SlideShare a Scribd company logo
12.1
Multiple Access
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
12.2
Data link layer divided into two functionality-oriented sublayers
12.3
Taxonomy of multiple-access protocols discussed in this chapter
12.4
RANDOM ACCESSRANDOM ACCESS
InIn random accessrandom access oror contentioncontention methods, no station ismethods, no station is
superior to another station and none is assigned thesuperior to another station and none is assigned the
control over another. No station permits, or does notcontrol over another. No station permits, or does not
permit, another station to send. At each instance, apermit, another station to send. At each instance, a
station that has data to send uses a procedure definedstation that has data to send uses a procedure defined
by the protocol to make a decision on whether or notby the protocol to make a decision on whether or not
to send.to send.
ALOHA
Carrier Sense Multiple Access
Carrier Sense Multiple Access with Collision Detection
Carrier Sense Multiple Access with Collision Avoidance
Topics discussed in this section:Topics discussed in this section:
12.5
To avoid access conflict or to resolve it when itTo avoid access conflict or to resolve it when it
happens, each station follows a procedure that answerhappens, each station follows a procedure that answer
the following questions:the following questions:
 When can the station access the medium.When can the station access the medium.
What can the station do if the medium is busy.What can the station do if the medium is busy.
How can the station determine the success or failureHow can the station determine the success or failure
of the transmission.of the transmission.
What can the station do if there is an access conflict.What can the station do if there is an access conflict.
12.6
ALOHA
ALOHA, the earliest random access method, was developed at the University of Hawaii
in early 1970. It was designed for a radio (wireless) LAN, but it can be used on any
shared medium.
Pure ALOHA
Slotted ALOHA
12.7
Frames in a pure ALOHA network
12.8
Procedure for pure ALOHA protocol
12.9
Vulnerable time for pure ALOHA protocol
The Vulnerable time, in which there is possibility of collision
12.10
Slotted ALOHA
12.11
Frames in a slotted ALOHA network
12.12
Figure 12.7 Vulnerable time for slotted ALOHA protocol
12.13
CSMA
Carrier Sense Multiple Access
12.14
Space/time model of the collision in CSMA
12.15
Figure 12.9 Vulnerable time in CSMA
12.16
Persistence Method
What Should a station do if the channel is busy.
What should a station do if the channel is idle.
1-Persistence Method
Non Persistence Method
p-Persistence Method
12.17
Behavior of three persistence methods
12.18
Flow diagram for three persistence methods
12.19
Collision of the first bit in CSMA/CD
12.20
Collision and abortion in CSMA/CD
12.21
Flow diagram for the CSMA/CD
12.22
Figure 12.15 Energy level during transmission, idleness, or collision
12.23
Figure 12.16 Timing in CSMA/CA
Interframe Space (IFS)
12.24
In CSMA/CA, the IFS can also be used to
define the priority of a station or a
frame.
Note
12.25
In CSMA/CA, if the station finds the
channel busy, it does not restart the
timer of the contention window;
it stops the timer and restarts it when
the channel becomes idle.
Note
12.26
Figure 12.17 Flow diagram for CSMA/CA
12.27
CONTROLLED ACCESSCONTROLLED ACCESS
InIn controlled accesscontrolled access, the stations consult one another, the stations consult one another
to find which station has the right to send. A stationto find which station has the right to send. A station
cannot send unless it has been authorized by othercannot send unless it has been authorized by other
stations. We discuss three popular controlled-accessstations. We discuss three popular controlled-access
methods.methods.
Reservation
Polling
Token Passing
Topics discussed in this section:Topics discussed in this section:
12.28
Logical ring and physical topology in token-passing access method
Computer Science & Engineering
Assignment
Semester- VI (I & II) Branch: CSE
Subject with Code: Computer Networks (IT-305-F)
-----------------------------------------------------------------------------------------------
Q:1 Explain Lacal Area Network.
Q:2 Explain IEEE 802 standards in Detail.

More Related Content

PDF
Multiple Access in Computer Network
PPTX
Multiple access protocol
PPT
Lecture 6
PPT
Medium Access PROTOCOL b yENGR. FAWAD KHAN UET BANNU KP PAKISTAN
PPT
MAC seminar
PPTX
Multiple access protocol
PPTX
Carrier-sense multiple access with collision avoidance CSMA/CA
PPTX
M.A.C (Medium Access Control)
Multiple Access in Computer Network
Multiple access protocol
Lecture 6
Medium Access PROTOCOL b yENGR. FAWAD KHAN UET BANNU KP PAKISTAN
MAC seminar
Multiple access protocol
Carrier-sense multiple access with collision avoidance CSMA/CA
M.A.C (Medium Access Control)

What's hot (20)

PPTX
Media Access Control
PPT
3.Medium Access Control
PPTX
Media Access Control
DOCX
seminar report on multiple access control protocol submitted by munesh
PPSX
Multiple Access Control Protocol (MAC Protocol) Networking
PPTX
Multiple access protocols in data communication networks
PPTX
clas 8
PPSX
Multiple access control protocol
PPTX
The medium access sublayer
PPTX
The mac layer
PPT
aloha
PPTX
Media Access Control (MAC Layer)
PPT
csma ca
PDF
CSMA /CD PPT ON SLIDESHARE
PPT
Aloha
PPTX
Csma protocols
PPT
Chapter4 1
PPT
PPTX
Csmaca
Media Access Control
3.Medium Access Control
Media Access Control
seminar report on multiple access control protocol submitted by munesh
Multiple Access Control Protocol (MAC Protocol) Networking
Multiple access protocols in data communication networks
clas 8
Multiple access control protocol
The medium access sublayer
The mac layer
aloha
Media Access Control (MAC Layer)
csma ca
CSMA /CD PPT ON SLIDESHARE
Aloha
Csma protocols
Chapter4 1
Csmaca
Ad

Similar to multiple access (20)

PPT
Multiple Access mechanism in Computer Network.ppt
PPT
mutiple acces protocol.ppt
PPT
mac-protocols
PPT
Ch_12 of media acess protocol and other .ppt
PPT
ch12-multiple-access-COMPUTER NETWORKS.ppt
PPT
Multiple Access ppt in Object Oriented Programming
PPT
Media_Access_Control In Networking .ppt
PPT
multiple access techniquesch12-multiple-access.ppt
PPT
Forouzan _ Multiple access protocols.ppt
PPT
medium access tcpip network layer data link layer
PPT
Computer communication multiple access.ppt
PPT
ch12.ppt computer network specifically from data link layer
PPT
3b multiple access
PPT
Multiple Access in wireless communication
PPT
multiple access in wireless communication
PPT
M5L2 Multiple Access.ppt communication network
PPT
PPT
PPTX
Unit_3_WSN.pptx
Multiple Access mechanism in Computer Network.ppt
mutiple acces protocol.ppt
mac-protocols
Ch_12 of media acess protocol and other .ppt
ch12-multiple-access-COMPUTER NETWORKS.ppt
Multiple Access ppt in Object Oriented Programming
Media_Access_Control In Networking .ppt
multiple access techniquesch12-multiple-access.ppt
Forouzan _ Multiple access protocols.ppt
medium access tcpip network layer data link layer
Computer communication multiple access.ppt
ch12.ppt computer network specifically from data link layer
3b multiple access
Multiple Access in wireless communication
multiple access in wireless communication
M5L2 Multiple Access.ppt communication network
Unit_3_WSN.pptx
Ad

More from AKSHIT KOHLI (19)

PPTX
Surveilance ppt
PPTX
ELECTRICAL AND ELECTRONICS MEASURING INSTRUMETNTS,CRO,CRT,PROBES,OSCILLOSCOPES
PPT
VIRTUAL CIRCUIT NETWORKS, atm , frame relay
PPT
LAYER PROTOCOL ,SONET,SDH
PPT
ETHERNET
PPT
data queue data base ,MAN
PPT
lan connecting device
PPTX
local area network
PPTX
PPT
transfer protocols,ftp,smtp,pop,imap
PPT
internet protocols
PPTX
tcp ip protocols
PPT
udp , tcp ,sctp
PPTX
icmp , igmp
PPT
network layer
PPT
osi model
PPT
transmission mode
PPT
computer networks
PPT
topologycomputer networking basics
Surveilance ppt
ELECTRICAL AND ELECTRONICS MEASURING INSTRUMETNTS,CRO,CRT,PROBES,OSCILLOSCOPES
VIRTUAL CIRCUIT NETWORKS, atm , frame relay
LAYER PROTOCOL ,SONET,SDH
ETHERNET
data queue data base ,MAN
lan connecting device
local area network
transfer protocols,ftp,smtp,pop,imap
internet protocols
tcp ip protocols
udp , tcp ,sctp
icmp , igmp
network layer
osi model
transmission mode
computer networks
topologycomputer networking basics

Recently uploaded (20)

PDF
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
PPTX
AUTOMOTIVE ENGINE MANAGEMENT (MECHATRONICS).pptx
PDF
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
PPTX
Module 8- Technological and Communication Skills.pptx
PPT
Occupational Health and Safety Management System
PDF
SMART SIGNAL TIMING FOR URBAN INTERSECTIONS USING REAL-TIME VEHICLE DETECTI...
PDF
BIO-INSPIRED ARCHITECTURE FOR PARSIMONIOUS CONVERSATIONAL INTELLIGENCE : THE ...
PPTX
Feature types and data preprocessing steps
PPTX
Current and future trends in Computer Vision.pptx
PPTX
Management Information system : MIS-e-Business Systems.pptx
PDF
Influence of Green Infrastructure on Residents’ Endorsement of the New Ecolog...
PDF
III.4.1.2_The_Space_Environment.p pdffdf
PPTX
Graph Data Structures with Types, Traversals, Connectivity, and Real-Life App...
PPTX
introduction to high performance computing
PDF
Abrasive, erosive and cavitation wear.pdf
PPTX
Safety Seminar civil to be ensured for safe working.
PPTX
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
PDF
22EC502-MICROCONTROLLER AND INTERFACING-8051 MICROCONTROLLER.pdf
PDF
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
AUTOMOTIVE ENGINE MANAGEMENT (MECHATRONICS).pptx
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
Module 8- Technological and Communication Skills.pptx
Occupational Health and Safety Management System
SMART SIGNAL TIMING FOR URBAN INTERSECTIONS USING REAL-TIME VEHICLE DETECTI...
BIO-INSPIRED ARCHITECTURE FOR PARSIMONIOUS CONVERSATIONAL INTELLIGENCE : THE ...
Feature types and data preprocessing steps
Current and future trends in Computer Vision.pptx
Management Information system : MIS-e-Business Systems.pptx
Influence of Green Infrastructure on Residents’ Endorsement of the New Ecolog...
III.4.1.2_The_Space_Environment.p pdffdf
Graph Data Structures with Types, Traversals, Connectivity, and Real-Life App...
introduction to high performance computing
Abrasive, erosive and cavitation wear.pdf
Safety Seminar civil to be ensured for safe working.
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
22EC502-MICROCONTROLLER AND INTERFACING-8051 MICROCONTROLLER.pdf
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
Automation-in-Manufacturing-Chapter-Introduction.pdf

multiple access

  • 1. 12.1 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
  • 2. 12.2 Data link layer divided into two functionality-oriented sublayers
  • 3. 12.3 Taxonomy of multiple-access protocols discussed in this chapter
  • 4. 12.4 RANDOM ACCESSRANDOM ACCESS InIn random accessrandom access oror contentioncontention methods, no station ismethods, no station is superior to another station and none is assigned thesuperior to another station and none is assigned the control over another. No station permits, or does notcontrol over another. No station permits, or does not permit, another station to send. At each instance, apermit, another station to send. At each instance, a station that has data to send uses a procedure definedstation that has data to send uses a procedure defined by the protocol to make a decision on whether or notby the protocol to make a decision on whether or not to send.to send. ALOHA Carrier Sense Multiple Access Carrier Sense Multiple Access with Collision Detection Carrier Sense Multiple Access with Collision Avoidance Topics discussed in this section:Topics discussed in this section:
  • 5. 12.5 To avoid access conflict or to resolve it when itTo avoid access conflict or to resolve it when it happens, each station follows a procedure that answerhappens, each station follows a procedure that answer the following questions:the following questions:  When can the station access the medium.When can the station access the medium. What can the station do if the medium is busy.What can the station do if the medium is busy. How can the station determine the success or failureHow can the station determine the success or failure of the transmission.of the transmission. What can the station do if there is an access conflict.What can the station do if there is an access conflict.
  • 6. 12.6 ALOHA ALOHA, the earliest random access method, was developed at the University of Hawaii in early 1970. It was designed for a radio (wireless) LAN, but it can be used on any shared medium. Pure ALOHA Slotted ALOHA
  • 7. 12.7 Frames in a pure ALOHA network
  • 8. 12.8 Procedure for pure ALOHA protocol
  • 9. 12.9 Vulnerable time for pure ALOHA protocol The Vulnerable time, in which there is possibility of collision
  • 11. 12.11 Frames in a slotted ALOHA network
  • 12. 12.12 Figure 12.7 Vulnerable time for slotted ALOHA protocol
  • 14. 12.14 Space/time model of the collision in CSMA
  • 16. 12.16 Persistence Method What Should a station do if the channel is busy. What should a station do if the channel is idle. 1-Persistence Method Non Persistence Method p-Persistence Method
  • 17. 12.17 Behavior of three persistence methods
  • 18. 12.18 Flow diagram for three persistence methods
  • 19. 12.19 Collision of the first bit in CSMA/CD
  • 21. 12.21 Flow diagram for the CSMA/CD
  • 22. 12.22 Figure 12.15 Energy level during transmission, idleness, or collision
  • 23. 12.23 Figure 12.16 Timing in CSMA/CA Interframe Space (IFS)
  • 24. 12.24 In CSMA/CA, the IFS can also be used to define the priority of a station or a frame. Note
  • 25. 12.25 In CSMA/CA, if the station finds the channel busy, it does not restart the timer of the contention window; it stops the timer and restarts it when the channel becomes idle. Note
  • 26. 12.26 Figure 12.17 Flow diagram for CSMA/CA
  • 27. 12.27 CONTROLLED ACCESSCONTROLLED ACCESS InIn controlled accesscontrolled access, the stations consult one another, the stations consult one another to find which station has the right to send. A stationto find which station has the right to send. A station cannot send unless it has been authorized by othercannot send unless it has been authorized by other stations. We discuss three popular controlled-accessstations. We discuss three popular controlled-access methods.methods. Reservation Polling Token Passing Topics discussed in this section:Topics discussed in this section:
  • 28. 12.28 Logical ring and physical topology in token-passing access method
  • 29. Computer Science & Engineering Assignment Semester- VI (I & II) Branch: CSE Subject with Code: Computer Networks (IT-305-F) ----------------------------------------------------------------------------------------------- Q:1 Explain Lacal Area Network. Q:2 Explain IEEE 802 standards in Detail.