Telecommunication Systems

Network Access Control Techniques

Access control methods are required in a network to ensure that only one user of the network is able to transmit at any one time.

In ring-based local area networks (LANs), two commonly employed techniques are:

  • Token passing
  • Slot passing

Token Passing

In this technique, a token i.e. a special bit pattern, is circulated. When a station wishes to transmit, it waits until it receives the token, and then transmits the data with the token attached to its end. Another station that wishes to transmit removes the token from the package of data and transmits its own data with the token attached to its end.

Slot Passing                  

This technique involves empty slots being circulated. When a station wishes to transmit data it deposits it in the first empty slot that comes along.

Network Access Control Techniques

In bus or tree networks a technique that is frequently employed is:

Carrier Sense Multiple Access with Collision Detection (CSMA/CD)

With CSMA/CD technique, stations have to listen for other transmissions before transmitting, with any station being able to gain control of the network and transmit, hence the term multiple access. If no activity is detected then transmission can occur. If there is an activity, then the system has to wait until it can detect no further activity. Even with this listening before transmitting, it is still possible for two or more systems to start to transmit at the same time. If such a condition is detected, both stations cease submitting and wait a random time before attempting to transmit again. This method is commonly associated with Ethernet LAN bus.

Related: Topological Network Structures used in Fieldbus Systems

John Mulindi

John Mulindi is an Industrial Instrumentation and Control Professional with a wide range of experience in electrical and electronics, process measurement, control systems and automation. In free time he spends time reading, taking adventure walks and watching football.

View Comments

Recent Posts

Smart Home Devices and Embedded Systems: What Instrumentation Engineers Should Know

Image source: Pexels Smart homes are no longer futuristic. They are already here, changing how…

1 week ago

Thyristor Power Converters: Function, Applications, Advantages & Disadvantages

Thyristors are semiconductor devices that tend to stay ‘ON’ once turned ON, and tend to…

1 week ago

The Future of Telecommunications: How 6G and IoT Are Redefining Connectivity

Image source: Freepik Introduction: The Evolution of Connectivity Telecommunications have come a long way since…

2 weeks ago

Precision Control in Industrial Heating: How Advanced Induction Systems Enhance Efficiency

Modern manufacturing demands smarter heat treatment. Specifically, factories seek greater precision, energy efficiency, and automation.…

2 weeks ago

Control Architectures for Smart EV Charging: Meeting NEC 2023, Demand Response, and Safety Standards

An Expert’s Guide to EV Load Management and NEC Compliance Smart EV charging control architectures…

1 month ago

How Residential Battery Backup Protects Your Home During Power Outages

Frequent power failures due to severe storms, aging grid infrastructure, and other unpredictable natural disasters…

1 month ago