Virtual Time Carrier Sensed Multiple Access (VTCSMA) is used mostly in hard real-time system. It is used in transferring signals simultaneously and efficiently in a real-time system for avoiding a collision. In a real-time system, CSMA can not be used but Virtual Time CSMA can be used for signal transfer.
Every node in VTCSMA uses 2 types of clocks:
- Virtual Clock called as VC: RC shows the real time which is synchronized for all the nodes.
- Real Clock called as RC: VC is different for different nodes in the system.
The rate of VC is greater than the RC.
- If a node senses the communication channel to be busy, then the Virtual Clock or VC freezes and stops.
- If a node senses the communication channel to be free, the Virtual Clock of VC is reset.
Every node in the system decides a time, VSX(M) (virtual time to start transmission of message M) for the transmission of a message M. If VSX(m) <= VC, then the transmission signal is sent by the node and does not transfer otherwise.
If many nodes transfer the message signal at the same time, then collision may occur. If a collision occurs while transferring the signal, then the next signal is transmitted using the probability of p or (1-p) after the channel is idle.
Flow Diagram of Virtual Carrier Sensed Multiple Access:
The basic idea of using Virtual Time CSMA instead of CSMA is to incorporate the priority to the nodes or devices in the real-time system. Global ordering of priorities can be achieved using a priority function of the current time RC and VC and some other parameters, which makes Virtual Time CSMA better and efficient as compared to that of CSMA.
VTCSMA is generally used in the Broadcast network.
Attention reader! Don’t stop learning now. Get hold of all the important DSA concepts with the DSA Self Paced Course at a student-friendly price and become industry ready.
- Carrier Sense Multiple Access (CSMA)
- Multiple Access with Collision Avoidance (MACA)
- Multiple Access Protocols in Computer Network
- Java | CDMA (Code Division Multiple Access)
- Time based Access-List
- Virtual LAN (VLAN)
- Types of Virtual LAN (VLAN)
- Virtual Circuit in Computer Network
- Access Networks
- Access-Lists (ACL)
- Differences between Virtual Circuits and Datagram Networks
- Difference Between Virtual Private Network (VPN) and Proxy
- Types of Virtual Private Network (VPN) and its Protocols
- Standard Access-List
- Wifi protected access (WPA)
- Extended Access-List
- Access and trunk ports
- Reflexive Access-List
- Role-based Access Control
- Access Control in Computer Network
If you like GeeksforGeeks and would like to contribute, you can also write an article using contribute.geeksforgeeks.org or mail your article to firstname.lastname@example.org. See your article appearing on the GeeksforGeeks main page and help other Geeks.
Please Improve this article if you find anything incorrect by clicking on the "Improve Article" button below.