English

Access Methods

Advertisements
  • Contention
  • Polling
  • Token passing

Access Methods

Contention 

Contention occurs when multiple computers compete to use the transmission medium, leading to collisions when two transmit simultaneously. Collisions increase with network activity but can be reduced by carrier sensing, where computers listen before transmitting, and carrier detection, where they monitor the network while transmitting and stop if interference is detected. After a collision, computers wait a random time before retrying. Contention methods are common in LANs, but they don't guarantee transmission priority, and collisions increase as more computers join the network. All computers are treated equally in this probabilistic system. 

Polling 

In polling-based systems, a controller or master device checks other devices on the network to see if they are ready to transmit or receive data. However, polling generates significant network traffic, making it less common. A typical example is a computer polling a printer for print jobs. 

Token passing 

Token passing involves a token frame circulating the network, allowing only the computer holding the token to transmit. Once done, the token is passed to the next station. This method is more suitable than contention when handling time-sensitive data, as it provides predictable delivery, making it deterministic. It also handles heavy network traffic better by preventing gridlock from collisions and allows for priority assignments among stations. 

Token passing requires complex control mechanisms and costly hardware. It outperforms contention networks under heavy traffic, but contention networks perform better under light traffic loads. 

If you would like to contribute notes or other learning material, please submit them using the button below.
Advertisements
Share
Notifications

Englishहिंदीमराठी


      Forgot password?
Use app×