2024 Multiple Access
2024 Multiple Access
Multiple Access
12.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Figure 12.1 Data link layer divided into two functionality-oriented sublayers
12.2
Figure 12.2 Taxonomy of multiple-access protocols discussed in this chapter
12.3
12-1 RANDOM ACCESS
12.5
Figure 12.4 Procedure for pure ALOHA protocol
TB=R X Tp or R X Tfr
R: 0 to 2^k -1
12.6
12.9
12.10
12.11
e refers to the base of the natural logarithm,
approximately 2.718
Figure 12.6 Frames in a slotted ALOHA network
12.14
Figure 12.7 Vulnerable time for slotted ALOHA protocol
12.15
Figure 12.9 Vulnerable time in CSMA
12.18
Figure 12.10 Behavior of three persistence methods
12.19
Figure 12.11 Flow diagram for three persistence methods
12.20
Figure 12.12 Collision of the first bit in CSMA/CD
12.21
Figure 12.13 Collision and abortion in CSMA/CD
12.22
12.23
12.24
12.25
Figure 12.14 Flow diagram for the CSMA/CD
12.26
12.27
12.28
Example 12.5
12.34
12.35
12.36
12.37
DIFS: Distributed coordinated function interframe space
SIFS: Short interframe space
RTS: Request to send
CTS: Clear to send
NAV: Network allocation vector(timer)
Collision during handshake
12.39
12.40
12.41
12.42
12.43
12.44
12.45