0% found this document useful (0 votes)
23 views33 pages

Chap 12

This document discusses multiple access protocols used in data communications. It describes random access methods like ALOHA and slotted ALOHA, controlled access methods using polling and token passing, and channelization techniques including FDMA, TDMA, and CDMA. It provides details on the procedures, throughput, and encoding/decoding processes of these different media access control methods.

Uploaded by

almamalik
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views33 pages

Chap 12

This document discusses multiple access protocols used in data communications. It describes random access methods like ALOHA and slotted ALOHA, controlled access methods using polling and token passing, and channelization techniques including FDMA, TDMA, and CDMA. It provides details on the procedures, throughput, and encoding/decoding processes of these different media access control methods.

Uploaded by

almamalik
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 33

Chapter 12.

Multiple Access

1. Random Access
2. Controlled Access
3. Channelization

Data Communications, Kwangwoon University 12-1


Data Link Layer: Two sublayers
• Data link layer divided into two functionality-oriented sublayers
• IEEE made this division for LANs

Data Communications, Kwangwoon University 12-2


Medium Access Protocols

Data Communications, Kwangwoon University 12-3


Random Access

• Each station has the right to the medium without being controlled by
any other station
• Collision, a access conflict, if more than one station tries to send

Data Communications, Kwangwoon University 12-4


ALOHA
• The earliest random access method developed at the Univ. of Hawaii in the
early 1970s
• Designed for a radio (wireless) LAN
• Pure ALOHA and Slotted ALOHA
• Frames in a pure ALOHA network

Data Communications, Kwangwoon University 12-5


Pure ALOHA Protocol: Procedure
• Binary exponential back-off algorithm

Data Communications, Kwangwoon University 12-6


Pure ALOHA Protocol
• Pure ALOHA vulnerable time = 2 x Tfr

• The throughput for pure ALOHA is S = G × e −2G .


• The maximum throughput Smax = 0.184 when G= (1/2).

Data Communications, Kwangwoon University 12-7


Slotted ALOHA
• Pure ALOHA vulnerable time = 2 x Tfr because there is no rule that defines wh
en the station can send
• Slotted ALOHA was invented to improve the efficiency of pure ALOHA

Data Communications, Kwangwoon University 12-8


Slotted ALOHA
• throughput for slotted ALOHA is S = G × e−G .
• The maximum throughput Smax = 0.368 when G = 1
• Slotted ALOHA vulnerable time = Tfr

Data Communications, Kwangwoon University 12-9


Carrier Sense Multiple Access (CSMA)
• CSMA
– “Sense before transmit”
– “Listen before talk”
• CSMA can reduce the possibility of collision, but it can not eliminate it

Data Communications, Kwangwoon University 12-10


Collision in CSMA

Data Communications, Kwangwoon University 12-11


CSMA: Vulnerable Time
• Vulnerable time for CSMA is the propagation time Tp need
ed for a signal to propagate from one end of the medium to
the other

Data Communications, Kwangwoon University 12-12


CSMA: Persistence Methods
• Behavior of 1-persistent, Nonpersistent, p-persistent method

Data Communications, Kwangwoon University 12-13


CSMA: Persistence Methods
• Flow diagram for 1-persistent, Nonpersistent, p-persistent method

Data Communications, Kwangwoon University 12-14


Persistence Strategy
• Nonpersistent strategy
– Reduces the chance of collision
– Reduces the efficiency of the network
• 1-persistent
– Increases the chance of collision
• p-persistent
– Reduces the chance of collision and improves the effici
ency by combining the other two strategies.

Data Communications, Kwangwoon University 12-15


CSMA/CD (Collision Detection)

Data Communications, Kwangwoon University 12-16


CSMA/CD: Min. Frame Size
• Example: A network using CSMA/CD has a bandwidth of 10 Mbp
s. If the maximum propagation time (including the delays in the dev
ices and ignoring the time needed to send a jamming signal, as we
see later) is 25.6 μs, what is the minimum size of the frame?

Solution
The frame transmission time is Tfr = 2 × Tp = 51.2 μs. This means, i
n the worst case, a station needs to transmit for a period of 51.2 μs t
o detect the collision. The minimum size of the frame is 10 Mbps ×
51.2 μs = 512 bits or 64 bytes. This is actually the minimum size of
the frame for Standard Ethernet.

Data Communications, Kwangwoon University 12-17


CSMA/CD: Flow Diagram

Data Communications, Kwangwoon University 12-18


CSMA/CD: Energy Level & Throughput
• Energy level during transmission, idleness, or collision

• Throughput of CSMA/CD is greater than that of ALOHA


• The max. throughput occurs at a different value of G and is based on the persistent method and the value of p in the p-persistent approach
• The max throughput is around 50% when G=1 for 1-persistent, up to 90% when G is between 3 and 8 for non-persistent

Data Communications, Kwangwoon University 12-19


CSMA/CA (Collision Avoidance)
• Invented for wireless network where we cannot detect collisions
• Collision are avoided through the use of CSMA/CA’s three strategies:
the interframe space, the contention windows, and acknowledgement

• IFS can also be used to define the priority of a station or a frame


• If the station finds the channel busy, it does not restart the timer of the contention window; it stops the timer and restarts it when the channel becomes idle

Data Communications, Kwangwoon University 12-20


CSMA/CA: Flow Diagram

Data Communications, Kwangwoon University 12-21


Controlled Access
• The stations consult one another to find which station has
the right to send
• Reservation/Polling/ Token passing
• Reservation access method

Data Communications, Kwangwoon University 12-22


Polling: Select and Poll Functions

Data Communications, Kwangwoon University 12-23


Token Passing
• Logical Ring and physical topology

Data Communications, Kwangwoon University 12-24


Channelization: FDMA
• FDMA
– Available bandwidth of the common channel is divided into bands
that are separated by guard bands
– FDMA is an access method in data link layer protocol. But, FDM
is a physical layer technique

Data Communications, Kwangwoon University 12-25


Channelization: TDMA
• TDMA
– The bandwidth is just one channel that is timeshared between different stations
– TDMA is an access method. But, TDM is a physical layer technique

Data Communications, Kwangwoon University 12-26


Channelization: CDMA
• One channel carries all transmissions simultaneously
• Two properties: If we multiply each code by another, we get 0. If we
multiply each code by itself, we get 4
• Data = (d1.c1 + d2.c2 + d3.c3 + d4.c4) .c1
= d1.c1.c1 + d2.c2.c1 + d3.c3.c1 + d4.c4.c1 = 4.d1

Data Communications, Kwangwoon University 12-27


CDMA: Chips
• Sequence of numbers called chips

• Orthogonal sequences have the following properties:


– Each sequence is made of N elements, where N is the number of stations
– If we multiply a sequence by a number, every element in the sequence is multiplied by that
element (scalar multiplication)
– If we multiply two equal sequence, element by element, and add the results, we get N (inner
product)
– If we multiply two different sequence, element by element, and add the results, we get 0
– Adding two sequence means adding the corresponding elements. The result is another
sequence
• Data representation in CDMA

Data Communications, Kwangwoon University 12-28


CDMA: Encoding and Decoding
• Show how four stations share the link during a 1-bit interval

Data Communications, Kwangwoon University 12-29


CDMA: Signal Level
• Digital signal created by four stations in CDMA using NRZ-L for
simplicity

Data Communications, Kwangwoon University 12-30


CDMA: Decoding
• Show how station 3 can detect the data by station 2 by using the code
for station 2
• Decoding of the composite signal for one in CDMA

Data Communications, Kwangwoon University 12-31


CDMA: Sequence Generation
• To generate chip sequence, we use a Walsh table
• The number of sequence in a Walsh table needs to be N = 2m

Data Communications, Kwangwoon University 12-32


Sequence Generation: Example
• Find the chips for a network with
a. Two stations b. Four stations

Solution

a. For a two-station network, we have


[+1 +1] and [+1 −1].

b. For a four-station network we have


[+1 +1 +1 +1], [+1 −1 +1 −1],
[+1 +1 −1 −1], and [+1 −1 −1 +1].

Data Communications, Kwangwoon University 12-33

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy