Multiple acessing

17
Multiple Access

Transcript of Multiple acessing

Page 1: Multiple acessing

Multiple Access

Page 2: Multiple acessing

Data link layer divided into two functionality-oriented sublayers

LOGIC LINK CONTROL-Error and flow control MAC LAYER-Multiple access resolution

Page 3: Multiple acessing

Taxonomy of multiple-access protocols discussed in this chapter

Page 4: Multiple acessing

RANDOM ACCESS

In random access or contention methods

>No scheduling of time station

>No rule that which station should send next

Protocol used in this method-ALOHA

Carrier Sense Multiple Access

Carrier Sense Multiple Access with Collision Detection

Carrier Sense Multiple Access with Collision Avoidance

Page 5: Multiple acessing

>1972-for Radio >Pure/Slotted >Globally used >Acknowledgement >Back off time TB

>Vulnerable time-Time in which possibility of collision

ALOHA

Page 6: Multiple acessing

12.6

Frames in a pure ALOHA network

Page 7: Multiple acessing

>Carrier sense multiple access >Vulnerable time-Time need to propagate from one to

another >Senses the medium >Method- 1.Persistent I 2. Non Persistent- Random amount of time 3.P-Persiustance- change of slot duration> max

propagation time

CSMA

Page 8: Multiple acessing

12.8

Figure 12.10 Behavior of three persistence methods

Page 9: Multiple acessing

>Carrier sense multiple access/collision Detection >Arguments algorithm to handle for collision >Monitors

CSMA/CD

Page 10: Multiple acessing

12.10

Figure 12.16 CSMA/CA

Page 11: Multiple acessing

>Carrier sense multiple access/collision avoidance >Two signal >For wireless –because collision cannot be detected >Three strategy-Interframe Space(short ifs high priority) Contention window Acknowledgement

CSMA/CA

Page 12: Multiple acessing

Flow diagram for CSMA/CA

Page 13: Multiple acessing

12.13

CONTROLLED ACCESS

In controlled access, the stations consult one another to find which station has the right to

send. A station cannot send unless it has been authorized by other stations.

Reservation

Polling

Token Passing

Three popular controlled-access methods

Page 14: Multiple acessing

Reservation access method

Page 15: Multiple acessing

Select and poll functions in polling access method

>Primary device

>Link is available

>Select-selection of primary

>Poll-primary device verify and allow to transmit

Page 16: Multiple acessing

Logical ring and physical topology in token-passing access method

Page 17: Multiple acessing

CHANNELIZATION

Channelization is a multiple-access method in which the available bandwidth of a link is

shared in time, frequency, or through code, between different stations.

Frequency-Division Multiple Access (FDMA)-Guard band

Time-Division Multiple Access (TDMA)-Access method of DLL to control PL

Code-Division Multiple Access (CDMA)-One chanel all transmission, simuntaniously

Protocol