Chapter 13 Multiple Access.

Slides:



Advertisements
Similar presentations
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Advertisements

Multiple access What if multiple machines are sharing the same link?
Multiple Access Methods. When nodes or stations are connected and use a common link (cable or air), called a multipoint or broadcast link, we need a.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 12 Multiple Access Figure 12.1 Data link layer divided into two functionality-oriented sublayers Figure 12.2 Taxonomy of multiple-access protocols.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 13 Multiple Access.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
Lecture Focus: Data Communications and Networking  Data Link Layer  Media Access Control (MAC) Lecture 24 CSCS 311.
Medium Access Control Sublayer
Shashank Srivastava Motilal Nehru National Institute Of Technology, Allahabad Medium Access Control.
1 Computer Communication & Networks Lecture 12 Datalink Layer: Multiple Access Waleed Ejaz
: Data Communication and Computer Networks
McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Chapter 12 Multiple Access Figure 12.1 Data link layer divided into two functionality-oriented sublayers Figure 12.2 Taxonomy of multiple-access protocols.
LOCAL AREA NETWORKS. CSMA Carrier Sense Multiple Access To minimize the chance of collision and, therefore, increase the performance, the CSMA method.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Data Link Layer PART III.
Multiple Access Protocol ผศ. ดร. อนันต์ ผลเพิ่ม Asst.Prof.Anan Phonphoem, Ph.D. Computer Engineering Department.
جلسه یازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Unit-II Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. © The McGraw-Hill Companies, Inc. Medium Access Control Asst. Prof. Chaiporn.
LOCAL AREA NETWORKS. CSMA/CD Carrier Sense Multiple Access with Collision Detection The CSMA method does not specify the procedure following a collision.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Multiple Access.
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
1 Kyung Hee University Chapter 12 Multiple Access.
Chapter 6 Multiple Radio Access
1 Kyung Hee University Chapter 12 Multiple Access.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Ch 12. Multiple Access. Multiple Access for Shared Link Dedicated link – Point-to-point connection is sufficient Shared link – Link is not dedicated –
Department of Computer Science, University of Peshawar Multiple Access.
Chapter 12 Media Access Control (MAC) Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 12 Multiple Access
1 Kyung Hee University Prof. Choong Seon HONG Multiple Access.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 13 Multiple Access.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 13 Multiple Access.
Chapter 12 Media Access Control (MAC)
UNIT 3 MULTIPLE ACCESS Adapted from lecture slides by Behrouz A. Forouzan © The McGraw-Hill Companies, Inc. All rights reserved.
Multiple Access. Figure 12.1 Data link layer divided into two functionality-oriented sublayers.
Network Operations & administration CS 4592 Lecture 18 Instructor: Ibrahim Tariq.
Lecture Focus: Data Communications and Networking  Data Link Layer  Media Access Control (MAC) Lecture 23 CSCS 311.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
Part III. Data Link Layer
Multiple Access Methods
Chapter 12 Part 2 Media Access Control (MAC)
Data link layer divided into two functionality-oriented sublayers
Chapter 12 Multiple Access.
Chapter 12 Multiple Access
Part III Datalink Layer 10.
Multiple Access Problem: When two or more nodes transmit at the same time, their frames will collide and the link bandwidth is wasted during collision.
Multiple Access Mahesh Jangid Assistant Professor JVW University.
Subject Name: Computer Communication Networks Subject Code: 10EC71
Chapter 12 Multiple Access
Chapter 12 Multiple Access
Figure 12.1 Data link layer divided into two functionality-oriented sublayers Networks can be divided into two categories: those using point-to-point.
Multiple Access Methods
Chapter 13 Multiple Access.
Chapter 12 Multiple Access
Chapter 12 Multiple Access
Chapter 13 Multiple Access
Data Communication Networks
Chapter 13 Multiple Access
CSE 313 Data Communication
Multiple Access Methods
Part III Datalink Layer 10.
Chapter 12 Media Access Control (MAC)
Chapter 12 Media Access Control (MAC)
Presentation transcript:

Chapter 13 Multiple Access

Figure 13.1 Multiple-access protocols

13.1 Random Access/ Contention Multiple Access CSMA Carrier Sense Multiple Access CSMA/CD Carrier Sense Multiple Access with Collision Detection CSMA/CA Carrier Sense Multiple Access with Collision Avoidance

CSMA/ Collision Detection CSMA/ Collision Avoidance Evolution of random-access methods or Contention method CSMA/ Collision Detection Media Access (ALOHA) Carrier Sense Multiple Access CSMA/ Collision Avoidance No station is superior to another station None is assigned the control over another No station permits, or does not permit, another station to send station that has data to send uses a procedure defined by protocol to make a decision on whether or not to send The decision depends on the state of medium (idle or busy)

MA (Media Access) ALOHA network When can the station access the medium ? What can the station do if the medium is busy? How can the station determine the success or failure of the transmission? What can the station do if there is an access conflict?

Media Access/ ALOHA protocol Station sends frame whenever it has a frame to send. there is only one channel to share, there is possibility of collision between frames from different stations Pure Aloha

Procedure for ALOHA protocol Kmax : Maximum No. of retransmission attemps Tb : Back-off time K: backoff = # attempt K=0 Tb = Random x Tp_max Random = [0, 1] Twaiting = 2 x Tp_max K>Kmax Tp_max = max. propagation time K=K++

Carrier Sense Multiple Access CSMA The chance of collision can be reduced if station sense medium before trying to use it. CSMA requires that each station first listen to the medium before sending ( “sense before transmit” or “listen before talk” )

Persistence Methods What should station do if channel if busy? What should station do if channel if idle? Three methods have been devised to answer these questions Nonpersistent method 1-Persistent method p-persistent method

Persistence strategies

Flow diagram for three persistence methods Highest chance of collision Reduce efficiency of N/W Channel has time slot : >= Max. propagation time Combine advantages of two methods Reduce chance of collision improve efficiency Behavior of three persistence methods

Collision Delay Delay

Collision in CSMA Possibility of collision still exists because of Propagation delay Collision in CSMA CSMA can reduce the possibility of collision, but it cannot eliminate

CSMA/CD procedure Collision Detection K=0 Nonpersistence p-persistence CSMA does not specify procedure following collision CSMA/CD augments algorithm to handle collision station monitors medium after sending frame transmission was successful, station is finished there is collision, frame is send again K=0 Tb = Random x Tp_max Random = [0, 2K - 1] Nonpersistence p-persistence K>Kmax K=K++ Kmax is normally 15

Timing in CSMA/CA In wireless network, much of sent energy is lost in transmission : not useful for effective collision detection We need to avoid collisions on wireless network because they cannot be detected CDMA/CA has three strategies Interframe space (IFS) Contention window Acknowledgement

CSMA/CA procedure

13.2 Control Access Reservation Polling Token Passing

Reservation access method

Controlled Access Protocol Polling

Polling

Selecting

Controlled Access Protocol TOKEN Passing

Token-passing network predecessor successor Token

Token-passing procedure

13.3 Channelization FDMA: Frequency Division Multiple Access TDMA: Time Division Multiple Access CDMA: Code Division Multiple Access

Channelization Use Multiplexing Techniques FDMA: Frequency Division Multiple Access the bandwidth is divided into channels. TDMA: Time Division Multiple Access the bandwidth is just one channel that is timeshared. CDMA one channel carries all transmissions simultaneously

Frequency-division multiple access (FDMA)

Time-division multiple access (TDMA)

Channelization CDMA

Simple idea of communication with code

Chip sequences

Encoding rules

CDMA multiplexer

Digital signal created by four stations in CDMA

CDMA demultiplexer

Decoding of the composite signal for one in CDMA

PN Sequence Generation (W1 and W2N) Walsh Table Walsh Code or Hadamard Matrix

Sequence generation Element W2 W2 W2 W2 N=1 N=2

Example 1 Check to see if the second property about orthogonal codes holds for our CDMA example. Solution The inner product of each code by itself is N. This is shown for code C; you can prove for yourself that it holds true for the other codes. C . C = [+1, +1, -1, -1] . [+1, +1, -1, -1] = 1 + 1 + 1 + 1 = 4 If two sequences are different, the inner product is 0. B . C = [+1, -1, +1, -1] . [+1, +1, -1, -1] = 1 - 1 - 1 + 1 = 0

Example 2 Check to see if the third property about orthogonal codes holds for our CDMA example. Solution The inner product of each code by its complement is -N. This is shown for code C; you can prove for yourself that it holds true for the other codes. C . (-C ) = [+1, +1, -1, -1] . [-1, -1, +1, +1] = - 1 - 1 - 1 - 1 = -4 The inner product of a code with the complement of another code is 0. B . (-C ) = [+1, -1, +1, -1] . [-1, -1, +1, +1] = -1 + 1 + 1 - 1 = 0