Multiple Access Methods

Slides:



Advertisements
Similar presentations
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Advertisements

Multiple access What if multiple machines are sharing the same link?
Lecture 9: Multiple Access Protocols
Multiple Access Methods. When nodes or stations are connected and use a common link (cable or air), called a multipoint or broadcast link, we need a.
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Channel Access Methods When several devices are connected to a single channel, there must be some rules to govern these devices as they access, transmit,
Chapter 12 Multiple Access Figure 12.1 Data link layer divided into two functionality-oriented sublayers Figure 12.2 Taxonomy of multiple-access protocols.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 13 Multiple Access.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Medium Access Control Sublayer
Shashank Srivastava Motilal Nehru National Institute Of Technology, Allahabad Medium Access Control.
McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Chapter 12 Multiple Access Figure 12.1 Data link layer divided into two functionality-oriented sublayers Figure 12.2 Taxonomy of multiple-access protocols.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. © The McGraw-Hill Companies, Inc. Medium Access Control Asst. Prof. Chaiporn.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Multiple Access.
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
1 Kyung Hee University Chapter 12 Multiple Access.
1 Kyung Hee University Chapter 12 Multiple Access.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Ch 12. Multiple Access. Multiple Access for Shared Link Dedicated link – Point-to-point connection is sufficient Shared link – Link is not dedicated –
Understanding Network Architecture CHAPTER FOUR. The Function of Access Methods The set of rules that defines how a computer puts data onto the network.
Chapter 12 Multiple Access
Introduction to Computer Networks Introduction to Computer Networks.
1 Kyung Hee University Prof. Choong Seon HONG Multiple Access.
COMPUTER NETWORKS Lecture-8 Husnain Sherazi. Review Lecture 7  Shared Communication Channel  Locality of Reference Principle  LAN Topologies – Star.
Chapter 13 Multiple Access.
Chapter 12 Media Access Control (MAC)
Multiple Access. Figure 12.1 Data link layer divided into two functionality-oriented sublayers.
Network Operations & administration CS 4592 Lecture 18 Instructor: Ibrahim Tariq.
2. Data Link Layer: Medium Access Control. Scheduling.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
Part III. Data Link Layer
A Taxonomy of Mechanisms for Multi-Access
Multiple Access Methods
Chapter 12 Part 2 Media Access Control (MAC)
Data link layer divided into two functionality-oriented sublayers
Chapter 12 Multiple Access.
Packetizing Error Detection
CT301 LECTURE 8.
Chapter 12 Multiple Access
Part III Datalink Layer 10.
Multiple Access Problem: When two or more nodes transmit at the same time, their frames will collide and the link bandwidth is wasted during collision.
Multiple Access Mahesh Jangid Assistant Professor JVW University.
Channel Allocation (MAC)
Subject Name: Computer Communication Networks Subject Code: 10EC71
Chapter 12 Multiple Access
Figure 12.1 Data link layer divided into two functionality-oriented sublayers Networks can be divided into two categories: those using point-to-point.
THE IEEE MAC SUB-LAYER – chapter 14
Communication Networks NETW 501
Learning Objectives After interacting with this Learning Object, the learner will be able to: Explain the process of collision detection in CSMA/CD.
The Medium Access Control Sublayer
Chapter 13 Multiple Access
Channel Allocation Problem/Multiple Access Protocols Group 3
Chapter 12 Multiple Access
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
Channel Allocation Problem/Multiple Access Protocols Group 3
Data Communication Networks
Chapter 13 Multiple Access
Lecture 5- Data Link Layer
CSE 313 Data Communication
Multiple Access Methods
Dr. John P. Abraham Professor UTPA
Multiple Access Control (MAC) Protocols
Part III Datalink Layer 10.
Chapter 12 Media Access Control (MAC)
Chapter 12 Media Access Control (MAC)
Presentation transcript:

Multiple Access Methods Lec#5 part 2 Multiple Access Methods

Multiple Access Methods

Multiple Access Methods When nodes or stations are connected and use a common link (cable or air) , called a multipoint or broadcast link, we need a multiple-access protocol to coordinate access to the link. It is a set of rules that defines how a stations puts data onto the link and takes data from the link .

Multiple Access Methods Many formal protocols have been devised to handle access to a shared links. We categorize them into three groups. Multiple Access Protocols Controlled Access Protocol Ex: Polling and Token passing Random Access protocols Ex: CSMA/CD and CSMA/CA Channelization protocol Ex: FDMA, TDMA, and CDMA

1 CONTROLLED ACCESS In controlled access, the stations consult one another to find which station has the right to send. A station cannot send unless it has been authorized by other stations. Two methods: Polling Access Method Token Passing Access Method In these access methods, no contention and no collision take place.

1.1 Polling Access Method In this access method, one station is designated as the primary device and the others are secondary stations. All access to the network is controlled by the primary station. The primary queries (polls) each of the secondary stations in turn, if it has information to be transmitted. Only when it is polled does the secondary have access to the communication channel. 

1.2 Token-Passing Access Method In this access method, a special type of packet, called a token, circulates around a cable ring from station to station . When any station on the ring needs to send data across the network, it must wait for a free token. When a free token is detected, the station will take control of it if the station has data to send.

2 Random Access Methods In random access or contention methods, no station is superior to another station and none is assigned the control over another (i.e. each station has the right to the medium without being controlled by any other station). It is named contention method because stations on the network contend, or compete, for an opportunity to send data. Methods: Carrier-Sense Multiple Access With Collision Detection Carrier-Sense Multiple Access With Collision Avoidance

Carrier-Sense Multiple Access In this way of methods, each station first listen to the cable (or check the state of the cable ) before sending. When the station "senses" that the cable is free ( that there is no traffic on the cable) it can send a frame. Once the station has transmitted frame on the cable, no other station can transmit data until the original data has reached its destination and the cable is free again.  

Collisions Even though each station listens for network traffic before it attempts to transmit, an access conflict -collision- will happen if more than one station tries to send at the same time. When a collision happened, the frames will be either destroyed or modified The collisions occur because it takes time for signals to propagate through the link.  Two specialized methods of collision management have been developed to improve performance: Collision Detection (CD) and Collision Avoidance (CA).

2.1 Carrier-Sense Multiple Access With Collision Detection The carrier-sense multiple access with collision detection (CSMA/CD) adds a procedure to handle a collision. In this method, a station monitors the medium after it sends a frame to see if the transmission was successful. If so, the station is finished. If, however, there is a collision, the frame is sent again. In the case of collision, the two stations involved stop transmitting for a random period of time and then attempt to retransmit. Each station determines its own waiting period; this reduces the chance that the computers will once again transmit simultaneously.

2.2 Carrier-Sense Multiple Access With Collision Avoidance The Carrier-Sense Multiple Access With Collision Avoidance (CSMA/CA)  differs from the previous method in that there is no collision. Each station signals its intent to transmit before it actually transmits data.

Differences 1.CSMA CD takes effect after a collision while CSMA CA takes effect before a collision. 2.CSMA CA reduces the possibility of a collision while CSMA CD only minimizes the recovery time. 3.CSMA CD is typically used in wired networks while CSMA CA is used in wireless networks.

3 CHANNELIZATION Channelization is a multiple-access method in which the available bandwidth of a link is shared in time, frequency, or through code, between different stations. Used for wireless communications. Methods: Frequency division Multiple Access Time division Multiple Access Code division Multiple Access

3.1 Frequency-Division Multiple Access In frequency-division multiple access (FDMA), the available bandwidth is divided into frequency bands. Each station is allocated a band to send its data. In other words, each band is reserved for a specific station, and it belongs to the station all the time.

3.2 Time-division Multiple Access In time-division multiple access (TDMA), the stations share the bandwidth of the channel in time. Each station is allocated a time slot during which it can send data. Each station transmits its data in is assigned time slot.

3.3 Code-Division Multiple Access In the code-division multiple access (CDMA), each station assigned a code that used to send its data. Several transmitters can send information simultaneously over a single communication channel. CDMA differs from FDMA because only one channel occupies the entire bandwidth of the link. It differs from TDMA because all stations can send data simultaneously; there is no timesharing.