Multiple Accesses When nodes or stations are connected and use a common link, called a multipoint or broadcast link, we need a multiple-access protocol.

Slides:



Advertisements
Similar presentations
Fundamentals of Computer Networks ECE 478/578
Advertisements

Multiple Access Methods. When nodes or stations are connected and use a common link (cable or air), called a multipoint or broadcast link, we need a.
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 12 Multiple Access Figure 12.1 Data link layer divided into two functionality-oriented sublayers Figure 12.2 Taxonomy of multiple-access protocols.
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
The Data Link Layer Read Chapters 3 and 4. CSC 3352 Computer Communications Chapter 3&42 Where in the OSI Reference Model ? Session Transport Network.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 13 Multiple Access.
Computer Networks Set 6: MAC sublayer. MAC Sublayer ÑWhen several users contend to use same medium, the DLL is divided into a LLC and a MAC sublayer.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
1 Chapter 5 The Medium Access Sublayer. 2 Chapter 5 The Medium Access Layer 5.1 The Channel Allocation problem - Static and dynamic channel allocation.
1 Computer Communication & Networks Lecture 12 Datalink Layer: Multiple Access Waleed Ejaz
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Chapter 4: Medium Access Control (MAC) Sublayer
Chapter 12 Multiple Access Figure 12.1 Data link layer divided into two functionality-oriented sublayers Figure 12.2 Taxonomy of multiple-access protocols.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
LOCAL AREA NETWORKS. MEDIUM ACCESS CONTROL All LANs and MANs consist of collections of devices that must share the network’s transmission capacity. Some.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation Dynamic Channel Allocation  Delay for the divided.
Ch 5. Link layer and Local Area Networks Myungchul Kim
Ethernet: Distributed Packet Switching for Local Computer Networks Authors: Robert M. Metcalfe and David R. Boggs Presentation: Christopher Peery.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Unit-II Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. © The McGraw-Hill Companies, Inc. Medium Access Control Asst. Prof. Chaiporn.
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
LOCAL AREA NETWORKS. CSMA/CD Carrier Sense Multiple Access with Collision Detection The CSMA method does not specify the procedure following a collision.
Medium Access Control Sub Layer
Multiple Access.
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
1 Kyung Hee University Chapter 12 Multiple Access.
1 Kyung Hee University Chapter 12 Multiple Access.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
CSMA/CD Simulation Carrier Sense Multiple Access (CSMA), although more efficient than ALOHA or slotted ALOHA, still has one glaring inefficiency: When.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 13 Multiple Access.
Chapter 13 Multiple Access.
Chapter 12 Media Access Control (MAC)
Multiple Access. Figure 12.1 Data link layer divided into two functionality-oriented sublayers.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
Lecture Focus: Data Communications and Networking  Data Link Layer  Media Access Control (MAC) Lecture 23 CSCS 311.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
Part III. Data Link Layer
A Taxonomy of Mechanisms for Multi-Access
Multiple Access Methods
CSMA/CD Carrier sense multiple access with collision detection (CSMA/CD) is a media access control method used most notably in early Ethernet technology.
Chapter 12 Part 2 Media Access Control (MAC)
Data link layer divided into two functionality-oriented sublayers
Chapter 12 Multiple Access.
Lab 7 – CSMA/CD (Data Link Layer Layer)
CT301 LECTURE 8.
Part III Datalink Layer 10.
Subject Name: Computer Communication Networks Subject Code: 10EC71
Chapter 12 Multiple Access
Net301 lecture9 11/5/2015 Lect 9 NET301.
Services of DLL Framing Link access Reliable delivery
Multiple Access Methods
Learning Objectives After interacting with this Learning Object, the learner will be able to: Explain the process of collision detection in CSMA/CD.
Chapter 13 Multiple Access.
Chapter 12 Multiple Access
Chapter 12 Multiple Access
The Medium Access Control Sublayer
Chapter 13 Multiple Access
Network Topologies & Standards
Data Communication Networks
Chapter 13 Multiple Access
Lecture 5- Data Link Layer
CSE 313 Data Communication
Figure 3.1 Internet model.
Multiple Access Methods
Part III Datalink Layer 10.
Chapter 12 Media Access Control (MAC)
CLARISSE UMURERWA 10/2/2019UKUNDWA ESTER 1.  CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) is a protocol for carrier transmission in
Presentation transcript:

Multiple Accesses When nodes or stations are connected and use a common link, called a multipoint or broadcast link, we need a multiple-access protocol to coordinate access to the link. The problem of controlling the access to the medium is similar to the rules of speaking in an assembly. The procedures guarantee that the right to speak is upheld and ensure that two people do not speak at the same time, do not interrupt each other, do not monopolize the discussion, and so on. The situation is similar for multipoint networks. Many formal protocols have been devised to handle access to a shared link .We categorize them into three groups. Protocols belonging to each group are shown in Figure 12.2.

each station follows a procedure that answers the following questions: 1- When can the station access the medium? 2- What can the station do if the medium is busy? 3- How can the station determine the success or failure of the transmission? 4- What can the station do if there is an access conflict?

Figure 12.4 shows the procedure for pure ALOHA based on the above strategy.

Carrier Sense Multiple Access (CSMA)

Carrier Sense Multiple Access with Collision Detection (CSMA/CD) The CSMA method does not specify the procedure following a collision. Carrier sense multiple access with collision detection (CSMA/CD) augments the algorithm to handle the collision.