Forouzan _ Multiple access protocols.ppt

drmerinskariah 972 views 41 slides Jun 12, 2024
Slide 1
Slide 1 of 41
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39
Slide 40
40
Slide 41
41

About This Presentation

Computer communication, Multiple access protocols.


Slide Content

12.1
Chapter 12
Multiple Access
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

12.2
Figure 12.1 Data link layer divided into two functionality-oriented sublayers

12.3
IEEE 802 LAN ARCHITECTURE

12.4
IEEE 802 LAN
•Physical layer
•Physical layer deals with actual transmission and
reception of bits over the transmission medium
•MAC (Medium Access Control
•Its concerned with the sharing of physical
connection among several computers. MAC is a
protocol for accessing high speed internet links and
for transferring data frames from one station to
another.

12.5
IEEE 802 LAN
LLC( Logical Link Control)
•Provides a service interface
•Protocols on network layer uses the services
provided by LLC layer.
•Concerned with managing traffic(flow and error
control)

12.6
Figure 12.2 Taxonomy of multiple-access protocols discussed in this chapter

12.7
12-1 RANDOM ACCESS
Inrandomaccessorcontentionmethods,nostationis
superiortoanotherstationandnoneisassignedthe
controloveranother.Nostationpermits,ordoesnot
permit,anotherstationtosend.Ateachinstance,a
stationthathasdatatosendusesaproceduredefined
bytheprotocoltomakeadecisiononwhetherornotto
send.
ALOHA
Carrier Sense Multiple Access
Carrier Sense Multiple Access with Collision Detection
Carrier Sense Multiple Access with Collision Avoidance
Topics discussed in this section:

12.8
Two features:
•First, there is no schedules time for a station to
transmit. Transmission is random. Hence they are
called ransom access methods.
•Second, no rules specify which station should send
next. Stations compete with one another to access the
medium. That is why these methods are called
contention methods.

12.9
ALOHA
•Earliest random access method developed in 1970’s.
•When a station sends data, another station may
attempt to do so at the same time. The data from the
two stations collide and become garbled.

12.10
PURE ALOHA
•The original ALOHA is called Pure ALOHA.
•The idea is each station sends a frame, whenever it has
a frame to send.
•However, since there is only one channel to share,
there is a possibility of collision.
.

12.11
Figure 12.3 Frames in a pure ALOHA network

12.12
PURE ALOHA
•We need to resend the frames that have been destroyed
during transmission.
•Pure ALOHA relies in acknowledgement from the
receiver.
•When a station sends a frame, it expects the receiver to
send back an acknowledgment.
•If the acknowledgment does not arrive after a time-out
period, the station assumes that the frame has been
destroyed and resends the frame.

PURE ALOHA
•Pure ALOHA dictates that when the time-out period
passes, each station waits for a random amount of time
before resending the frame. This time is called back-off
time Tb.
•Pure ALOHA has a second method to prevent
congesting the channel with transmitted frames.
•After a maximum number of retransmission attempts
Kmax, a station must give up and try later.
•The time-out period is equal to the maximum possible
round-trip propagation delay, which is twice the amount
of time required to send a frame between two most
widely seperatedstations(2*Tp)

12.14
Figure 12.4 Procedure for pure ALOHA protocol

12.15
Figure 12.5 Vulnerable time for pure ALOHA protocol

12.16
The throughput for pure ALOHA is
S = G ×e
−2G
.
The maximum throughput
S
max= 0.184 when G= (1/2).
Note

SLOTTED ALOHA
•Pure ALOHA has a vulnerable time of 2Tfr. This is
because there’s no rule that defines when a station can
send. Slotted ALOHA improves the efficiency of Pure
ALOHA.
•In Slotted ALOHA, we divide the time into slots of Tfr
seconds and force the station to send only at the
beginning of the time slot.
•Because the station is allowed to send only at the
beginning of a slot, if the station misses that slot, then it
must wait until the beginning of the next slot.

12.18
Figure 12.6 Frames in a slotted ALOHA network

SLOTTED ALOHA
•There’s still a possibility of collision, is two stations try
to send at the beginning of the same slot. However, the
vulnerable time is now reduced to half , equal to Tfr.
.

12.20
The throughput for slotted ALOHA is
S = G ×e
−G
.
The maximum throughput
S
max= 0.368when G = 1.
Note

12.21
Figure 12.7 Vulnerable time for slotted ALOHA protocol

CSMA
•To minimize the chance of collision and to increase the
performance, the CSMA method was developed.
•Carrier Sense Multiple Access(CSMA) requires that
each station first listen to the medium (check the state of
the medium) before sending. This is based on the
principle “sense before transmit "or “listen before talk”.
•The possibility of collision still exist because of
propagation delay.
.

CSMA
•A station may sense the medium and find it idle, only
because the first bit send by another station has not yet
been received.
•When a station sends a frame or any other station tries
to send a frame during this time, a collison will result.
But if the first bit of the frame, reaches the end of the
medium, every station will already have sensed the bit
and will refrain from sending.
.

12.24
Figure 12.9 Vulnerable time in CSMA

Persistence Methods
•What should a station do if the channel is busy?
•What should a station do if the channel is idle?
•3 methods have been devised to answer these questions:
•The 1-persistent method
•The non-persistent method
•The p-persistent method
.

1-persistent method
•In this method, after the station finds the line idle, it
sends its frame immediately (with probability 1). This
method has the highest chance of collision because two
or more stations may find the line idle and send their
frames immediately.
.

Non persistent method
•In this method, a station that has a frame to send senses
the line. If the line is idle, it sends immediately.
•If not, it waits a random amount of time and then senses
the line again.
•This method reduces the chance of collision because its
unlikely that two or more stations will wait the same
amount of time and retry simultaneously.
•Reduces the efficiency of the network because the
medium remains idle while there maybe stations to send.

12.28
Figure 12.10 Behavior of three persistence methods

P-persistent method
•This method is used if the channel has time slots with a
slot duration equal to or greater than the maximum
propagation time. It reduces the chances of collision and
improves efficiency.
•In this method, after a station finds the line idle, it does
the following:
•With probability p, the station sends its frame.
•With probability q=1-p, the station waits for the
beginning of next time slot and checks the line again.
.

12.30
Figure 12.12 Collision of the first bit in CSMA/CD

12.31
Figure 12.13 Collision and abortion in CSMA/CD

12.32
Figure 12.14 Flow diagram for the CSMA/CD

12.33
Figure 12.15 Energy level during transmission, idleness, or collision

12.34
Figure 12.16 Timing in CSMA/CA

12.35
In CSMA/CA, the IFS can also be used to
define the priority of a station or a frame.
Note

12.36
In CSMA/CA, if the station finds the
channel busy, it does not restart the
timer of the contention window;
it stops the timer and restarts it when
the channel becomes idle.
Note

12.37
Figure 12.17 Flow diagram for CSMA/CA

12.38
12-2 CONTROLLED ACCESS
Incontrolledaccess,thestationsconsultoneanother
tofindwhichstationhastherighttosend.Astation
cannotsendunlessithasbeenauthorizedbyother
stations.Wediscussthreepopularcontrolled-access
methods.
Reservation
Polling
Token Passing
Topics discussed in this section:

12.39
Figure 12.18 Reservation access method

12.40
Figure 12.19 Select and poll functions in polling access method

12.41
Figure 12.20 Logical ring and physical topology in token-passing access method