Subject Name: Computer Communication Networks Subject Code: 10EC71

Slides:



Advertisements
Similar presentations
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Advertisements

Multiple access What if multiple machines are sharing the same link?
Multiple Access Methods. When nodes or stations are connected and use a common link (cable or air), called a multipoint or broadcast link, we need a.
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 12 Multiple Access Figure 12.1 Data link layer divided into two functionality-oriented sublayers Figure 12.2 Taxonomy of multiple-access protocols.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 13 Multiple Access.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Medium Access Control Sublayer
: Data Communication and Computer Networks
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Chapter 12 Multiple Access Figure 12.1 Data link layer divided into two functionality-oriented sublayers Figure 12.2 Taxonomy of multiple-access protocols.
LOCAL AREA NETWORKS. MEDIUM ACCESS CONTROL All LANs and MANs consist of collections of devices that must share the network’s transmission capacity. Some.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Unit-II Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. © The McGraw-Hill Companies, Inc. Medium Access Control Asst. Prof. Chaiporn.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Multiple Access.
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
1 Kyung Hee University Chapter 12 Multiple Access.
1 Kyung Hee University Chapter 12 Multiple Access.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Ch 12. Multiple Access. Multiple Access for Shared Link Dedicated link – Point-to-point connection is sufficient Shared link – Link is not dedicated –
Department of Computer Science, University of Peshawar Multiple Access.
Chapter 12 Media Access Control (MAC) Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 12 Multiple Access
1 Kyung Hee University Prof. Choong Seon HONG Multiple Access.
Chapter 13 Multiple Access.
Chapter 12 Media Access Control (MAC)
UNIT 3 MULTIPLE ACCESS Adapted from lecture slides by Behrouz A. Forouzan © The McGraw-Hill Companies, Inc. All rights reserved.
Multiple Access. Figure 12.1 Data link layer divided into two functionality-oriented sublayers.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
2. Data Link Layer: Medium Access Control. Scheduling.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
Part III. Data Link Layer
Multiple Access Methods
Chapter 12 Part 2 Media Access Control (MAC)
Data link layer divided into two functionality-oriented sublayers
Chapter 12 Multiple Access.
CT301 LECTURE 8.
Chapter 12 Multiple Access
Part III Datalink Layer 10.
Multiple Access Problem: When two or more nodes transmit at the same time, their frames will collide and the link bandwidth is wasted during collision.
Multiple Access Mahesh Jangid Assistant Professor JVW University.
Channel Allocation (MAC)
Subject Name: Computer Communication Networks Subject Code: 10EC71
Chapter 12 Multiple Access
Chapter 12 Multiple Access
Subject Name: Computer Communication Networks Subject Code: 10EC71
Subject Name: Computer Communication Networks Subject Code: 10EC71
Subject Name: Computer Communication Networks Subject Code: 10EC71
Figure 12.1 Data link layer divided into two functionality-oriented sublayers Networks can be divided into two categories: those using point-to-point.
THE IEEE MAC SUB-LAYER – chapter 14
Subject Name: Computer Communication Networks Subject Code: 10EC71
Communication Networks NETW 501
Multiple Access Methods
Chapter 13 Multiple Access.
Chapter 12 Multiple Access
Chapter 12 Multiple Access
Chapter 13 Multiple Access
Chapter 12 Multiple Access
Data Communication Networks
Chapter 13 Multiple Access
Lecture 5- Data Link Layer
CSE 313 Data Communication
Multiple Access Methods
Dr. John P. Abraham Professor UTPA
Multiple Access Control (MAC) Protocols
Part III Datalink Layer 10.
Chapter 12 Media Access Control (MAC)
Chapter 12 Media Access Control (MAC)
Presentation transcript:

Subject Name: Computer Communication Networks Subject Code: 10EC71 Prepared By: Kala H S & Megha Gupta Department: ECE Date: 9/17/2018

Unit 3 MULTIPLE ACCESSES 9/17/2018

TOPICS TO BE COVERED Multiple Access Mechanism Random Access Controlled Access Channelization 9/17/2018

2 Functionality-Oriented Sublayers of Data Link Layer: Upper sublayer is responsible for data link control. Lower sublayer is responsible for resolving access to the shared media. If the channel is dedicated, we do not need the lower sublayer. 9/17/2018

Multiple Access Mechanism When nodes or stations are connected and use a common link, we need a multiple-access protocol to coordinate access to the link. These protocols regulate the contention between many transmitters which tend to use the media anywhere, anytime and independently. 9/17/2018

RANDOM ACCESS Also called as contention method. No station is superior to another station and none is assigned the control over another. Two features give this method its name. Random Access: there is no scheduled time for a station to transmit. Transmission is random among the stations. (b) Contention Method: Stations compete with one another to access the medium. 9/17/2018

ALOHA It is the earliest random access method. It was developed at the University of Hawaii in early 1970. It was designed for a radio (wireless) LAN, but it can be used on any shared medium. The medium is shared between the stations. When a station sends data, another station may attempt to do so at the same time. The data from the two stations collide and become garbled. 9/17/2018

PURE ALOHA It is the original Aloha Protocol. Each station sends a frame whenever it has a frame to send. Since there is only one channel to share, there is the possibility of collision between frames from different stations. 9/17/2018

PROCEDURE FOR PURE ALOHA PROTOCOL 9/17/2018

VULNERABLE TIME FOR PURE ALOHA 9/17/2018

SLOTTED ALOHA It was invented to improve the efficiency of pure ALOHA. In slotted ALOHA we divide the time into slots and force the station to send only at the beginning of the time slot. 9/17/2018

VULNERABLE TIME FOR SLOTTED ALOHA 9/17/2018

CSMA CSMA would send a frame only if it senses no carrier. There are two strategies for that: Non-persistent and persistent strategy. 9/17/2018

CSMA/CD CSMA method does not specify the procedure following a collision. Carrier sense multiple access with collision detection (CSMA/CD) augments the algorithm to handle the collision. A station monitors the medium after it sends a frame to see if the transmission was successful. If so, the station is finished. If, however, there is a collision, the frame is sent again. 9/17/2018

CSMA/CD FLOW DIAGRAM 9/17/2018

CSMA/CD Carrier Sense Multiple Access with Collision Avoidance. Used in a network where collision cannot be detected. Eg: Wireless LAN 9/17/2018

contention window size is 2K-1 CSMA/CA FLOW DIAGRAM contention window size is 2K-1 After each slot: - If idle, continue counting - If busy, stop counting 9/17/2018

CONTROLLED ACCESS The stations consult one another to find which station has the right to send. A station cannot send unless it has been authorized by other stations. Three common methods: Reservation Polling Token passing 9/17/2018

RESERVATION A station needs to make a reservation before sending data. Time is divided into intervals. In each interval, a reservation frame precedes the data frames sent in that interval. 9/17/2018

POLLING One device is designated as a primary station and the other devices are secondary stations. All data exchanges are made through the primary device even when the ultimate destination is a secondary device. The primary device controls the link; the secondary devices follow its instructions. Primary device determines which device is allowed to use the channel at a given time. Primary device is always the initiator of a session. 9/17/2018

POLLING and ACCESS METHOD 9/17/2018

TOKEN PASSING The stations in a network are organized in a logical ring. For each station, there is a predecessor and a successor. Stations do not have to be physically connected in a ring, the ring can be a logical one. 9/17/2018

CHANNELISATION It is a multiple-access method in which the available bandwidth of a link is shared in time, frequency, or through code, between different stations. Three channelization protocols: FDMA, TDMA, CDMA. 9/17/2018

FDMA The bandwidth is divided into channels. Each channel is used by a single station. FDMA is data link layer protocol (MAC sub layer) which uses FDM at the physical layer. 9/17/2018

TDMA The entire bandwidth is just one channel. The stations share the bandwidth through time slots. TDMA is data link layer protocol (MAC sub layer) which uses TDM at the physical layer. 9/17/2018

CDMA All stations share the same bandwidth and the same time (no frequency division, no time division, all data transmitted simultaneously). One channel carries all transmissions at the same time. Each channel is separated by code. 9/17/2018

CDMA: CHIP SEQUENCES Each station is assigned a unique chip sequence Chip sequences are orthogonal vectors Inner product of any pair must be zero With N stations, sequences must have the following properties: They are of length N Their self inner product is always N 9/17/2018

CDMA: BIT REPRESENTATION 9/17/2018

CDMA: TRANSMISSION 9/17/2018

CDMA ENCODING 9/17/2018

CDMA DECODING 9/17/2018

Acknowledgement : MY SINCERE THANKS TO By Kala H S & Megha Gupta THE AUTHOR PROF.BEHROUZ A FOROUZAN. BECAUSE THE ABOVE PRESENTATION MATERIALS ARE HEAVILY BORROWED FROM HIS TEXTBOOK “DATA COMMUNICATION & NETWORKING” 4TH EDITION, PUBLISHER TATA MCGRAW HILL SURESHA V. PROFESSOR, DEPT. OF E&C, KVG COLLEGE OF ENGINEERING. SULLIA, D.K - 574 327 By Kala H S & Megha Gupta Assistant Professor 9/17/2018