SlideShare a Scribd company logo
1 of 19
INDEX
1. Intoduction.

     a. Broadcast networks

     b.   Need of protocols in Broadcast channel

2.Types of Multiple –access protocol

     a. Random Access Protocols

             i.   ALOHA
            ii.   CSMA
           iii.   CSMA/CD
           iv.    CSMA/CA

    b.Controlled Access
          I. Reservation
         II. Polling
        III. Token -based

    c.Channelization
           I. FDMA
          II. TDMA
         III. CDMA
1.INTRODACTION
The media access control (MAC) data communication protocol sub-layer, also
known as the medium access control, is a sublayer of the data link layer specified
in the seven-layer OSI model (layer 2). It provides addressing and channel access
control mechanisms that make it possible for several terminals or network nodes
to communicate within a multiple access network that incorporates a shared
medium, e.g. Ethernet. The hardware that implements the MAC is referred to as a
medium access controller.




The MAC sub-layer acts as an interface between the logical link control (LLC)
sublayer and the network's physical layer. The MAC layer emulates a full-duplex
logical communication channel in a multi-point network. This channel may provide
unicast, multicast or broadcast communication service.

The channel access control mechanisms provided by the MAC layer Is known as a
multiple access protocol. This makes it possible for several stations connected to
the same physical medium to share it. Examples of shared physical media are bus
networks, ring networks, hub networks, wireless networks and half-duplex point-
to-point links. The multiple access protocol may detect or avoid data packet
collisions if a packet mode contention based channel access method is used, or
reserve resources to establish a logical channel if a circuit switched or
channelization based channel access method is used. The channel access control
mechanism relies on a physical layer multiplex scheme.
a. Broadcast networks
Broadcast networks have a single communication channel that is shared by all the
machines on the network. A packet sent by one computer is received by all the
other computers on the network. The packets that are sent contain the address of
the receiving computer; each computer checks this field to see if it matches its
own address. If it does not then it is usually ignored; if it does then it is read.
Broadcast channels are sometimes known as multi-access channel.




   b. Need of protocols in Broadcast channel
Issues in multi-access channel :

   • WHO is going to use the channel ?

   • WHEN the channel is going to be used ?

   • For HOW much time the channel is used ?

Due to shared channel and unregulated traffic over the network collisions and
data loss occur. Some protocol must be followed for regulated and safe
transmission over the network.


2.Types of Multiple –access protocol

Over the years, dozens of multiple access protocol have been implemented in a
variety of link-layer technologies. Nevertheless ,we can classify just about any
multiple access protocol as belonging to one of three categories .Random access
protocols, Controlled access protocols and channelization protocols.




   a. Random Access Protocols

In a random access protocol, a transmitting node always transmits at the full rate
of the channel, namely ,R bps .When there is a collision ,each node involved in the
collision repeatedly retransmits its frame( that is ,packet) until the frame gets
through without a collision. But when a node experiences a collision ,it doesn’t
necessarily retransmitting the frame right away. Instead it waits a random delay
before retransmitting the frame .Each node involved in a collision chooses
independent random delays .Because the random delays are independently
chosen , it is possible that one of the nodes will pick a delay that is sufficiently less
than the delays of the other colliding nodes and will therefore be able to sneak its
frame into the channel without a collision.

There are dozens of random access protocols in this we’ll describe a few of the
most commonly used random access protocols – the ALOHA protocol , CSMA
(carrier sense multiple access ) protocol , CSMA/CD (carrier sense multiple access
/collision detection) protocol and CSMA/CA (carrier sense multiple access winth
collision avoidance )protocol
I.   ALOHA

The original version of ALOHA used two distinct frequencies in a hub/star
configuration, with the hub machine broadcasting packets to everyone on the
"outbound" channel, and the various client machines sending data packets to the
hub on the "inbound" channel. If data was received correctly at the hub, a short
acknowledgment packet was sent to the client; if an acknowledgment was not
received by a client machine after a short wait time, it would automatically
retransmit the data packet after waiting a randomly selected time interval. This
acknowledgment mechanism was used to detect and correct for "collisions"
created when two client machines both attempted to send a packet at the same
time.

ALOHAnet's primary importance was its use of a shared medium for client
transmissions. Unlike the ARPANET where each node could only talk directly to a
node at the other end of a wire or satellite circuit, in ALOHAnet all client nodes
communicated with the hub on the same frequency. This meant that some sort of
mechanism was needed to control who could talk at what time. The ALOHAnet
solution was to allow each client to send its data without controlling when it was
sent, with an acknowledgment/retransmission scheme used to deal with
collisions. This became known as a pure ALOHA or random-accessed channel, and
was the basis for subsequent Ethernet development and later Wi-Fi networks.
Various versions of the ALOHA protocol (such as Pure ALOHA, Slotted ALOHA) also
appeared later in satellite communications, and were used in wireless data
networks such as ARDIS, GSM.

PURE ALOHA

The first version of the was quite simple:

      If you have data to send, send the data
      If the message collides with another transmission, try resending "later"

Note that the first step implies that Pure ALOHA does not check whether the
channel is busy before transmitting. The critical aspect is the "later" concept: the
quality of the backoff scheme chosen significantly influences the efficiency of the
protocol, the ultimate channel capacity, and the predictability of its behavior.
To assess Pure ALOHA, we need to predict its throughput, the rate of (successful)
transmission of frames. First, let's make a few simplifying assumptions:

      All frames have the same length.
      Stations cannot generate a frame while transmitting or trying to transmit.
      The population of stations attempts to transmit (both new frames and old
      frames that collided) according to a Poisson distribution.

Let "T" refer to the time needed to transmit one frame on the channel, and let's
define "frame-time" as a unit of time equal to T. Let "G" refer to the mean used in
the Poisson distribution over transmission-attempt amounts: that is, on average,
there are G transmission-attempts per frame-time.
Overlapping frames in the pure ALOHA protocol. Frame-time is equal to 1 for all
frames.

Pure Aloha efficiency
P(success by given node) = P(node transmits) .

                  P(no other node transmits in [t0-1,t0] .

                  P(no other node transmits in [t0,t0+1]

                  = p . (1-p)N-1 . (1-p)N-1

                  = p . (1-p)2(N-1)
          … choosing optimum p and then letting n ->   ...




           Efficiency = 1/(2e) = .18




Slotted ALOHA

An improvement to the original ALOHA protocol was "Slotted ALOHA", which
introduced discrete timeslots and increased the maximum throughput. A station
can send only at the beginning of a timeslot, and thus collisions are reduced. In
this case, we only need to worry about the transmission-attempts within 1 frame-
time and not 2 consecutive frame-times, since collisions can only occur during
each timeslot. Thus, the probability of there being zero transmission-attempts in a
single timeslot is:




Slotted ALOHA is used in low-data-rate tactical satellite communications networks
by military forces, in subscriber-based satellite communications networks, mobile
telephony call setup, and in the contactless RFID technologies.

Pros

   • single active node can continuously transmit at full rate of channel

   • highly decentralized: only slots in nodes need to be in sync

   • simple

Cons

   • collisions, wasting slots

   • idle slots

   • nodes may be able to detect collision in less than time to transmit packet

   • clock synchronization



   Efficiency is the long-run fraction of successful slots when there are many
   nodes, each with many frames to send

   • Suppose N nodes with many frames to send, each transmits in slot with
     probability p

   • prob that node 1 has success in a slot = p(1-p)N-1

   • prob that any node has a success = Np(1-p)N-1

   • For max efficiency with N nodes, find p* that maximizes
     Np(1-p)N-1

   • For many nodes, take limit of Np*(1-p*)N-1 as N goes to infinity, gives 1/e =
     .37

   • Efficiency is 37%, even with optimal p
II.      Carrier Sense Multiple Access

Carrier Sense Multiple Access (CSMA) is a probabilistic Media Access Control
(MAC) protocol in which a node verifies the absence of other traffic before
transmitting on a shared transmission medium, such as an electrical bus, or a
band of the electromagnetic spectrum.

"Carrier Sense" describes the fact that a transmitter uses feedback from a
receiver that detects a carrier wave before trying to send. That is, it tries to detect
the presence of an encoded signal from another station before attempting to
transmit. If a carrier is sensed, the station waits for the transmission in progress to
finish before initiating its own transmission.

"Multiple Access" describes the fact that multiple stations send and receive on
the medium. Transmissions by one node are generally received by all other
stations using the medium.




    Advantages

              Fairly simple to implement

              Functional scheme that works

    Disadvantages

              Can not recover from a collision
(inefficient waste of medium time)


     III.   CSMA/CD (Collision Detection)

Carrier sense multiple access with collision detection (CSMA/CD) is a Media
Access Control method in which.

      a carrier sensing scheme is used.
      a transmitting data station that detects another signal while transmitting a
      frame, stops transmitting that frame, transmits a jam signal, and then waits
      for a random time interval before trying to resend the frame.

CSMA/CD is a modification of pure carrier sense multiple access (CSMA).
CSMA/CD is used to improve CSMA performance by terminating transmission as
soon as a collision is detected, thus shortening the time required before a retry
can be attempted.




Algorithm

When a station wants to send some information, it uses the following algorithm.

Main procedure

   1. Frame ready for transmission.
   2. Is medium idle? If not, wait until it becomes ready
3. Start transmitting.
   4. Did a collision occur? If so, go to collision detected procedure.
   5. Reset retransmission counters and end frame transmission.

Collision detected procedure

   1. Continue transmission until minimum packet time is reached to ensure that
      all receivers detect the collision.
   2. Increment retransmission counter.
   3. Was the maximum number of transmission attempts reached? If so, abort
      transmission.
   4. Calculate and wait random backoff period based on number of collisions.
   5. Re-enter main procedure at stage 1.

Methods for collision detection are media dependent, but on an electrical bus
such as 10BASE-5 or 10BASE-2, collisions can be detected by comparing
transmitted data with received data or by recognizing a higher than normal signal
amplitude on the bus.

Jam signal

The jam signal is a signal that carries a 32-bit binary pattern sent by a data station
to inform the other stations that they must not transmit.

Advantages

          More efficient than basic CSMA

Disadvantages

          Requires ability to detect collisions




      IV.    Carrier Sense Multiple Access with Collision Avoidance
             (CSMA-CA)

Carrier sense multiple access with collision avoidance (CSMA/CA), in computer
networking, is a wireless network multiple access method in which:
a carrier sensing scheme is used.
      a node wishing to transmit data has to first listen to the channel for a
      predetermined amount of time to determine whether or not another node
      is transmitting on the channel within the wireless range. If the channel is
      sensed "idle," then the node is permitted to begin the transmission
      process. If the channel is sensed as "busy," the node defers its transmission
      for a random period of time. Once the transmission process begins, it is still
      possible for the actual transmission of application data to not occur

   • Timing in CSMA/CA




   • Interframe Space (IFS)
        – When an idle channel is found, the station does not send
            immediately but waits for a period of time call IFS
        – The IFS time allows the front of the transmitted signal by the distant
            station to reach this station
        – The IFS variable can also be used to prioritize stations or frame types
               • e.g., DIFS(Distributed IFS) , SIFS((Short)



CSMA/CA is a modification of carrier sense multiple access.

Collision avoidance is used to improve CSMA performance by not allowing
wireless transmission of a node if another node is transmitting, thus reducing the
probability of collision due to the use of a random truncated binary exponential
backoff time.
b.       Controlled Access
Controlled access protocols grant permission to send only to one node at a time,
avoiding collisions of messages on the shared medium. Predetermined channel
allocation schemes assign access rights to the nodes statically. Bandwidth
requirements need to be known in advance and the system cannot adapt to
changing needs at run time. Demand adaptive protocols take the current
demands of the nodes into account and grant network access accordingly. This
class can be subdivided into reservation,Polling and token -based schemes. If
network traffic is bursty, controlled access protocols are potentially inefficient,
because in that case they frequently grant transmission rights to nodes that do
not want to send. Even if such nodes immediately give up their rights, these
schemes may cause considerable overhead.


 I. Reservation
   • Features
        – Time is divided into intervals
              • In each interval, a reservation frame precedes the data frames
                 sent in that interval
        – N stations  N reservation minislots in the reservation frame
              • When a station needs to send a data frame  it makes a
                 reservation in its own minislot




II. Polling
   • Polling uses a centralized controller
– which cycles through stations on the network and gives each an
           opportunity to transmit a packet

   • During selection a controller can choose which station to poll at a given
     time

   • Select and Poll




   • There are two general polling policies:

         –   Round robin order

               • Round-robin means each station has an equal opportunity to
                 transmit packets

         –   Priority order

               • Priority order means some stations will have more opportunity
                 to send

For example, priority order might be used to assign an IP telephone higher priority
than a personal computer


III. Token Passing
Token passing is a channel access method where a signal called a token is passed
between nodes that authorizes the node to communicate. The most well-known
examples are token ring and ARCNET.

Token passing schemes provide round-robin scheduling, and if the packets are
equally sized, the scheduling is max-min fair. The advantage over contention
based channel access is that collisions are eliminated, and that the channel
bandwidth can be fully utilized without idle time when demand is heavy. The
disadvantage is that even when demand is light, a station wishing to transmit
must wait for the token, increasing latency.

   • Features
        – A station is authorized to send data when it receives a special frame
           called a token
        – Stations are arranged around a ring (physically or logically)
               • A token circulates around the ring
        – If a station needs to send data, it waits for the token
        – The station captures the token and sends one or more frames as long
           as the allocated time has not expired
        – It releases the token to be used by the successor station




   c. Channelization
   • Definition
        – A Multiple-access method in which the available BW of a link is
           shared in time, frequency, or through code, between different stations
   • Features
        – FDMA, TDMA are based on FDM and TDM in the physical layer
        – CDMA is a data link multiple-access protocol
I.    FDMA

Frequency Division Multiple Access or FDMA is a channel access method used in
multiple-access protocols as a channelization protocol. FDMA gives users an
individual allocation of one or several frequency bands, or channels. It is
particularly commonplace in satellite communication

   • Approach and features
       – A data link layer protocol that uses FDM at the physical layer
       – The available BW is shared by all stations
       – Each stations uses its allocated band to send its data
       – Ex. AMPS (1G cellular networks)




   II.   TDMA

Time division multiple access (TDMA) is a channel access method for shared
medium networks. It allows several users to share the same frequency channel by
dividing the signal into different time slots. The users transmit in rapid succession,
one after the other, each using its own time slot. This allows multiple stations to
share the same transmission medium while using only a part of its channel
capacity. TDMA is used in the digital 2G cellular systems such as Global System for
Mobile Communications (GSM) , Personal Digital Cellular (PDC), and in the Digital
Enhanced Cordless Telecommunications (DECT) standard for portable phones. It is
also used extensively in satellite systems, combat-net radio systems, and PON
networks for upstream traffic from premises to the operator. For usage of
Dynamic TDMA packet mode communication, see below.

   • Approach and features
       – A data link layer protocol that uses TDM at the physical layer
       – The stations share the capacity of the channel in time
       – Each station is allocated a time slot during which it can send data
       – Ex. GSM (2G cellular networks - Europe)




   III.   Code Division Multiple Access (CDMA)

   • used in several wireless broadcast channels (cellular, satellite, etc) standards
   • unique “code” assigned to each user; i.e., code set partitioning
   • all users share same frequency, but each user has own “chipping” sequence
     (i.e., code) to encode data
   • encoded signal = (original data) X (chipping sequence)
• decoding: inner-product of encoded signal and chipping sequence
  • allows multiple users to “coexist” and transmit simultaneously with minimal
    interference (if codes are “orthogonal”)

CDMA Encode/Decode
CDMA: two-sender interference

More Related Content

What's hot (20)

Mac layer
Mac  layerMac  layer
Mac layer
 
GSM & UMTS Security
GSM & UMTS SecurityGSM & UMTS Security
GSM & UMTS Security
 
HIGH SPEED NETWORKS
HIGH SPEED NETWORKSHIGH SPEED NETWORKS
HIGH SPEED NETWORKS
 
C08 wireless atm[1]
C08 wireless atm[1]C08 wireless atm[1]
C08 wireless atm[1]
 
WSN-Routing Protocols Energy Efficient Routing
WSN-Routing Protocols Energy Efficient RoutingWSN-Routing Protocols Energy Efficient Routing
WSN-Routing Protocols Energy Efficient Routing
 
Unit 33-routing protocols for wsn
Unit 33-routing protocols for wsnUnit 33-routing protocols for wsn
Unit 33-routing protocols for wsn
 
3 g call flow
3 g call flow3 g call flow
3 g call flow
 
T mac protocol
T mac protocolT mac protocol
T mac protocol
 
First generation network
First generation networkFirst generation network
First generation network
 
MANET routing protocols Issues and Classifications
 MANET routing protocols Issues and Classifications MANET routing protocols Issues and Classifications
MANET routing protocols Issues and Classifications
 
Call flow oma000003 gsm communication flow
Call flow oma000003 gsm communication flowCall flow oma000003 gsm communication flow
Call flow oma000003 gsm communication flow
 
WLAN
WLANWLAN
WLAN
 
Simplified Call Flow Signaling: 2G/3G Voice Call
Simplified Call Flow Signaling: 2G/3G Voice CallSimplified Call Flow Signaling: 2G/3G Voice Call
Simplified Call Flow Signaling: 2G/3G Voice Call
 
IP Routing
IP RoutingIP Routing
IP Routing
 
Signaling system 7 (ss7)
Signaling system 7 (ss7)Signaling system 7 (ss7)
Signaling system 7 (ss7)
 
Lecture 6
Lecture 6Lecture 6
Lecture 6
 
Wireless communication
Wireless communicationWireless communication
Wireless communication
 
Call flow in gsm
Call flow in gsmCall flow in gsm
Call flow in gsm
 
Gprs architecture
Gprs architectureGprs architecture
Gprs architecture
 
Umts r99 architecture
Umts r99 architectureUmts r99 architecture
Umts r99 architecture
 

Viewers also liked

Encoding and Decoding
Encoding and DecodingEncoding and Decoding
Encoding and Decodingmrhaken
 
Frequency Modulation In Data Transmission
Frequency Modulation In Data TransmissionFrequency Modulation In Data Transmission
Frequency Modulation In Data TransmissionBise Mond
 
The Encoding
The EncodingThe Encoding
The EncodingJen W
 
Encoding/Decoding Stuart Hall
Encoding/Decoding Stuart HallEncoding/Decoding Stuart Hall
Encoding/Decoding Stuart HallNic JM
 
Chapter 4 frequency modulation
Chapter 4 frequency modulationChapter 4 frequency modulation
Chapter 4 frequency modulationHattori Sidek
 

Viewers also liked (10)

Encoding and Decoding
Encoding and DecodingEncoding and Decoding
Encoding and Decoding
 
تاريخ اولى ثانوى 2014 جزء اول
تاريخ اولى ثانوى 2014  جزء اولتاريخ اولى ثانوى 2014  جزء اول
تاريخ اولى ثانوى 2014 جزء اول
 
Frequency Modulation In Data Transmission
Frequency Modulation In Data TransmissionFrequency Modulation In Data Transmission
Frequency Modulation In Data Transmission
 
Buffer Overflow Demo by Saurabh Sharma
Buffer Overflow Demo by Saurabh SharmaBuffer Overflow Demo by Saurabh Sharma
Buffer Overflow Demo by Saurabh Sharma
 
Angle mod for stdnts 25 apr
Angle mod for stdnts  25 aprAngle mod for stdnts  25 apr
Angle mod for stdnts 25 apr
 
The Encoding
The EncodingThe Encoding
The Encoding
 
Encoding/Decoding Stuart Hall
Encoding/Decoding Stuart HallEncoding/Decoding Stuart Hall
Encoding/Decoding Stuart Hall
 
Multiple access protocol
Multiple access protocolMultiple access protocol
Multiple access protocol
 
CSMA/CD
CSMA/CDCSMA/CD
CSMA/CD
 
Chapter 4 frequency modulation
Chapter 4 frequency modulationChapter 4 frequency modulation
Chapter 4 frequency modulation
 

Similar to seminar report on multiple access control protocol submitted by munesh

Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptxComputer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptxPravinbhargav
 
Mac protocol for wmn
Mac protocol for wmnMac protocol for wmn
Mac protocol for wmnmmjalbiaty
 
9 multiple access
9 multiple access9 multiple access
9 multiple accessampas03
 
Multipleaccessprotocol 140213082552-phpapp02
Multipleaccessprotocol 140213082552-phpapp02Multipleaccessprotocol 140213082552-phpapp02
Multipleaccessprotocol 140213082552-phpapp02arifur rahman
 
multipleaccessprotocol-140213082552-phpapp02.pdf
multipleaccessprotocol-140213082552-phpapp02.pdfmultipleaccessprotocol-140213082552-phpapp02.pdf
multipleaccessprotocol-140213082552-phpapp02.pdfGauravWankar2
 
Media Access Control
Media Access ControlMedia Access Control
Media Access ControlHusnainHadi
 
Multiple Access Control Protocol (MAC Protocol) Networking
Multiple Access Control Protocol (MAC Protocol) Networking Multiple Access Control Protocol (MAC Protocol) Networking
Multiple Access Control Protocol (MAC Protocol) Networking Nitish Awasthi (anitish_225)
 
WHAT IS MAC-1 presentation for information .pptx
WHAT IS MAC-1 presentation for information  .pptxWHAT IS MAC-1 presentation for information  .pptx
WHAT IS MAC-1 presentation for information .pptxSaqlainKhan39
 
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETsSimulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETsIOSR Journals
 
Network Topologies
Network TopologiesNetwork Topologies
Network TopologiesJason Hando
 
Computer Network MAC Layer Notes as per RGPV syllabus
Computer Network MAC Layer Notes as per RGPV syllabusComputer Network MAC Layer Notes as per RGPV syllabus
Computer Network MAC Layer Notes as per RGPV syllabusNANDINI SHARMA
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communicationpanditadesh123
 

Similar to seminar report on multiple access control protocol submitted by munesh (20)

satellite communication- UNIT-V.pptx
satellite communication- UNIT-V.pptxsatellite communication- UNIT-V.pptx
satellite communication- UNIT-V.pptx
 
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptxComputer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptx
 
Mac protocol for wmn
Mac protocol for wmnMac protocol for wmn
Mac protocol for wmn
 
Mac
MacMac
Mac
 
Unit_3_WSN.pptx
Unit_3_WSN.pptxUnit_3_WSN.pptx
Unit_3_WSN.pptx
 
9 multiple access
9 multiple access9 multiple access
9 multiple access
 
Multipleaccessprotocol 140213082552-phpapp02
Multipleaccessprotocol 140213082552-phpapp02Multipleaccessprotocol 140213082552-phpapp02
Multipleaccessprotocol 140213082552-phpapp02
 
multipleaccessprotocol-140213082552-phpapp02.pdf
multipleaccessprotocol-140213082552-phpapp02.pdfmultipleaccessprotocol-140213082552-phpapp02.pdf
multipleaccessprotocol-140213082552-phpapp02.pdf
 
MAC
MACMAC
MAC
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
 
Multiple Access Control Protocol (MAC Protocol) Networking
Multiple Access Control Protocol (MAC Protocol) Networking Multiple Access Control Protocol (MAC Protocol) Networking
Multiple Access Control Protocol (MAC Protocol) Networking
 
WHAT IS MAC-1 presentation for information .pptx
WHAT IS MAC-1 presentation for information  .pptxWHAT IS MAC-1 presentation for information  .pptx
WHAT IS MAC-1 presentation for information .pptx
 
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETsSimulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
 
Unit 1 mac vsd
Unit 1 mac vsdUnit 1 mac vsd
Unit 1 mac vsd
 
CN.pptx
CN.pptxCN.pptx
CN.pptx
 
2nd
2nd2nd
2nd
 
Network Topologies
Network TopologiesNetwork Topologies
Network Topologies
 
dcn.pdf
dcn.pdfdcn.pdf
dcn.pdf
 
Computer Network MAC Layer Notes as per RGPV syllabus
Computer Network MAC Layer Notes as per RGPV syllabusComputer Network MAC Layer Notes as per RGPV syllabus
Computer Network MAC Layer Notes as per RGPV syllabus
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communication
 

Recently uploaded

Corporate Presentation Probe April 2024.pdf
Corporate Presentation Probe April 2024.pdfCorporate Presentation Probe April 2024.pdf
Corporate Presentation Probe April 2024.pdfProbe Gold
 
Collective Mining | Corporate Presentation - April 2024
Collective Mining | Corporate Presentation - April 2024Collective Mining | Corporate Presentation - April 2024
Collective Mining | Corporate Presentation - April 2024CollectiveMining1
 
slideshare_2404_presentation materials_en.pdf
slideshare_2404_presentation materials_en.pdfslideshare_2404_presentation materials_en.pdf
slideshare_2404_presentation materials_en.pdfsansanir
 
Best investment platform in india - falcon invoice discounting
Best investment platform in india - falcon invoice discountingBest investment platform in india - falcon invoice discounting
Best investment platform in india - falcon invoice discountingFalcon Invoice Discounting
 
WheelTug PLC Pitch Deck | Investor Insights | April 2024
WheelTug PLC Pitch Deck | Investor Insights | April 2024WheelTug PLC Pitch Deck | Investor Insights | April 2024
WheelTug PLC Pitch Deck | Investor Insights | April 2024Hector Del Castillo, CPM, CPMM
 
Nicola Mining Inc. Corporate Presentation April 2024
Nicola Mining Inc. Corporate Presentation April 2024Nicola Mining Inc. Corporate Presentation April 2024
Nicola Mining Inc. Corporate Presentation April 2024nicola_mining
 
9654467111 Low Rate Call Girls In Tughlakabad, Delhi NCR
9654467111 Low Rate Call Girls In Tughlakabad, Delhi NCR9654467111 Low Rate Call Girls In Tughlakabad, Delhi NCR
9654467111 Low Rate Call Girls In Tughlakabad, Delhi NCRSapana Sha
 
Leveraging USDA Rural Development Grants for Community Growth and Sustainabil...
Leveraging USDA Rural Development Grants for Community Growth and Sustainabil...Leveraging USDA Rural Development Grants for Community Growth and Sustainabil...
Leveraging USDA Rural Development Grants for Community Growth and Sustainabil...USDAReapgrants.com
 
Basic Accountants in|TaxlinkConcept.pdf
Basic  Accountants in|TaxlinkConcept.pdfBasic  Accountants in|TaxlinkConcept.pdf
Basic Accountants in|TaxlinkConcept.pdftaxlinkcpa
 
9654467111 Call Girls In Katwaria Sarai Short 1500 Night 6000
9654467111 Call Girls In Katwaria Sarai Short 1500 Night 60009654467111 Call Girls In Katwaria Sarai Short 1500 Night 6000
9654467111 Call Girls In Katwaria Sarai Short 1500 Night 6000Sapana Sha
 
the 25 most beautiful words for a loving and lasting relationship.pdf
the 25 most beautiful words for a loving and lasting relationship.pdfthe 25 most beautiful words for a loving and lasting relationship.pdf
the 25 most beautiful words for a loving and lasting relationship.pdfFrancenel Paul
 
Corporate Presentation Probe April 2024.pdf
Corporate Presentation Probe April 2024.pdfCorporate Presentation Probe April 2024.pdf
Corporate Presentation Probe April 2024.pdfProbe Gold
 
The Concept of Humanity in Islam and its effects at future of humanity
The Concept of Humanity in Islam and its effects at future of humanityThe Concept of Humanity in Islam and its effects at future of humanity
The Concept of Humanity in Islam and its effects at future of humanityJohanAspro
 
Q1 Quarterly Update - April 16, 2024.pdf
Q1 Quarterly Update - April 16, 2024.pdfQ1 Quarterly Update - April 16, 2024.pdf
Q1 Quarterly Update - April 16, 2024.pdfProbe Gold
 

Recently uploaded (19)

Corporate Presentation Probe April 2024.pdf
Corporate Presentation Probe April 2024.pdfCorporate Presentation Probe April 2024.pdf
Corporate Presentation Probe April 2024.pdf
 
Collective Mining | Corporate Presentation - April 2024
Collective Mining | Corporate Presentation - April 2024Collective Mining | Corporate Presentation - April 2024
Collective Mining | Corporate Presentation - April 2024
 
slideshare_2404_presentation materials_en.pdf
slideshare_2404_presentation materials_en.pdfslideshare_2404_presentation materials_en.pdf
slideshare_2404_presentation materials_en.pdf
 
Best investment platform in india - falcon invoice discounting
Best investment platform in india - falcon invoice discountingBest investment platform in india - falcon invoice discounting
Best investment platform in india - falcon invoice discounting
 
WheelTug PLC Pitch Deck | Investor Insights | April 2024
WheelTug PLC Pitch Deck | Investor Insights | April 2024WheelTug PLC Pitch Deck | Investor Insights | April 2024
WheelTug PLC Pitch Deck | Investor Insights | April 2024
 
Nicola Mining Inc. Corporate Presentation April 2024
Nicola Mining Inc. Corporate Presentation April 2024Nicola Mining Inc. Corporate Presentation April 2024
Nicola Mining Inc. Corporate Presentation April 2024
 
9654467111 Low Rate Call Girls In Tughlakabad, Delhi NCR
9654467111 Low Rate Call Girls In Tughlakabad, Delhi NCR9654467111 Low Rate Call Girls In Tughlakabad, Delhi NCR
9654467111 Low Rate Call Girls In Tughlakabad, Delhi NCR
 
young call girls in Yamuna Vihar 🔝 9953056974 🔝 Delhi escort Service
young  call girls in   Yamuna Vihar 🔝 9953056974 🔝 Delhi escort Serviceyoung  call girls in   Yamuna Vihar 🔝 9953056974 🔝 Delhi escort Service
young call girls in Yamuna Vihar 🔝 9953056974 🔝 Delhi escort Service
 
Leveraging USDA Rural Development Grants for Community Growth and Sustainabil...
Leveraging USDA Rural Development Grants for Community Growth and Sustainabil...Leveraging USDA Rural Development Grants for Community Growth and Sustainabil...
Leveraging USDA Rural Development Grants for Community Growth and Sustainabil...
 
young Call girls in Dwarka sector 1🔝 9953056974 🔝 Delhi escort Service
young Call girls in Dwarka sector 1🔝 9953056974 🔝 Delhi escort Serviceyoung Call girls in Dwarka sector 1🔝 9953056974 🔝 Delhi escort Service
young Call girls in Dwarka sector 1🔝 9953056974 🔝 Delhi escort Service
 
Basic Accountants in|TaxlinkConcept.pdf
Basic  Accountants in|TaxlinkConcept.pdfBasic  Accountants in|TaxlinkConcept.pdf
Basic Accountants in|TaxlinkConcept.pdf
 
9654467111 Call Girls In Katwaria Sarai Short 1500 Night 6000
9654467111 Call Girls In Katwaria Sarai Short 1500 Night 60009654467111 Call Girls In Katwaria Sarai Short 1500 Night 6000
9654467111 Call Girls In Katwaria Sarai Short 1500 Night 6000
 
Call Girls in South Ex⎝⎝9953056974⎝⎝ Escort Delhi NCR
Call Girls in South Ex⎝⎝9953056974⎝⎝ Escort Delhi NCRCall Girls in South Ex⎝⎝9953056974⎝⎝ Escort Delhi NCR
Call Girls in South Ex⎝⎝9953056974⎝⎝ Escort Delhi NCR
 
young call girls in Hauz Khas,🔝 9953056974 🔝 escort Service
young call girls in Hauz Khas,🔝 9953056974 🔝 escort Serviceyoung call girls in Hauz Khas,🔝 9953056974 🔝 escort Service
young call girls in Hauz Khas,🔝 9953056974 🔝 escort Service
 
the 25 most beautiful words for a loving and lasting relationship.pdf
the 25 most beautiful words for a loving and lasting relationship.pdfthe 25 most beautiful words for a loving and lasting relationship.pdf
the 25 most beautiful words for a loving and lasting relationship.pdf
 
Corporate Presentation Probe April 2024.pdf
Corporate Presentation Probe April 2024.pdfCorporate Presentation Probe April 2024.pdf
Corporate Presentation Probe April 2024.pdf
 
young call girls in Govindpuri 🔝 9953056974 🔝 Delhi escort Service
young call girls in Govindpuri 🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Govindpuri 🔝 9953056974 🔝 Delhi escort Service
young call girls in Govindpuri 🔝 9953056974 🔝 Delhi escort Service
 
The Concept of Humanity in Islam and its effects at future of humanity
The Concept of Humanity in Islam and its effects at future of humanityThe Concept of Humanity in Islam and its effects at future of humanity
The Concept of Humanity in Islam and its effects at future of humanity
 
Q1 Quarterly Update - April 16, 2024.pdf
Q1 Quarterly Update - April 16, 2024.pdfQ1 Quarterly Update - April 16, 2024.pdf
Q1 Quarterly Update - April 16, 2024.pdf
 

seminar report on multiple access control protocol submitted by munesh

  • 1. INDEX 1. Intoduction. a. Broadcast networks b. Need of protocols in Broadcast channel 2.Types of Multiple –access protocol a. Random Access Protocols i. ALOHA ii. CSMA iii. CSMA/CD iv. CSMA/CA b.Controlled Access I. Reservation II. Polling III. Token -based c.Channelization I. FDMA II. TDMA III. CDMA
  • 2. 1.INTRODACTION The media access control (MAC) data communication protocol sub-layer, also known as the medium access control, is a sublayer of the data link layer specified in the seven-layer OSI model (layer 2). It provides addressing and channel access control mechanisms that make it possible for several terminals or network nodes to communicate within a multiple access network that incorporates a shared medium, e.g. Ethernet. The hardware that implements the MAC is referred to as a medium access controller. The MAC sub-layer acts as an interface between the logical link control (LLC) sublayer and the network's physical layer. The MAC layer emulates a full-duplex logical communication channel in a multi-point network. This channel may provide unicast, multicast or broadcast communication service. The channel access control mechanisms provided by the MAC layer Is known as a multiple access protocol. This makes it possible for several stations connected to the same physical medium to share it. Examples of shared physical media are bus networks, ring networks, hub networks, wireless networks and half-duplex point- to-point links. The multiple access protocol may detect or avoid data packet collisions if a packet mode contention based channel access method is used, or reserve resources to establish a logical channel if a circuit switched or channelization based channel access method is used. The channel access control mechanism relies on a physical layer multiplex scheme.
  • 3. a. Broadcast networks Broadcast networks have a single communication channel that is shared by all the machines on the network. A packet sent by one computer is received by all the other computers on the network. The packets that are sent contain the address of the receiving computer; each computer checks this field to see if it matches its own address. If it does not then it is usually ignored; if it does then it is read. Broadcast channels are sometimes known as multi-access channel. b. Need of protocols in Broadcast channel Issues in multi-access channel : • WHO is going to use the channel ? • WHEN the channel is going to be used ? • For HOW much time the channel is used ? Due to shared channel and unregulated traffic over the network collisions and data loss occur. Some protocol must be followed for regulated and safe transmission over the network. 2.Types of Multiple –access protocol Over the years, dozens of multiple access protocol have been implemented in a variety of link-layer technologies. Nevertheless ,we can classify just about any
  • 4. multiple access protocol as belonging to one of three categories .Random access protocols, Controlled access protocols and channelization protocols. a. Random Access Protocols In a random access protocol, a transmitting node always transmits at the full rate of the channel, namely ,R bps .When there is a collision ,each node involved in the collision repeatedly retransmits its frame( that is ,packet) until the frame gets through without a collision. But when a node experiences a collision ,it doesn’t necessarily retransmitting the frame right away. Instead it waits a random delay before retransmitting the frame .Each node involved in a collision chooses independent random delays .Because the random delays are independently chosen , it is possible that one of the nodes will pick a delay that is sufficiently less than the delays of the other colliding nodes and will therefore be able to sneak its frame into the channel without a collision. There are dozens of random access protocols in this we’ll describe a few of the most commonly used random access protocols – the ALOHA protocol , CSMA (carrier sense multiple access ) protocol , CSMA/CD (carrier sense multiple access /collision detection) protocol and CSMA/CA (carrier sense multiple access winth collision avoidance )protocol
  • 5. I. ALOHA The original version of ALOHA used two distinct frequencies in a hub/star configuration, with the hub machine broadcasting packets to everyone on the "outbound" channel, and the various client machines sending data packets to the hub on the "inbound" channel. If data was received correctly at the hub, a short acknowledgment packet was sent to the client; if an acknowledgment was not received by a client machine after a short wait time, it would automatically retransmit the data packet after waiting a randomly selected time interval. This acknowledgment mechanism was used to detect and correct for "collisions" created when two client machines both attempted to send a packet at the same time. ALOHAnet's primary importance was its use of a shared medium for client transmissions. Unlike the ARPANET where each node could only talk directly to a node at the other end of a wire or satellite circuit, in ALOHAnet all client nodes communicated with the hub on the same frequency. This meant that some sort of mechanism was needed to control who could talk at what time. The ALOHAnet solution was to allow each client to send its data without controlling when it was sent, with an acknowledgment/retransmission scheme used to deal with collisions. This became known as a pure ALOHA or random-accessed channel, and was the basis for subsequent Ethernet development and later Wi-Fi networks. Various versions of the ALOHA protocol (such as Pure ALOHA, Slotted ALOHA) also appeared later in satellite communications, and were used in wireless data networks such as ARDIS, GSM. PURE ALOHA The first version of the was quite simple: If you have data to send, send the data If the message collides with another transmission, try resending "later" Note that the first step implies that Pure ALOHA does not check whether the channel is busy before transmitting. The critical aspect is the "later" concept: the quality of the backoff scheme chosen significantly influences the efficiency of the protocol, the ultimate channel capacity, and the predictability of its behavior.
  • 6. To assess Pure ALOHA, we need to predict its throughput, the rate of (successful) transmission of frames. First, let's make a few simplifying assumptions: All frames have the same length. Stations cannot generate a frame while transmitting or trying to transmit. The population of stations attempts to transmit (both new frames and old frames that collided) according to a Poisson distribution. Let "T" refer to the time needed to transmit one frame on the channel, and let's define "frame-time" as a unit of time equal to T. Let "G" refer to the mean used in the Poisson distribution over transmission-attempt amounts: that is, on average, there are G transmission-attempts per frame-time.
  • 7. Overlapping frames in the pure ALOHA protocol. Frame-time is equal to 1 for all frames. Pure Aloha efficiency P(success by given node) = P(node transmits) . P(no other node transmits in [t0-1,t0] . P(no other node transmits in [t0,t0+1] = p . (1-p)N-1 . (1-p)N-1 = p . (1-p)2(N-1) … choosing optimum p and then letting n -> ... Efficiency = 1/(2e) = .18 Slotted ALOHA An improvement to the original ALOHA protocol was "Slotted ALOHA", which introduced discrete timeslots and increased the maximum throughput. A station can send only at the beginning of a timeslot, and thus collisions are reduced. In this case, we only need to worry about the transmission-attempts within 1 frame- time and not 2 consecutive frame-times, since collisions can only occur during each timeslot. Thus, the probability of there being zero transmission-attempts in a single timeslot is: Slotted ALOHA is used in low-data-rate tactical satellite communications networks
  • 8. by military forces, in subscriber-based satellite communications networks, mobile telephony call setup, and in the contactless RFID technologies. Pros • single active node can continuously transmit at full rate of channel • highly decentralized: only slots in nodes need to be in sync • simple Cons • collisions, wasting slots • idle slots • nodes may be able to detect collision in less than time to transmit packet • clock synchronization Efficiency is the long-run fraction of successful slots when there are many nodes, each with many frames to send • Suppose N nodes with many frames to send, each transmits in slot with probability p • prob that node 1 has success in a slot = p(1-p)N-1 • prob that any node has a success = Np(1-p)N-1 • For max efficiency with N nodes, find p* that maximizes Np(1-p)N-1 • For many nodes, take limit of Np*(1-p*)N-1 as N goes to infinity, gives 1/e = .37 • Efficiency is 37%, even with optimal p
  • 9. II. Carrier Sense Multiple Access Carrier Sense Multiple Access (CSMA) is a probabilistic Media Access Control (MAC) protocol in which a node verifies the absence of other traffic before transmitting on a shared transmission medium, such as an electrical bus, or a band of the electromagnetic spectrum. "Carrier Sense" describes the fact that a transmitter uses feedback from a receiver that detects a carrier wave before trying to send. That is, it tries to detect the presence of an encoded signal from another station before attempting to transmit. If a carrier is sensed, the station waits for the transmission in progress to finish before initiating its own transmission. "Multiple Access" describes the fact that multiple stations send and receive on the medium. Transmissions by one node are generally received by all other stations using the medium.  Advantages  Fairly simple to implement  Functional scheme that works  Disadvantages  Can not recover from a collision
  • 10. (inefficient waste of medium time) III. CSMA/CD (Collision Detection) Carrier sense multiple access with collision detection (CSMA/CD) is a Media Access Control method in which. a carrier sensing scheme is used. a transmitting data station that detects another signal while transmitting a frame, stops transmitting that frame, transmits a jam signal, and then waits for a random time interval before trying to resend the frame. CSMA/CD is a modification of pure carrier sense multiple access (CSMA). CSMA/CD is used to improve CSMA performance by terminating transmission as soon as a collision is detected, thus shortening the time required before a retry can be attempted. Algorithm When a station wants to send some information, it uses the following algorithm. Main procedure 1. Frame ready for transmission. 2. Is medium idle? If not, wait until it becomes ready
  • 11. 3. Start transmitting. 4. Did a collision occur? If so, go to collision detected procedure. 5. Reset retransmission counters and end frame transmission. Collision detected procedure 1. Continue transmission until minimum packet time is reached to ensure that all receivers detect the collision. 2. Increment retransmission counter. 3. Was the maximum number of transmission attempts reached? If so, abort transmission. 4. Calculate and wait random backoff period based on number of collisions. 5. Re-enter main procedure at stage 1. Methods for collision detection are media dependent, but on an electrical bus such as 10BASE-5 or 10BASE-2, collisions can be detected by comparing transmitted data with received data or by recognizing a higher than normal signal amplitude on the bus. Jam signal The jam signal is a signal that carries a 32-bit binary pattern sent by a data station to inform the other stations that they must not transmit. Advantages  More efficient than basic CSMA Disadvantages  Requires ability to detect collisions IV. Carrier Sense Multiple Access with Collision Avoidance (CSMA-CA) Carrier sense multiple access with collision avoidance (CSMA/CA), in computer networking, is a wireless network multiple access method in which:
  • 12. a carrier sensing scheme is used. a node wishing to transmit data has to first listen to the channel for a predetermined amount of time to determine whether or not another node is transmitting on the channel within the wireless range. If the channel is sensed "idle," then the node is permitted to begin the transmission process. If the channel is sensed as "busy," the node defers its transmission for a random period of time. Once the transmission process begins, it is still possible for the actual transmission of application data to not occur • Timing in CSMA/CA • Interframe Space (IFS) – When an idle channel is found, the station does not send immediately but waits for a period of time call IFS – The IFS time allows the front of the transmitted signal by the distant station to reach this station – The IFS variable can also be used to prioritize stations or frame types • e.g., DIFS(Distributed IFS) , SIFS((Short) CSMA/CA is a modification of carrier sense multiple access. Collision avoidance is used to improve CSMA performance by not allowing wireless transmission of a node if another node is transmitting, thus reducing the probability of collision due to the use of a random truncated binary exponential backoff time.
  • 13. b. Controlled Access Controlled access protocols grant permission to send only to one node at a time, avoiding collisions of messages on the shared medium. Predetermined channel allocation schemes assign access rights to the nodes statically. Bandwidth requirements need to be known in advance and the system cannot adapt to changing needs at run time. Demand adaptive protocols take the current demands of the nodes into account and grant network access accordingly. This class can be subdivided into reservation,Polling and token -based schemes. If network traffic is bursty, controlled access protocols are potentially inefficient, because in that case they frequently grant transmission rights to nodes that do not want to send. Even if such nodes immediately give up their rights, these schemes may cause considerable overhead. I. Reservation • Features – Time is divided into intervals • In each interval, a reservation frame precedes the data frames sent in that interval – N stations  N reservation minislots in the reservation frame • When a station needs to send a data frame  it makes a reservation in its own minislot II. Polling • Polling uses a centralized controller
  • 14. – which cycles through stations on the network and gives each an opportunity to transmit a packet • During selection a controller can choose which station to poll at a given time • Select and Poll • There are two general polling policies: – Round robin order • Round-robin means each station has an equal opportunity to transmit packets – Priority order • Priority order means some stations will have more opportunity to send For example, priority order might be used to assign an IP telephone higher priority than a personal computer III. Token Passing
  • 15. Token passing is a channel access method where a signal called a token is passed between nodes that authorizes the node to communicate. The most well-known examples are token ring and ARCNET. Token passing schemes provide round-robin scheduling, and if the packets are equally sized, the scheduling is max-min fair. The advantage over contention based channel access is that collisions are eliminated, and that the channel bandwidth can be fully utilized without idle time when demand is heavy. The disadvantage is that even when demand is light, a station wishing to transmit must wait for the token, increasing latency. • Features – A station is authorized to send data when it receives a special frame called a token – Stations are arranged around a ring (physically or logically) • A token circulates around the ring – If a station needs to send data, it waits for the token – The station captures the token and sends one or more frames as long as the allocated time has not expired – It releases the token to be used by the successor station c. Channelization • Definition – A Multiple-access method in which the available BW of a link is shared in time, frequency, or through code, between different stations • Features – FDMA, TDMA are based on FDM and TDM in the physical layer – CDMA is a data link multiple-access protocol
  • 16. I. FDMA Frequency Division Multiple Access or FDMA is a channel access method used in multiple-access protocols as a channelization protocol. FDMA gives users an individual allocation of one or several frequency bands, or channels. It is particularly commonplace in satellite communication • Approach and features – A data link layer protocol that uses FDM at the physical layer – The available BW is shared by all stations – Each stations uses its allocated band to send its data – Ex. AMPS (1G cellular networks) II. TDMA Time division multiple access (TDMA) is a channel access method for shared medium networks. It allows several users to share the same frequency channel by dividing the signal into different time slots. The users transmit in rapid succession, one after the other, each using its own time slot. This allows multiple stations to share the same transmission medium while using only a part of its channel capacity. TDMA is used in the digital 2G cellular systems such as Global System for
  • 17. Mobile Communications (GSM) , Personal Digital Cellular (PDC), and in the Digital Enhanced Cordless Telecommunications (DECT) standard for portable phones. It is also used extensively in satellite systems, combat-net radio systems, and PON networks for upstream traffic from premises to the operator. For usage of Dynamic TDMA packet mode communication, see below. • Approach and features – A data link layer protocol that uses TDM at the physical layer – The stations share the capacity of the channel in time – Each station is allocated a time slot during which it can send data – Ex. GSM (2G cellular networks - Europe) III. Code Division Multiple Access (CDMA) • used in several wireless broadcast channels (cellular, satellite, etc) standards • unique “code” assigned to each user; i.e., code set partitioning • all users share same frequency, but each user has own “chipping” sequence (i.e., code) to encode data • encoded signal = (original data) X (chipping sequence)
  • 18. • decoding: inner-product of encoded signal and chipping sequence • allows multiple users to “coexist” and transmit simultaneously with minimal interference (if codes are “orthogonal”) CDMA Encode/Decode