Department of Computer Science, University of Peshawar Multiple Access.

Slides:



Advertisements
Similar presentations
The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
Advertisements

12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Multiple access What if multiple machines are sharing the same link?
Multiple Access Methods. When nodes or stations are connected and use a common link (cable or air), called a multipoint or broadcast link, we need a.
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 12 Multiple Access Figure 12.1 Data link layer divided into two functionality-oriented sublayers Figure 12.2 Taxonomy of multiple-access protocols.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 13 Multiple Access.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
Chapter 13 Wired LANs: Ethernet
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Medium Access Control Sublayer
1 Kyung Hee University Chapter 13 Wired LANs: Ethernet.
Shashank Srivastava Motilal Nehru National Institute Of Technology, Allahabad Medium Access Control.
Wired LANs: Ethernet In Chapter 1, we learned that a local area network (LAN) is a computer network that is designed for a limited geographic area such.
: Data Communication and Computer Networks
McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Ch. 16 High-Speed LANs The Emergence of High- Speed LANs Trends –Computing power of PCs has continued to grow. –MIS organizations recognize the.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking LANs 2: MAC protocols.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 14 Local Area Networks: Ethernet.
Local Area Networks: Ethernet. IEEE Background Institution of Electrical and Electronic Engineering (IEEE) A professional non-profit organization Project.
1 Data Link Layer Lecture 22 Imran Ahmed University of Management & Technology.
McGraw-Hill©The McGraw-Hill Companies, Inc., Chapter 14 Local Area Networks: Ethernet.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Multiple Access.
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
1 Kyung Hee University Chapter 12 Multiple Access.
1 Kyung Hee University Chapter 12 Multiple Access.
Ch 13. Wired LANs: Ethernet IEEE Standards Project 802 launched in 1985 – To set standards to enable intercommunication among equipment from a variety.
Ch 12. Multiple Access. Multiple Access for Shared Link Dedicated link – Point-to-point connection is sufficient Shared link – Link is not dedicated –
IEEE STANDARDS IEEE STANDARDS In 1985, the Computer Society of the IEEE started a project, called Project 802, to set standards to enable intercommunication.
Chapter 14 Local Area Networks
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
Datornätverk A – lektion 10
Chapter 12 Multiple Access
Wired LANs: Ethernet Shashank Srivastava Motilal Nehru national Institute Of Information Technology, Allahabad 4 Sep 2013.
1 Kyung Hee University Prof. Choong Seon HONG Multiple Access.
Chapter 13 Multiple Access.
Chapter 14 Local Area Networks: Ethernet. Figure 14.1 Three generations of Ethernet.
Chapter 12 Media Access Control (MAC)
UNIT 3 MULTIPLE ACCESS Adapted from lecture slides by Behrouz A. Forouzan © The McGraw-Hill Companies, Inc. All rights reserved.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
1 Kyung Hee University Chapter 13 Wired LANs: Ethernet.
Multiple Access Methods
Chapter 13 Wired LANs: Ethernet
Chapter 12 Multiple Access.
CT301 LECTURE 8.
Part III Datalink Layer.
Part III Datalink Layer 10.
Subject Name: Computer Communication Networks Subject Code: 10EC71
Net301 lecture9 11/5/2015 Lect 9 NET301.
Subject Name: Computer Communication Networks Subject Code: 10EC71
Chapter 12 Local Area Networks
THE IEEE MAC SUB-LAYER – chapter 14
Multiple Access Methods
Local Area Networks: Ethernet
Chapter 13 Multiple Access
Part III Datalink Layer.
Chapter 13 Multiple Access
Chapter 12 Local Area Networks
Figure 3.1 Internet model.
Chapter 12 Local Area Networks
Multiple Access Methods
Chaithra Ashwin Sanjana
Part III Datalink Layer 10.
Chapter 12 Media Access Control (MAC)
Chapter 12 Media Access Control (MAC)
Presentation transcript:

Department of Computer Science, University of Peshawar Multiple Access

Department of Computer Science, University of Peshawar Multiple-access protocols

Department of Computer Science, University of Peshawar Random Access MA CSMA CSMA/CD CSMA/CA

Department of Computer Science, University of Peshawar Evolution of random-access methods

Department of Computer Science, University of Peshawar ALOHA The earliest random-access method Developed at the University of Hawaii in early 1970’s Used on a wireless LAN with a data rate 9600 bits/sec A base station is the central controller The base station receives the frame and relays it to the intended destination The uploading transmission uses carrier frequency of 407 MHz The downloading uses carrier freq of 413 MHz

Department of Computer Science, University of Peshawar ALOHA network

Department of Computer Science, University of Peshawar Procedure for ALOHA protocol

Department of Computer Science, University of Peshawar Back off time The station waits an amount of time b/w 0 and 2 N *(maximum_propagation_time) For the first time between: 0 and 2 1 *(max_propg_time) For the second time between: 0 and 2 2 (max_propag_time), and so on N is the number of attempted transmissions

Department of Computer Science, University of Peshawar CSMA Carrier Sense Multiple Access To minimize the chance of collision Based on the principle “sense before transmit” Can reduce the possibility of collision, but can not eliminate it Collision because of the propagation delay

Department of Computer Science, University of Peshawar Collision in CSMA

Department of Computer Science, University of Peshawar Persistent Strategy The procedure for a station that senses a busy medium Two substrategies Nonpersistent Persistent

Department of Computer Science, University of Peshawar Persistence strategies

Department of Computer Science, University of Peshawar Persistence strategies cont… In 1-persistent, the station sends its frame immediately, when finds the line idle It increase the chance of collision due to same time sending In P-persistent, the station may or may not send, when finds the line idle The system generates a random number b/w 1 and 100 If the number is less than 20, then sends, otherwise not

Department of Computer Science, University of Peshawar CSMA/CD Carrier Sense Multiple Access with collision detection The station monitors the medium after sending a frame If successful, the station is finished If collision, the frame is resent Used in Ethernet

Department of Computer Science, University of Peshawar CSMA/CD procedure

Department of Computer Science, University of Peshawar CSMA/CA Carrier Sense Multiple Access with collision avoidance No chance of collision Used in Wireless LANs

Department of Computer Science, University of Peshawar CSMA/CA procedure

Department of Computer Science, University of Peshawar Control Access Reservation Polling Token Passing

Department of Computer Science, University of Peshawar Reservation access method

Department of Computer Science, University of Peshawar Polling One primary station, other devices are secondary stations All data transmission must be made through the primary device The secondary devices follow its instructions In case of receiving the data, the primary device does polling In case of sending the data, the primary device does selection

Department of Computer Science, University of Peshawar Select

Department of Computer Science, University of Peshawar Poll

Department of Computer Science, University of Peshawar Token passing A station is authorized to send data when it receives a special frame called token When no data are being sent, a token is circulating around the ring. If a station needs to send data, it waits for the token

Department of Computer Science, University of Peshawar Token-passing network

Department of Computer Science, University of Peshawar Token-passing procedure

Department of Computer Science, University of Peshawar Local Area Networks: Ethernet

Department of Computer Science, University of Peshawar History of Ethernet Developed by Xerox’s Palo Alto Research Center (PARC) in 1976 IEEE standard

Department of Computer Science, University of Peshawar Traditional Ethernet  Designed to operate at 10 Mbps  Access Method CSMA/CD  Ethernet frame contains 7 fields

Department of Computer Science, University of Peshawar MAC frame

Department of Computer Science, University of Peshawar MAC frame cont… Preamble 7 bytes (56 bits) alternating 0’s and 1’s alert the receiver to the coming frame SFD 1 byte ( ) Shows beginning of the frame Last 2 bits 11 alert the receiver that the next field is the DA DA 6 bytes Contains the physical address of the receiver SA 6 bytes Contains the physical address of the sender

Department of Computer Science, University of Peshawar MAC frame cont… Length/type Defines the length of the Data field Data Caries the data, min of 46 and max 1500 bytes CRC Contains error detection information

Department of Computer Science, University of Peshawar Minimum and maximum length

Department of Computer Science, University of Peshawar Ethernet addresses in hexadecimal notation

Department of Computer Science, University of Peshawar Categories of traditional Ethernet

Department of Computer Science, University of Peshawar Physical layer

Department of Computer Science, University of Peshawar PLS

Department of Computer Science, University of Peshawar Fast Ethernet Operates at 100 Mbps Physical Layer Implementation  RS (Reconciliation Sublayer)  responsible for passing of 4 bit data to MII  MII (Medium Independent Interface)  AUI was replaced with MII  PHY (Transceiver)  Responsible for encoding and decoding

Department of Computer Science, University of Peshawar Fast Ethernet implementations

Department of Computer Science, University of Peshawar Fast Ethernet physical layer

Department of Computer Science, University of Peshawar Gigabit Ethernet Operates at 1000 Mbps Physical Layer Implementation  RS  responsible for passing of 8 bit data to GMII  GMII  Connects RS to the PHY  PHY (Transceiver)  Encodes and decodes the data

Department of Computer Science, University of Peshawar Gigabit Ethernet implementations

Department of Computer Science, University of Peshawar Physical layer in Gigabit Ethernet

Department of Computer Science, University of Peshawar Thank you!