Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Overview
An accessing method is used to process the data transfer onto the network cable and also receiving the data from the cable. It prevents the simultaneous access of the cable. It has two commonly used methods - Carrier-Sense Multiple Access with Collision Detection (CSMA/CD) and Carrier-Sense Multiple Access with Collision Avoidance (CSMA/CA). Data transmission, whether analog or digital, may also be characterized by the direction in which the signals travel over the media. The different data transmissions can be divided into Simplex, Half duplex and Full Duplex. Messages that are sent from one device to another can be divided into three types also. A unicast address is an address that represents a single interface on a device. It would be a communication between a single sender and a single receiver on the network. A multicast address would represent multiple devices and are useful when the same data needs to be sent to a group of devices that meet some specific criteria. A broadcast address is used to send the information from one source to all systems on the LAN.
Introduction
In this lesson, the different types of accessing methods, communication methods and messaging types are discussed. The accessing method is used to process the data transfer onto the network cable and receiving the data from the cable and also prevents simultaneous access of the cable. It has two commonly used methods - Carrier-Sense Multiple Access with Collision Detection (CSMA/CD) and Carrier-Sense Multiple Access with Collision Avoidance (CSMA/CA). In communication modes, there are three types of which the two devices communicate with each other through network. The messaging types are used to send the messages to multiple recipients. A protocol which is connectionless can send broadcast or multicast messages and unicast messages. A protocol which is connection-oriented can only use unicast messaging type because the connection exists between a specific pair of hosts.
data transfer onto the network cable and receiving the data from the cable. Access methods should be consistent in handling the data. If different computers use different access methods, the network might fail. Access methods prevent simultaneous access of the cable. The two of the commonly used access methods are:
Carrier-Sense Multiple Access with Collision Detection (CSMA/CD) Carrier-Sense Multiple Access with Collision Avoidance (CSMA/CA)
CSMA/CD is a type of contention protocol which defines the response when a collision is detected, or when two devices attempt to transmit packages simultaneously. Ethernet allows each device to send messages at any time without having to wait for network permission. Thus, there is a high possibility that devices may try to send messages at the same time. In order to manage collisions Ethernet uses Carrier Sense Multiple Access/Collision Detection (CSMA/CD). If two devices transmit the data simultaneously on the network, a collision occurs and each computer backs off and waits a random amount of time. When the collision occurs, both the data packets are discarded and the systems must retransmit the data.
Carrier Sense Multiple Access/Collision Avoidance is the medium access control method which is used in wireless networks. The wireless networks make use of collision avoidance which is used in wired systems such as IEEE 802.3 and Ethernet. It is a protocol for carrier transmission which prevents collisions in advance. When a node receives a packet that is to be sent, it checks the channel for clearance and that no other node is transmitting at the time. If the channel is clear, then the packet is sent otherwise, the node waits for a randomly chosen period of time, and then checks again to see if the channel is clear. This period of time is called the backoff factor, and is counted down by a backoff counter. If the channel is clear when the backoff counter reaches zero, the node transmits the packet. If the channel is not clear, the backoff factor is set again and the process is repeated.
The mechanism of a Token Ring local area network is called token passing. Token passing is considered as the most efficient MAC mechanism since it provides each system on the network with an equal opportunity to transmit its data without generating any collisions and diminished performance at high traffic levels. The mechanism of token passing works by circulating a special packet called a token around the network. The length of the token is of 3-bytes long and contains no useful data. The main function of the token is to designate which system on the network is allowed to transmit the data. When the computers are in inactive state, on a token ring network is called as repeat mode. When the packets are not received, the ring is effectively broken and the network communication stops.
devices in a network communicate with each other. There are three different modes of communication. They are:
In this mode of communication, the network cable or the communication channel can transfer data in only one direction. Simplex communication is a permanent unidirectional communication. For example, the Mainframe computers communicate with the printer in simplex mode. The printer just sends the data and the print command to the printer. The Computer (sender) is not aware of whether the printer is ready for printing or if there are any errors while printing etc. In this mode of communication the sender is not aware of the receivers status.
10
The half duplex mode communication can send the data in both directions but not simultaneously. It can either use the communication channel to send the data or the same channel can be used to receive the data at a time. In this mode of operation, the receiver detects the error in the data and asks the transmitter to send the corrupted data again. Walkie-talkies and CB radios are best examples of half duplex communication where you will not be able to hear the other persons conversation currently. A single network cable between any two devices can be considered as the best example for this mode of communication.
11
The full duplex communication permits data to be sent and received by the same communication channel simultaneously. The full duplex communication can be compared to a two way bridge on a two lane highway. Telephone is the best example of full duplex communication where both the sender and the receiver can talk simultaneously. The user can use the cable connection not only for receiving signals for television but the same cable can be used for surfing the internet and telephone connectivity.
12
of tasks which is undertaken in order to successfully transmit the data from one place to another. There are three different kinds of messages which have to be sent from one device to another through network. They are:
13
Unicast
Unicast is the communication between a single sender and a single receiver through the network. The unicast messages are sent from a single source to a specified destination on LANs within the Internet. The local area network and the IP networks maintain unicast transfer mode and most users are familiar with the standard unicast applications like HTTP, SMTP, FTP and telnet employ the TCP transport protocol.
14
Multicast is the delivery of information to a group of destination system simultaneously using the most efficient strategy to deliver the messages over each link of the network. The multicast system communicates where the information is sent from one or more points to a set of other points. In this case, there may be more than one senders and the information is distributed to a set of receivers. Multicasting is the networking technique of delivering the same packet simultaneously to a group of destination systems. Multicast Messages are sent to a group of stations which meets a particular set of criteria. These stations are usually related to each other such as serving a common function, or being set up into a particular multicast group.
15
Broadcast is used to send the information from one source to multiple systems. One sender sends the information to all connected receivers. Broadcast transmission is supported on most LANs and can be used to send messages to all computers on the LAN. The Network layer protocols also support a form of broadcast which allows the same packet to be sent to every system in a logical network. The messages are sent to every device on a network. They are used when the information actually communicates to every system on the network, or it is also used when the sending station needs to send to just one recipient, but the address is not recognized.
16
Summary
An access method is defined as a set of rules which processes of the data transfer onto the network cable and receiving the data from the cable. The communication modes refer to the manner in which the two devices in a network communicate with each other. There are three different modes of communication. They are:
Simplex Communication Half Duplex Communication Duplex Communication
The messaging types are of different types which have to be sent from one device to another through network. They are:
Unicast Broadcast Multicast
Understanding Network Basics
17