Multiple Access in Computer Network

HiteshMohapatra 2,546 views 62 slides Apr 01, 2019
Slide 1
Slide 1 of 62
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39
Slide 40
40
Slide 41
41
Slide 42
42
Slide 43
43
Slide 44
44
Slide 45
45
Slide 46
46
Slide 47
47
Slide 48
48
Slide 49
49
Slide 50
50
Slide 51
51
Slide 52
52
Slide 53
53
Slide 54
54
Slide 55
55
Slide 56
56
Slide 57
57
Slide 58
58
Slide 59
59
Slide 60
60
Slide 61
61
Slide 62
62

About This Presentation

Error Detection and correction: Types of Errors, Error Detection mechanism (Linear codes, CRC, Checksum), Error Correction mechanism: Hamming Encoding. Data Link Control and Protocols: Flow and Error Control, Stop-and-Wait ARQ. Go-Back-N ARQ,
Selective Repeat ARQ, HDLC and Point-to-Point Protocol
Mu...


Slide Content

Multiple Access
Hitesh Mohapatra
Class Note

Data link layer divided into two functionality-oriented sublayers

Taxonomy of multiple-access protocols discussed in
this chapter

ALOHA
Random Access
Frames in a pure ALOHA network

Importance Relevance Significance
•To maximize the
bandwidth
utilization
•ALOHA
•Carrier Sense
Multiple Access
•Carrier Sense
Multiple Access with
Collision Detection
•Carrier Sense
Multiple Access with
Collision Avoidance
•In random access or
contention methods, no
station is superior to
another station and none
is assigned the control
over another. No station
permits, or does not
permit, another station
to send. At each instance,
a station that has data to
send uses a procedure
defined by the protocol
to make a decision on
whether or not to send.

•No idle state
How to achieve the maximum utilization?
•Multiple send/receive
•Avoid Collision
•Avoid Trafficking
2
1
3
4

Procedure for pure ALOHA protocol

Vulnerable time for pure ALOHA protocol

Frames in a slotted ALOHA network

Vulnerable time for slotted ALOHA protocol

Space/time model of the collision in CSMA

Vulnerable time in CSMA

Behavior of three
persistence methods

Flow diagram for three
persistence methods

Collision of the first bit in CSMA/CD

Collision and abortion in CSMA/CD

Flow diagram for the
CSMA/CD

Energy level during transmission, idleness, or
collision

Timing in CSMA/CA

Note InCSMA/CA,ifthestation
findsthechannelbusy,it
doesnotrestartthetimer
ofthecontentionwindow;
itstopsthetimerand
restartsitwhenthe
channelbecomesidle.InCSMA/CA,the
IFScanalsobe
usedtodefinethe
priorityofa
stationoraframe.

Flow diagram for CSMA/CA

Controlled Access

Controlled Access
Incontrolledaccess,thestations
consultoneanothertofindwhich
stationhastherighttosend.Astation
cannotsendunlessithasbeen
authorizedbyotherstations.We
discussthreepopularcontrolled-
accessmethods.
1.Reservation
2.Polling
3.Token Passing

Reservation access method

Select and poll functions in polling access method

Logical ring and physical topology in token-passing
access method

Channelization

Channelization
Channelizationisamultiple-
accessmethodinwhichthe
availablebandwidthofalink
issharedintime,frequency,
orthroughcode,between
differentstations.Inthis
section,wediscussthree
channelizationprotocols.
1.Frequency-Division Multiple Access (FDMA)
2.Time-Division Multiple Access (TDMA)
3.Code-Division Multiple Access (CDMA)

FDMA
In FDMA, the
available
bandwidth
of the common
channel is divided
into bands that
are separated by
guard bands.

TDMA
In TDMA, the
bandwidth is just one
channel that is
timeshared between
different stations.

CDMA
In CDMA, one
channel carries
all transmissions
simultaneously.
Simple idea of communication with code

Chip sequences

Data representation in CDMA

Sharing channel in CDMA

Digital signal created by four stations in CDMA

Decoding of the composite signal for one in CDMA

General rule and
examples of creating
Walsh tables
The number of
sequences in a
Walsh table needs to
be N = 2
m
.

Reference
Author:Behrouz A. Forouzan
Publication:· Book
Data Communications and Networking (McGraw-Hill ForouzanNetworking)
McGraw-Hill Higher Education ©2007
ISBN:0072967757

Wired LANs: Ethernet

IEEE STANDARDS
In1985,theComputerSocietyofthe
IEEEstartedaproject,calledProject
802,tosetstandardstoenable
intercommunicationamongequipment
fromavarietyofmanufacturers.Project
802isawayofspecifyingfunctionsof
thephysicallayerandthedatalinklayer
ofmajorLANprotocols.
1.Data Link Layer
2.Physical Layer

STANDARD ETHERNET
TheoriginalEthernetwascreatedin1976atXerox’sPalo
AltoResearchCentre(PARC).Sincethen,ithasgone
throughfourgenerations.Webrieflydiscussthe
Standard(ortraditional)Ethernetinthissection.
1.MAC Sublayer
2.Physical Layer

Ethernet evolution through four generations

802.3 MAC frame

Minimum and maximum lengths
Frame length:
Minimum: 64 bytes (512 bits)
Maximum: 1518 bytes (12,144 bits)

Example of an Ethernet address in
hexadecimal notation

Unicast and multicast addresses

Note
The least significant bit of the
first byte
defines the type of address.
If the bit is 0, the address is
unicast;
otherwise, it is multicast.
The broadcast
destination address is a
special case of the
multicast address in
which all bits are 1s.

Categories of Standard Ethernet

Encoding in a Standard Ethernet implementation

10Base5 implementation

10Base2 implementation

10Base-T implementation

10Base-F implementation

Summary of Standard Ethernet
implementations

CHANGES IN THE STANDARD

CHANGES IN THE STANDARD
The10-MbpsStandardEthernethas
gonethroughseveralchangesbefore
movingtothehigherdatarates.These
changesactuallyopenedtheroadtothe
evolutionoftheEthernettobecome
compatiblewithotherhigh-data-rate
LANs.
1.Bridged Ethernet
2.Switched Ethernet
3.Full-Duplex Ethernet

Sharing bandwidth

A network with and without a bridge

Collision domains in an unbridged network
and a bridged network

Switched Ethernet

Full-duplex switched Ethernet

AsK
AnyQuestion
[email protected]