SlideShare a Scribd company logo
12.1
Chapter 12
Multiple Access
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
12.2
Figure 12.1 Data link layer divided into two functionality-oriented sublayers
12.3
IEEE 802 LAN ARCHITECTURE
12.4
IEEE 802 LAN
• Physical layer
•Physical layer deals with actual transmission and
reception of bits over the transmission medium
•MAC (Medium Access Control
•Its concerned with the sharing of physical
connection among several computers. MAC is a
protocol for accessing high speed internet links and
for transferring data frames from one station to
another.
12.5
IEEE 802 LAN
LLC( Logical Link Control)
•Provides a service interface
•Protocols on network layer uses the services
provided by LLC layer.
•Concerned with managing traffic(flow and error
control)
12.6
Figure 12.2 Taxonomy of multiple-access protocols discussed in this chapter
12.7
12-1 RANDOM ACCESS
In random access or contention methods, no station is
superior to another station and none is assigned the
control over another. No station permits, or does not
permit, another station to send. At each instance, a
station that has data to send uses a procedure defined
by the protocol to make a decision on whether or not to
send.
ALOHA
Carrier Sense Multiple Access
Carrier Sense Multiple Access with Collision Detection
Carrier Sense Multiple Access with Collision Avoidance
Topics discussed in this section:
12.8
Two features:
• First, there is no schedules time for a station to
transmit. Transmission is random. Hence they are
called ransom access methods.
•Second, no rules specify which station should send
next. Stations compete with one another to access the
medium. That is why these methods are called
contention methods.
12.9
ALOHA
• Earliest random access method developed in 1970’s.
•When a station sends data, another station may
attempt to do so at the same time. The data from the
two stations collide and become garbled.
12.10
PURE ALOHA
• The original ALOHA is called Pure ALOHA.
•The idea is each station sends a frame, whenever it has
a frame to send.
•However, since there is only one channel to share,
there is a possibility of collision.
.
12.11
Figure 12.3 Frames in a pure ALOHA network
12.12
PURE ALOHA
• We need to resend the frames that have been destroyed
during transmission.
•Pure ALOHA relies in acknowledgement from the
receiver.
•When a station sends a frame, it expects the receiver to
send back an acknowledgment.
•If the acknowledgment does not arrive after a time-out
period, the station assumes that the frame has been
destroyed and resends the frame.
PURE ALOHA
• Pure ALOHA dictates that when the time-out period
passes, each station waits for a random amount of time
before resending the frame. This time is called back-off
time Tb.
•Pure ALOHA has a second method to prevent
congesting the channel with transmitted frames.
•After a maximum number of retransmission attempts
Kmax, a station must give up and try later.
•The time-out period is equal to the maximum possible
round-trip propagation delay, which is twice the amount
of time required to send a frame between two most
widely seperated stations(2*Tp)
12.14
Figure 12.4 Procedure for pure ALOHA protocol
12.15
Figure 12.5 Vulnerable time for pure ALOHA protocol
12.16
The throughput for pure ALOHA is
S = G × e −2G .
The maximum throughput
Smax = 0.184 when G= (1/2).
Note
SLOTTED ALOHA
• Pure ALOHA has a vulnerable time of 2Tfr. This is
because there’s no rule that defines when a station can
send. Slotted ALOHA improves the efficiency of Pure
ALOHA.
•In Slotted ALOHA, we divide the time into slots of Tfr
seconds and force the station to send only at the
beginning of the time slot.
•Because the station is allowed to send only at the
beginning of a slot, if the station misses that slot, then it
must wait until the beginning of the next slot.
12.18
Figure 12.6 Frames in a slotted ALOHA network
SLOTTED ALOHA
• There’s still a possibility of collision, is two stations try
to send at the beginning of the same slot. However, the
vulnerable time is now reduced to half , equal to Tfr.
.
12.20
The throughput for slotted ALOHA is
S = G × e−G .
The maximum throughput
Smax = 0.368 when G = 1.
Note
12.21
Figure 12.7 Vulnerable time for slotted ALOHA protocol
CSMA
• To minimize the chance of collision and to increase the
performance, the CSMA method was developed.
•Carrier Sense Multiple Access(CSMA) requires that
each station first listen to the medium (check the state of
the medium) before sending. This is based on the
principle “sense before transmit "or “listen before talk”.
•The possibility of collision still exist because of
propagation delay.
.
CSMA
• A station may sense the medium and find it idle, only
because the first bit send by another station has not yet
been received.
•When a station sends a frame or any other station tries
to send a frame during this time, a collison will result.
But if the first bit of the frame, reaches the end of the
medium, every station will already have sensed the bit
and will refrain from sending.
.
12.24
Figure 12.9 Vulnerable time in CSMA
Persistence Methods
• What should a station do if the channel is busy?
•What should a station do if the channel is idle?
•3 methods have been devised to answer these questions:
•The 1-persistent method
•The non-persistent method
•The p-persistent method
.
1-persistent method
•In this method, after the station finds the line idle, it
sends its frame immediately (with probability 1). This
method has the highest chance of collision because two
or more stations may find the line idle and send their
frames immediately.
.
Non persistent method
•In this method, a station that has a frame to send senses
the line. If the line is idle, it sends immediately.
•If not, it waits a random amount of time and then senses
the line again.
•This method reduces the chance of collision because its
unlikely that two or more stations will wait the same
amount of time and retry simultaneously.
•Reduces the efficiency of the network because the
medium remains idle while there maybe stations to send.
12.28
Figure 12.10 Behavior of three persistence methods
P- persistent method
•This method is used if the channel has time slots with a
slot duration equal to or greater than the maximum
propagation time. It reduces the chances of collision and
improves efficiency.
•In this method, after a station finds the line idle, it does
the following:
•With probability p, the station sends its frame.
•With probability q=1-p, the station waits for the
beginning of next time slot and checks the line again.
12.30
Figure 12.12 Collision of the first bit in CSMA/CD
12.31
Figure 12.13 Collision and abortion in CSMA/CD
12.32
Figure 12.14 Flow diagram for the CSMA/CD
12.33
Figure 12.15 Energy level during transmission, idleness, or collision
12.34
Figure 12.16 Timing in CSMA/CA
12.35
In CSMA/CA, the IFS can also be used to
define the priority of a station or a frame.
Note
12.36
In CSMA/CA, if the station finds the
channel busy, it does not restart the
timer of the contention window;
it stops the timer and restarts it when
the channel becomes idle.
Note
12.37
Figure 12.17 Flow diagram for CSMA/CA
12.38
12-2 CONTROLLED ACCESS
In controlled access, the stations consult one another
to find which station has the right to send. A station
cannot send unless it has been authorized by other
stations. We discuss three popular controlled-access
methods.
Reservation
Polling
Token Passing
Topics discussed in this section:
12.39
Figure 12.18 Reservation access method
12.40
Figure 12.19 Select and poll functions in polling access method
12.41
Figure 12.20 Logical ring and physical topology in token-passing access method

More Related Content

PPTX
Presentation on Transmission Media
PPT
Chapter 10
PPTX
flip flops
PPTX
Domain name system presentation
PDF
Placement management system
PPTX
Unit 1 - R Programming (Part 2).pptx
PPTX
Microsoft word
PPTX
Address resolution protocol (ARP)
Presentation on Transmission Media
Chapter 10
flip flops
Domain name system presentation
Placement management system
Unit 1 - R Programming (Part 2).pptx
Microsoft word
Address resolution protocol (ARP)

What's hot (20)

PPT
Forouzan-ch19-Network-Layer-Logical-Addressing.ppt
PPT
Chapter 23
PPTX
SLOTTED ALOHA and pure aloha are the category of aloha
PPT
Chapter 25
PPT
Chapter 15
PDF
PPTX
Multiple Access Protocal
PPT
Unit 3 Network Layer PPT
PPT
Network layer tanenbaum
PPT
Chapter 8: Switching
PPT
Chapter 26 - Remote Logging, Electronic Mail & File Transfer
PPT
Chapter 1 Introduction (Data Communication by Forouzan)
PPT
Sliding window protocol
PPT
Chapter 20
PPTX
Unit 2 data link control
PPT
Unit 5 Application Layer
PPTX
Framing in data link layer
PPT
Chapter 6
Forouzan-ch19-Network-Layer-Logical-Addressing.ppt
Chapter 23
SLOTTED ALOHA and pure aloha are the category of aloha
Chapter 25
Chapter 15
Multiple Access Protocal
Unit 3 Network Layer PPT
Network layer tanenbaum
Chapter 8: Switching
Chapter 26 - Remote Logging, Electronic Mail & File Transfer
Chapter 1 Introduction (Data Communication by Forouzan)
Sliding window protocol
Chapter 20
Unit 2 data link control
Unit 5 Application Layer
Framing in data link layer
Chapter 6
Ad

Similar to Forouzan _ Multiple access protocols.ppt (20)

PPT
Multiple Access ppt in Object Oriented Programming
PPTX
Media Access Control (MAC Layer)
PPTX
module 2 ppt.pptx
PPT
multiple access techniquesch12-multiple-access.ppt
PPT
ch12.ppt computer network specifically from data link layer
PPT
ch12.ppt
PDF
Medium access control. MAC Protocol.Data link layer
PPT
IV_UNIT.ppt
PDF
CN-U-II- Multiple access control Algo.pdf
PPT
3b multiple access
PPT
Computer communication multiple access.ppt
PPTX
Computer Networks ppt for the following data base and it's analysis
PPT
unit 3 Multiple Access.ppt
PPTX
Unit 3 - Data Link Layer - Part B
PPTX
Multiple access protocols in data communication networks
PDF
CN R16 -UNIT-4.pdf
PPT
medium access tcpip network layer data link layer
PPT
kamalaveni.ppt
PPT
Unit 1 mac vsd
Multiple Access ppt in Object Oriented Programming
Media Access Control (MAC Layer)
module 2 ppt.pptx
multiple access techniquesch12-multiple-access.ppt
ch12.ppt computer network specifically from data link layer
ch12.ppt
Medium access control. MAC Protocol.Data link layer
IV_UNIT.ppt
CN-U-II- Multiple access control Algo.pdf
3b multiple access
Computer communication multiple access.ppt
Computer Networks ppt for the following data base and it's analysis
unit 3 Multiple Access.ppt
Unit 3 - Data Link Layer - Part B
Multiple access protocols in data communication networks
CN R16 -UNIT-4.pdf
medium access tcpip network layer data link layer
kamalaveni.ppt
Unit 1 mac vsd
Ad

Recently uploaded (20)

PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPTX
bas. eng. economics group 4 presentation 1.pptx
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PDF
Structs to JSON How Go Powers REST APIs.pdf
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPTX
CH1 Production IntroductoryConcepts.pptx
PDF
Well-logging-methods_new................
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PDF
composite construction of structures.pdf
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PDF
Arduino robotics embedded978-1-4302-3184-4.pdf
PDF
PPT on Performance Review to get promotions
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PDF
Digital Logic Computer Design lecture notes
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPTX
Lecture Notes Electrical Wiring System Components
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
bas. eng. economics group 4 presentation 1.pptx
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Structs to JSON How Go Powers REST APIs.pdf
UNIT-1 - COAL BASED THERMAL POWER PLANTS
CH1 Production IntroductoryConcepts.pptx
Well-logging-methods_new................
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
composite construction of structures.pdf
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Arduino robotics embedded978-1-4302-3184-4.pdf
PPT on Performance Review to get promotions
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
Digital Logic Computer Design lecture notes
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Lecture Notes Electrical Wiring System Components

Forouzan _ Multiple access protocols.ppt

  • 1. 12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
  • 2. 12.2 Figure 12.1 Data link layer divided into two functionality-oriented sublayers
  • 3. 12.3 IEEE 802 LAN ARCHITECTURE
  • 4. 12.4 IEEE 802 LAN • Physical layer •Physical layer deals with actual transmission and reception of bits over the transmission medium •MAC (Medium Access Control •Its concerned with the sharing of physical connection among several computers. MAC is a protocol for accessing high speed internet links and for transferring data frames from one station to another.
  • 5. 12.5 IEEE 802 LAN LLC( Logical Link Control) •Provides a service interface •Protocols on network layer uses the services provided by LLC layer. •Concerned with managing traffic(flow and error control)
  • 6. 12.6 Figure 12.2 Taxonomy of multiple-access protocols discussed in this chapter
  • 7. 12.7 12-1 RANDOM ACCESS In random access or contention methods, no station is superior to another station and none is assigned the control over another. No station permits, or does not permit, another station to send. At each instance, a station that has data to send uses a procedure defined by the protocol to make a decision on whether or not to send. ALOHA Carrier Sense Multiple Access Carrier Sense Multiple Access with Collision Detection Carrier Sense Multiple Access with Collision Avoidance Topics discussed in this section:
  • 8. 12.8 Two features: • First, there is no schedules time for a station to transmit. Transmission is random. Hence they are called ransom access methods. •Second, no rules specify which station should send next. Stations compete with one another to access the medium. That is why these methods are called contention methods.
  • 9. 12.9 ALOHA • Earliest random access method developed in 1970’s. •When a station sends data, another station may attempt to do so at the same time. The data from the two stations collide and become garbled.
  • 10. 12.10 PURE ALOHA • The original ALOHA is called Pure ALOHA. •The idea is each station sends a frame, whenever it has a frame to send. •However, since there is only one channel to share, there is a possibility of collision. .
  • 11. 12.11 Figure 12.3 Frames in a pure ALOHA network
  • 12. 12.12 PURE ALOHA • We need to resend the frames that have been destroyed during transmission. •Pure ALOHA relies in acknowledgement from the receiver. •When a station sends a frame, it expects the receiver to send back an acknowledgment. •If the acknowledgment does not arrive after a time-out period, the station assumes that the frame has been destroyed and resends the frame.
  • 13. PURE ALOHA • Pure ALOHA dictates that when the time-out period passes, each station waits for a random amount of time before resending the frame. This time is called back-off time Tb. •Pure ALOHA has a second method to prevent congesting the channel with transmitted frames. •After a maximum number of retransmission attempts Kmax, a station must give up and try later. •The time-out period is equal to the maximum possible round-trip propagation delay, which is twice the amount of time required to send a frame between two most widely seperated stations(2*Tp)
  • 14. 12.14 Figure 12.4 Procedure for pure ALOHA protocol
  • 15. 12.15 Figure 12.5 Vulnerable time for pure ALOHA protocol
  • 16. 12.16 The throughput for pure ALOHA is S = G × e −2G . The maximum throughput Smax = 0.184 when G= (1/2). Note
  • 17. SLOTTED ALOHA • Pure ALOHA has a vulnerable time of 2Tfr. This is because there’s no rule that defines when a station can send. Slotted ALOHA improves the efficiency of Pure ALOHA. •In Slotted ALOHA, we divide the time into slots of Tfr seconds and force the station to send only at the beginning of the time slot. •Because the station is allowed to send only at the beginning of a slot, if the station misses that slot, then it must wait until the beginning of the next slot.
  • 18. 12.18 Figure 12.6 Frames in a slotted ALOHA network
  • 19. SLOTTED ALOHA • There’s still a possibility of collision, is two stations try to send at the beginning of the same slot. However, the vulnerable time is now reduced to half , equal to Tfr. .
  • 20. 12.20 The throughput for slotted ALOHA is S = G × e−G . The maximum throughput Smax = 0.368 when G = 1. Note
  • 21. 12.21 Figure 12.7 Vulnerable time for slotted ALOHA protocol
  • 22. CSMA • To minimize the chance of collision and to increase the performance, the CSMA method was developed. •Carrier Sense Multiple Access(CSMA) requires that each station first listen to the medium (check the state of the medium) before sending. This is based on the principle “sense before transmit "or “listen before talk”. •The possibility of collision still exist because of propagation delay. .
  • 23. CSMA • A station may sense the medium and find it idle, only because the first bit send by another station has not yet been received. •When a station sends a frame or any other station tries to send a frame during this time, a collison will result. But if the first bit of the frame, reaches the end of the medium, every station will already have sensed the bit and will refrain from sending. .
  • 25. Persistence Methods • What should a station do if the channel is busy? •What should a station do if the channel is idle? •3 methods have been devised to answer these questions: •The 1-persistent method •The non-persistent method •The p-persistent method .
  • 26. 1-persistent method •In this method, after the station finds the line idle, it sends its frame immediately (with probability 1). This method has the highest chance of collision because two or more stations may find the line idle and send their frames immediately. .
  • 27. Non persistent method •In this method, a station that has a frame to send senses the line. If the line is idle, it sends immediately. •If not, it waits a random amount of time and then senses the line again. •This method reduces the chance of collision because its unlikely that two or more stations will wait the same amount of time and retry simultaneously. •Reduces the efficiency of the network because the medium remains idle while there maybe stations to send.
  • 28. 12.28 Figure 12.10 Behavior of three persistence methods
  • 29. P- persistent method •This method is used if the channel has time slots with a slot duration equal to or greater than the maximum propagation time. It reduces the chances of collision and improves efficiency. •In this method, after a station finds the line idle, it does the following: •With probability p, the station sends its frame. •With probability q=1-p, the station waits for the beginning of next time slot and checks the line again.
  • 30. 12.30 Figure 12.12 Collision of the first bit in CSMA/CD
  • 31. 12.31 Figure 12.13 Collision and abortion in CSMA/CD
  • 32. 12.32 Figure 12.14 Flow diagram for the CSMA/CD
  • 33. 12.33 Figure 12.15 Energy level during transmission, idleness, or collision
  • 35. 12.35 In CSMA/CA, the IFS can also be used to define the priority of a station or a frame. Note
  • 36. 12.36 In CSMA/CA, if the station finds the channel busy, it does not restart the timer of the contention window; it stops the timer and restarts it when the channel becomes idle. Note
  • 37. 12.37 Figure 12.17 Flow diagram for CSMA/CA
  • 38. 12.38 12-2 CONTROLLED ACCESS In controlled access, the stations consult one another to find which station has the right to send. A station cannot send unless it has been authorized by other stations. We discuss three popular controlled-access methods. Reservation Polling Token Passing Topics discussed in this section:
  • 40. 12.40 Figure 12.19 Select and poll functions in polling access method
  • 41. 12.41 Figure 12.20 Logical ring and physical topology in token-passing access method