Error Detection and correction: Types of Errors, Error Detection mechanism (Linear codes, CRC, Checksum), Error Correction mechanism: Hamming Encoding. Data Link Control and Protocols: Flow and Error Control, Stop-and-Wait ARQ. Go-Back-N ARQ,
Selective Repeat ARQ, HDLC and Point-to-Point Protocol
Mu...
Error Detection and correction: Types of Errors, Error Detection mechanism (Linear codes, CRC, Checksum), Error Correction mechanism: Hamming Encoding. Data Link Control and Protocols: Flow and Error Control, Stop-and-Wait ARQ. Go-Back-N ARQ,
Selective Repeat ARQ, HDLC and Point-to-Point Protocol
Multiple Access: Random Access (ALOHA, CSMA, CSMA/CD, CSMA/CA), Controlled Access (Polling, Reservation, Token Passing), Channelization (FDMA, TDMA, CDMA). Wired LANs (Ethernet): Traditional Ethernet, Fast Ethernet, Gigabit Ethernet.
Size: 3.54 MB
Language: en
Added: Apr 01, 2019
Slides: 62 pages
Slide Content
Multiple Access
Hitesh Mohapatra
Class Note
Data link layer divided into two functionality-oriented sublayers
Taxonomy of multiple-access protocols discussed in
this chapter
ALOHA
Random Access
Frames in a pure ALOHA network
Importance Relevance Significance
•To maximize the
bandwidth
utilization
•ALOHA
•Carrier Sense
Multiple Access
•Carrier Sense
Multiple Access with
Collision Detection
•Carrier Sense
Multiple Access with
Collision Avoidance
•In random access or
contention methods, no
station is superior to
another station and none
is assigned the control
over another. No station
permits, or does not
permit, another station
to send. At each instance,
a station that has data to
send uses a procedure
defined by the protocol
to make a decision on
whether or not to send.
•No idle state
How to achieve the maximum utilization?
•Multiple send/receive
•Avoid Collision
•Avoid Trafficking
2
1
3
4
Procedure for pure ALOHA protocol
Vulnerable time for pure ALOHA protocol
Frames in a slotted ALOHA network
Vulnerable time for slotted ALOHA protocol
Space/time model of the collision in CSMA
Vulnerable time in CSMA
Behavior of three
persistence methods
Flow diagram for three
persistence methods
Collision of the first bit in CSMA/CD
Collision and abortion in CSMA/CD
Flow diagram for the
CSMA/CD
Energy level during transmission, idleness, or
collision
STANDARD ETHERNET
TheoriginalEthernetwascreatedin1976atXerox’sPalo
AltoResearchCentre(PARC).Sincethen,ithasgone
throughfourgenerations.Webrieflydiscussthe
Standard(ortraditional)Ethernetinthissection.
1.MAC Sublayer
2.Physical Layer
Ethernet evolution through four generations
802.3 MAC frame
Minimum and maximum lengths
Frame length:
Minimum: 64 bytes (512 bits)
Maximum: 1518 bytes (12,144 bits)
Example of an Ethernet address in
hexadecimal notation
Unicast and multicast addresses
Note
The least significant bit of the
first byte
defines the type of address.
If the bit is 0, the address is
unicast;
otherwise, it is multicast.
The broadcast
destination address is a
special case of the
multicast address in
which all bits are 1s.
Categories of Standard Ethernet
Encoding in a Standard Ethernet implementation
10Base5 implementation
10Base2 implementation
10Base-T implementation
10Base-F implementation
Summary of Standard Ethernet
implementations
CHANGES IN THE STANDARD
CHANGES IN THE STANDARD
The10-MbpsStandardEthernethas
gonethroughseveralchangesbefore
movingtothehigherdatarates.These
changesactuallyopenedtheroadtothe
evolutionoftheEthernettobecome
compatiblewithotherhigh-data-rate
LANs.
1.Bridged Ethernet
2.Switched Ethernet
3.Full-Duplex Ethernet
Sharing bandwidth
A network with and without a bridge
Collision domains in an unbridged network
and a bridged network