies only as a
spare tier for a car
 If one of the links in the main ring fails the
system automatically combines the two rings
to form a temporary ring
 After the failed link is restored ,the auxiliary
ring becomes idle again
Dual Ring
 Note that for this topology to work
each station needs to have two
transmitter ports and two receiver
ports
 The high speed token ring networks
called FDDI
 (Fiber Distributed Data Interface) and
CDDI (Copper Distributed Data
Interface) use this topology
Bus Topology
 Also called a token bus
 The stations are connected to a single cable
called a bus
 They make a logical ring because each station
knows the address of its successor b.
 When a station has finishedsending it’s data
,it releases the token and inserts the address
of its successor in the token.
 Only the station with the address matching
the destination address of the token gets the
token to access the shared media.
Star Ring Topology
 The physical topology is a star.
 There is a hub ,however that acts as a
connector
 The wiring inside the hub makes the ring the
stations are connected to this ring through
two wire connections
 This topology makes the network less prone
to failure because if a link goes down it will
be bypassed the hub and the rest of the
stations can operate
 Also adding and removing stations from the
ring is easier
THANK YOU
Cotrolled access
Cotrolled access
Cotrolled access
Cotrolled access
Cotrolled access
Cotrolled access

Contenu connexe

Tendances

Ch 18 intro to network layer - section 2
Ch 18   intro to network layer - section 2Ch 18   intro to network layer - section 2
Ch 18 intro to network layer - section 2Hossam El-Deen Osama
 
Performance Observation of Proactive and Reactive Routing Protocols with Incr...
Performance Observation of Proactive and Reactive Routing Protocols with Incr...Performance Observation of Proactive and Reactive Routing Protocols with Incr...
Performance Observation of Proactive and Reactive Routing Protocols with Incr...Computer Science Journals
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSDr. SELVAGANESAN S
 
Introduction to backwards learning algorithm
Introduction to backwards learning algorithmIntroduction to backwards learning algorithm
Introduction to backwards learning algorithmRoshan Karunarathna
 
Lecture2 networkclassification
Lecture2 networkclassificationLecture2 networkclassification
Lecture2 networkclassificationH K
 
Wireless LAN in Data Communication & Networking
Wireless LAN in Data Communication & NetworkingWireless LAN in Data Communication & Networking
Wireless LAN in Data Communication & NetworkingSweta Kumari Barnwal
 
Computer networks network layer,routing
Computer networks network layer,routingComputer networks network layer,routing
Computer networks network layer,routingDeepak John
 
Networking and Data Communications
Networking and Data CommunicationsNetworking and Data Communications
Networking and Data Communicationskuramartin
 
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...Narendra Singh Yadav
 
IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5Vicky Kumar
 
Routing protocols-network-layer
Routing protocols-network-layerRouting protocols-network-layer
Routing protocols-network-layerNitesh Singh
 

Tendances (20)

Topology
TopologyTopology
Topology
 
Token ring 802.5
Token ring 802.5Token ring 802.5
Token ring 802.5
 
Ch 18 intro to network layer - section 2
Ch 18   intro to network layer - section 2Ch 18   intro to network layer - section 2
Ch 18 intro to network layer - section 2
 
Networkdevices by Jetarvind kumar madhukar
Networkdevices by Jetarvind kumar madhukarNetworkdevices by Jetarvind kumar madhukar
Networkdevices by Jetarvind kumar madhukar
 
Performance Observation of Proactive and Reactive Routing Protocols with Incr...
Performance Observation of Proactive and Reactive Routing Protocols with Incr...Performance Observation of Proactive and Reactive Routing Protocols with Incr...
Performance Observation of Proactive and Reactive Routing Protocols with Incr...
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
 
Introduction to backwards learning algorithm
Introduction to backwards learning algorithmIntroduction to backwards learning algorithm
Introduction to backwards learning algorithm
 
Lecture2 networkclassification
Lecture2 networkclassificationLecture2 networkclassification
Lecture2 networkclassification
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Unit 3 - Data Link Layer - Part B
Unit 3 - Data Link Layer - Part BUnit 3 - Data Link Layer - Part B
Unit 3 - Data Link Layer - Part B
 
Wireless LAN in Data Communication & Networking
Wireless LAN in Data Communication & NetworkingWireless LAN in Data Communication & Networking
Wireless LAN in Data Communication & Networking
 
Week15 lec1
Week15 lec1Week15 lec1
Week15 lec1
 
Ch 20 UNICAST ROUTING SECTION 2
Ch 20   UNICAST ROUTING  SECTION  2Ch 20   UNICAST ROUTING  SECTION  2
Ch 20 UNICAST ROUTING SECTION 2
 
Computer networks network layer,routing
Computer networks network layer,routingComputer networks network layer,routing
Computer networks network layer,routing
 
Networking and Data Communications
Networking and Data CommunicationsNetworking and Data Communications
Networking and Data Communications
 
Week14 lec2
Week14 lec2Week14 lec2
Week14 lec2
 
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
 
IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5
 
Routing protocols-network-layer
Routing protocols-network-layerRouting protocols-network-layer
Routing protocols-network-layer
 

Similaire à Cotrolled access

Controlled Access Protocols
Controlled Access ProtocolsControlled Access Protocols
Controlled Access ProtocolsPruthviraj Konu
 
multiacess protocol
multiacess protocolmultiacess protocol
multiacess protocolKanwal Khan
 
TOKEN BUS & TOKEN RING.ppt
TOKEN BUS & TOKEN RING.pptTOKEN BUS & TOKEN RING.ppt
TOKEN BUS & TOKEN RING.pptshanthishyam
 
Token Ring : 802.5
Token Ring : 802.5Token Ring : 802.5
Token Ring : 802.5Pnkj_Sharma
 
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptxComputer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptxPravinbhargav
 
4-Topology and Categories of Network-06-01-2024.PPT
4-Topology and Categories of Network-06-01-2024.PPT4-Topology and Categories of Network-06-01-2024.PPT
4-Topology and Categories of Network-06-01-2024.PPTvedhatrioathi100
 
Physical and logical topologies in computer network and client server
Physical  and logical topologies in computer network and client serverPhysical  and logical topologies in computer network and client server
Physical and logical topologies in computer network and client serverSatya P. Joshi
 
Presentation on network topology
Presentation on network topologyPresentation on network topology
Presentation on network topologySwarnima Tiwari
 
Multiple Access Methods
Multiple Access MethodsMultiple Access Methods
Multiple Access MethodsPrateek Soni
 
Topography
TopographyTopography
Topographyrosu555
 
Network topology 20.1.2020
Network topology 20.1.2020Network topology 20.1.2020
Network topology 20.1.2020jhunudb
 
20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks 20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks Kathirvel Ayyaswamy
 
Lecture 2 Connecting LANs, Backbone Networks, and Virtual LANs.ppt
Lecture 2   Connecting LANs, Backbone Networks, and Virtual LANs.pptLecture 2   Connecting LANs, Backbone Networks, and Virtual LANs.ppt
Lecture 2 Connecting LANs, Backbone Networks, and Virtual LANs.pptabdnazar2003
 
Determine best fit topology copy
Determine best fit topology   copyDetermine best fit topology   copy
Determine best fit topology copyJaleto Sunkemo
 

Similaire à Cotrolled access (20)

Controlled Access Protocols
Controlled Access ProtocolsControlled Access Protocols
Controlled Access Protocols
 
multiacess protocol
multiacess protocolmultiacess protocol
multiacess protocol
 
TOKEN BUS & TOKEN RING.ppt
TOKEN BUS & TOKEN RING.pptTOKEN BUS & TOKEN RING.ppt
TOKEN BUS & TOKEN RING.ppt
 
Presentation on control access protocol
Presentation on control access protocolPresentation on control access protocol
Presentation on control access protocol
 
ieee 802.4
ieee 802.4ieee 802.4
ieee 802.4
 
Token Ring : 802.5
Token Ring : 802.5Token Ring : 802.5
Token Ring : 802.5
 
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptxComputer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptx
 
4-Topology and Categories of Network-06-01-2024.PPT
4-Topology and Categories of Network-06-01-2024.PPT4-Topology and Categories of Network-06-01-2024.PPT
4-Topology and Categories of Network-06-01-2024.PPT
 
Physical and logical topologies in computer network and client server
Physical  and logical topologies in computer network and client serverPhysical  and logical topologies in computer network and client server
Physical and logical topologies in computer network and client server
 
Presentation on network topology
Presentation on network topologyPresentation on network topology
Presentation on network topology
 
Multiple Access Methods
Multiple Access MethodsMultiple Access Methods
Multiple Access Methods
 
ieeeeeee802.ppt
ieeeeeee802.pptieeeeeee802.ppt
ieeeeeee802.ppt
 
Topography
TopographyTopography
Topography
 
Token ring
Token ringToken ring
Token ring
 
Network topology 20.1.2020
Network topology 20.1.2020Network topology 20.1.2020
Network topology 20.1.2020
 
Ethernet lan
Ethernet lanEthernet lan
Ethernet lan
 
dcn.pdf
dcn.pdfdcn.pdf
dcn.pdf
 
20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks 20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks
 
Lecture 2 Connecting LANs, Backbone Networks, and Virtual LANs.ppt
Lecture 2   Connecting LANs, Backbone Networks, and Virtual LANs.pptLecture 2   Connecting LANs, Backbone Networks, and Virtual LANs.ppt
Lecture 2 Connecting LANs, Backbone Networks, and Virtual LANs.ppt
 
Determine best fit topology copy
Determine best fit topology   copyDetermine best fit topology   copy
Determine best fit topology copy
 

Dernier

Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 

Dernier (20)

Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 

Cotrolled access

  • 1. COMPUTER NETWORKS TOPIC CONTROLLED ACCESS IN MAC BY S.MAHALAKSHMI [AUTHOR DATA COMMUNICATIONS AND NETWORKING FOROUZAN]
  • 2. Here stations consult one another to find which station has the right to send. A station can not send unless it has been authorized by other stations. CONTROLLED ACCESS
  • 3. RESERVATION  In the reservation method ,a station needs to make a reservation before sending data.  Time is divided into intervals In each interval,a reservation frame proceeds the data frames sent in the interval  If there are N stations in the system ,there are exacty N reservation minislots in the reservation frame.
  • 4. RESERVATION  Each mini slot belongs to a station  When a station needs to send a data frame, it makes a reservation in its own minislot.  The stations that have made reservations can send their data frames after the reservation frame
  • 5. Reservation  Fig 12.18 shows a situation with five stations and a five minislot reservation frame.  In the first interval only stations 1,3,4 have made reservations .  In the second interval only station 1 has made reservation
  • 6.
  • 7. Polling  Polling works with topologies in which one device is designated as a primary slot and the other devices are secondary stations  All data exchanges must be made through the primary device even the ultimate destination is a secondary device.  The primary device controls the link and the secondary devices follow it’s instructions.  It is up to the primary device to determine which device is allowed to use the channel at a given time
  • 8. POLLING  The primary device therefore is the initiator of a session.  This method uses poll and select functions to prevent collisions.  And the drawback is if the primary station fails the system goes down.
  • 9.
  • 10. SELECT  This function is used whenever the primary device has something to send.  If the primary is neither sending nor received the data,it knows the link is available.  What it does not know ,however is whether the target device is prepared to receive.  So the primary must alert the secondary to the upcoming transmission and wait for an acknowedgement Of the secondary’s ready status  Before sending data the primary creates and transmits a select frame ,one field of which includes the address of the intended secondary.
  • 11. POLL  The poll function used by the primary device to solicit transmissions from the secondary devices  When the primary is ready to receive data it must ask each device in turn if it has anything to send.  When the first secondary is approached it responds either with the NAK frame if it has nothing to send or with data if it does  If the response is negative then the primary polls the next secondary in the same manner until it finds one with data to send.  When the response is positive ,the primary reads the frame and returns an acknowledge verifying its receipt
  • 12. Token passing  Here the stations in a networ are organized in a logical ring.  For each station there is a predecessor and a successor  The predecessor is the station which is logically before the station in the ring.  The successor is the station which is after the station in the ring  The current station is the one that is accessing the channel Now.
  • 13. Token passing  The right to this access has been passed from the predecessor to the current station  The right will be passed to the successor when the current station has no more data to send.  IN this method a special packet called a toen circulates through the ring.  This toen gives the station the right to access the channel and send its data.
  • 14. Token passing  When the station has no more data to send it releases the token passing it to the next logical station in the ring.  Tha station can not send data until it receives the token again in the next round  Stations must be limited in the time they can have possessio of the token.  The token must be monitored to ensure that it has not been lost or destroyed
  • 15. Token passing  For example if a station that is holding the token fails the token will disappear from the networ k.  Another func tion of token management is to assign priorities to the stations and to the types of data being transmitted  And finally token management is needed to make low priority stations releases the token to high priority stations
  • 16. LOGICAL RING  In token passing network station do not have to be physically connected in the ring  The ring can be logical one  Fig 12.20 shows physical topologies that can create logical ring
  • 17.
  • 18. Physical ring Topology  In the physical ring topology when a station sends the toe to its successor the token can not be seen by other stations  The successor is the next one in line  This means that the token does not have to have the address of the next successor  The problem with this topology is that if one of the links-the medium between two adjacent stations –fails the whole system fails
  • 19. Dual Ring  This topology uses a second ring which operates in the reverse direction compared with the main ring.  The second ring is for emergencies only as a spare tier for a car  If one of the links in the main ring fails the system automatically combines the two rings to form a temporary ring  After the failed link is restored ,the auxiliary ring becomes idle again
  • 20. Dual Ring  Note that for this topology to work each station needs to have two transmitter ports and two receiver ports  The high speed token ring networks called FDDI  (Fiber Distributed Data Interface) and CDDI (Copper Distributed Data Interface) use this topology
  • 21. Bus Topology  Also called a token bus  The stations are connected to a single cable called a bus  They make a logical ring because each station knows the address of its successor b.  When a station has finishedsending it’s data ,it releases the token and inserts the address of its successor in the token.  Only the station with the address matching the destination address of the token gets the token to access the shared media.
  • 22. Star Ring Topology  The physical topology is a star.  There is a hub ,however that acts as a connector  The wiring inside the hub makes the ring the stations are connected to this ring through two wire connections  This topology makes the network less prone to failure because if a link goes down it will be bypassed the hub and the rest of the stations can operate  Also adding and removing stations from the ring is easier