Multiple acessing
-
Upload
piyush-sarin -
Category
Technology
-
view
124 -
download
0
Transcript of Multiple acessing
![Page 1: Multiple acessing](https://reader035.fdocuments.us/reader035/viewer/2022062904/587a75111a28abf0468b4da3/html5/thumbnails/1.jpg)
Multiple Access
![Page 2: Multiple acessing](https://reader035.fdocuments.us/reader035/viewer/2022062904/587a75111a28abf0468b4da3/html5/thumbnails/2.jpg)
Data link layer divided into two functionality-oriented sublayers
LOGIC LINK CONTROL-Error and flow control MAC LAYER-Multiple access resolution
![Page 3: Multiple acessing](https://reader035.fdocuments.us/reader035/viewer/2022062904/587a75111a28abf0468b4da3/html5/thumbnails/3.jpg)
Taxonomy of multiple-access protocols discussed in this chapter
![Page 4: Multiple acessing](https://reader035.fdocuments.us/reader035/viewer/2022062904/587a75111a28abf0468b4da3/html5/thumbnails/4.jpg)
RANDOM ACCESS
In random access or contention methods
>No scheduling of time station
>No rule that which station should send next
Protocol used in this method-ALOHA
Carrier Sense Multiple Access
Carrier Sense Multiple Access with Collision Detection
Carrier Sense Multiple Access with Collision Avoidance
![Page 5: Multiple acessing](https://reader035.fdocuments.us/reader035/viewer/2022062904/587a75111a28abf0468b4da3/html5/thumbnails/5.jpg)
>1972-for Radio >Pure/Slotted >Globally used >Acknowledgement >Back off time TB
>Vulnerable time-Time in which possibility of collision
ALOHA
![Page 6: Multiple acessing](https://reader035.fdocuments.us/reader035/viewer/2022062904/587a75111a28abf0468b4da3/html5/thumbnails/6.jpg)
12.6
Frames in a pure ALOHA network
![Page 7: Multiple acessing](https://reader035.fdocuments.us/reader035/viewer/2022062904/587a75111a28abf0468b4da3/html5/thumbnails/7.jpg)
>Carrier sense multiple access >Vulnerable time-Time need to propagate from one to
another >Senses the medium >Method- 1.Persistent I 2. Non Persistent- Random amount of time 3.P-Persiustance- change of slot duration> max
propagation time
CSMA
![Page 8: Multiple acessing](https://reader035.fdocuments.us/reader035/viewer/2022062904/587a75111a28abf0468b4da3/html5/thumbnails/8.jpg)
12.8
Figure 12.10 Behavior of three persistence methods
![Page 9: Multiple acessing](https://reader035.fdocuments.us/reader035/viewer/2022062904/587a75111a28abf0468b4da3/html5/thumbnails/9.jpg)
>Carrier sense multiple access/collision Detection >Arguments algorithm to handle for collision >Monitors
CSMA/CD
![Page 10: Multiple acessing](https://reader035.fdocuments.us/reader035/viewer/2022062904/587a75111a28abf0468b4da3/html5/thumbnails/10.jpg)
12.10
Figure 12.16 CSMA/CA
![Page 11: Multiple acessing](https://reader035.fdocuments.us/reader035/viewer/2022062904/587a75111a28abf0468b4da3/html5/thumbnails/11.jpg)
>Carrier sense multiple access/collision avoidance >Two signal >For wireless –because collision cannot be detected >Three strategy-Interframe Space(short ifs high priority) Contention window Acknowledgement
CSMA/CA
![Page 12: Multiple acessing](https://reader035.fdocuments.us/reader035/viewer/2022062904/587a75111a28abf0468b4da3/html5/thumbnails/12.jpg)
Flow diagram for CSMA/CA
![Page 13: Multiple acessing](https://reader035.fdocuments.us/reader035/viewer/2022062904/587a75111a28abf0468b4da3/html5/thumbnails/13.jpg)
12.13
CONTROLLED ACCESS
In controlled access, the stations consult one another to find which station has the right to
send. A station cannot send unless it has been authorized by other stations.
Reservation
Polling
Token Passing
Three popular controlled-access methods
![Page 14: Multiple acessing](https://reader035.fdocuments.us/reader035/viewer/2022062904/587a75111a28abf0468b4da3/html5/thumbnails/14.jpg)
Reservation access method
![Page 15: Multiple acessing](https://reader035.fdocuments.us/reader035/viewer/2022062904/587a75111a28abf0468b4da3/html5/thumbnails/15.jpg)
Select and poll functions in polling access method
>Primary device
>Link is available
>Select-selection of primary
>Poll-primary device verify and allow to transmit
![Page 16: Multiple acessing](https://reader035.fdocuments.us/reader035/viewer/2022062904/587a75111a28abf0468b4da3/html5/thumbnails/16.jpg)
Logical ring and physical topology in token-passing access method
![Page 17: Multiple acessing](https://reader035.fdocuments.us/reader035/viewer/2022062904/587a75111a28abf0468b4da3/html5/thumbnails/17.jpg)
CHANNELIZATION
Channelization is a multiple-access method in which the available bandwidth of a link is
shared in time, frequency, or through code, between different stations.
Frequency-Division Multiple Access (FDMA)-Guard band
Time-Division Multiple Access (TDMA)-Access method of DLL to control PL
Code-Division Multiple Access (CDMA)-One chanel all transmission, simuntaniously
Protocol