Presentation is loading. Please wait.

Presentation is loading. Please wait.

Access Methods in Network

Similar presentations


Presentation on theme: "Access Methods in Network"— Presentation transcript:

1 Access Methods in Network
Point to Point Protocol (PPP) Shared Link Access Protocol

2 Dedicated Link or Shared Link
2 devices in a network can be connected by : Dedicated link Shared link

3 Point to Point Access method for connection using dedicated link known as Point to Point access Most common protocol for this access is Point-to-Point Protocol (PPP) Exp: Internet user makes a connection from his/her home to ISP

4 Users have traditional modem (DSL or cable)
Telephone line or TV cable provides physical connection, but to control and manage the transfer of data, there is a need for a PPP at data link layer.

5 What PPP provides: Defines the format of the frame to be exchanged between devices Defines how two devices can negotiate the establishment of the link and the exchange of data Defines how network layer data are encapsulated in the data link frame. Defines how two devices can authenticate each other

6 PPP Stack Although PPP is a data link layer protocol, it uses another set of other protocols to establish the link : Link Control Protocol Responsible for establishing, maintaining, configuring and terminating links Authentication Protocol Verification of user identity (exp: dial up session) PAP (password) and CHAP (challenge handshake) Network Control Protocol To encapsulate data (network layer protocol -> PPP frame)

7 PPP frame –HDLC version

8 Transition phase in PPP

9 Protocol stack

10 LCP packet encapsulated in a frame

11 Password Authentication Protocol

12 PAP Packet

13 Challenge Handshake Authentication Protocol

14 Example of CHAP

15 Shared link methods When multiple stations are connected and use a common link, called a multipoint or broadcast link, we need a multiple access protocol to coordinate access to the link

16 There are procedures to guarantee that :
Shared link There are procedures to guarantee that : Each station can access the medium No 2 stations can access the medium at the same time No station interrupt the other station No station monopolize the access

17 Multiple access protocols

18 Random Access Protocol
No station is superior to another station and none is assigned the control over another If > 1 station tries to access the link, there is an access conflict- collision- and the frames will be either destroyed or modified.

19 Random Access Protocol
To avoid access conflict or to resolve it when it happens, each station follow the procedure that answer the following questions: When can the station access the medium ? What can the station determine the success or failure of the transmission ? How can the station determine the success or failure of the transmission ? What can the station do if there is an access conflict ?

20 Random access method evolusion

21 Multiple Access: ALOHA – The earliest random access protocol
Developed at Univ. of Hawaii (1970-an) for radio wireless LAN with data rate 9600bps Base station– central controller To send data, needs to go through base station

22 Multiple Access : ALOHA
ALOHA Protocol follows these regulations: Multiple access : Any stations sending frame when it has data to be sent Acknowledgement : After sending frame, station waiting for acknowledgement. If nothing received with certain allocated time, station waits (use backoff strategy) and resend it Station stop if has tried several times

23 ALOHA Protocol Procedure

24 Carrier Sense Multiple Access (CSMA)
To minimize the chance of collision and to sense the medium before trying to use it Each station first listen to medium before sending However collision can still happen due to propagation delay – time spend by first bit to reach the destination

25 Collision in CSMA

26 Persistent strategy Dgn strategi gigih-p, bergtg kpd kebrgkalian tersebut. Jika p=0.2, stesen mempunyai 20 kemungkinan (drp 100) utk menggunakan talian. Jika stesen mengesan talian sedang idle, ia akan janakan suatu no. rawak (1-100), jika no. tersebut < 20, stesen akan menghantar data

27 Carrier Sense Multiple Access/Carrier Detect (CSMA/CD)
CSMA tidak menakrifkan prosedur sekiranya berlaku perlanggaran Dlm CSMA/CD, mana2 stesen boleh menghantar data Stesen kemudian memantau talian utk mengetahui status penghantaran (berjaya/gagal) Jika berlaku perlanggaran, kerangka akan dihantar semula Bgimanapun utk elakkan perlanggaran drp berulang, ia menunggu (strategi backoff ) utk suatu jangkamasa Jangkamasa bertambah jika perlanggaran lebih kerap berlaku Diguna dlm rangkaian Ethernet tradisional

28 Prosedur CSMA/CD

29 Carrier Sense Multiple Access/ Collision Avoidance (CSMA/CA)
Kaedah ini berbeza kerana ia mengelak berlakunya perlanggaran Stesen menggunakan strategi gigih. Jika talian didapati dlm keadaan melahu (idle), stesen menunggu selama IFG (interframe gap) Stesen menunggu lagi utk suatu jangkamasa rawak Kemudian ia menghantar data dan menunggu perakuan utk suatu jangkamasa tertentu Jika tidak diterima, nilai backoff ditingkatkan dan talian didengar sebelum penghantaran semula Diguna dlm rangkaian WLAN

30 CSMA/CA procedure

31 Controlled Access The stations consult one another to find which station has the right to send A station cannot send unless it has been authorized by other stations 3 popular methods: Reservation Polling Token Passing

32 A station needs to make a reservation before sending data
Time is divided into intervals In each interval, a reservation frame precedes the data frames sent in that interval If there are N stations in the system, there are exactly N reservation minislots in the reservation frame. The stations that have made reservation can send their data frames after the reservation frame

33 Polling Works with topologies in which one device is designated as a primary station and others as secondary stations. All data exchanges must be made through the primary station. Primary station controls the link. If the primary wants to receive data, it asks the secondaries if they have anything to send; this is called poll function If the primary wants to send data, it tells the secondary to get ready to receive; this is called select function

34 Selecting process

35 Polling process

36 Token Passing A Station is allowed to send data when it receives a special packet called token In this method, the stations in a network are organized in a logical ring For each station, there is a predecessor and a successor Packet received from predecessor and sent to successor

37 Token Passing When data is sent, token circulates through the ring
When a station has some data to send, it waits until it receives the token from its predecessor. It then holds the token and sends its data. When the station has no more data to send, it releases the token, passing it to the next logical station in the ring. The station cannot send data until it receives the token again in the next round. If a station receives the token and has no data to send, it just passes the data to the next station

38 Token Passing procedures

39 Channelization Multiple access method in which the available bandwidth of a link is shared in time, frequency or code between different stations. 3 popular channelization protocol: FDMA – the available bandwidth is divided into frequency bands TDMA – the stations share the bandwidth of the channel in time CDMA – differs from FDMA because only one channel occupies the entire bandwidth of the link; differs from TDMA because all stations can send data simultaneously, no time sharing

40 CDMA Still new in implementation
A channel carry all data transmission simultaneously Based on coding theory . Each station is assigned a code, which is a sequence of numbers called chips

41 Data representation

42 CDMA multiplexing

43 CDMA demultiplexing

44 Sequence generation using Walsh Table : W1 and W2N

45 Sequence generation using Chips

46 Example 1 Check to see if the second property about orthogonal codes holds for our CDMA example. Solution The inner product of each code by itself is N. This is shown for code C; you can prove for yourself that it holds true for the other codes. C . C = [+1, +1, -1, -1] . [+1, +1, -1, -1] = = 4 If two sequences are different, the inner product is 0. B . C = [+1, -1, +1, -1] . [+1, +1, -1, -1] = = 0

47 Example 2 Check to see if the third property about orthogonal codes holds for our CDMA example. Solution The inner product of each code by its complement is -N. This is shown for code C; you can prove for yourself that it holds true for the other codes. C . (-C ) = [+1, +1, -1, -1] . [-1, -1, +1, +1] = = -4 The inner product of a code with the complement of another code is 0. B . (-C ) = [+1, -1, +1, -1] . [-1, -1, +1, +1] = = 0


Download ppt "Access Methods in Network"

Similar presentations


Ads by Google