Found 1301 Articles for MCA

Resilient Packet Ring (RPR) - IEEE 802.17

Moumita
Updated on 30-Jul-2019 22:30:26

2K+ Views

Resilient Packet Ring (RPR), standardized as IEEE 802.17, is a protocol standard for data transmission over fiber optic ring networks, that operates in the Media Access Control (MAC) layer of the Open Systems Interconnection (OSI) model. It provides a packet based transmission facility, with the aim of improving efficiency of Ethernet and IP services. RPR provides improved bandwidth utilization and throughput, greater speed of deployment, and optimized equipment and operational costs.Working PrincipleThe stations in a RPR are connected by dual counter rotating fiber optic rings called ringlets. Transmission occurs along both the rings. This helps to utilize the total available ... Read More

Fiber Distributed Data Interface (FDDI)

Moumita
Updated on 22-Oct-2023 02:28:04

26K+ Views

Fiber Distributed Data Interface (FDDI) is a set of ANSI and ISO standards for transmission of data in local area network (LAN) over fiber optic cables. It is applicable in large LANs that can extend up to 200 kilometers in diameter. Features FDDI uses optical fiber as its physical medium. It operates in the physical and medium access control (MAC layer) of the Open Systems Interconnection (OSI) network model. It provides high ... Read More

Token Bus and Token Ring

Moumita
Updated on 30-Jul-2019 22:30:26

23K+ Views

Token RingToken ring (IEEE 802.5) is a communication protocol in a local area network (LAN) where all stations are connected in a ring topology and pass one or more tokens for channel acquisition. A token is a special frame of 3 bytes that circulates along the ring of stations. A station can send data frames only if it holds a token. The tokens are released on successful receipt of the data frame.Token Passing Mechanism in Token RingIf a station has a frame to transmit when it receives a token, it sends the frame and then passes the token to the ... Read More

Token Bus (IEEE 802.4) Network

Moumita
Updated on 30-Jul-2019 22:30:26

5K+ Views

Token Bus (IEEE 802.4) is a standard for implementing token ring over the virtual ring in LANs. The physical media has a bus or a tree topology and uses coaxial cables. A virtual ring is created with the nodes/stations and the token is passed from one node to the next in a sequence along this virtual ring. Each node knows the address of its preceding station and its succeeding station. A station can only transmit data when it has the token. The working principle of the token bus is similar to Token Ring.Token Passing Mechanism in Token BusA token is ... Read More

Token Passing in Bit-Map Protocol

Vikyath Ram
Updated on 30-Jul-2019 22:30:26

2K+ Views

Bit-map protocol is a collision free protocol that operates in the Medium Access Control (MAC) layer of the OSI model. It resolves any possibility of collisions while multiple stations are contending for acquiring a shared channel for transmission. In this protocol, if a station wishes to transmit, it broadcasts itself before the actual transmission. Every station gets its turn for transmission in a predefined order. A method to accomplish this is to use the method of token passing.Token Passing MechanismA token is a small message that circulates among the stations of a computer network providing permission to the stations for ... Read More

What is RSVP (Resource Reservation Protocol)?

Rishi Raj
Updated on 30-Jul-2019 22:30:26

6K+ Views

RSVP is a transport layer protocol that is used to reserve resources in a computer network to get different quality of services (QoS) while accessing Internet applications. It operates over Internet protocol (IP) and initiates resource reservations from the receiver’s end.FeaturesRSVP is a receiver oriented signalling protocol. The receiver initiates and maintains resource reservation.It is used both for unicasting (sending data from one source to one destination) and multicasting (sending data simultaneously to a group of destination computers).RSVP supports dynamic automatic adaptation to changes in network.It provides a number of reservation styles. It also provides support for addition of future ... Read More

Reservation Protocols in Computer Network

Arushi
Updated on 30-Jul-2019 22:30:26

4K+ Views

Reservation protocols are the class of protocols in which the stations wishing to transmit data broadcast themselves before actual transmission. These protocols operate in the medium access control (MAC) layer and transport layer of the OSI model.In these protocols, there is a contention period prior to transmission. In the contention period, each station broadcasts its desire for transmission. Once each station announces itself, one of them gets the desired network resources based upon any agreed criteria. Since each station has complete knowledge whether every other station wants to transmit or not before actual transmission, all possibilities of collisions are eliminated.Examples ... Read More

Bit-Map Protocol

Vikyath Ram
Updated on 30-Jul-2019 22:30:26

3K+ Views

Bit-map protocol is a collision free protocol that operates in the Medium Access Control (MAC) layer of the OSI model. It resolves any possibility of collisions while multiple stations are contending for acquiring a shared channel for transmission.In this protocol, if a station wishes to transmit, it broadcasts itself before the actual transmission. This is an example of Reservation Protocol.Working PrincipleIn this protocol, the contention period is divided into N slots, where N is the total number of stations sharing the channel. If a station has a frame to send, it sets the corresponding bit in the slot.Suppose that there ... Read More

Collision-Free Protocols

Arushi
Updated on 30-Jul-2019 22:30:26

13K+ Views

In computer networks, when more than one station tries to transmit simultaneously via a shared channel, the transmitted data is garbled. This event is called collision. The Medium Access Control (MAC) layer of the OSI model is responsible for handling collision of frames. Collision – free protocols are devised so that collisions do not occur. Protocols like CSMA/CD and CSMA/CA nullifies the possibility of collisions once the transmission channel is acquired by any station. However, collision can still occur during the contention period if more than one stations starts to transmit at the same time. Collision – free protocols resolves ... Read More

Multi-access Channels and Random Access Channels

Vikyath Ram
Updated on 30-Jul-2019 22:30:26

750 Views

Multi-access ChannelsMulti-access channels are network channels that allow several transmitters to communicate with a common receiver via a shared channel. These channels are also called multiple access (MAC) channels. The network channel may be a single cable or optical fiber connecting multiple nodes, or a portion of the wireless spectrum.Random Access ChannelsRandom-access channels (RACH) are shared channels used in wireless communication systems to allow mobile devices for call set-up. RACH also handles bursty data transmission. RACH is popularly used by GSM mobiles for transmission over cellular networks.Multiple Access SchemesBoth multi-access channels and random access channels require a scheme to allow ... Read More

Advertisements