SlideShare ist ein Scribd-Unternehmen logo
1 von 53
Multiple Access
Komunikasi Data

Adapted from lecture slides by Behrouz A. Forouzan
© The McGraw-Hill Companies, Inc. All rights reserved

Anhar, ST., MT
anhar19@gmail.com
http://anhar.staff.unri.ac.id
Jurusan Teknik Elektro
Univ. Riau
Outline





Multiple access mechanisms
Random access
Controlled access
Channelization

2
Data Link Layer
Sublayers of Data Link
Layer

4
Multiple Access Links and
Protocols
Three types of “links”:
 Point-to-point (single wire, e.g. PPP,
SLIP)
 Broadcast (shared wire or medium; e.g,
Ethernet, WiFi/WaveLAN, etc.)



Switched (e.g., switched Ethernet, ATM etc)
Multiple access problem





Example:
Classroom– many people gather together in a
large room
Broadcast medium – air
Human protocols:







“Give everyone a chance to speak”
“Don’t speak until you are spoken to”
“Don’t monopolize the conversation”
“Raise your hand if you have a question”
“Don’t interrupt when someone is speaking”
“Don’t fall asleep when someone else is talking”
Multiple access protocols







In LANs, WiFi, satellite networks
If more than 2 users send @ the same time collision
All collided packets are lost -> waste of bandwidth
Ideally, the MAC protocol for a broadcast channel
with the bit-rate R bps should satisfy:






if only 1 node is sending than the throughput is R
when M nodes have data to send than the throughput is
R/M
decentralized protocol – no master
simple & inexpensive to implement
MAC Protocols: Taxonomy

Three broad classes:
 Channel Partitioning






Random Access





divide channel into smaller “pieces” (time slots,
frequency)
allocate piece to node for exclusive use
allow collisions
“recover” from collisions

“Taking turns”


tightly coordinate shared access to avoid
collisions
Goal: efficient, fair, simple, decentralized
Multiple Access
Mechanisms

9
Random Access
Random Access



Also called contention-based access
No station is assigned to control another

11
Random Access Protocols


In random access or contention methods,
no station is superior to another station
and none is assigned the control over
another. No station permits, or does not
permit, another station to send. At each
instance, a station that has data to send
uses a procedure defined by the protocol
to make a decision on whether or not to
send.
Random Access




1.
2.
3.

4.

If more than one station wants to send,
there is an access conflict -- Collision—
To avoid access conflict each station has
to follow procedure that will answers the
following questions:
When can the station access the medium?
What can the station do if the medium is busy?
How can the station determine the success or failure of the
transmission
What can the station do if there is an access conflict?
ALOHA Network


Developed by Norm Abramson at the Univ. of Hawaii




the guy had interest in surfing and packet switching
mountainous islands → land-based network difficult to install
fully decentralized protocol

ACK
ACK

ACK
ACK
Frames in Pure ALOHA

15
ALOHA Protocol

16
Example


Calculate possible values of TB, when
stations on an ALOHA network are a
maximum of 600 km apart
Tp = (600 × 103) / (3 × 108) = 2 ms



When K=1, TB ∈ {0ms,2ms}



When K=2, TB ∈ {0ms,2ms,4ms,6ms}



:
17
ALOHA: Vulnerable Time

18
ALOHA: Throughput






Assume number of stations trying to
transmit follow Poisson Distribution
The throughput for pure ALOHA is
S = G × e−2G
where G is the average number of frames
requested per frame-time
The maximum throughput


Smax = 0.184 when G= 1/2

19
Example


A pure ALOHA network transmits 200-bit
frames on a shared channel of 200 kbps.
What is the throughput if the system (all
stations together) produces




1000 frames per second
500 frames per second
250 frames per second

20
Slotted ALOHA

21
Slotted ALOHA: Vulnerable Time

22
Slotted ALOHA:
Throughput


The throughput for Slotted ALOHA is
S = G × e−G



where G is the average number of frames
requested per frame-time
The maximum throughput


Smax = 0.368 when G= 1
23
Example


A Slotted ALOHA network transmits 200bit frames on a shared channel of 200
kbps. What is the throughput if the system
(all stations together) produces




1000 frames per second
500 frames per second
250 frames per second

24
Multiple Access Protocols

ALOHA
CSMA


C arrier S ense M ultiple A ccess




"Listen before talk"

Reduce the possibility of collision


But cannot completely eliminate it

26
Collision in CSMA

27
CSMA: Vulnerable Time

28
Persistence Methods


What a station does when channel is idle or busy

29
Persistence Methods

30
CSMA/CD




C arrier S ense M ultiple A ccess with
C ollision D etection
Station monitors channel when sending a
frame

31
Carrier Sensing Multiple Access with
Collision detection (CSMA-CD)


Jika station dp mengetahui apakah collision terjadi,
maka bandwith yang terbuang dpt dikurangi dengan
menghentikan transmisi
Carrier Sensing Multiple Access with
Collision detection (CSMA-CD)
Carrier Sensing Multiple Access with
Collision detection (CSMA-CD)






Station yang mempunyai paket mendeteksi kanal dan
transmit jika kanal idle
Jika kanal sibuk, gunakan strategi dari CSMA (persist,
backoff segera atau persist dengan prob. p)
Jika collision terdeteksi saat transmisi, sinyal short
jamming ditransmisikan untuk meyakinkan semua
station mengetahui terjadi collision sebelum
menghentikan transmisi, selanjutnya algoritma backoff
digunakan untuk rescheduling waktu resensing
Carrier Sensing Multiple Access with
Collision detection (CSMA-CD)


Kanal mempunyai 3 kondisi (state):








sibuk mentransmisikan frame
idle
perioda contention (dimana station berusaha menduduki kanal)

Throughput 1-Persistent CSMA-CD dapat dianalisa dg
asumsi waktu dibagi dalam minislot sebesar 2tprop det
(untuk menjamin station selalu dapat mendeteksi
collision)
Setiap kanal menjadi idle, station memperebutkan
(contend) kanal dengan transmit dan mendengar untuk
mengetahui apakah sukses menduduki kanal
CSMA/CD: Minimum Frame Size




Each frame must be large enough for a sender
to detect a collision
Worst case scenario:



"A" is transmitting
"D" starts transmitting just before A's signal arrives
A

B

C

D

Long enough to
hear colliding signal
from D

36
Example


A CSMA/CD network has a bandwidth of
10 Mbps. If the maximum propagation
time is 25.6 μs, what is the minimum size
of the frame?

37
CSMA/CD: Flow Diagram

38
Multiple Access Protocols

ALOHA
CSMA/CA




C arrier S ense M ultiple A ccess with
C ollision A voidance
Used in a network where collision cannot
be detected


E.g., wireless LAN

IFS – Interframe Space
40
CSMA/ CA
In wireless networks collision is avoided.
 Collisions are avoided through following
strategies:
1. Interframe Space
2. Contention Window
3. Acknowledgment

CSMA/CA: Flow Diagram

contention window
size is 2K-1

After each slot:
- If idle, continue counting
- If busy, stop counting

42
Controlled Access
Control Access




A station must be authorized by someone
(e.g., other stations) before transmitting
Three common methods:




Reservation
Polling
Token passing

44
Reservation




A station must make a reservation before sending
data
Time is divided into intervals





A reservation frame proceeds each time interval
Number of stations and number of time slots in the
reservation frame are equal
Each time slot belongs to a particular station
Polling


Devises are categorized into:








All data exchange must go through the primary station
Primary station controls the link and initiates the session
Secondary station obey the instructions of PS.
PS polls stations




Primary station (PS)
Secondary station (SS)

Asking SS if they have something to send

PS select a SS


Telling it to get ready to receive data
Poll procedure
Select procedure
Token passing










the stations in a network are organized in a logical ring
for each station, there is a predecessor and a successor
for a station to access the channel, it must posses a token
(special packet) that gives the station the right to access the
channel and send its data
once the station has finished its task, the token will then be
passed to the successor (next station)
the station cannot send data until it receives the token again in
the next round
token management is necessary





Every station is limited in the time of token possession
Token must be monitored to ensure no lose or destroyed
Assign priorities to the stations and to the types of data transmitted
To make low-priority stations release the token to high priority stations
Token Passing procedure
Token passing


Logical Ring


in a token passing network, stations do not have to be physically connected
in a ring; the ring can be a logical one.
Channelization
Channelization



Similar to multiplexing
Three schemes




Frequency-Division Multiple Access (FDMA)
Time-Division Multiple Access (TDMA)
Code-Division Multiple Access (CDMA)

53

Weitere ähnliche Inhalte

Was ist angesagt?

12 multiple access
12 multiple access12 multiple access
12 multiple access
bheemsain
 
Ethernet and token ring
Ethernet and token ringEthernet and token ring
Ethernet and token ring
Abhijeet Shah
 

Was ist angesagt? (20)

Csma protocols
Csma protocolsCsma protocols
Csma protocols
 
CSMA /CD PPT ON SLIDESHARE
CSMA /CD PPT ON SLIDESHARECSMA /CD PPT ON SLIDESHARE
CSMA /CD PPT ON SLIDESHARE
 
Csma
CsmaCsma
Csma
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
 
12 multiple access
12 multiple access12 multiple access
12 multiple access
 
Transport layer
Transport layerTransport layer
Transport layer
 
Ethernet
EthernetEthernet
Ethernet
 
Controlled Access Protocols
Controlled Access ProtocolsControlled Access Protocols
Controlled Access Protocols
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
 
Packet radio protocol
Packet radio protocolPacket radio protocol
Packet radio protocol
 
Multiple access protocol
Multiple access protocolMultiple access protocol
Multiple access protocol
 
Carrier Sense Multiple Access (CSMA)
Carrier Sense Multiple Access (CSMA)Carrier Sense Multiple Access (CSMA)
Carrier Sense Multiple Access (CSMA)
 
Mac layer
Mac  layerMac  layer
Mac layer
 
Computer networks - Channelization
Computer networks - ChannelizationComputer networks - Channelization
Computer networks - Channelization
 
Computer network switching
Computer network switchingComputer network switching
Computer network switching
 
M.A.C (Medium Access Control)
M.A.C (Medium Access Control)M.A.C (Medium Access Control)
M.A.C (Medium Access Control)
 
Shannon Capacity.pptx
Shannon Capacity.pptxShannon Capacity.pptx
Shannon Capacity.pptx
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
 
Ethernet and token ring
Ethernet and token ringEthernet and token ring
Ethernet and token ring
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
 

Andere mochten auch

Pure Aloha and Slotted Aloha
Pure Aloha and Slotted AlohaPure Aloha and Slotted Aloha
Pure Aloha and Slotted Aloha
Chun-Kang Luo
 
C07 wireless la-ns
C07 wireless la-nsC07 wireless la-ns
C07 wireless la-ns
Rio Nguyen
 
seminar report on multiple access control protocol submitted by munesh
seminar report on multiple access control protocol submitted by munesh seminar report on multiple access control protocol submitted by munesh
seminar report on multiple access control protocol submitted by munesh
meenamunesh
 

Andere mochten auch (19)

Aloha
AlohaAloha
Aloha
 
ALOHA Protocol (in detail)
ALOHA Protocol (in detail)ALOHA Protocol (in detail)
ALOHA Protocol (in detail)
 
Introduction To Wireless Fading Channels
Introduction To Wireless Fading ChannelsIntroduction To Wireless Fading Channels
Introduction To Wireless Fading Channels
 
CSMA/CA
CSMA/CACSMA/CA
CSMA/CA
 
csma ca
 csma ca csma ca
csma ca
 
Francesco Varanini Information & Comminication Technology iCT come leva strat...
Francesco Varanini Information & Comminication Technology iCT come leva strat...Francesco Varanini Information & Comminication Technology iCT come leva strat...
Francesco Varanini Information & Comminication Technology iCT come leva strat...
 
Plc basics
Plc basicsPlc basics
Plc basics
 
Tugas kelompok jarkom
Tugas kelompok jarkomTugas kelompok jarkom
Tugas kelompok jarkom
 
Lecture 13
Lecture 13Lecture 13
Lecture 13
 
Pure Aloha and Slotted Aloha
Pure Aloha and Slotted AlohaPure Aloha and Slotted Aloha
Pure Aloha and Slotted Aloha
 
Ch13
Ch13Ch13
Ch13
 
Csmaca
CsmacaCsmaca
Csmaca
 
Ch 13
Ch 13Ch 13
Ch 13
 
C07 wireless la-ns
C07 wireless la-nsC07 wireless la-ns
C07 wireless la-ns
 
seminar report on multiple access control protocol submitted by munesh
seminar report on multiple access control protocol submitted by munesh seminar report on multiple access control protocol submitted by munesh
seminar report on multiple access control protocol submitted by munesh
 
Ch12
Ch12Ch12
Ch12
 
802.11n Tutorial
802.11n Tutorial802.11n Tutorial
802.11n Tutorial
 
Ch14
Ch14Ch14
Ch14
 
Switching
SwitchingSwitching
Switching
 

Ähnlich wie 9 multiple access

Network Topologies
Network TopologiesNetwork Topologies
Network Topologies
Jason Hando
 
Wired Lan Ethernet - DATA Link Layer
Wired Lan Ethernet - DATA Link LayerWired Lan Ethernet - DATA Link Layer
Wired Lan Ethernet - DATA Link Layer
Taimoor Muzaffar Gondal
 
16 high speedla-ns
16 high speedla-ns16 high speedla-ns
16 high speedla-ns
Mayur Garg
 
16 high speedla-ns
16 high speedla-ns16 high speedla-ns
16 high speedla-ns
Mayur Garg
 
Unit-2 Media Access Protocols.pdf
Unit-2 Media Access Protocols.pdfUnit-2 Media Access Protocols.pdf
Unit-2 Media Access Protocols.pdf
SmtPArunaKumari
 

Ähnlich wie 9 multiple access (20)

MultipleAccess.ppt
MultipleAccess.pptMultipleAccess.ppt
MultipleAccess.ppt
 
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptxComputer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptx
 
Network Topologies
Network TopologiesNetwork Topologies
Network Topologies
 
Wired Lan Ethernet - DATA Link Layer
Wired Lan Ethernet - DATA Link LayerWired Lan Ethernet - DATA Link Layer
Wired Lan Ethernet - DATA Link Layer
 
10 high speedla-ns
10 high speedla-ns10 high speedla-ns
10 high speedla-ns
 
Unit 1 mac vsd
Unit 1 mac vsdUnit 1 mac vsd
Unit 1 mac vsd
 
Multiple Access in Computer Network
Multiple Access in Computer NetworkMultiple Access in Computer Network
Multiple Access in Computer Network
 
Unit 3 - Data Link Layer - Part B
Unit 3 - Data Link Layer - Part BUnit 3 - Data Link Layer - Part B
Unit 3 - Data Link Layer - Part B
 
16 high speedla-ns
16 high speedla-ns16 high speedla-ns
16 high speedla-ns
 
16 high speedla-ns
16 high speedla-ns16 high speedla-ns
16 high speedla-ns
 
Mac
MacMac
Mac
 
kamalaveni.ppt
kamalaveni.pptkamalaveni.ppt
kamalaveni.ppt
 
Unit-2 Media Access Protocols.pdf
Unit-2 Media Access Protocols.pdfUnit-2 Media Access Protocols.pdf
Unit-2 Media Access Protocols.pdf
 
aloha
alohaaloha
aloha
 
dcn.pdf
dcn.pdfdcn.pdf
dcn.pdf
 
WHAT IS MAC-1 presentation for information .pptx
WHAT IS MAC-1 presentation for information  .pptxWHAT IS MAC-1 presentation for information  .pptx
WHAT IS MAC-1 presentation for information .pptx
 
Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...
Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...
Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...
 
CN R16 -UNIT-4.pdf
CN R16 -UNIT-4.pdfCN R16 -UNIT-4.pdf
CN R16 -UNIT-4.pdf
 
Multiple Access Methods
Multiple Access MethodsMultiple Access Methods
Multiple Access Methods
 
Multiple Access Networking
Multiple Access NetworkingMultiple Access Networking
Multiple Access Networking
 

Mehr von ampas03

Digital 131341 t 27623-analisis kualitas-tinjauan literatur
Digital 131341 t 27623-analisis kualitas-tinjauan literaturDigital 131341 t 27623-analisis kualitas-tinjauan literatur
Digital 131341 t 27623-analisis kualitas-tinjauan literatur
ampas03
 
Dasar telekomunikasi
Dasar telekomunikasiDasar telekomunikasi
Dasar telekomunikasi
ampas03
 
komunikasi serat optik
komunikasi serat optikkomunikasi serat optik
komunikasi serat optik
ampas03
 
Serat Optik
Serat OptikSerat Optik
Serat Optik
ampas03
 
Network layer m6
Network layer m6Network layer m6
Network layer m6
ampas03
 
Materi s-parameter
Materi s-parameterMateri s-parameter
Materi s-parameter
ampas03
 
Matching impedance
Matching impedanceMatching impedance
Matching impedance
ampas03
 
Makalah phase shift keying
Makalah phase shift keyingMakalah phase shift keying
Makalah phase shift keying
ampas03
 
Jaringan dan teknologi fiber opti kkkkkkk
Jaringan dan teknologi fiber opti kkkkkkkJaringan dan teknologi fiber opti kkkkkkk
Jaringan dan teknologi fiber opti kkkkkkk
ampas03
 
Datalink layer m5
Datalink layer m5Datalink layer m5
Datalink layer m5
ampas03
 
Bounce diagram technique
Bounce diagram techniqueBounce diagram technique
Bounce diagram technique
ampas03
 
Bahan presentasi
Bahan presentasiBahan presentasi
Bahan presentasi
ampas03
 
Bab 4 perkembangan dan kemajuan sistem komunikasi bergerak
Bab 4 perkembangan dan kemajuan sistem komunikasi bergerakBab 4 perkembangan dan kemajuan sistem komunikasi bergerak
Bab 4 perkembangan dan kemajuan sistem komunikasi bergerak
ampas03
 
Bab 3 konsep sistem komunikasi bergerak
Bab 3 konsep sistem komunikasi bergerakBab 3 konsep sistem komunikasi bergerak
Bab 3 konsep sistem komunikasi bergerak
ampas03
 
Bab 2 arsitektur sistem komunikasi bergerak
Bab 2 arsitektur sistem komunikasi bergerakBab 2 arsitektur sistem komunikasi bergerak
Bab 2 arsitektur sistem komunikasi bergerak
ampas03
 
Bab 1 pendahuluan
Bab 1 pendahuluanBab 1 pendahuluan
Bab 1 pendahuluan
ampas03
 
10 wired lan
10 wired lan10 wired lan
10 wired lan
ampas03
 
10 hub bridgeswitch
10 hub bridgeswitch10 hub bridgeswitch
10 hub bridgeswitch
ampas03
 
5 multiplexing dan media transmisi(1)
5 multiplexing dan media transmisi(1)5 multiplexing dan media transmisi(1)
5 multiplexing dan media transmisi(1)
ampas03
 

Mehr von ampas03 (20)

Digital 131341 t 27623-analisis kualitas-tinjauan literatur
Digital 131341 t 27623-analisis kualitas-tinjauan literaturDigital 131341 t 27623-analisis kualitas-tinjauan literatur
Digital 131341 t 27623-analisis kualitas-tinjauan literatur
 
Dasar telekomunikasi
Dasar telekomunikasiDasar telekomunikasi
Dasar telekomunikasi
 
komunikasi serat optik
komunikasi serat optikkomunikasi serat optik
komunikasi serat optik
 
Serat Optik
Serat OptikSerat Optik
Serat Optik
 
Network layer m6
Network layer m6Network layer m6
Network layer m6
 
Materi s-parameter
Materi s-parameterMateri s-parameter
Materi s-parameter
 
Matching impedance
Matching impedanceMatching impedance
Matching impedance
 
Makalah phase shift keying
Makalah phase shift keyingMakalah phase shift keying
Makalah phase shift keying
 
Komdat
KomdatKomdat
Komdat
 
Jaringan dan teknologi fiber opti kkkkkkk
Jaringan dan teknologi fiber opti kkkkkkkJaringan dan teknologi fiber opti kkkkkkk
Jaringan dan teknologi fiber opti kkkkkkk
 
Datalink layer m5
Datalink layer m5Datalink layer m5
Datalink layer m5
 
Bounce diagram technique
Bounce diagram techniqueBounce diagram technique
Bounce diagram technique
 
Bahan presentasi
Bahan presentasiBahan presentasi
Bahan presentasi
 
Bab 4 perkembangan dan kemajuan sistem komunikasi bergerak
Bab 4 perkembangan dan kemajuan sistem komunikasi bergerakBab 4 perkembangan dan kemajuan sistem komunikasi bergerak
Bab 4 perkembangan dan kemajuan sistem komunikasi bergerak
 
Bab 3 konsep sistem komunikasi bergerak
Bab 3 konsep sistem komunikasi bergerakBab 3 konsep sistem komunikasi bergerak
Bab 3 konsep sistem komunikasi bergerak
 
Bab 2 arsitektur sistem komunikasi bergerak
Bab 2 arsitektur sistem komunikasi bergerakBab 2 arsitektur sistem komunikasi bergerak
Bab 2 arsitektur sistem komunikasi bergerak
 
Bab 1 pendahuluan
Bab 1 pendahuluanBab 1 pendahuluan
Bab 1 pendahuluan
 
10 wired lan
10 wired lan10 wired lan
10 wired lan
 
10 hub bridgeswitch
10 hub bridgeswitch10 hub bridgeswitch
10 hub bridgeswitch
 
5 multiplexing dan media transmisi(1)
5 multiplexing dan media transmisi(1)5 multiplexing dan media transmisi(1)
5 multiplexing dan media transmisi(1)
 

Kürzlich hochgeladen

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Kürzlich hochgeladen (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

9 multiple access

  • 1. Multiple Access Komunikasi Data Adapted from lecture slides by Behrouz A. Forouzan © The McGraw-Hill Companies, Inc. All rights reserved Anhar, ST., MT anhar19@gmail.com http://anhar.staff.unri.ac.id Jurusan Teknik Elektro Univ. Riau
  • 2. Outline     Multiple access mechanisms Random access Controlled access Channelization 2
  • 4. Sublayers of Data Link Layer 4
  • 5. Multiple Access Links and Protocols Three types of “links”:  Point-to-point (single wire, e.g. PPP, SLIP)  Broadcast (shared wire or medium; e.g, Ethernet, WiFi/WaveLAN, etc.)  Switched (e.g., switched Ethernet, ATM etc)
  • 6. Multiple access problem     Example: Classroom– many people gather together in a large room Broadcast medium – air Human protocols:       “Give everyone a chance to speak” “Don’t speak until you are spoken to” “Don’t monopolize the conversation” “Raise your hand if you have a question” “Don’t interrupt when someone is speaking” “Don’t fall asleep when someone else is talking”
  • 7. Multiple access protocols     In LANs, WiFi, satellite networks If more than 2 users send @ the same time collision All collided packets are lost -> waste of bandwidth Ideally, the MAC protocol for a broadcast channel with the bit-rate R bps should satisfy:     if only 1 node is sending than the throughput is R when M nodes have data to send than the throughput is R/M decentralized protocol – no master simple & inexpensive to implement
  • 8. MAC Protocols: Taxonomy Three broad classes:  Channel Partitioning    Random Access    divide channel into smaller “pieces” (time slots, frequency) allocate piece to node for exclusive use allow collisions “recover” from collisions “Taking turns”  tightly coordinate shared access to avoid collisions Goal: efficient, fair, simple, decentralized
  • 11. Random Access   Also called contention-based access No station is assigned to control another 11
  • 12. Random Access Protocols  In random access or contention methods, no station is superior to another station and none is assigned the control over another. No station permits, or does not permit, another station to send. At each instance, a station that has data to send uses a procedure defined by the protocol to make a decision on whether or not to send.
  • 13. Random Access   1. 2. 3. 4. If more than one station wants to send, there is an access conflict -- Collision— To avoid access conflict each station has to follow procedure that will answers the following questions: When can the station access the medium? What can the station do if the medium is busy? How can the station determine the success or failure of the transmission What can the station do if there is an access conflict?
  • 14. ALOHA Network  Developed by Norm Abramson at the Univ. of Hawaii    the guy had interest in surfing and packet switching mountainous islands → land-based network difficult to install fully decentralized protocol ACK ACK ACK ACK
  • 15. Frames in Pure ALOHA 15
  • 17. Example  Calculate possible values of TB, when stations on an ALOHA network are a maximum of 600 km apart Tp = (600 × 103) / (3 × 108) = 2 ms  When K=1, TB ∈ {0ms,2ms}  When K=2, TB ∈ {0ms,2ms,4ms,6ms}  : 17
  • 19. ALOHA: Throughput    Assume number of stations trying to transmit follow Poisson Distribution The throughput for pure ALOHA is S = G × e−2G where G is the average number of frames requested per frame-time The maximum throughput  Smax = 0.184 when G= 1/2 19
  • 20. Example  A pure ALOHA network transmits 200-bit frames on a shared channel of 200 kbps. What is the throughput if the system (all stations together) produces    1000 frames per second 500 frames per second 250 frames per second 20
  • 23. Slotted ALOHA: Throughput  The throughput for Slotted ALOHA is S = G × e−G  where G is the average number of frames requested per frame-time The maximum throughput  Smax = 0.368 when G= 1 23
  • 24. Example  A Slotted ALOHA network transmits 200bit frames on a shared channel of 200 kbps. What is the throughput if the system (all stations together) produces    1000 frames per second 500 frames per second 250 frames per second 24
  • 26. CSMA  C arrier S ense M ultiple A ccess   "Listen before talk" Reduce the possibility of collision  But cannot completely eliminate it 26
  • 29. Persistence Methods  What a station does when channel is idle or busy 29
  • 31. CSMA/CD   C arrier S ense M ultiple A ccess with C ollision D etection Station monitors channel when sending a frame 31
  • 32. Carrier Sensing Multiple Access with Collision detection (CSMA-CD)  Jika station dp mengetahui apakah collision terjadi, maka bandwith yang terbuang dpt dikurangi dengan menghentikan transmisi
  • 33. Carrier Sensing Multiple Access with Collision detection (CSMA-CD)
  • 34. Carrier Sensing Multiple Access with Collision detection (CSMA-CD)    Station yang mempunyai paket mendeteksi kanal dan transmit jika kanal idle Jika kanal sibuk, gunakan strategi dari CSMA (persist, backoff segera atau persist dengan prob. p) Jika collision terdeteksi saat transmisi, sinyal short jamming ditransmisikan untuk meyakinkan semua station mengetahui terjadi collision sebelum menghentikan transmisi, selanjutnya algoritma backoff digunakan untuk rescheduling waktu resensing
  • 35. Carrier Sensing Multiple Access with Collision detection (CSMA-CD)  Kanal mempunyai 3 kondisi (state):      sibuk mentransmisikan frame idle perioda contention (dimana station berusaha menduduki kanal) Throughput 1-Persistent CSMA-CD dapat dianalisa dg asumsi waktu dibagi dalam minislot sebesar 2tprop det (untuk menjamin station selalu dapat mendeteksi collision) Setiap kanal menjadi idle, station memperebutkan (contend) kanal dengan transmit dan mendengar untuk mengetahui apakah sukses menduduki kanal
  • 36. CSMA/CD: Minimum Frame Size   Each frame must be large enough for a sender to detect a collision Worst case scenario:   "A" is transmitting "D" starts transmitting just before A's signal arrives A B C D Long enough to hear colliding signal from D 36
  • 37. Example  A CSMA/CD network has a bandwidth of 10 Mbps. If the maximum propagation time is 25.6 μs, what is the minimum size of the frame? 37
  • 40. CSMA/CA   C arrier S ense M ultiple A ccess with C ollision A voidance Used in a network where collision cannot be detected  E.g., wireless LAN IFS – Interframe Space 40
  • 41. CSMA/ CA In wireless networks collision is avoided.  Collisions are avoided through following strategies: 1. Interframe Space 2. Contention Window 3. Acknowledgment 
  • 42. CSMA/CA: Flow Diagram contention window size is 2K-1 After each slot: - If idle, continue counting - If busy, stop counting 42
  • 44. Control Access   A station must be authorized by someone (e.g., other stations) before transmitting Three common methods:    Reservation Polling Token passing 44
  • 45. Reservation   A station must make a reservation before sending data Time is divided into intervals    A reservation frame proceeds each time interval Number of stations and number of time slots in the reservation frame are equal Each time slot belongs to a particular station
  • 46. Polling  Devises are categorized into:       All data exchange must go through the primary station Primary station controls the link and initiates the session Secondary station obey the instructions of PS. PS polls stations   Primary station (PS) Secondary station (SS) Asking SS if they have something to send PS select a SS  Telling it to get ready to receive data
  • 49. Token passing       the stations in a network are organized in a logical ring for each station, there is a predecessor and a successor for a station to access the channel, it must posses a token (special packet) that gives the station the right to access the channel and send its data once the station has finished its task, the token will then be passed to the successor (next station) the station cannot send data until it receives the token again in the next round token management is necessary     Every station is limited in the time of token possession Token must be monitored to ensure no lose or destroyed Assign priorities to the stations and to the types of data transmitted To make low-priority stations release the token to high priority stations
  • 51. Token passing  Logical Ring  in a token passing network, stations do not have to be physically connected in a ring; the ring can be a logical one.
  • 53. Channelization   Similar to multiplexing Three schemes    Frequency-Division Multiple Access (FDMA) Time-Division Multiple Access (TDMA) Code-Division Multiple Access (CDMA) 53