Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
-
Economics & Finance
Multiple Access Protocols in Computer Networks
Multiple access protocols are a set of protocols operating in the Medium Access Control sublayer (MAC sublayer) of the Open Systems Interconnection (OSI) model. These protocols allow multiple nodes or users to access a shared network channel efficiently, enabling several data streams originating from different nodes to be transferred through a multi-point transmission medium.
The primary objectives of multiple access protocols are optimization of transmission time, minimization of collisions, and avoidance of interference between transmissions. These protocols solve the fundamental problem of how multiple devices can share a single communication channel without data corruption.
Categories of Multiple Access Protocols
Multiple access protocols can be broadly classified into three main categories: random access protocols, controlled access protocols, and channelization protocols. Each category uses different approaches to manage channel access and prevent conflicts.
Random Access Protocols
Random access protocols assign equal priority to all connected nodes. Any node can transmit data when the transmission channel appears idle, without requiring permission from a central authority. No fixed time slots or predetermined sequence is assigned for data transmission.
The main random access protocols include:
-
ALOHA − Nodes transmit whenever they have data, leading to potential collisions
-
Carrier Sense Multiple Access (CSMA) − Nodes listen before transmitting
-
CSMA with Collision Detection (CSMA/CD) − Used in Ethernet, detects collisions during transmission
-
CSMA with Collision Avoidance (CSMA/CA) − Used in WiFi, attempts to avoid collisions
Controlled Access Protocols
Controlled access protocols ensure that only one node transmits data at any given time. Before initiating transmission, a node must obtain permission or wait for its designated turn. This approach eliminates collisions but introduces coordination overhead.
The three main controlled access methods are:
-
Reservation − Nodes reserve time slots in advance before transmitting
-
Polling − A central controller asks each node if it has data to transmit
-
Token Passing − A special control frame (token) circulates, granting transmission rights
Channelization Protocols
Channelization protocols divide the available bandwidth among different nodes, allowing simultaneous data transmission without interference. Each node gets a dedicated portion of the communication resource.
The three primary channelization methods are:
-
Frequency Division Multiple Access (FDMA) − Divides bandwidth into frequency bands
-
Time Division Multiple Access (TDMA) − Divides time into slots for each node
-
Code Division Multiple Access (CDMA) − Uses unique codes to distinguish transmissions
Comparison of Protocol Categories
| Protocol Type | Collision Handling | Efficiency | Complexity |
|---|---|---|---|
| Random Access | Collisions occur | Variable, depends on load | Low |
| Controlled Access | Collision-free | High under heavy load | Medium |
| Channelization | No collisions | Fixed allocation | High |
Conclusion
Multiple access protocols provide essential mechanisms for sharing network channels among multiple nodes. Each category offers different trade-offs between simplicity, efficiency, and collision handling, making them suitable for various network scenarios and requirements.
