SlideShare a Scribd company logo
1 of 29
Networking Fundamentals
MULTIPLE ACCESS
12.1
Data link layer divided into two functionality-oriented sublayers
12.2
Taxonomy of multiple-access protocols
12.3
RANDOM ACCESSRANDOM ACCESS
• InIn random accessrandom access oror contentioncontention methods, no stationmethods, no station
is superior to another station and none is assignedis superior to another station and none is assigned
the control over another.the control over another.
• No station permits, or does not permit, anotherNo station permits, or does not permit, another
station to send.station to send.
• At each instance, a station that has data to sendAt each instance, a station that has data to send
uses a procedure defined by the protocol to make auses a procedure defined by the protocol to make a
decision on whether or not to send.decision on whether or not to send.
12.4
12.5
Frames in a pure ALOHA network
12.6
1. Each station sends a frame when it has a frame to send. Thus likelihood of collisions.
2. If Ack timed-out, each station waits a random amount of time, TB, before resending.
3. After Kmax (normally = 15) No. of resending attempts, must give up and try later.
12.7
Space/time model of the collision in CSMA
12.8
B’s
C’s
Vulnerable time in CSMA
12.9
Behavior of three persistence methods- What to do if channel busy or idle
12.10
After finding line idle
sends immediately, ie.
with probability 1. Max
chance of collisions
If line idle sends
immediately, else waits
random amount of
time. Reduced
collisions
If line idle sends with
prob p, else waits for
next slot.
Flow diagram for three persistence methods
12.11
12.12
Note, quickly terminating damaged frames saves time and bandwidth.
Collision of the first bit in CSMA/CD
12.13
Collision and abortion in CSMA/CD
12.14
Qn. What about the Minimum Frame Size?
12.15
A network using CSMA/CD has a bandwidth of 10 Mbps.
If the maximum propagation time (including the delays in
the devices and ignoring the time needed to send a
jamming signal, as we see later) is 25.6 μs, what is the
minimum size of the frame?
Example
Solution
The frame transmission time is Tfr = 2 × Tp = 51.2 μs.
This means, in the worst case, a station needs to transmit
for a period of 51.2 μs to detect the collision. The
minimum size of the frame is 10 Mbps × 51.2 μs = 512
bits or 64 bytes. This is actually the minimum size of the
frame for Standard Ethernet.
12.16
Flow diagram for the CSMA/CD
12.17
Energy level during transmission, idleness, or collision
12.18
12.19
Timing in CSMA/CA
12.20
In CSMA/CA, the IFS (time allowed for a
distant frame to reach another station)
can also be used to define the priority of
a station or a frame.
Note
12.21
Contention window is an amount of time
divided into slots; A station ready to
transmit, chooses a random No. of slots
as its wait time.
Note
12.22
In CSMA/CA, if the station finds the
channel busy, it does not restart the
timer of the contention;
it stops the timer and restarts it when
the channel becomes idle.
Note
12.23
Flow diagram for CSMA/CA
12.24
CONTROLLED ACCESSCONTROLLED ACCESS
InIn controlled accesscontrolled access, the stations consult one another, the stations consult one another
to find which station has the right to send. A stationto find which station has the right to send. A station
cannot send unless it has been authorized by othercannot send unless it has been authorized by other
stations. We discuss three popular controlled-accessstations. We discuss three popular controlled-access
methods.methods.
12.25
Reservation Access Method
12.26
Select and poll functions in Polling Access Method
12.27
12.28
Logical ring and physical topology in token-passing access method
12.29

More Related Content

What's hot

seminar report on multiple access control protocol submitted by munesh
seminar report on multiple access control protocol submitted by munesh seminar report on multiple access control protocol submitted by munesh
seminar report on multiple access control protocol submitted by munesh meenamunesh
 
3.Medium Access Control
3.Medium Access Control3.Medium Access Control
3.Medium Access ControlSonali Chauhan
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLjunnubabu
 
Multiple access control protocol
Multiple access control protocol Multiple access control protocol
Multiple access control protocol meenamunesh
 
819 Static Channel Allocation
819 Static Channel Allocation819 Static Channel Allocation
819 Static Channel Allocationtechbed
 
Multiple access in Communication Netwroks
Multiple access in Communication NetwroksMultiple access in Communication Netwroks
Multiple access in Communication Netwroksaounraza007
 
Csma protocols
Csma protocolsCsma protocols
Csma protocolsManal Shah
 
Unit 2 data link control
Unit 2 data link controlUnit 2 data link control
Unit 2 data link controlVishal kakade
 

What's hot (20)

seminar report on multiple access control protocol submitted by munesh
seminar report on multiple access control protocol submitted by munesh seminar report on multiple access control protocol submitted by munesh
seminar report on multiple access control protocol submitted by munesh
 
3.Medium Access Control
3.Medium Access Control3.Medium Access Control
3.Medium Access Control
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
 
Mac
MacMac
Mac
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROL
 
Lecture 6
Lecture 6Lecture 6
Lecture 6
 
Multiple access control protocol
Multiple access control protocol Multiple access control protocol
Multiple access control protocol
 
819 Static Channel Allocation
819 Static Channel Allocation819 Static Channel Allocation
819 Static Channel Allocation
 
Multiple access in Communication Netwroks
Multiple access in Communication NetwroksMultiple access in Communication Netwroks
Multiple access in Communication Netwroks
 
HIGH SPEED NETWORKS
HIGH SPEED NETWORKSHIGH SPEED NETWORKS
HIGH SPEED NETWORKS
 
MAC
MACMAC
MAC
 
clas 8
clas 8clas 8
clas 8
 
Csma cd and csma-ca
Csma cd and csma-caCsma cd and csma-ca
Csma cd and csma-ca
 
Csma protocols
Csma protocolsCsma protocols
Csma protocols
 
Multiple access protocol
Multiple access protocolMultiple access protocol
Multiple access protocol
 
Unit 2 data link control
Unit 2 data link controlUnit 2 data link control
Unit 2 data link control
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
 
Sliding window protocol
Sliding window protocolSliding window protocol
Sliding window protocol
 
Unit 1 mac vsd
Unit 1 mac vsdUnit 1 mac vsd
Unit 1 mac vsd
 
5 digital datacomm
5 digital datacomm5 digital datacomm
5 digital datacomm
 

Viewers also liked

Multiple Access Methods
Multiple Access MethodsMultiple Access Methods
Multiple Access MethodsPrateek Soni
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocaltes31
 
Multiple acessing
Multiple acessing Multiple acessing
Multiple acessing Piyush Sarin
 
Dc chapter 13
Dc chapter   13Dc chapter   13
Dc chapter 13TechiNerd
 
Multiple Access Networking
Multiple Access NetworkingMultiple Access Networking
Multiple Access NetworkingShashi Kumar
 
802.11 wireless lan
802.11 wireless lan802.11 wireless lan
802.11 wireless lanMohd Arif
 
Multiple Access Techniques for 5G
Multiple Access Techniques for 5GMultiple Access Techniques for 5G
Multiple Access Techniques for 5GSitha Sok
 
Satellite Multiple Access Schemes
Satellite Multiple Access SchemesSatellite Multiple Access Schemes
Satellite Multiple Access SchemesDileep Kadavarath
 
Multiple acces techniques
Multiple acces techniquesMultiple acces techniques
Multiple acces techniquesparamsidhu89
 
Medium Access Control
Medium Access ControlMedium Access Control
Medium Access Controlanishgoel
 
Wireless networking
Wireless networkingWireless networking
Wireless networkingOnline
 
Wireless Local Area Networks
Wireless Local Area NetworksWireless Local Area Networks
Wireless Local Area NetworksDon Norwood
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)Parvesh Taneja
 

Viewers also liked (16)

Multiple Access Methods
Multiple Access MethodsMultiple Access Methods
Multiple Access Methods
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
 
Multiple acessing
Multiple acessing Multiple acessing
Multiple acessing
 
Dc chapter 13
Dc chapter   13Dc chapter   13
Dc chapter 13
 
Multiple Access Networking
Multiple Access NetworkingMultiple Access Networking
Multiple Access Networking
 
802.11 wireless lan
802.11 wireless lan802.11 wireless lan
802.11 wireless lan
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
 
Multiple Access Techniques for 5G
Multiple Access Techniques for 5GMultiple Access Techniques for 5G
Multiple Access Techniques for 5G
 
Satellite Multiple Access Schemes
Satellite Multiple Access SchemesSatellite Multiple Access Schemes
Satellite Multiple Access Schemes
 
Multiple acces techniques
Multiple acces techniquesMultiple acces techniques
Multiple acces techniques
 
FDMA-TDMA-CDMA
FDMA-TDMA-CDMAFDMA-TDMA-CDMA
FDMA-TDMA-CDMA
 
Medium Access Control
Medium Access ControlMedium Access Control
Medium Access Control
 
Wireless networking
Wireless networkingWireless networking
Wireless networking
 
Multiple access techniques for wireless communications
Multiple access techniques for wireless communicationsMultiple access techniques for wireless communications
Multiple access techniques for wireless communications
 
Wireless Local Area Networks
Wireless Local Area NetworksWireless Local Area Networks
Wireless Local Area Networks
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)
 

Similar to Networking Fundamentals: Multiple Access Protocols

Multiple Access ppt in Object Oriented Programming
Multiple Access ppt in Object Oriented ProgrammingMultiple Access ppt in Object Oriented Programming
Multiple Access ppt in Object Oriented Programmingarnavytstudio2814
 
Media Access Control (MAC Layer)
Media Access Control (MAC Layer)Media Access Control (MAC Layer)
Media Access Control (MAC Layer)Meenakshi Paul
 
Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...
Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...
Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...Soumen Santra
 
12 Multiple Access
12 Multiple Access12 Multiple Access
12 Multiple AccessAhmar Hashmi
 
Carrier-sense multiple access with collision detection (CSMA/CD)
Carrier-sense multiple access with collision detection (CSMA/CD)Carrier-sense multiple access with collision detection (CSMA/CD)
Carrier-sense multiple access with collision detection (CSMA/CD)university of Malakand Dir Lower
 
MEDIUM ACCESS CONTROL Sublayer IN CN.ppt
MEDIUM ACCESS CONTROL Sublayer IN CN.pptMEDIUM ACCESS CONTROL Sublayer IN CN.ppt
MEDIUM ACCESS CONTROL Sublayer IN CN.pptssuser35e92d
 
3-MACSublayer.ppt
3-MACSublayer.ppt3-MACSublayer.ppt
3-MACSublayer.pptDigiPlexus
 
Jaimin chp-4 - media access sub-layer- 2011 batch
Jaimin   chp-4 - media access sub-layer- 2011 batchJaimin   chp-4 - media access sub-layer- 2011 batch
Jaimin chp-4 - media access sub-layer- 2011 batchJaimin Jani
 
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptxComputer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptxPravinbhargav
 
Mac protocol for wmn
Mac protocol for wmnMac protocol for wmn
Mac protocol for wmnmmjalbiaty
 
Unit-2 Media Access Protocols.pdf
Unit-2 Media Access Protocols.pdfUnit-2 Media Access Protocols.pdf
Unit-2 Media Access Protocols.pdfSmtPArunaKumari
 

Similar to Networking Fundamentals: Multiple Access Protocols (20)

Multiple Access ppt in Object Oriented Programming
Multiple Access ppt in Object Oriented ProgrammingMultiple Access ppt in Object Oriented Programming
Multiple Access ppt in Object Oriented Programming
 
Media Access Control (MAC Layer)
Media Access Control (MAC Layer)Media Access Control (MAC Layer)
Media Access Control (MAC Layer)
 
ch12.ppt
ch12.pptch12.ppt
ch12.ppt
 
Unit_3_WSN.pptx
Unit_3_WSN.pptxUnit_3_WSN.pptx
Unit_3_WSN.pptx
 
AIU_CN_2.pptx
AIU_CN_2.pptxAIU_CN_2.pptx
AIU_CN_2.pptx
 
Ch12
Ch12Ch12
Ch12
 
Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...
Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...
Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...
 
12 Multiple Access
12 Multiple Access12 Multiple Access
12 Multiple Access
 
Ch12
Ch12Ch12
Ch12
 
Ch12
Ch12Ch12
Ch12
 
Carrier-sense multiple access with collision detection (CSMA/CD)
Carrier-sense multiple access with collision detection (CSMA/CD)Carrier-sense multiple access with collision detection (CSMA/CD)
Carrier-sense multiple access with collision detection (CSMA/CD)
 
MultipleAccess.ppt
MultipleAccess.pptMultipleAccess.ppt
MultipleAccess.ppt
 
Mac
MacMac
Mac
 
MEDIUM ACCESS CONTROL Sublayer IN CN.ppt
MEDIUM ACCESS CONTROL Sublayer IN CN.pptMEDIUM ACCESS CONTROL Sublayer IN CN.ppt
MEDIUM ACCESS CONTROL Sublayer IN CN.ppt
 
3-MACSublayer.ppt
3-MACSublayer.ppt3-MACSublayer.ppt
3-MACSublayer.ppt
 
Jaimin chp-4 - media access sub-layer- 2011 batch
Jaimin   chp-4 - media access sub-layer- 2011 batchJaimin   chp-4 - media access sub-layer- 2011 batch
Jaimin chp-4 - media access sub-layer- 2011 batch
 
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptxComputer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptx
 
Mac protocol for wmn
Mac protocol for wmnMac protocol for wmn
Mac protocol for wmn
 
Unit-2 Media Access Protocols.pdf
Unit-2 Media Access Protocols.pdfUnit-2 Media Access Protocols.pdf
Unit-2 Media Access Protocols.pdf
 
Technical seminar
Technical seminarTechnical seminar
Technical seminar
 

More from kavish dani

4b internet protocol
4b internet protocol4b internet protocol
4b internet protocolkavish dani
 
4a logical laddressing
4a logical laddressing4a logical laddressing
4a logical laddressingkavish dani
 
4c Address Mapping, Error Reporting and Multicasting
4c Address Mapping, Error Reporting and Multicasting4c Address Mapping, Error Reporting and Multicasting
4c Address Mapping, Error Reporting and Multicastingkavish dani
 
1b network models
1b network models1b network models
1b network modelskavish dani
 
3d connecting networks
3d connecting networks3d connecting networks
3d connecting networkskavish dani
 
3a data link layer continued
3a data link layer continued3a data link layer continued
3a data link layer continuedkavish dani
 
3a data link layer
3a data link layer 3a data link layer
3a data link layer kavish dani
 
2c wired transmission
2c wired transmission2c wired transmission
2c wired transmissionkavish dani
 
2b switching in networks
2b switching in networks2b switching in networks
2b switching in networkskavish dani
 
2a transmission media
2a transmission  media2a transmission  media
2a transmission mediakavish dani
 
1a introduction to network fundamentals
1a introduction to network fundamentals1a introduction to network fundamentals
1a introduction to network fundamentalskavish dani
 

More from kavish dani (14)

4d routing
4d routing4d routing
4d routing
 
4b internet protocol
4b internet protocol4b internet protocol
4b internet protocol
 
4a logical laddressing
4a logical laddressing4a logical laddressing
4a logical laddressing
 
4c Address Mapping, Error Reporting and Multicasting
4c Address Mapping, Error Reporting and Multicasting4c Address Mapping, Error Reporting and Multicasting
4c Address Mapping, Error Reporting and Multicasting
 
1b network models
1b network models1b network models
1b network models
 
3d connecting networks
3d connecting networks3d connecting networks
3d connecting networks
 
3c ethernet
3c ethernet3c ethernet
3c ethernet
 
3a data link layer continued
3a data link layer continued3a data link layer continued
3a data link layer continued
 
3a data link layer
3a data link layer 3a data link layer
3a data link layer
 
2c wired transmission
2c wired transmission2c wired transmission
2c wired transmission
 
2b switching in networks
2b switching in networks2b switching in networks
2b switching in networks
 
2a transmission media
2a transmission  media2a transmission  media
2a transmission media
 
1a introduction to network fundamentals
1a introduction to network fundamentals1a introduction to network fundamentals
1a introduction to network fundamentals
 
5 forces model
5 forces model5 forces model
5 forces model
 

Recently uploaded

Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 

Recently uploaded (20)

Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 

Networking Fundamentals: Multiple Access Protocols

  • 2. Data link layer divided into two functionality-oriented sublayers 12.2
  • 4. RANDOM ACCESSRANDOM ACCESS • InIn random accessrandom access oror contentioncontention methods, no stationmethods, no station is superior to another station and none is assignedis superior to another station and none is assigned the control over another.the control over another. • No station permits, or does not permit, anotherNo station permits, or does not permit, another station to send.station to send. • At each instance, a station that has data to sendAt each instance, a station that has data to send uses a procedure defined by the protocol to make auses a procedure defined by the protocol to make a decision on whether or not to send.decision on whether or not to send. 12.4
  • 6. Frames in a pure ALOHA network 12.6 1. Each station sends a frame when it has a frame to send. Thus likelihood of collisions. 2. If Ack timed-out, each station waits a random amount of time, TB, before resending. 3. After Kmax (normally = 15) No. of resending attempts, must give up and try later.
  • 8. Space/time model of the collision in CSMA 12.8 B’s C’s
  • 9. Vulnerable time in CSMA 12.9
  • 10. Behavior of three persistence methods- What to do if channel busy or idle 12.10 After finding line idle sends immediately, ie. with probability 1. Max chance of collisions If line idle sends immediately, else waits random amount of time. Reduced collisions If line idle sends with prob p, else waits for next slot.
  • 11. Flow diagram for three persistence methods 12.11
  • 12. 12.12 Note, quickly terminating damaged frames saves time and bandwidth.
  • 13. Collision of the first bit in CSMA/CD 12.13
  • 14. Collision and abortion in CSMA/CD 12.14 Qn. What about the Minimum Frame Size?
  • 15. 12.15
  • 16. A network using CSMA/CD has a bandwidth of 10 Mbps. If the maximum propagation time (including the delays in the devices and ignoring the time needed to send a jamming signal, as we see later) is 25.6 μs, what is the minimum size of the frame? Example Solution The frame transmission time is Tfr = 2 × Tp = 51.2 μs. This means, in the worst case, a station needs to transmit for a period of 51.2 μs to detect the collision. The minimum size of the frame is 10 Mbps × 51.2 μs = 512 bits or 64 bytes. This is actually the minimum size of the frame for Standard Ethernet. 12.16
  • 17. Flow diagram for the CSMA/CD 12.17
  • 18. Energy level during transmission, idleness, or collision 12.18
  • 19. 12.19
  • 21. In CSMA/CA, the IFS (time allowed for a distant frame to reach another station) can also be used to define the priority of a station or a frame. Note 12.21
  • 22. Contention window is an amount of time divided into slots; A station ready to transmit, chooses a random No. of slots as its wait time. Note 12.22
  • 23. In CSMA/CA, if the station finds the channel busy, it does not restart the timer of the contention; it stops the timer and restarts it when the channel becomes idle. Note 12.23
  • 24. Flow diagram for CSMA/CA 12.24
  • 25. CONTROLLED ACCESSCONTROLLED ACCESS InIn controlled accesscontrolled access, the stations consult one another, the stations consult one another to find which station has the right to send. A stationto find which station has the right to send. A station cannot send unless it has been authorized by othercannot send unless it has been authorized by other stations. We discuss three popular controlled-accessstations. We discuss three popular controlled-access methods.methods. 12.25
  • 27. Select and poll functions in Polling Access Method 12.27
  • 28. 12.28
  • 29. Logical ring and physical topology in token-passing access method 12.29