Uploaded by makangara22

QUESTION

advertisement
QUESTION
Comparison of access techniques, random
methods, error control scheme for link layer
access.
ACCESS TECHNIQUES…..
are methods used to control how devices in a network gain access to a shared communication medium. The two
commonly used access techniques are;
Random access: in random access, multiple devices contend for access to the network without any predetermined
order. Each device has an equal chance of accessing the medium. Random-access is commonly used in networks
where the communication medium is shared, such as ethernet networks. Examples of random-access methods
include carrier sense multiple access (CSMA) and CSMA/CD (carrier sense multiple access with collision
detection).
❖ Controlled access: controlled access refers to access techniques where devices gain access to the network in a
predetermined manner. These techniques are typically used in scenarios where devices are assigned specific time
slots or priorities. Controlled access can provide guaranteed access and can be more efficient in managing
network resources. Examples of controlled access techniques include Time Division Multiple Access (TDMA) and
polling.
❖
RANDOM ACCESS METHODS.
These are methods are a subset of access techniques that use randomization to handle conflicts and allow fair
access to the medium.
ALOHA: ALOHA is a random-access method where nodes can transmit data whenever they have it. without
checking for channel availability. Collision may happen if multiple nodes transmit simultaneously, resulting in the
loss of data. There are two variations of ALOHA: pure ALOHA and slotted ALOHA
❖ Carrier sense multiple access (CSMA): In CSMA, nodes listen to the channel before transmitting. If the channel
is idle, they transmit simultaneously.
❖ Carrier sense multiple access with collision detection (CSMA/CD): CSMA/CD is used in ethernet networks. It
improves upon CSMA by detecting collision occurs. It then waits for a random period before retrying.
❖ Carrier sense multiple access with collision avoidance (CSMA/CA): CSMA/CA is used in wireless networks like WIFI. It includes a handshake mechanism where nodes exchange control packets to reserve the channel before
❖
ERROR CONTROL SCHEME
FOR LINK LAYER…
These schemes in link layer aims to detect and correct errors that may occur during data transmission over a physical
layer.
❖ Automatic repeat request (ARQ): ARQ is a common error control scheme that detects and corrects transmission
errors by retransmitting lost or corrupted data. It uses acknowledgements and timeouts to identify and recover from
errors, ARQ is divided into the following categories
.
 Stop-and-wait ARQ
 Back-N ARQ
 Selective repeat ARQ
Forward error correction (FCF): FCF adds redundant error-correcting codes to the transmitted data. the receiver can
use these codes to detect and correct errors without requiring retransmissions. Common FEC codes include
hamming codes and convolutional codes.
❖ Hybrid ARQ (HARQ): HARQ combines the techniques of ARQ and FEC. It uses error-detection codes to correct errors
if possible, and if not, it requests retransmission through ARQ error detection and retransmission
❖ Checksums: checksums are simple error-detection techniques that involve calculating a checksum value from the
data. The receiver recalculates the checksum and compares it with the received checksum to detect errors.
Checksums are less reliable than ARQ or FEC but are computationally efficient.
❖
SIMILARITIES OF ACCESS TECHNIQUES, RANDOM ACCESS
METHODS, ERROR CONTROL SCHEMES FOR LINK LAYER…
❖
Link Layer Scope: All three concepts—access techniques, random access methods, and error control schemes—operate
at the link layer of the network protocol stack. They primarily deal with the communication between adjacent nodes or
devices in a network.
❖
Enhance Efficiency: Access techniques, random access methods, and error control schemes aim to improve the
efficiency of data transmission. They strive to maximize the utilization of the available bandwidth, minimize collisions
or errors, and optimize the overall performance of the link.
❖
Impact on Data Transmission: All three mechanisms directly influence the process of transmitting data over a link.
Access techniques determine how multiple devices or users’ access and share the medium. Random access methods
control the timing and protocol for devices to transmit data. Error control schemes detect and handle errors to ensure
reliable data delivery.
SIMILARITIES OF ACCESS TECHNIQUES, RANDOM ACCESS
METHODS, ERROR CONTROL SCHEMES FOR LINK LAYER…
❖
Protocol Implementation: Access techniques, random access methods, and error control schemes require specific
protocols and algorithms to be implemented at the link layer. These protocols define the rules, procedures, and signaling
mechanisms necessary for successful communication.
❖
Trade-offs and Performance: Each of these concepts involves trade-offs and considerations related to performance. Access
techniques and random-access methods often trade off fairness, latency, and throughput to achieve optimal utilization of
the medium. Similarly, error control schemes balance the overhead of error detection and correction against the reliability
of data transmission.
❖
Interaction with Higher Layers: While primarily operating at the link layer, access techniques, random access methods, and
error control schemes can also interact with higher layers of the network protocol stack. For example, they may influence
flow control, congestion control, and packet retransmission strategies implemented at higher layers to ensure end-to-end
reliability.
DIFFERENCES OF ACCESS TECHNIQUES, RANDOM ACCESS
METHODS, ERROR CONTROL SCHEMES FOR LINK LAYER
RANDOM ACCESS
METHOD
…
PROPERTIES
ACCESS TECHNIQUES
ERROR CONTROL
SCHEME FOR LINK LAYER
DEFINITION
These are techniques Are a subset of access
which determine how techniques.
devices or users share
communication
medium.
These scheme focuses
on ensuring reliable
data transmission over
a link.
EXAMPLES
Examples include
contention based
access, controlled
access, and polling.
Examples include
ALOHA, CSMA, and
CSMA/CA.
Examples include error
detection techniques
and error correction
techniques (e.g. ARQ
and FEC)
CONTROL MECHANISM
Employ a control
mechanism to
manage the shared
medium.
Do not rely on a
central control
mechanism.
These use protocols and
algorithms to manage
error detection and
correction
DIFFERENCES OF ACCESS TECHNIQUES, RANDOM ACCESS
METHODS, ERROR CONTROL SCHEMES FOR LINK LAYER
PROPERTIES
ACCESS TECHNIQUES
RANDOM ACCESS
METHODS
ERROR CONTROL
SCHEME FOR LINK
LAYER
MEDIUM SHARING
Determine how multiple
devices share the
available bandwidth.
Allow devices to
contend for the medium
and transmit when
available
Do not directly
influence medium
sharing but focus on
data integrity during
transmission.
COLLISION HANDLING
Access techniques such as
CSMA/CD and CSMA/CA
incorporate collision
handling mechanism.
Random access
methods like ALOHA and
CSMA, have collision
detection and
avoidance.
Error control scheme
particularly ARQ
protocols, handle
retransmission in
case of collision or
errors.
Download