Multiple Access
Data link layer divided into two functionality-oriented sublayers
 LOGIC LINK CONTROL-Error and flow control
 MAC LAYER-Multiple access resolution
Taxonomy of multiple-access protocols discussed in this chapter
RANDOM ACCESS
In random access or contention methods
>No scheduling of time station
>No rule that which station should send next
Protocol used in this method-
ALOHA
Carrier Sense Multiple Access
Carrier Sense Multiple Access with Collision Detection
Carrier Sense Multiple Access with Collision Avoidance
 >1972-for Radio
 >Pure/Slotted
 >Globally used
 >Acknowledgement
 >Back off time TB
 >Vulnerable time-Time in which possibility of collision
ALOHA
12.6
Frames in a pure ALOHA network
 >Carrier sense multiple access
 >Vulnerable time-Time need to propagate from one to another
 >Senses the medium
 >Method- 1.Persistent I
2. Non Persistent- Random amount of time
3.P-Persiustance- change of slot duration> max
propagation time
CSMA
12.8
Figure 12.10 Behavior of three persistence methods
 >Carrier sense multiple access/collision Detection
 >Arguments algorithm to handle for collision
 >Monitors
CSMA/CD
12.10
Figure 12.16 CSMA/CA
 >Carrier sense multiple access/collision avoidance
 >Two signal
 >For wireless –because collision cannot be detected
 >Three strategy-Interframe Space(short ifs high priority)
Contention window
Acknowledgement
CSMA/CA
Flow diagram for CSMA/CA
12.13
CONTROLLED ACCESS
In controlled access, the stations consult one another
to find which station has the right to send. A station
cannot send unless it has been authorized by other
stations.
Reservation
Polling
Token Passing
Three popular controlled-access methods
Reservation access method
Select and poll functions in polling access method
>Primary device
>Link is available
>Select-selection of primary
>Poll-primary device verify and allow to transmit
Logical ring and physical topology in token-passing access method
CHANNELIZATION
Channelization is a multiple-access method in which
the available bandwidth of a link is shared in time,
frequency, or through code, between different stations.
Frequency-Division Multiple Access (FDMA)-Guard band
Time-Division Multiple Access (TDMA)-Access method of DLL to control PL
Code-Division Multiple Access (CDMA)-One chanel all transmission, simuntaniously
Protocol

More Related Content

PPT
multiple access
PPTX
Media Access Control
PPT
Medium Access PROTOCOL b yENGR. FAWAD KHAN UET BANNU KP PAKISTAN
PPT
PPT
PPTX
The mac layer
TXT
New rough
multiple access
Media Access Control
Medium Access PROTOCOL b yENGR. FAWAD KHAN UET BANNU KP PAKISTAN
The mac layer
New rough

What's hot (20)

PPT
Link-Level Flow and Error Control Chapter11
PPT
TCP Traffic Control Chapter12
PPTX
It802 d mobilecommunicationspart4
PPT
Lect21 09-11
PPT
Call flow comparison gsm umts
PDF
Snooping TCP
PPT
Layer 3 messages (2G)
PDF
Introduction to packet service evolution & new technologies
PPTX
Csma protocols
PPTX
Distributed contention based mac protocol for cognitive radio
PPTX
It 802 d_Mobile Communications_part 2
PPTX
It 802 d_Mobile Communications_part 2
PPTX
M.A.C (Medium Access Control)
PDF
11gsmpo b-en-gsmgsmnetworksdcchcongestionsolutions-word-201009-130915134031-p...
PPT
Traffic and Congestion Control in ATM Networks Chapter 13
PPT
MAC seminar
PDF
A distributed multi channel mac protocol for ad hoc wireless networks
PDF
43096827 gsm-timers
PPT
Link-Level Flow and Error Control Chapter11
TCP Traffic Control Chapter12
It802 d mobilecommunicationspart4
Lect21 09-11
Call flow comparison gsm umts
Snooping TCP
Layer 3 messages (2G)
Introduction to packet service evolution & new technologies
Csma protocols
Distributed contention based mac protocol for cognitive radio
It 802 d_Mobile Communications_part 2
It 802 d_Mobile Communications_part 2
M.A.C (Medium Access Control)
11gsmpo b-en-gsmgsmnetworksdcchcongestionsolutions-word-201009-130915134031-p...
Traffic and Congestion Control in ATM Networks Chapter 13
MAC seminar
A distributed multi channel mac protocol for ad hoc wireless networks
43096827 gsm-timers
Ad

Viewers also liked (15)

PPT
3b multiple access
PPT
Dc chapter 13
PPTX
Multiple Access Methods
PPTX
Multiple Access Protocal
PPT
802.11 wireless lan
PPT
3.Medium Access Control
PPT
Mac protocols
PPTX
Multiple access protocol
PPTX
FDMA-TDMA-CDMA
PPTX
Medium Access Control
PPT
Wireless networking
PPT
Multiple access techniques for wireless communications
PPSX
Multiple access control protocol
PDF
Wireless Local Area Networks
PDF
W-LAN (Wireless Local Area Network)
3b multiple access
Dc chapter 13
Multiple Access Methods
Multiple Access Protocal
802.11 wireless lan
3.Medium Access Control
Mac protocols
Multiple access protocol
FDMA-TDMA-CDMA
Medium Access Control
Wireless networking
Multiple access techniques for wireless communications
Multiple access control protocol
Wireless Local Area Networks
W-LAN (Wireless Local Area Network)
Ad

Similar to Multiple acessing (20)

PPT
mac-protocols
PPT
Multiple Access mechanism in Computer Network.ppt
PPT
Ch_12 of media acess protocol and other .ppt
PPTX
Media Access Control (MAC Layer)
PPTX
computer__networks .pptx
PPT
medium access tcpip network layer data link layer
PPT
mutiple acces protocol.ppt
PPT
ch12-multiple-access-COMPUTER NETWORKS.ppt
PPT
multiple access techniquesch12-multiple-access.ppt
PPT
Multiple Access ppt in Object Oriented Programming
PPTX
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptx
PPT
Multiple Access Techniques
PPT
Forouzan _ Multiple access protocols.ppt
PPT
unit 3 Multiple Access.ppt
PPTX
WHAT IS MAC-1 presentation for information .pptx
PPT
12 multiple access
PPTX
Multiple access protocols in data communication networks
PPT
ch12.ppt computer network specifically from data link layer
PPTX
Lecture 10
mac-protocols
Multiple Access mechanism in Computer Network.ppt
Ch_12 of media acess protocol and other .ppt
Media Access Control (MAC Layer)
computer__networks .pptx
medium access tcpip network layer data link layer
mutiple acces protocol.ppt
ch12-multiple-access-COMPUTER NETWORKS.ppt
multiple access techniquesch12-multiple-access.ppt
Multiple Access ppt in Object Oriented Programming
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptx
Multiple Access Techniques
Forouzan _ Multiple access protocols.ppt
unit 3 Multiple Access.ppt
WHAT IS MAC-1 presentation for information .pptx
12 multiple access
Multiple access protocols in data communication networks
ch12.ppt computer network specifically from data link layer
Lecture 10

Recently uploaded (20)

PPTX
O2C Customer Invoices to Receipt V15A.pptx
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
Architecture types and enterprise applications.pdf
PDF
Hybrid model detection and classification of lung cancer
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
Getting Started with Data Integration: FME Form 101
PPTX
observCloud-Native Containerability and monitoring.pptx
PPTX
Web Crawler for Trend Tracking Gen Z Insights.pptx
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
DOCX
search engine optimization ppt fir known well about this
PDF
Zenith AI: Advanced Artificial Intelligence
PPTX
Chapter 5: Probability Theory and Statistics
PPTX
Modernising the Digital Integration Hub
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
O2C Customer Invoices to Receipt V15A.pptx
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Hindi spoken digit analysis for native and non-native speakers
Architecture types and enterprise applications.pdf
Hybrid model detection and classification of lung cancer
A comparative study of natural language inference in Swahili using monolingua...
WOOl fibre morphology and structure.pdf for textiles
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Developing a website for English-speaking practice to English as a foreign la...
Getting Started with Data Integration: FME Form 101
observCloud-Native Containerability and monitoring.pptx
Web Crawler for Trend Tracking Gen Z Insights.pptx
Group 1 Presentation -Planning and Decision Making .pptx
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
search engine optimization ppt fir known well about this
Zenith AI: Advanced Artificial Intelligence
Chapter 5: Probability Theory and Statistics
Modernising the Digital Integration Hub
Enhancing emotion recognition model for a student engagement use case through...
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf

Multiple acessing

  • 2. Data link layer divided into two functionality-oriented sublayers  LOGIC LINK CONTROL-Error and flow control  MAC LAYER-Multiple access resolution
  • 3. Taxonomy of multiple-access protocols discussed in this chapter
  • 4. RANDOM ACCESS In random access or contention methods >No scheduling of time station >No rule that which station should send next Protocol used in this method- ALOHA Carrier Sense Multiple Access Carrier Sense Multiple Access with Collision Detection Carrier Sense Multiple Access with Collision Avoidance
  • 5.  >1972-for Radio  >Pure/Slotted  >Globally used  >Acknowledgement  >Back off time TB  >Vulnerable time-Time in which possibility of collision ALOHA
  • 6. 12.6 Frames in a pure ALOHA network
  • 7.  >Carrier sense multiple access  >Vulnerable time-Time need to propagate from one to another  >Senses the medium  >Method- 1.Persistent I 2. Non Persistent- Random amount of time 3.P-Persiustance- change of slot duration> max propagation time CSMA
  • 8. 12.8 Figure 12.10 Behavior of three persistence methods
  • 9.  >Carrier sense multiple access/collision Detection  >Arguments algorithm to handle for collision  >Monitors CSMA/CD
  • 11.  >Carrier sense multiple access/collision avoidance  >Two signal  >For wireless –because collision cannot be detected  >Three strategy-Interframe Space(short ifs high priority) Contention window Acknowledgement CSMA/CA
  • 12. Flow diagram for CSMA/CA
  • 13. 12.13 CONTROLLED ACCESS In controlled access, the stations consult one another to find which station has the right to send. A station cannot send unless it has been authorized by other stations. Reservation Polling Token Passing Three popular controlled-access methods
  • 15. Select and poll functions in polling access method >Primary device >Link is available >Select-selection of primary >Poll-primary device verify and allow to transmit
  • 16. Logical ring and physical topology in token-passing access method
  • 17. CHANNELIZATION Channelization is a multiple-access method in which the available bandwidth of a link is shared in time, frequency, or through code, between different stations. Frequency-Division Multiple Access (FDMA)-Guard band Time-Division Multiple Access (TDMA)-Access method of DLL to control PL Code-Division Multiple Access (CDMA)-One chanel all transmission, simuntaniously Protocol