Page 78 - Intelligent Communication Systems
P. 78

CHAPTER 7 / NEWLY DEVELOPED TELECOMMUNICATION  SERVICES  6 1
            CSMA/CD is carried out in the following  sequence.
            (1)  Sending a frame: Using a carrier detection technique, each node monitors
        the transmission  medium.  If a carrier  is detected and another  node  is  sending  a
        frame,  the first node must wait until the transmission medium is idle. When  the
        transmission  medium becomes  idle, any node can issue its frame into the medium
        after waiting for the time slot in which a minimum frame is transmitted. If no col-
        lision occurs during the transmission, the node finishes the sending operation and
        waits for the next request to send a frame.
            (2)  Collision detection and recovery: When a node issues a frame,  it tries to
        detect a collision. When a collision is detected, it immediately  stops sending, issues
        a jam  signal to the transmission medium, and informs  it of the occurrence  of the
        collision. After  stopping its operation, it backs off and waits a while before trying
        to reissue the frame. The waiting time is determined by the Mh power of 2, where
        N  is  the  number of  the  collision.  This is  called  the  binary  exponential  back-off
        method.
            (3)  Recovering a frame: The receiving operation  starts with the detection of
        a start frame  delimiter by getting  the preamble  of the frame.  The operation  ends
        after  checking the frame address, frame length, and frame check sequence (PCS),

            CSMA/CD is a well-known method that gives efficient  and effective  trans-
        mission when traffic  is scarce. That is, when the number of source nodes is small,
        high-speed transmission is possible because full  use is made of the transmission
        network.
            When  traffic  is heavy, that is, when it occupies  more than 70-80% of trans-
        mission  capacity, performance decreases  substantially because  of collision  of the
        frames.  This  makes it is  difficult  to predict  the  completion  time  for  the frame's
        transmission. This defect of CSMA/CD makes it inappropriate for applications such
        as production  management  and real-time  control  of a factory. However, it is good
        for  the intraoffice  environment where requirements are not severe.

        7.6.5 Token Ring Protocol

        In the token ring method, a token is circulated through the network. A source node
        gets the right to transmit a frame once it acquires the token. A node that has a frame to
        transmit waits to acquire the token, at which time it begins to transmit the frame. It
        releases  the token back  into the network after  finishing  the transmission.  As the
        right to transmit a frame  is moved from one node to another in the token ring, no
        conflicts among nodes can occur. Therefore, performance is very high when traffic
        is heavy in the network. The token ring  method  is divided  into two submethods
        depending on the network topology.
           (1)  Token ring method: This is applied  to the ring network.
           (2)  Token bus method: This is applied to the bus network. Since a bus
              network is not a ring topology, a logical ring is constructed and a token is
              circulated  in the logical ring network.
   73   74   75   76   77   78   79   80   81   82   83