SlideShare ist ein Scribd-Unternehmen logo
1 von 7
Downloaden Sie, um offline zu lesen
Communication
Networks
Access Control
in datalink layer
[Random Access Methods]
Part – 2 – CSMA CD
Overview of Module - 2
• Framing
• What is Framing
• Types of Framing
• Methods for identifying the
boundaries
• Flow Control
• What is flow control
• Types of flow control
• Access Control
• What is access control
• Types of access control
• Ethernet – IEEE 802.3
• Evolution of Ethernet
• Frame Format of Ethernet
• Access Control for Ethernet
• Performance Evaluation of Ethernet
• WLAN – IEEE 802.11
• Architecture
• Bluetooth
• WIFI
• Zigbee
• 6LowPan
• Network Layer Services
• IPv4
• Packet switching
• Network Layer Protocols
Visit www.youtube.com/GURUKULA for Lecture Videos
Classification of Access Control Mechanism
Visit www.youtube.com/GURUKULA for Lecture Videos
1.C – CSMA – CD [Collision Detection]
Visit www.youtube.com/GURUKULA for Lecture Videos
What if channel is Free ?
• Assume station A in Figure has a frame to send to station D.
• Station A first should check whether any other station is sending
(carrier sense).
• Station A measures the level of energy on the medium (for a short
period of time, normally less than 100 μs).
• If there is no signal energy on the medium, it means that no station is
sending (or the signal has not reached station A).
• Station A interprets this situation as idle medium. It starts sending
its frame.
What if channel is Busy ?
• On the other hand, if the signal energy level
is not zero, it means that the medium is
being used by another station.
• Station A continuously monitors the
medium until it becomes idle for 100 μs.
• It then starts sending the frame. However,
station A needs to keep a copy of the frame
in its buffer until it is sure that there is no
collision.
When to stop Sensing the Channel?
The medium sensing does not stop after station A has started sending the frame.
Station A needs to send and receive continuously. Two cases may occur:
Case 1: Station A has sent 512 bits and no collision is sensed (the energy level
did not go above the regular energy level), the station then is sure that the frame
will go through and stops sensing the medium.
Case 2: Station A has sensed a collision before sending 512 bits. In this case both
stations should refrain from sending and keep the frame in their buffer for
resending.
However, to inform other stations that there is a collision in the network, the
station sends a 48-bit jam signal. The jam signal alert other stations about the
collision.
Visit www.youtube.com/GURUKULA for Lecture Videos
Session Summary
• Access Control [Similar to people accessing the cell tower]
• Random Access Methods [Checks the channel randomly, Idle –
Transmit, Busy – Check again]
• ALOHA [Pure ALOHA, Slotted ALOHA]
• CSMA [ 1 Persistent, n Persistent, p Persistent]
• CSMA – CD [widely used in Ethernet]
• CSMA – CA [widely used in WLAN]
Visit www.youtube.com/GURUKULA for Lecture Videos
References:
• Behrouz A. Forouzan, ―Data communication and Networking, Fifth
Edition, Tata McGraw – Hill, 2013
• Larry L. Peterson, Bruce S. Davie, ―Computer Networks: A Systems
Approach, Fifth Edition, Morgan Kaufmann Publishers, 2011.
• Few online References (Will be Mentioned in the description Section)
Thank You…

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

2.2 flow control
2.2 flow control2.2 flow control
2.2 flow control
 
2.3 access control random access methods - part 1
2.3 access control   random access methods - part 12.3 access control   random access methods - part 1
2.3 access control random access methods - part 1
 
6. data link layer physical addressing
6. data link layer   physical addressing6. data link layer   physical addressing
6. data link layer physical addressing
 
1. introduction to communication networks subject introduction
1. introduction to communication networks   subject introduction1. introduction to communication networks   subject introduction
1. introduction to communication networks subject introduction
 
3. overview of data communication part 2
3. overview of data communication   part 23. overview of data communication   part 2
3. overview of data communication part 2
 
2.10 network layer services i pv4
2.10 network layer services  i pv42.10 network layer services  i pv4
2.10 network layer services i pv4
 
7. data link layer error detection and correction codes - parity and checksum
7. data link layer   error detection and correction codes - parity and checksum7. data link layer   error detection and correction codes - parity and checksum
7. data link layer error detection and correction codes - parity and checksum
 
Adhoc ppt2
Adhoc ppt2Adhoc ppt2
Adhoc ppt2
 
Adhoc
AdhocAdhoc
Adhoc
 
6590 Research Paper Review: MAC Protocol for Multi-Hop Multicast in Adhoc Net...
6590 Research Paper Review: MAC Protocol for Multi-Hop Multicast in Adhoc Net...6590 Research Paper Review: MAC Protocol for Multi-Hop Multicast in Adhoc Net...
6590 Research Paper Review: MAC Protocol for Multi-Hop Multicast in Adhoc Net...
 
Lan overview
Lan overviewLan overview
Lan overview
 
Computer networks unit ii
Computer networks    unit iiComputer networks    unit ii
Computer networks unit ii
 
Chapter07
Chapter07Chapter07
Chapter07
 
Lecture 04 networking
Lecture 04 networkingLecture 04 networking
Lecture 04 networking
 
5. protocol layering
5. protocol layering5. protocol layering
5. protocol layering
 
computer Netwoks - network layer
computer Netwoks - network layercomputer Netwoks - network layer
computer Netwoks - network layer
 
PLNOG 17 - Leonir Hoxha - Next Generation Network Architecture - Segment Routing
PLNOG 17 - Leonir Hoxha - Next Generation Network Architecture - Segment RoutingPLNOG 17 - Leonir Hoxha - Next Generation Network Architecture - Segment Routing
PLNOG 17 - Leonir Hoxha - Next Generation Network Architecture - Segment Routing
 
PLNOG 13: Michał Dubiel: OpenContrail software architecture
PLNOG 13: Michał Dubiel: OpenContrail software architecturePLNOG 13: Michał Dubiel: OpenContrail software architecture
PLNOG 13: Michał Dubiel: OpenContrail software architecture
 
Day 9 routing
Day 9 routingDay 9 routing
Day 9 routing
 
Lecture 2 data link layer 1 v1
Lecture 2 data link layer 1 v1Lecture 2 data link layer 1 v1
Lecture 2 data link layer 1 v1
 

Ähnlich wie 2.3a access control random access methods - part 2 - csma cd

the Multiple Access SLIDE for university students
the Multiple Access SLIDE for university studentsthe Multiple Access SLIDE for university students
the Multiple Access SLIDE for university students
novrain1
 
9 multiple access
9 multiple access9 multiple access
9 multiple access
ampas03
 
Unit-2 Media Access Protocols.pdf
Unit-2 Media Access Protocols.pdfUnit-2 Media Access Protocols.pdf
Unit-2 Media Access Protocols.pdf
SmtPArunaKumari
 
Wired Lan Ethernet - DATA Link Layer
Wired Lan Ethernet - DATA Link LayerWired Lan Ethernet - DATA Link Layer
Wired Lan Ethernet - DATA Link Layer
Taimoor Muzaffar Gondal
 
Data Link Control Protocols
Data Link Control ProtocolsData Link Control Protocols
Data Link Control Protocols
TechiNerd
 
SLOTTED ALOHA and pure aloha are the category of aloha
SLOTTED ALOHA and pure aloha are the category of alohaSLOTTED ALOHA and pure aloha are the category of aloha
SLOTTED ALOHA and pure aloha are the category of aloha
AkshathaM29
 
Using buffer mechanisms in FIBRE CHANNEL technology
Using buffer mechanisms in FIBRE CHANNEL technologyUsing buffer mechanisms in FIBRE CHANNEL technology
Using buffer mechanisms in FIBRE CHANNEL technology
Pavel Bankov
 

Ähnlich wie 2.3a access control random access methods - part 2 - csma cd (20)

Data link layer
Data link layerData link layer
Data link layer
 
datalinklayer-200201062315 (1).pptx
datalinklayer-200201062315 (1).pptxdatalinklayer-200201062315 (1).pptx
datalinklayer-200201062315 (1).pptx
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
the Multiple Access SLIDE for university students
the Multiple Access SLIDE for university studentsthe Multiple Access SLIDE for university students
the Multiple Access SLIDE for university students
 
Mac sub layer
Mac sub layerMac sub layer
Mac sub layer
 
9 multiple access
9 multiple access9 multiple access
9 multiple access
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
 
Unit-2 Media Access Protocols.pdf
Unit-2 Media Access Protocols.pdfUnit-2 Media Access Protocols.pdf
Unit-2 Media Access Protocols.pdf
 
Wired Lan Ethernet - DATA Link Layer
Wired Lan Ethernet - DATA Link LayerWired Lan Ethernet - DATA Link Layer
Wired Lan Ethernet - DATA Link Layer
 
Thesis Presentation on Renewal theory based 802.15.6 latest.pptx
Thesis Presentation on Renewal theory based 802.15.6 latest.pptxThesis Presentation on Renewal theory based 802.15.6 latest.pptx
Thesis Presentation on Renewal theory based 802.15.6 latest.pptx
 
Frame relay
Frame relayFrame relay
Frame relay
 
9_Network.ppt
9_Network.ppt9_Network.ppt
9_Network.ppt
 
Random Access Protocols presentation 4th Sem
Random Access Protocols presentation 4th SemRandom Access Protocols presentation 4th Sem
Random Access Protocols presentation 4th Sem
 
Data Link Control Protocols
Data Link Control ProtocolsData Link Control Protocols
Data Link Control Protocols
 
Wireless Sensor Network
Wireless Sensor Network Wireless Sensor Network
Wireless Sensor Network
 
SLOTTED ALOHA and pure aloha are the category of aloha
SLOTTED ALOHA and pure aloha are the category of alohaSLOTTED ALOHA and pure aloha are the category of aloha
SLOTTED ALOHA and pure aloha are the category of aloha
 
MEDIUM-ACCESS CONTROL SUB LAYER.ppt
MEDIUM-ACCESS CONTROL SUB LAYER.pptMEDIUM-ACCESS CONTROL SUB LAYER.ppt
MEDIUM-ACCESS CONTROL SUB LAYER.ppt
 
Multiple access protocols in data communication networks
Multiple access protocols in data communication networksMultiple access protocols in data communication networks
Multiple access protocols in data communication networks
 
Using buffer mechanisms in FIBRE CHANNEL technology
Using buffer mechanisms in FIBRE CHANNEL technologyUsing buffer mechanisms in FIBRE CHANNEL technology
Using buffer mechanisms in FIBRE CHANNEL technology
 

Mehr von JAIGANESH SEKAR

Mehr von JAIGANESH SEKAR (14)

Ec8551 communication networks mcq question bank
Ec8551   communication networks mcq question bank Ec8551   communication networks mcq question bank
Ec8551 communication networks mcq question bank
 
2.10b network layer services i pv4 - variable length subnetting
2.10b network layer services  i pv4 - variable length subnetting2.10b network layer services  i pv4 - variable length subnetting
2.10b network layer services i pv4 - variable length subnetting
 
2.10a network layer services i pv4 - fixed length subnetting
2.10a network layer services  i pv4 - fixed length subnetting2.10a network layer services  i pv4 - fixed length subnetting
2.10a network layer services i pv4 - fixed length subnetting
 
9. data link layer error correction codes - hamming code
9. data link layer   error correction codes - hamming code9. data link layer   error correction codes - hamming code
9. data link layer error correction codes - hamming code
 
8. data link layer error detection and correction codes - crc
8. data link layer   error detection and correction codes - crc8. data link layer   error detection and correction codes - crc
8. data link layer error detection and correction codes - crc
 
2. overview of data communication part 1
2. overview of data communication   part 12. overview of data communication   part 1
2. overview of data communication part 1
 
Ever Noticed the Rings on Your Head Phone Jack - Explainer
Ever Noticed the Rings on Your Head Phone Jack - ExplainerEver Noticed the Rings on Your Head Phone Jack - Explainer
Ever Noticed the Rings on Your Head Phone Jack - Explainer
 
Minimum Shift Keying - MSK Full Derivation
Minimum Shift Keying - MSK Full DerivationMinimum Shift Keying - MSK Full Derivation
Minimum Shift Keying - MSK Full Derivation
 
4.5 equalizers and its types
4.5   equalizers and its types4.5   equalizers and its types
4.5 equalizers and its types
 
4.4 diversity combining techniques
4.4   diversity combining techniques4.4   diversity combining techniques
4.4 diversity combining techniques
 
4.3 types of diversity
4.3  types of diversity4.3  types of diversity
4.3 types of diversity
 
4.2 concepts of diversity
4.2   concepts of diversity4.2   concepts of diversity
4.2 concepts of diversity
 
4.1 effects of multipth propagation
4.1   effects of multipth propagation4.1   effects of multipth propagation
4.1 effects of multipth propagation
 
3.3 modulation formats msk and gmsk
3.3 modulation formats   msk and gmsk3.3 modulation formats   msk and gmsk
3.3 modulation formats msk and gmsk
 

Kürzlich hochgeladen

Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 

Kürzlich hochgeladen (20)

HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Rums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdfRums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdf
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planes
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 

2.3a access control random access methods - part 2 - csma cd

  • 1. Communication Networks Access Control in datalink layer [Random Access Methods] Part – 2 – CSMA CD
  • 2. Overview of Module - 2 • Framing • What is Framing • Types of Framing • Methods for identifying the boundaries • Flow Control • What is flow control • Types of flow control • Access Control • What is access control • Types of access control • Ethernet – IEEE 802.3 • Evolution of Ethernet • Frame Format of Ethernet • Access Control for Ethernet • Performance Evaluation of Ethernet • WLAN – IEEE 802.11 • Architecture • Bluetooth • WIFI • Zigbee • 6LowPan • Network Layer Services • IPv4 • Packet switching • Network Layer Protocols Visit www.youtube.com/GURUKULA for Lecture Videos
  • 3. Classification of Access Control Mechanism Visit www.youtube.com/GURUKULA for Lecture Videos
  • 4. 1.C – CSMA – CD [Collision Detection] Visit www.youtube.com/GURUKULA for Lecture Videos
  • 5. What if channel is Free ? • Assume station A in Figure has a frame to send to station D. • Station A first should check whether any other station is sending (carrier sense). • Station A measures the level of energy on the medium (for a short period of time, normally less than 100 μs). • If there is no signal energy on the medium, it means that no station is sending (or the signal has not reached station A). • Station A interprets this situation as idle medium. It starts sending its frame. What if channel is Busy ? • On the other hand, if the signal energy level is not zero, it means that the medium is being used by another station. • Station A continuously monitors the medium until it becomes idle for 100 μs. • It then starts sending the frame. However, station A needs to keep a copy of the frame in its buffer until it is sure that there is no collision. When to stop Sensing the Channel? The medium sensing does not stop after station A has started sending the frame. Station A needs to send and receive continuously. Two cases may occur: Case 1: Station A has sent 512 bits and no collision is sensed (the energy level did not go above the regular energy level), the station then is sure that the frame will go through and stops sensing the medium. Case 2: Station A has sensed a collision before sending 512 bits. In this case both stations should refrain from sending and keep the frame in their buffer for resending. However, to inform other stations that there is a collision in the network, the station sends a 48-bit jam signal. The jam signal alert other stations about the collision. Visit www.youtube.com/GURUKULA for Lecture Videos
  • 6. Session Summary • Access Control [Similar to people accessing the cell tower] • Random Access Methods [Checks the channel randomly, Idle – Transmit, Busy – Check again] • ALOHA [Pure ALOHA, Slotted ALOHA] • CSMA [ 1 Persistent, n Persistent, p Persistent] • CSMA – CD [widely used in Ethernet] • CSMA – CA [widely used in WLAN] Visit www.youtube.com/GURUKULA for Lecture Videos
  • 7. References: • Behrouz A. Forouzan, ―Data communication and Networking, Fifth Edition, Tata McGraw – Hill, 2013 • Larry L. Peterson, Bruce S. Davie, ―Computer Networks: A Systems Approach, Fifth Edition, Morgan Kaufmann Publishers, 2011. • Few online References (Will be Mentioned in the description Section) Thank You…