Almost collisions can be avoided in CSMA/CD.they can still occur during the contention period.the collision during contention period adversely affects the system performance, this happens when the cable is long and length of packet are short. This problem becomes serious as fiber optics network come into use. Here we shall discuss some protocols that resolve the collision during the contention period.
- Bit-map Protocol
- Binary Countdown
- Limited Contention Protocols
- The Adaptive Tree Walk Protocol
Pure and slotted Aloha, CSMA and CSMA/CD are Contention based Protocols:
- Try-if collide-Retry
- No guarantee of performance
- What happen if the network load is high?
- Pay constant overhead to achieve performance guarantee
- Good when network load is high
- Collision based protocols (pure and slotted ALOHA, CSMA/CD) are good when the network load is low.
- Collision free protocols (bitmap, binary Countdown) are good when load is high.
- How about combining their advantages
- Behave like the ALOHA scheme under light load
- Behave like the bitmap scheme under heavy load.
- partition the group of station and limit the contention for each slot.
- Under light load, everyone can try for each slot like aloha
- Under heavy load, only a group can try for each slot
- How do we do it:
- treat every stations as the leaf of a binary tree
- first slot (after successful transmission), all stations
can try to get the slot(under the root node).
- if no conflict, fine
- in case of conflict, only nodes under a subtree get to try for the next one. (depth first search)
- Slot-0: C*, E*, F*, H* (all nodes under node 0 can try which are going to send), conflict
- Slot-1: C* (all nodes under node 1can try}, C sends
- Slot-2: E*, F*, H*(all nodes under node 2 can try}, conflict
- Slot-3: E*, F* (all nodes under node 5 can try to send), conflict
- Slot-4: E* (all nodes under E can try), E sends
- Slot-5: F* (all nodes under F can try), F sends
- Slot-6: H* (all nodes under node 6 can try to send), H sends.
- Routing v/s Routed Protocols in Computer Network
- Multiple Access Protocols in Computer Network
- Controlled Access Protocols in Computer Network
- Network Protocols
- Types of Virtual Private Network (VPN) and its Protocols
- Basic Network Attacks in Computer Network
- Unicode in Computer Network
- WiMax in Computer Network
- Bit Stuffing in Computer Network
- EtherChannel in Computer Network
- Elements of Computer Network
- Functionality of Computer Network
- Socket in Computer Network
- Authentication in Computer Network
- Delays in Computer Network
- Servers in Computer Network
- Buffering in Computer Network
- MAC Filtering in Computer Network
- Multicasting in Computer Network
- Redistribution in Computer Network
Collision Free Protocols:
1. Bit-map Protocol:
Bit map protocol is collision free Protocol in In bitmap protocol method, each contention period consists of exactly N slots. if any station has to send frame, then it transmits a 1 bit in the respective slot. For example if station 2 has a frame to send, it transmits a 1 bit during the second slot.
In general Station 1 Announce the fact that it has a frame questions by inserting a 1 bit into slot 1. In this way, each station has complete knowledge of which station wishes to transmit. There will never be any collisions because everyone agrees on who goes next. Protocols like this in which the desire to transmit is broadcasting for the actual transmission are called Reservation Protocols.
For analyzing the performance of this protocol, We will measure time in units of the contention bits slot, with a data frame consisting of d time units. Under low load conditions, the bitmap will simply be repeated over and over, for lack of data frames.All the stations have something to send all the time at high load, the N bit contention period is prorated over N frames, yielding an overhead of only 1 bit per frame.
Generally, high numbered stations have to wait for half a scan before starting to transmit low numbered stations have to wait for half a scan(N/2 bit slots) before starting to transmit, low numbered stations have to wait on an average 1.5 N slots.
2. Binary Countdown:
Binary countdown protocol is used to overcome the overhead 1 bit per binary station. In binary countdown, binary station addresses are used. A station wanting to use the channel broadcast its address as binary bit string starting with the high order bit. All addresses are assumed of the same length. Here, we will see the example to illustrate the working of the binary countdown.
In this method, different station addresses are ORed together who decide the priority of transmitting. If these stations 0001, 1001, 1100, 1011 all are trying to seize the channel for transmission. All the station at first broadcast their most significant address bit that is 0, 1, 1, 1 respectively. The most significant bits are ORed together. Station 0001 see the 1MSB in another station addresses and knows that a higher numbered station is competing for the channel, so it gives up for the current round.
Other three stations 1001, 1100, 1011 continue. The next bit is 1 at station 1100, swiss station 1011 and 1001 give up. Then station 110 starts transmitting a frame, after which another bidding cycle starts.
Limited Contention Protocols:
Adaptive Tree Walk Protocol:
Don’t stop now and take your learning to the next level. Learn all the important concepts of Data Structures and Algorithms with the help of the most trusted course: DSA Self Paced. Become industry ready at a student-friendly price.
If you like GeeksforGeeks and would like to contribute, you can also write an article using contribute.geeksforgeeks.org or mail your article to firstname.lastname@example.org. See your article appearing on the GeeksforGeeks main page and help other Geeks.
Please Improve this article if you find anything incorrect by clicking on the "Improve Article" button below.