Unit 2.3 Multiple Access
Unit 2.3 Multiple Access
Access
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Figure 12.1 Data link layer divided into two functionality-oriented sublayers
Multiple Access Protocols
ALOHA
RANDOM ACCESS
ACK ACK
ACK ACK
Frames in a pure ALOHA network
Procedure for pure ALOHA protocol
Example 12.1
Solution
(frame time=frame length/bit rate)
Average frame transmission time Tfr is 200 bits/200 kbps or
1 ms. The vulnerable time is 2 × 1 ms = 2 ms. This means
no station should send later than 1 ms before this station
starts transmission and no station should start sending
during the one 1-ms period that this station is sending.
Note
Let us G is the average number of frames generated by the
system during one frame transmission time. And S is the
successful transmission for pure ALOHA then
The throughput for pure ALOHA is
S = G × e −2G
The maximum throughput
Smax = 0.184 when G= (1/2).
Example 12.3
A pure ALOHA network transmits 200-bit frames on a
shared channel of 200 kbps. What is the throughput if the
system (all stations together) produces
a. 1000 frames per second b. 500 frames per second
c. 250 frames per second.
Solution
The frame transmission time is 200/200 kbps or 1 ms.
a. If the system creates 1000 frames per second, this is 1
frame per millisecond. The load is 1. In this case
S = G× e−2 G or S = 0.135 (13.5 percent). This means
that the throughput is 1000 × 0.135 = 135 frames. Only
135 frames out of 1000 will probably survive.
Example 12.3 (continued)
b. If the system creates 500 frames per second, this is
(1/2) frame per millisecond. The load is (1/2). In this
case S = G × e −2G or S = 0.184 (18.4 percent). This
means that the throughput is 500 × 0.184 = 92 and that
only 92 frames out of 500 will probably survive. Note
that this is the maximum throughput case,
percentagewise.
stop talking
CSMA:
A node should not send if another node is already
sending
carrier sensing
CD (collision detection):
A node should stop transmission if there is interference
collision detection
Carrier Sense Multiple Access
If everyone is sensing the medium how come
that collisions still occur?
channel propagation
delay
Space/time model of the collision in CSMA
Vulnerable time in CSMA
Behavior of three persistence methods
Flow diagram for three persistence methods
Collision of the first bit in CSMA/CD
Collision and abortion in CSMA/CD
Example 12.5