UNIT 3 MULTIPLE ACCESS Adapted from lecture slides by Behrouz A. Forouzan © The McGraw-Hill Companies, Inc. All rights reserved.

Slides:



Advertisements
Similar presentations
EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
Advertisements

12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Multiple access What if multiple machines are sharing the same link?
Multiple Access Methods. When nodes or stations are connected and use a common link (cable or air), called a multipoint or broadcast link, we need a.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 12 Multiple Access Figure 12.1 Data link layer divided into two functionality-oriented sublayers Figure 12.2 Taxonomy of multiple-access protocols.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 13 Multiple Access.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Medium Access Control Sublayer
Shashank Srivastava Motilal Nehru National Institute Of Technology, Allahabad Medium Access Control.
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
Multiple Access Protocols Chapter 6 of Hiroshi Harada Book
Wireless Application Protocol
: Data Communication and Computer Networks
McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Chapter 12 Multiple Access Figure 12.1 Data link layer divided into two functionality-oriented sublayers Figure 12.2 Taxonomy of multiple-access protocols.
1 21\09\2010 Unit-III Multiple Access Unit – 3 MULTIPLE ACCESS.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
جلسه یازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Unit-II Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. © The McGraw-Hill Companies, Inc. Medium Access Control Asst. Prof. Chaiporn.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Multiple Access.
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
1 Kyung Hee University Chapter 12 Multiple Access.
Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access.
Chapter 6 Multiple Radio Access
1 Kyung Hee University Chapter 12 Multiple Access.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Ch 12. Multiple Access. Multiple Access for Shared Link Dedicated link – Point-to-point connection is sufficient Shared link – Link is not dedicated –
Chapter 12 Media Access Control (MAC) Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 12 Multiple Access
1 Kyung Hee University Prof. Choong Seon HONG Multiple Access.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 13 Multiple Access.
Chapter 13 Multiple Access.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 13 Multiple Access.
Chapter 12 Media Access Control (MAC)
Multiple Access. Figure 12.1 Data link layer divided into two functionality-oriented sublayers.
2. Data Link Layer: Medium Access Control. Scheduling.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
Part III. Data Link Layer
Multiple Access Methods
MEDIUM ACCESS CONTROL PROTOCOL
Data link layer divided into two functionality-oriented sublayers
Chapter 12 Multiple Access.
Chapter 12 Multiple Access
Part III Datalink Layer 10.
Multiple Access Problem: When two or more nodes transmit at the same time, their frames will collide and the link bandwidth is wasted during collision.
Multiple Access Mahesh Jangid Assistant Professor JVW University.
Subject Name: Computer Communication Networks Subject Code: 10EC71
Chapter 12 Multiple Access
Chapter 12 Multiple Access
Figure 12.1 Data link layer divided into two functionality-oriented sublayers Networks can be divided into two categories: those using point-to-point.
Communication Networks NETW 501
Multiple Access Methods
Chapter 13 Multiple Access.
Chapter 12 Multiple Access
Chapter 12 Multiple Access
Chapter 13 Multiple Access
Data Communication Networks
Chapter 13 Multiple Access
Multiple Access Methods
Chapter 6 Multiple Radio Access.
Multiple Access Control (MAC) Protocols
Part III Datalink Layer 10.
Chapter 12 Media Access Control (MAC)
Chapter 12 Media Access Control (MAC)
Presentation transcript:

UNIT 3 MULTIPLE ACCESS Adapted from lecture slides by Behrouz A. Forouzan © The McGraw-Hill Companies, Inc. All rights reserved

OUTLINE Multiple access mechanisms Random access Controlled access Channelization 2

SUBLAYERS OF DATA LINK LAYER 3

MULTIPLE ACCESS MECHANISMS 4

RANDOM ACCESS

Also called contention-based access No station is assigned to control another 6

ALOHA NETWORK 7

FRAMES IN PURE ALOHA 8

ALOHA PROTOCOL 9

EXAMPLE Calculate possible values of T B when stations on an ALOHA network are a maximum of 600 km apart T p = (600 × 10 3 ) / (3 × 10 8 ) = 2 ms When K=1, T B  {0ms,2ms} When K=2, T B  {0ms,2ms,4ms,6ms} : 10

ALOHA: VULNERABLE TIME 11

ALOHA: THROUGHPUT Assume number of stations trying to transmit follow Poisson Distribution The throughput for pure ALOHA is S = G × e −2G where G is the average number of frames requested per frame-time The maximum throughput  S max = when G= 1/2 12

EXAMPLE A pure ALOHA network transmits 200-bit frames on a shared channel of 200 kbps. What is the throughput if the system (all stations together) produces  1000 frames per second  500 frames per second  250 frames per second 13

SLOTTED ALOHA 14

SLOTTED ALOHA: VULNERABLE TIME 15

SLOTTED ALOHA: THROUGHPUT The throughput for Slotted ALOHA is S = G × e −G where G is the average number of frames requested per frame-time The maximum throughput  S max = when G= 1 16

EXAMPLE A Slotted ALOHA network transmits 200-bit frames on a shared channel of 200 kbps. What is the throughput if the system (all stations together) produces  1000 frames per second  500 frames per second  250 frames per second 17

CSMA Carrier Sense Multiple Access  "Listen before talk" Reduce the possibility of collision  But cannot completely eliminate it 18

COLLISION IN CSMA 19 B C

CSMA: VULNERABLE TIME 20

PERSISTENCE METHODS What a station does when channel is idle or busy 21

PERSISTENCE METHODS 22

CSMA/CD Carrier Sense Multiple Access with Collision Detection Station monitors channel while sending a frame 23

ENERGY LEVELS 24

CSMA/CD: MINIMUM FRAME SIZE Each frame must be large enough for a sender to detect a collision Worst case scenario:  "A" is transmitting  "D" starts transmitting just before A's signal arrives 25 ABCD Long enough to hear colliding signal from D

EXAMPLE A CSMA/CD network has a bandwidth of 10 Mbps. If the maximum propagation time is 25.6 μs, what is the minimum size of the frame? 26

CSMA/CD: FLOW DIAGRAM 27

CSMA/CA Carrier Sense Multiple Access with Collision Avoidance Used in a network where collision cannot be detected  E.g., wireless LAN 28 IFS – Interframe Space

CSMA/CA: FLOW DIAGRAM 29 contention window size is 2 K -1 After each slot: - If idle, continue counting - If busy, stop counting

CONTROLLED ACCESS

CONTROL ACCESS A station must be authorized by someone (e.g., other stations) before transmitting Three common methods:  Reservation  Polling  Token passing 31

RESERVATION METHOD 32

POLLING METHOD 33

TOKEN PASSING 34

CHANNELIZATION

Similar to multiplexing Three schemes  Frequency-Division Multiple Access (FDMA)  Time-Division Multiple Access (TDMA)  Code-Division Multiple Access (CDMA) 36

FDMA 37

TDMA 38

CDMA One channel carries all transmissions at the same time Each channel is separated by code 39

CDMA: CHIP SEQUENCES Each station is assigned a unique chip sequence Chip sequences are orthogonal vectors  Inner product of any pair must be zero With N stations, sequences must have the following properties:  They are of length N  Their self inner product is always N 40

CDMA: BIT REPRESENTATION 41

TRANSMISSION IN CDMA 42

CDMA ENCODING 43

SIGNAL CREATED BY CDMA 44

CDMA DECODING 45

SEQUENCE GENERATION Common method: Walsh Table  Number of sequences is always a power of two 46