Multiple Access Protocols in Computer Network

Multiple Access Protocols in Computer Network

In computer networks, multiple devices often need to share a common communication medium, such as a wireless channel or a wired network. To manage this shared access efficiently and avoid data collisions, multiple access protocols are employed. These protocols determine how multiple devices can transmit data simultaneously over a shared medium without interference. This article explores the different types of multiple access protocols, their mechanisms, advantages, and use cases.

What are Multiple Access Protocols?

Multiple access protocols are rules and procedures that manage how multiple devices share and access the communication medium. They are essential in environments where numerous devices need to transmit data, ensuring orderly communication and minimizing collisions and data loss.

Types of Multiple Access Protocols

Multiple access protocols can be broadly categorized into three types:

  1. Random Access Protocols
  2. Controlled Access Protocols
  3. Channelization Protocols

1. Random Access Protocols

Random access protocols allow devices to transmit data at any time, but they include mechanisms to handle collisions when two or more devices transmit simultaneously.

ALOHA

Pure ALOHA
  • Mechanism: Devices transmit data whenever they have data to send. If a collision occurs, the device waits for a random time before retransmitting.
  • Efficiency: Approximately 18.4% channel utilization.
Slotted ALOHA
  • Mechanism: Time is divided into slots, and devices can only transmit at the beginning of a time slot. This reduces the chance of collisions.
  • Efficiency: Approximately 36.8% channel utilization.

Carrier Sense Multiple Access (CSMA)

CSMA/CD (Collision Detection)
  • Mechanism: Devices listen to the channel before transmitting (carrier sensing). If the channel is idle, the device transmits. If a collision is detected during transmission, the device stops and retries after a random delay.
  • Use Case: Wired Ethernet networks.
CSMA/CA (Collision Avoidance)
  • Mechanism: Devices listen to the channel before transmitting. If the channel is idle, the device transmits. If the channel is busy, the device waits for a random backoff time. Collisions are avoided rather than detected.
  • Use Case: Wireless networks (e.g., Wi-Fi).

2. Controlled Access Protocols

Controlled access protocols ensure that only one device transmits at a time by using centralized or decentralized control methods.

Reservation

  • Mechanism: Devices reserve the channel for a specific time slot before transmitting. Reservation ensures that no other device transmits during the reserved slot.
  • Use Case: Satellite and mobile networks.

Polling

  • Mechanism: A central controller (polling device) asks each device in turn if it has data to send. Only the polled device can transmit.
  • Use Case: Mainframe computer networks, where the central computer polls terminals.

Token Passing

  • Mechanism: A token (special data packet) circulates around the network. Only the device holding the token can transmit data. Once transmission is complete, the token is passed to the next device.
  • Use Case: Token Ring and FDDI (Fiber Distributed Data Interface) networks.

3. Channelization Protocols

Channelization protocols divide the communication medium into multiple logical channels, allowing multiple devices to use different channels simultaneously.

Frequency Division Multiple Access (FDMA)

  • Mechanism: The frequency spectrum is divided into distinct frequency bands, and each device is assigned a unique band. Devices transmit simultaneously on different frequencies.
  • Use Case: Analog cellular networks, radio and television broadcasting.

Time Division Multiple Access (TDMA)

  • Mechanism: Time is divided into slots, and each device is assigned a specific time slot for transmission. Devices take turns transmitting in their assigned slots.
  • Use Case: Digital cellular networks, such as GSM.

Code Division Multiple Access (CDMA)

  • Mechanism: Devices use unique codes to modulate their signals, allowing multiple signals to occupy the same frequency band simultaneously. The receiver uses the corresponding code to demodulate the signal.
  • Use Case: Modern cellular networks (e.g., 3G).

Comparison of Multiple Access Protocols

Random Access vs. Controlled Access

Feature Random Access Protocols Controlled Access Protocols
Collision Handling Collisions are managed using detection or avoidance mechanisms No collisions due to controlled access
Efficiency Lower due to potential collisions Higher due to orderly access
Complexity Simpler implementation More complex due to control mechanisms
Examples ALOHA, CSMA/CD, CSMA/CA Polling, Token Passing

Channelization Protocols

Feature FDMA TDMA CDMA
Bandwidth Utilization Divides bandwidth into frequency bands Divides bandwidth into time slots Uses the entire bandwidth with unique codes
Collision Handling No collisions (separate frequencies) No collisions (separate time slots) No collisions (unique codes)
Efficiency Limited by frequency bands Limited by time slots Highly efficient
Complexity Moderate Moderate High
Examples Analog cellular networks GSM (2G) 3G, 4G LTE

Conclusion

Multiple access protocols are essential for managing how multiple devices share and access a common communication medium. Whether through random access, controlled access, or channelization, these protocols ensure efficient, orderly, and reliable data transmission. Understanding the different types of multiple access protocols and their use cases helps in designing robust and efficient network systems. By choosing the appropriate protocol based on the network requirements, engineers can optimize performance and minimize issues related to data collisions and congestion.