Chapter 12
Multiple Access
12.1
, Figure 12.1 Data link layer divided into two functionality-oriented sublayers
12.2
, Figure 12.2 Taxonomy of multiple-access protocols discussed in this chapter
12.3
, 12-1 RANDOM ACCESS
In random access or contention methods, no station is
superior to another station and none is assigned the
control over another. No station permits, or does not
permit, another station to send. At each instance, a
station that has data to send uses a procedure defined
by the protocol to make a decision on whether or not to
send.
Topics discussed in this section:
ALOHA
Carrier Sense Multiple Access
Carrier Sense Multiple Access with Collision Detection
Carrier Sense Multiple Access with Collision Avoidance
12.4
Multiple Access
12.1
, Figure 12.1 Data link layer divided into two functionality-oriented sublayers
12.2
, Figure 12.2 Taxonomy of multiple-access protocols discussed in this chapter
12.3
, 12-1 RANDOM ACCESS
In random access or contention methods, no station is
superior to another station and none is assigned the
control over another. No station permits, or does not
permit, another station to send. At each instance, a
station that has data to send uses a procedure defined
by the protocol to make a decision on whether or not to
send.
Topics discussed in this section:
ALOHA
Carrier Sense Multiple Access
Carrier Sense Multiple Access with Collision Detection
Carrier Sense Multiple Access with Collision Avoidance
12.4