SlideShare a Scribd company logo
MEDIA ACCESS METHODS An access method is a set of rules governing how the network nodes share the transmission medium. The rules for sharing among computers are similar to the rules for sharing among humans in that they both boil down to a pair of fundamental philosophies: 1) first come, first served and 2) take turns. These philosophies are the principles defining the three most important types of media access methods: Contention.  (CSMA/CD  Carrier Sense Multiple Access with Collision Detection ,   CSMA/CA  Carrier Sense Multiple Access with Collision Avoidance ) Token passing.   Demand Priority.
Contention Competition for resources. The term is used specially to describe the situation where two or more nodes attempt to transmit message across the same wire at the same time.
MEDIA ACCESS METHODS CSMA/CD  Carrier Sense Multiple Access with Collision Detection CSMA/CA  Carrier Sense Multiple Access with Collision Avoidance Contention . (“listen before talking”)
MEDIA ACCESS METHODS Token passing  :-  IEEE 802.5 standard deals with Token Ring networks Token passing is implemented on a token-ring network.
MEDIA ACCESS METHODS Demand Priority. Demand priority is an access method used with the new 100Mbps 100VG-AnyLAN standard. Although demand priority is officially considered a contention-based access method, demand priority is considerably different from the basic CSMA/CD Ethernet. In demand priority, network nodes are connected to hubs, and those hubs are connected to other hubs. Contention, therefore, occurs at the hub. (100VG-AnyLAN cables can actually send and receive data at the same time.) Demand priority provides a mechanism for prioritizing data types. If contention occurs, data with a higher priority takes precedence.

More Related Content

PPT
Data Link Layer| Error Detection
PPT
Circuit switched network in Optical Fiber Communication
PPTX
Controlled Access Protocols
PPTX
Flow Control.pptx
PDF
Error detection & correction codes
PPTX
Secure Socket Layer (SSL)
PPTX
Simplex stop and_wait_protocol
PPTX
Hash Function
Data Link Layer| Error Detection
Circuit switched network in Optical Fiber Communication
Controlled Access Protocols
Flow Control.pptx
Error detection & correction codes
Secure Socket Layer (SSL)
Simplex stop and_wait_protocol
Hash Function

What's hot (20)

PPTX
unit 4.pptx of hash function in cryptography
PPT
MULTIPLE ACCESS PROTOCOL COMPUTER NETWORKS
PPTX
Multiple Access Protocal
PPTX
Media Access Control (MAC Layer)
PPTX
Public Key Cryptosystem
PPT
Unit 5 Application Layer
PPT
Sliding window protocol
PPTX
The medium access sublayer
PDF
Data Communication and Network chapter 1- introduction
PPTX
Hash Function
PPTX
Multicast routing
PPT
Secure Socket Layer
PPTX
Multicast routing protocols in adhoc networks
PPTX
Point to-point protocol (ppp)
PPT
Framming data link layer
PPTX
Data Link Control
PPTX
Congestion control
PPT
Traditional symmetric-key cipher
PDF
Ooad( class diagram)
PPTX
Distance Vector Routing
unit 4.pptx of hash function in cryptography
MULTIPLE ACCESS PROTOCOL COMPUTER NETWORKS
Multiple Access Protocal
Media Access Control (MAC Layer)
Public Key Cryptosystem
Unit 5 Application Layer
Sliding window protocol
The medium access sublayer
Data Communication and Network chapter 1- introduction
Hash Function
Multicast routing
Secure Socket Layer
Multicast routing protocols in adhoc networks
Point to-point protocol (ppp)
Framming data link layer
Data Link Control
Congestion control
Traditional symmetric-key cipher
Ooad( class diagram)
Distance Vector Routing
Ad

Similar to Media Access Methods (20)

PDF
Introduction to networking
PPTX
M.A.C (Medium Access Control)
PPSX
Multiple Access Control Protocol (MAC Protocol) Networking
PPTX
The mac layer
PDF
Wired Lan Ethernet - DATA Link Layer
PDF
PPT
Networking and Data Communications
PDF
Multiple Access in Computer Network
PPTX
Multiole acccess
PPT
Media Access and Internetworking
PPTX
Mac protocols
PPT
Lan access control methods
PPT
04 - Networking Technologies.ppt
PPTX
datalinklayer-200201062315 (1).pptx
PPTX
Distributed os
PPT
medium access tcpip network layer data link layer
PPTX
Demand assigned and packet reservation multiple access
PDF
ShortPaper
Introduction to networking
M.A.C (Medium Access Control)
Multiple Access Control Protocol (MAC Protocol) Networking
The mac layer
Wired Lan Ethernet - DATA Link Layer
Networking and Data Communications
Multiple Access in Computer Network
Multiole acccess
Media Access and Internetworking
Mac protocols
Lan access control methods
04 - Networking Technologies.ppt
datalinklayer-200201062315 (1).pptx
Distributed os
medium access tcpip network layer data link layer
Demand assigned and packet reservation multiple access
ShortPaper
Ad

Recently uploaded (20)

PDF
Sales and Distribution Managemnjnfijient.pdf
PDF
Prostaglandin E2.pdf orthoodontics op kharbanda
PPTX
Cerebral_Palsy_Detailed_Presentation.pptx
PPTX
E-Commerce____Intermediate_Presentation.pptx
PDF
Why Today’s Brands Need ORM & SEO Specialists More Than Ever.pdf
PDF
APNCET2025RESULT Result Result 2025 2025
PPTX
The Stock at arrangement the stock and product.pptx
PDF
Manager Resume for R, CL & Applying Online.pdf
PPTX
Surgical thesis protocol formation ppt.pptx
PPTX
退学买新西兰毕业证(WelTec毕业证书)惠灵顿理工学院毕业证国外证书制作
PDF
Understanding the Rhetorical Situation Presentation in Blue Orange Muted Il_2...
PPTX
1751884730-Visual Basic -Unitj CS B.pptx
DOCX
How to Become a Criminal Profiler or Behavioural Analyst.docx
DOCX
mcsp232projectguidelinesjan2023 (1).docx
PPTX
microtomy kkk. presenting to cryst in gl
PPTX
_+✅+JANUARY+2025+MONTHLY+CA.pptx current affairs
PPTX
Prokaryotes v Eukaryotes PowerPoint.pptx
PPTX
OnePlus 13R – ⚡ All-Rounder King Performance: Snapdragon 8 Gen 3 – same as iQ...
PDF
Biography of Mohammad Anamul Haque Nayan
PDF
esg-supply-chain-webinar-nov2018hkhkkh.pdf
Sales and Distribution Managemnjnfijient.pdf
Prostaglandin E2.pdf orthoodontics op kharbanda
Cerebral_Palsy_Detailed_Presentation.pptx
E-Commerce____Intermediate_Presentation.pptx
Why Today’s Brands Need ORM & SEO Specialists More Than Ever.pdf
APNCET2025RESULT Result Result 2025 2025
The Stock at arrangement the stock and product.pptx
Manager Resume for R, CL & Applying Online.pdf
Surgical thesis protocol formation ppt.pptx
退学买新西兰毕业证(WelTec毕业证书)惠灵顿理工学院毕业证国外证书制作
Understanding the Rhetorical Situation Presentation in Blue Orange Muted Il_2...
1751884730-Visual Basic -Unitj CS B.pptx
How to Become a Criminal Profiler or Behavioural Analyst.docx
mcsp232projectguidelinesjan2023 (1).docx
microtomy kkk. presenting to cryst in gl
_+✅+JANUARY+2025+MONTHLY+CA.pptx current affairs
Prokaryotes v Eukaryotes PowerPoint.pptx
OnePlus 13R – ⚡ All-Rounder King Performance: Snapdragon 8 Gen 3 – same as iQ...
Biography of Mohammad Anamul Haque Nayan
esg-supply-chain-webinar-nov2018hkhkkh.pdf

Media Access Methods

  • 1. MEDIA ACCESS METHODS An access method is a set of rules governing how the network nodes share the transmission medium. The rules for sharing among computers are similar to the rules for sharing among humans in that they both boil down to a pair of fundamental philosophies: 1) first come, first served and 2) take turns. These philosophies are the principles defining the three most important types of media access methods: Contention. (CSMA/CD Carrier Sense Multiple Access with Collision Detection , CSMA/CA Carrier Sense Multiple Access with Collision Avoidance ) Token passing. Demand Priority.
  • 2. Contention Competition for resources. The term is used specially to describe the situation where two or more nodes attempt to transmit message across the same wire at the same time.
  • 3. MEDIA ACCESS METHODS CSMA/CD Carrier Sense Multiple Access with Collision Detection CSMA/CA Carrier Sense Multiple Access with Collision Avoidance Contention . (“listen before talking”)
  • 4. MEDIA ACCESS METHODS Token passing :- IEEE 802.5 standard deals with Token Ring networks Token passing is implemented on a token-ring network.
  • 5. MEDIA ACCESS METHODS Demand Priority. Demand priority is an access method used with the new 100Mbps 100VG-AnyLAN standard. Although demand priority is officially considered a contention-based access method, demand priority is considerably different from the basic CSMA/CD Ethernet. In demand priority, network nodes are connected to hubs, and those hubs are connected to other hubs. Contention, therefore, occurs at the hub. (100VG-AnyLAN cables can actually send and receive data at the same time.) Demand priority provides a mechanism for prioritizing data types. If contention occurs, data with a higher priority takes precedence.