Chapter 13 Multiple Access

Slides:



Advertisements
Similar presentations
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Advertisements

Multiple access What if multiple machines are sharing the same link?
Multiple Access Methods. When nodes or stations are connected and use a common link (cable or air), called a multipoint or broadcast link, we need a.
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 12 Multiple Access Figure 12.1 Data link layer divided into two functionality-oriented sublayers Figure 12.2 Taxonomy of multiple-access protocols.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 13 Multiple Access.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Lecture Focus: Data Communications and Networking  Data Link Layer  Media Access Control (MAC) Lecture 24 CSCS 311.
Medium Access Control Sublayer
Shashank Srivastava Motilal Nehru National Institute Of Technology, Allahabad Medium Access Control.
: Data Communication and Computer Networks
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication CDMA.
McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Chapter 12 Multiple Access Figure 12.1 Data link layer divided into two functionality-oriented sublayers Figure 12.2 Taxonomy of multiple-access protocols.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Data Link Layer PART III.
Multiple Access Protocol ผศ. ดร. อนันต์ ผลเพิ่ม Asst.Prof.Anan Phonphoem, Ph.D. Computer Engineering Department.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. © The McGraw-Hill Companies, Inc. Medium Access Control Asst. Prof. Chaiporn.
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
1 Kyung Hee University Chapter 12 Multiple Access.
1 Kyung Hee University Chapter 12 Multiple Access.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Data Link Layer. Useful References r Wireless Communications and Networks by William Stallings r Computer Networks (third edition) by Andrew Tanenbaum.
Ch 12. Multiple Access. Multiple Access for Shared Link Dedicated link – Point-to-point connection is sufficient Shared link – Link is not dedicated –
Department of Computer Science, University of Peshawar Multiple Access.
Chapter 12 Media Access Control (MAC) Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 12 Multiple Access
1 Kyung Hee University Prof. Choong Seon HONG Multiple Access.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 13 Multiple Access.
Chapter 13 Multiple Access.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 13 Multiple Access.
Chapter 12 Media Access Control (MAC)
UNIT 3 MULTIPLE ACCESS Adapted from lecture slides by Behrouz A. Forouzan © The McGraw-Hill Companies, Inc. All rights reserved.
Multiple Access. Figure 12.1 Data link layer divided into two functionality-oriented sublayers.
Network Operations & administration CS 4592 Lecture 18 Instructor: Ibrahim Tariq.
2. Data Link Layer: Medium Access Control. Scheduling.
Part III. Data Link Layer
Multiple Access Methods
Chapter 12 Part 2 Media Access Control (MAC)
Data link layer divided into two functionality-oriented sublayers
Chapter 12 Multiple Access.
Packetizing Error Detection
CT301 LECTURE 8.
Chapter 12 Multiple Access
Part III Datalink Layer 10.
Multiple Access Problem: When two or more nodes transmit at the same time, their frames will collide and the link bandwidth is wasted during collision.
Multiple Access Mahesh Jangid Assistant Professor JVW University.
Channel Allocation (MAC)
Subject Name: Computer Communication Networks Subject Code: 10EC71
Chapter 12 Multiple Access
Figure 12.1 Data link layer divided into two functionality-oriented sublayers Networks can be divided into two categories: those using point-to-point.
THE IEEE MAC SUB-LAYER – chapter 14
Multiple Access Methods
Learning Objectives After interacting with this Learning Object, the learner will be able to: Explain the process of collision detection in CSMA/CD.
Chapter 13 Multiple Access.
Access Methods in Network
Channel Allocation Problem/Multiple Access Protocols Group 3
Chapter 12 Multiple Access
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
Channel Allocation Problem/Multiple Access Protocols Group 3
Chapter 13 Multiple Access
Lecture 5- Data Link Layer
Multiple Access Methods
Multiple Access Control (MAC) Protocols
Part III Datalink Layer 10.
Chapter 12 Media Access Control (MAC)
Chapter 12 Media Access Control (MAC)
Presentation transcript:

Chapter 13 Multiple Access

13.1 Random Access MA – Multiple Access CSMA – Carrier Sense MA CSMA/CD – CSMA/Collision Detection CSMA/CA – CSMA/Collision Avoidance

Evolution of random-access methods

ALOHA network – Multiple Access Base station is central controller Base station acts as a hop Potential collisions, all incoming data is @ 407 MHz

Procedure for ALOHA protocol

Collision in CSMA – Carrier Sense MA

Persistence strategies A random period of time 1- persistent p-persistent

CSMA/CD procedure – Collision Detection - Used in Ethernet Usually 15 In the exponential backoff method, backoff time : between 0 and 2N x (maximum propagation time)

CSMA/CA procedure – Collision Avoidance - Used in Wireless LAN Interframe Gap

13.2 Controlled Access Reservation Polling – Select and Poll Stations consult one another to find which station has the right to send Reservation Polling – Select and Poll Token Passing

Reservation access method A station needs to make a reservation before sending data

Polling If the primary wants to receive data, it asks the secondaries if they have anything to send. The secondaries are not allowed to transmit data unless asked

Select

poll

Token-passing network A station is authorized to send data when it receives a special frame called a token

Token-passing procedure

13.3 Channelization FDMA – Frequency Division TDMA – Time Division CDMA – Code Division

In FDMA, the bandwidth is divided into channels. The available bandwidth is shared by all stations. The FDMA is a data link layer protocol that uses FDM at the physical layer In FDMA, the bandwidth is divided into channels.

In TDMA, the bandwidth is just one channel that is timeshared. The entire bandwidth is just one channel. Stations share the capacity of the channel in time In TDMA, the bandwidth is just one channel that is timeshared.

In CDMA, one channel carries all transmissions simultaneously. Only one channel occupies the entire bandwidth of the link All Stations can send data simultaneously; there is no time sharing. In CDMA, one channel carries all transmissions simultaneously.

Chip sequences – Four Stations CDMA is based on coding theory Each station is assigned a code, which is a sequence of numbers called chips. All Stations can send data simultaneously; there is no time sharing.

Encoding Rules When a station is idle, it sends no signal, which is represented by a 0.

Encoding Rules Showing how four stations share the link during 1-bit interval. CDMA Multiplexer

Encoding Rules CDMA Demultiplexer

Sequence Generation To generate sequences, we use a Walsh table, a two-dimensional table with an equal number of rows and columns. Each row is a sequence of chips

Sequence Generation

Properties of Orthogonal Sequences If we multiply a sequence by -1, every element in the sequence is complemented If we multiply two sequences, element by element, and add the result, we get a number called the inner product. If two sequences are the same, we get N, where N is the number of sequences; if different ,we get 0. So, A·A is N, but A·B is 0. Inner product of a sequence by its complement is –N. So A·(-A) is –N.

Example 1 Check to see if the second property about orthogonal codes holds for our CDMA example. Solution The inner product of each code by itself is N. This is shown for code C; you can prove for yourself that it holds true for the other codes. C . C = [+1, +1, -1, -1] . [+1, +1, -1, -1] = 1 + 1 + 1 + 1 = 4 If two sequences are different, the inner product is 0. B . C = [+1, -1, +1, -1] . [+1, +1, -1, -1] = 1 - 1 - 1 + 1 = 0

Example 2 Check to see if the third property about orthogonal codes holds for our CDMA example. Solution The inner product of each code by its complement is -N. This is shown for code C; you can prove for yourself that it holds true for the other codes. C . (-C ) = [+1, +1, -1, -1] . [-1, -1, +1, +1] = - 1 - 1 - 1 - 1 = -4 The inner product of a code with the complement of another code is 0. B . (-C ) = [+1, -1, +1, -1] . [-1, -1, +1, +1] = -1 + 1 + 1 - 1 = 0