SlideShare a Scribd company logo
1 of 29
12.1
Multiple Access
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
12.2
Data link layer divided into two functionality-oriented sublayers
12.3
Taxonomy of multiple-access protocols discussed in this chapter
12.4
RANDOM ACCESSRANDOM ACCESS
InIn random accessrandom access oror contentioncontention methods, no station ismethods, no station is
superior to another station and none is assigned thesuperior to another station and none is assigned the
control over another. No station permits, or does notcontrol over another. No station permits, or does not
permit, another station to send. At each instance, apermit, another station to send. At each instance, a
station that has data to send uses a procedure definedstation that has data to send uses a procedure defined
by the protocol to make a decision on whether or notby the protocol to make a decision on whether or not
to send.to send.
ALOHA
Carrier Sense Multiple Access
Carrier Sense Multiple Access with Collision Detection
Carrier Sense Multiple Access with Collision Avoidance
Topics discussed in this section:Topics discussed in this section:
12.5
To avoid access conflict or to resolve it when itTo avoid access conflict or to resolve it when it
happens, each station follows a procedure that answerhappens, each station follows a procedure that answer
the following questions:the following questions:
 When can the station access the medium.When can the station access the medium.
What can the station do if the medium is busy.What can the station do if the medium is busy.
How can the station determine the success or failureHow can the station determine the success or failure
of the transmission.of the transmission.
What can the station do if there is an access conflict.What can the station do if there is an access conflict.
12.6
ALOHA
ALOHA, the earliest random access method, was developed at the University of Hawaii
in early 1970. It was designed for a radio (wireless) LAN, but it can be used on any
shared medium.
Pure ALOHA
Slotted ALOHA
12.7
Frames in a pure ALOHA network
12.8
Procedure for pure ALOHA protocol
12.9
Vulnerable time for pure ALOHA protocol
The Vulnerable time, in which there is possibility of collision
12.10
Slotted ALOHA
12.11
Frames in a slotted ALOHA network
12.12
Figure 12.7 Vulnerable time for slotted ALOHA protocol
12.13
CSMA
Carrier Sense Multiple Access
12.14
Space/time model of the collision in CSMA
12.15
Figure 12.9 Vulnerable time in CSMA
12.16
Persistence Method
What Should a station do if the channel is busy.
What should a station do if the channel is idle.
1-Persistence Method
Non Persistence Method
p-Persistence Method
12.17
Behavior of three persistence methods
12.18
Flow diagram for three persistence methods
12.19
Collision of the first bit in CSMA/CD
12.20
Collision and abortion in CSMA/CD
12.21
Flow diagram for the CSMA/CD
12.22
Figure 12.15 Energy level during transmission, idleness, or collision
12.23
Figure 12.16 Timing in CSMA/CA
Interframe Space (IFS)
12.24
In CSMA/CA, the IFS can also be used to
define the priority of a station or a
frame.
Note
12.25
In CSMA/CA, if the station finds the
channel busy, it does not restart the
timer of the contention window;
it stops the timer and restarts it when
the channel becomes idle.
Note
12.26
Figure 12.17 Flow diagram for CSMA/CA
12.27
CONTROLLED ACCESSCONTROLLED ACCESS
InIn controlled accesscontrolled access, the stations consult one another, the stations consult one another
to find which station has the right to send. A stationto find which station has the right to send. A station
cannot send unless it has been authorized by othercannot send unless it has been authorized by other
stations. We discuss three popular controlled-accessstations. We discuss three popular controlled-access
methods.methods.
Reservation
Polling
Token Passing
Topics discussed in this section:Topics discussed in this section:
12.28
Logical ring and physical topology in token-passing access method
Computer Science & Engineering
Assignment
Semester- VI (I & II) Branch: CSE
Subject with Code: Computer Networks (IT-305-F)
-----------------------------------------------------------------------------------------------
Q:1 Explain Lacal Area Network.
Q:2 Explain IEEE 802 standards in Detail.

More Related Content

What's hot

3.Medium Access Control
3.Medium Access Control3.Medium Access Control
3.Medium Access ControlSonali Chauhan
 
Media Access Control
Media Access ControlMedia Access Control
Media Access ControlHusnainHadi
 
seminar report on multiple access control protocol submitted by munesh
seminar report on multiple access control protocol submitted by munesh seminar report on multiple access control protocol submitted by munesh
seminar report on multiple access control protocol submitted by munesh meenamunesh
 
Multiple Access Control Protocol (MAC Protocol) Networking
Multiple Access Control Protocol (MAC Protocol) Networking Multiple Access Control Protocol (MAC Protocol) Networking
Multiple Access Control Protocol (MAC Protocol) Networking Nitish Awasthi (anitish_225)
 
Multiple access protocols in data communication networks
Multiple access protocols in data communication networksMultiple access protocols in data communication networks
Multiple access protocols in data communication networksNt Arvind
 
Multiple access control protocol
Multiple access control protocol Multiple access control protocol
Multiple access control protocol meenamunesh
 
The mac layer
The mac layerThe mac layer
The mac layeraazamk
 
Media Access Control (MAC Layer)
Media Access Control (MAC Layer)Media Access Control (MAC Layer)
Media Access Control (MAC Layer)Meenakshi Paul
 
CSMA /CD PPT ON SLIDESHARE
CSMA /CD PPT ON SLIDESHARECSMA /CD PPT ON SLIDESHARE
CSMA /CD PPT ON SLIDESHAREKhushboo Pal
 
Csma protocols
Csma protocolsCsma protocols
Csma protocolsManal Shah
 

What's hot (20)

Media Access Control
Media Access ControlMedia Access Control
Media Access Control
 
3.Medium Access Control
3.Medium Access Control3.Medium Access Control
3.Medium Access Control
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
 
seminar report on multiple access control protocol submitted by munesh
seminar report on multiple access control protocol submitted by munesh seminar report on multiple access control protocol submitted by munesh
seminar report on multiple access control protocol submitted by munesh
 
Multiple Access Control Protocol (MAC Protocol) Networking
Multiple Access Control Protocol (MAC Protocol) Networking Multiple Access Control Protocol (MAC Protocol) Networking
Multiple Access Control Protocol (MAC Protocol) Networking
 
Multiple access protocols in data communication networks
Multiple access protocols in data communication networksMultiple access protocols in data communication networks
Multiple access protocols in data communication networks
 
clas 8
clas 8clas 8
clas 8
 
Multiple access control protocol
Multiple access control protocol Multiple access control protocol
Multiple access control protocol
 
The medium access sublayer
 The medium  access sublayer The medium  access sublayer
The medium access sublayer
 
The mac layer
The mac layerThe mac layer
The mac layer
 
aloha
alohaaloha
aloha
 
Media Access Control (MAC Layer)
Media Access Control (MAC Layer)Media Access Control (MAC Layer)
Media Access Control (MAC Layer)
 
csma ca
 csma ca csma ca
csma ca
 
CSMA /CD PPT ON SLIDESHARE
CSMA /CD PPT ON SLIDESHARECSMA /CD PPT ON SLIDESHARE
CSMA /CD PPT ON SLIDESHARE
 
Aloha
AlohaAloha
Aloha
 
Csma protocols
Csma protocolsCsma protocols
Csma protocols
 
Chapter4 1
Chapter4 1Chapter4 1
Chapter4 1
 
MAC
MACMAC
MAC
 
Mac
MacMac
Mac
 
Csmaca
CsmacaCsmaca
Csmaca
 

Similar to multiple access

mutiple acces protocol.ppt
mutiple acces protocol.pptmutiple acces protocol.ppt
mutiple acces protocol.pptrocky781582
 
mac-protocols
mac-protocols mac-protocols
mac-protocols DivyaKS18
 
Multiple Access ppt in Object Oriented Programming
Multiple Access ppt in Object Oriented ProgrammingMultiple Access ppt in Object Oriented Programming
Multiple Access ppt in Object Oriented Programmingarnavytstudio2814
 
3b multiple access
3b multiple access3b multiple access
3b multiple accesskavish dani
 
Multiple Access in wireless communication
Multiple Access in wireless communicationMultiple Access in wireless communication
Multiple Access in wireless communicationMaulik Togadiya
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communicationpanditadesh123
 
unit 3 Multiple Access.ppt
unit 3 Multiple Access.pptunit 3 Multiple Access.ppt
unit 3 Multiple Access.pptzmulani8
 
Multiple acessing
Multiple acessing Multiple acessing
Multiple acessing Piyush Sarin
 
12 Multiple Access
12 Multiple Access12 Multiple Access
12 Multiple AccessAhmar Hashmi
 
specialized-mac-sdmafdmatdma-and-cdma.pdf
specialized-mac-sdmafdmatdma-and-cdma.pdfspecialized-mac-sdmafdmatdma-and-cdma.pdf
specialized-mac-sdmafdmatdma-and-cdma.pdfianeroman
 
Introduction to networking
Introduction to networkingIntroduction to networking
Introduction to networkingIdealGraphics
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...Pallepati Vasavi
 
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptxComputer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptxPravinbhargav
 

Similar to multiple access (20)

Ch12
Ch12Ch12
Ch12
 
mutiple acces protocol.ppt
mutiple acces protocol.pptmutiple acces protocol.ppt
mutiple acces protocol.ppt
 
mac-protocols
mac-protocols mac-protocols
mac-protocols
 
Multiple Access ppt in Object Oriented Programming
Multiple Access ppt in Object Oriented ProgrammingMultiple Access ppt in Object Oriented Programming
Multiple Access ppt in Object Oriented Programming
 
3b multiple access
3b multiple access3b multiple access
3b multiple access
 
Multiple Access in wireless communication
Multiple Access in wireless communicationMultiple Access in wireless communication
Multiple Access in wireless communication
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communication
 
Ch12
Ch12Ch12
Ch12
 
Ch12
Ch12Ch12
Ch12
 
Unit_3_WSN.pptx
Unit_3_WSN.pptxUnit_3_WSN.pptx
Unit_3_WSN.pptx
 
unit 3 Multiple Access.ppt
unit 3 Multiple Access.pptunit 3 Multiple Access.ppt
unit 3 Multiple Access.ppt
 
Computer network
Computer networkComputer network
Computer network
 
IV_UNIT.ppt
IV_UNIT.pptIV_UNIT.ppt
IV_UNIT.ppt
 
Multiple acessing
Multiple acessing Multiple acessing
Multiple acessing
 
12 Multiple Access
12 Multiple Access12 Multiple Access
12 Multiple Access
 
specialized-mac-sdmafdmatdma-and-cdma.pdf
specialized-mac-sdmafdmatdma-and-cdma.pdfspecialized-mac-sdmafdmatdma-and-cdma.pdf
specialized-mac-sdmafdmatdma-and-cdma.pdf
 
Introduction to networking
Introduction to networkingIntroduction to networking
Introduction to networking
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
 
Ch12
Ch12Ch12
Ch12
 
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptxComputer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptx
 

More from AKSHIT KOHLI

ELECTRICAL AND ELECTRONICS MEASURING INSTRUMETNTS,CRO,CRT,PROBES,OSCILLOSCOPES
ELECTRICAL AND ELECTRONICS MEASURING INSTRUMETNTS,CRO,CRT,PROBES,OSCILLOSCOPESELECTRICAL AND ELECTRONICS MEASURING INSTRUMETNTS,CRO,CRT,PROBES,OSCILLOSCOPES
ELECTRICAL AND ELECTRONICS MEASURING INSTRUMETNTS,CRO,CRT,PROBES,OSCILLOSCOPESAKSHIT KOHLI
 
VIRTUAL CIRCUIT NETWORKS, atm , frame relay
VIRTUAL CIRCUIT NETWORKS, atm , frame relayVIRTUAL CIRCUIT NETWORKS, atm , frame relay
VIRTUAL CIRCUIT NETWORKS, atm , frame relayAKSHIT KOHLI
 
LAYER PROTOCOL ,SONET,SDH
LAYER PROTOCOL ,SONET,SDHLAYER PROTOCOL ,SONET,SDH
LAYER PROTOCOL ,SONET,SDHAKSHIT KOHLI
 
data queue data base ,MAN
data queue data base ,MANdata queue data base ,MAN
data queue data base ,MANAKSHIT KOHLI
 
lan connecting device
lan connecting devicelan connecting device
lan connecting deviceAKSHIT KOHLI
 
local area network
 local area network local area network
local area networkAKSHIT KOHLI
 
transfer protocols,ftp,smtp,pop,imap
transfer protocols,ftp,smtp,pop,imaptransfer protocols,ftp,smtp,pop,imap
transfer protocols,ftp,smtp,pop,imapAKSHIT KOHLI
 
internet protocols
internet protocolsinternet protocols
internet protocolsAKSHIT KOHLI
 
computer networks
computer networks computer networks
computer networks AKSHIT KOHLI
 
topologycomputer networking basics
topologycomputer networking basicstopologycomputer networking basics
topologycomputer networking basicsAKSHIT KOHLI
 

More from AKSHIT KOHLI (19)

Surveilance ppt
Surveilance ppt Surveilance ppt
Surveilance ppt
 
ELECTRICAL AND ELECTRONICS MEASURING INSTRUMETNTS,CRO,CRT,PROBES,OSCILLOSCOPES
ELECTRICAL AND ELECTRONICS MEASURING INSTRUMETNTS,CRO,CRT,PROBES,OSCILLOSCOPESELECTRICAL AND ELECTRONICS MEASURING INSTRUMETNTS,CRO,CRT,PROBES,OSCILLOSCOPES
ELECTRICAL AND ELECTRONICS MEASURING INSTRUMETNTS,CRO,CRT,PROBES,OSCILLOSCOPES
 
VIRTUAL CIRCUIT NETWORKS, atm , frame relay
VIRTUAL CIRCUIT NETWORKS, atm , frame relayVIRTUAL CIRCUIT NETWORKS, atm , frame relay
VIRTUAL CIRCUIT NETWORKS, atm , frame relay
 
LAYER PROTOCOL ,SONET,SDH
LAYER PROTOCOL ,SONET,SDHLAYER PROTOCOL ,SONET,SDH
LAYER PROTOCOL ,SONET,SDH
 
ETHERNET
ETHERNETETHERNET
ETHERNET
 
data queue data base ,MAN
data queue data base ,MANdata queue data base ,MAN
data queue data base ,MAN
 
lan connecting device
lan connecting devicelan connecting device
lan connecting device
 
local area network
 local area network local area network
local area network
 
ipv4
ipv4ipv4
ipv4
 
transfer protocols,ftp,smtp,pop,imap
transfer protocols,ftp,smtp,pop,imaptransfer protocols,ftp,smtp,pop,imap
transfer protocols,ftp,smtp,pop,imap
 
internet protocols
internet protocolsinternet protocols
internet protocols
 
tcp ip protocols
tcp ip protocolstcp ip protocols
tcp ip protocols
 
udp , tcp ,sctp
udp , tcp ,sctpudp , tcp ,sctp
udp , tcp ,sctp
 
icmp , igmp
icmp , igmpicmp , igmp
icmp , igmp
 
network layer
network layernetwork layer
network layer
 
osi model
osi modelosi model
osi model
 
transmission mode
transmission modetransmission mode
transmission mode
 
computer networks
computer networks computer networks
computer networks
 
topologycomputer networking basics
topologycomputer networking basicstopologycomputer networking basics
topologycomputer networking basics
 

Recently uploaded

Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 

Recently uploaded (20)

Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 

multiple access

  • 1. 12.1 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
  • 2. 12.2 Data link layer divided into two functionality-oriented sublayers
  • 3. 12.3 Taxonomy of multiple-access protocols discussed in this chapter
  • 4. 12.4 RANDOM ACCESSRANDOM ACCESS InIn random accessrandom access oror contentioncontention methods, no station ismethods, no station is superior to another station and none is assigned thesuperior to another station and none is assigned the control over another. No station permits, or does notcontrol over another. No station permits, or does not permit, another station to send. At each instance, apermit, another station to send. At each instance, a station that has data to send uses a procedure definedstation that has data to send uses a procedure defined by the protocol to make a decision on whether or notby the protocol to make a decision on whether or not to send.to send. ALOHA Carrier Sense Multiple Access Carrier Sense Multiple Access with Collision Detection Carrier Sense Multiple Access with Collision Avoidance Topics discussed in this section:Topics discussed in this section:
  • 5. 12.5 To avoid access conflict or to resolve it when itTo avoid access conflict or to resolve it when it happens, each station follows a procedure that answerhappens, each station follows a procedure that answer the following questions:the following questions:  When can the station access the medium.When can the station access the medium. What can the station do if the medium is busy.What can the station do if the medium is busy. How can the station determine the success or failureHow can the station determine the success or failure of the transmission.of the transmission. What can the station do if there is an access conflict.What can the station do if there is an access conflict.
  • 6. 12.6 ALOHA ALOHA, the earliest random access method, was developed at the University of Hawaii in early 1970. It was designed for a radio (wireless) LAN, but it can be used on any shared medium. Pure ALOHA Slotted ALOHA
  • 7. 12.7 Frames in a pure ALOHA network
  • 8. 12.8 Procedure for pure ALOHA protocol
  • 9. 12.9 Vulnerable time for pure ALOHA protocol The Vulnerable time, in which there is possibility of collision
  • 11. 12.11 Frames in a slotted ALOHA network
  • 12. 12.12 Figure 12.7 Vulnerable time for slotted ALOHA protocol
  • 14. 12.14 Space/time model of the collision in CSMA
  • 16. 12.16 Persistence Method What Should a station do if the channel is busy. What should a station do if the channel is idle. 1-Persistence Method Non Persistence Method p-Persistence Method
  • 17. 12.17 Behavior of three persistence methods
  • 18. 12.18 Flow diagram for three persistence methods
  • 19. 12.19 Collision of the first bit in CSMA/CD
  • 21. 12.21 Flow diagram for the CSMA/CD
  • 22. 12.22 Figure 12.15 Energy level during transmission, idleness, or collision
  • 23. 12.23 Figure 12.16 Timing in CSMA/CA Interframe Space (IFS)
  • 24. 12.24 In CSMA/CA, the IFS can also be used to define the priority of a station or a frame. Note
  • 25. 12.25 In CSMA/CA, if the station finds the channel busy, it does not restart the timer of the contention window; it stops the timer and restarts it when the channel becomes idle. Note
  • 26. 12.26 Figure 12.17 Flow diagram for CSMA/CA
  • 27. 12.27 CONTROLLED ACCESSCONTROLLED ACCESS InIn controlled accesscontrolled access, the stations consult one another, the stations consult one another to find which station has the right to send. A stationto find which station has the right to send. A station cannot send unless it has been authorized by othercannot send unless it has been authorized by other stations. We discuss three popular controlled-accessstations. We discuss three popular controlled-access methods.methods. Reservation Polling Token Passing Topics discussed in this section:Topics discussed in this section:
  • 28. 12.28 Logical ring and physical topology in token-passing access method
  • 29. Computer Science & Engineering Assignment Semester- VI (I & II) Branch: CSE Subject with Code: Computer Networks (IT-305-F) ----------------------------------------------------------------------------------------------- Q:1 Explain Lacal Area Network. Q:2 Explain IEEE 802 standards in Detail.