Access control methods are required in a network to ensure that only one user of the network is able to transmit at any one time.
In ring-based local area networks (LANs), two commonly employed techniques are:
Contents
In this technique, a token i.e. a special bit pattern, is circulated. When a station wishes to transmit, it waits until it receives the token, and then transmits the data with the token attached to its end. Another station that wishes to transmit removes the token from the package of data and transmits its own data with the token attached to its end.
This technique involves empty slots being circulated. When a station wishes to transmit data it deposits it in the first empty slot that comes along.
In bus or tree networks a technique that is frequently employed is:
With CSMA/CD technique, stations have to listen for other transmissions before transmitting, with any station being able to gain control of the network and transmit, hence the term multiple access. If no activity is detected then transmission can occur. If there is an activity, then the system has to wait until it can detect no further activity. Even with this listening before transmitting, it is still possible for two or more systems to start to transmit at the same time. If such a condition is detected, both stations cease submitting and wait a random time before attempting to transmit again. This method is commonly associated with Ethernet LAN bus.
Recommended: The Ultimate Guide to Electrical Maintenance
Related: Topological Network Structures used in Fieldbus Systems
The importance of printed circuit board (PCB) technology has escalated throughout the years with the…
One of the key challenges in measuring the electrical current in high voltage, high power…
The Concept behind Wiegand Effect Based Sensors The Wiegand effect technology employs the unique…
An accelerometer is a sensor that is designed to measure acceleration or rate of change…
The USB-6009 is a small external data acquisition and control device manufactured by National Instruments…
X-Y tables are utilized as components in many systems where reprogrammable position control is desired.…