SlideShare a Scribd company logo
1 of 10
BY
G.GOWRILATHA,M.Sc(Info Tech)
Department Of CS & IT
Nadar Saraswathi College Of Arts and Science,
Theni.
Demand Assigned Multiple Access
• Demand Assigned Multiple Access (DAMA) is a name for a
central allocation of network resources. it is an operation process
that lies above multiple access processes, because it is an
administrative, not a technical function.
•Demand Assigned Multiple Access (DAMA) is a name for a
central allocation of network resources. DAMA is one of the two
main techniques for allocating channels to users.
• The most multiple-access systems use DAMA in which the
available channels are allocated on an as required basis to users.
• DAMA is a technique used to assign satellite channels to on an as
request basis.
Demand Assigned Multiple Access (DAMA) is a
technology used to assign a channel to clients that don't
need to use it constantly. DAMA systems assign
communication channels based on news issued from user
terminals to a network security system.
Channels are typically a pair of carrier frequencies (one
for transmit and one for receive), but can be other fixed
bandwidth resources such as timeslots in a TDMA burst
plan or even physical party line channels.
Once a channel is allocated to a given pair of nodes, it is
not available to other users in the network until their
session is finished.
A. Packet Reservation Multiple Access (PRMA)
refers to a multiple access strategy with frames of
a fixed number of slots.
B. In case a terminal contains a set of data packets or
speech segments to deliver, it competes to gain
access in any free slot.
C. In PRMA, adjacent cells make use of distinct
carrier frequencies in line with a cellular reuse
plan. The fundamental process of PRMA includes
occupying a time slot only at the time of speech
talkspurts and releasing the channel at the time of
silence periods.
PRMA facts:
TDMA with slotted ALOHA reservation system
Source rates are 32 kbit/sec
Frame Duration is 16 msec ( 62.5 frames/sec)
20 slots per frame
Channel bit rate is 720 kbit/sec and bandwidth is 720
khz
576 bits per slot (contains 64 bit overhead)
Packet dropping rate is 1%
Supports data and voice
Medium Access Control (MAC) Protocols
The role of the MAC protocol [1] is to determine when
a node is allowed to transmit its packets. It typically
controls all access to the medium.
Wireless MAC protocols have been studied extensively
since the 1970s. The initial protocols were developed for
data and satellite communications.
The two major objectives of a multiple access protocol
are maximization of the channel capacity utilization and
minimization of latency between a station deciding to
transmit and able to transmit.
High throughput- A high network throughput, or high efficiency, is
achieved when the protocol has low overhead and low collision probability.
It is also equivalent to low frame delay.
Scalability- The network throughput should be unaffected by increases in
number of nodes. Naturally, the per-node throughput decreases as the
number of active nodes increases but ideally, this should follow a linear
decrease.
Topology independence- The network throughput should be transparent to
network topology changes. In high mobility scenarios, where the rate of
nodes joining and leaving the network is high, as well as node velocity, the
protocol should be able to maintain a high network throughput.
Fairness- The protocol should not give priority to particular nodes over the
others.
Quality of Service (QoS) - When multiple traffic classes are defined, the
protocol should be able to manage the bandwidth resources in order to
assign different priorities to real-time and besteffort nodes.
PRMA Model
CDMA/PRMA
Joint Code Division Multiple Access Packet
Reservation Multiple Access (CDMA/PRMA)
protocol was introduced as a candidate for an
uplink protocol for third generation mobile
communication.
Packet CDMA the time axis is unslotted and
packets are granted random access to the
channel, in Joint CDMA/PRMA the time axis
is slotted, with the slots grouped into frames
(as in PRMA) and the access of packets to the
channel
Thank You

More Related Content

What's hot

Signals and Antennas in mobile computing
Signals and Antennas in mobile computingSignals and Antennas in mobile computing
Signals and Antennas in mobile computingMadhuri Badgujar
 
Concepts of & cell sectoring and micro cell
Concepts of & cell sectoring and micro cellConcepts of & cell sectoring and micro cell
Concepts of & cell sectoring and micro cellKundan Kumar
 
Spread Spectrum Multiple Access
 Spread Spectrum Multiple Access Spread Spectrum Multiple Access
Spread Spectrum Multiple Accessguest734441
 
Switching Techniques
Switching TechniquesSwitching Techniques
Switching Techniquestameemyousaf
 
Frequency Division Multiple Access (FDMA)
Frequency Division Multiple Access (FDMA)Frequency Division Multiple Access (FDMA)
Frequency Division Multiple Access (FDMA)Miles Kevin Galario
 
Multiple Access in wireless communication
Multiple Access in wireless communicationMultiple Access in wireless communication
Multiple Access in wireless communicationMaulik Togadiya
 
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...ArunChokkalingam
 
Lecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksLecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksChandra Meena
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocolsbarodia_1437
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLjunnubabu
 
2.3 time division multiple access
2.3   time division multiple access2.3   time division multiple access
2.3 time division multiple accessJAIGANESH SEKAR
 
Frequency hopping spread spectrum
Frequency hopping spread spectrumFrequency hopping spread spectrum
Frequency hopping spread spectrumHarshit Gupta
 
2.5 capacity calculations of fdma, tdma and cdma
2.5   capacity calculations of fdma, tdma and cdma2.5   capacity calculations of fdma, tdma and cdma
2.5 capacity calculations of fdma, tdma and cdmaJAIGANESH SEKAR
 

What's hot (20)

Signals and Antennas in mobile computing
Signals and Antennas in mobile computingSignals and Antennas in mobile computing
Signals and Antennas in mobile computing
 
CDMA
CDMACDMA
CDMA
 
Concepts of & cell sectoring and micro cell
Concepts of & cell sectoring and micro cellConcepts of & cell sectoring and micro cell
Concepts of & cell sectoring and micro cell
 
Spread Spectrum Multiple Access
 Spread Spectrum Multiple Access Spread Spectrum Multiple Access
Spread Spectrum Multiple Access
 
Switching Techniques
Switching TechniquesSwitching Techniques
Switching Techniques
 
Frequency Division Multiple Access (FDMA)
Frequency Division Multiple Access (FDMA)Frequency Division Multiple Access (FDMA)
Frequency Division Multiple Access (FDMA)
 
Multiple Access in wireless communication
Multiple Access in wireless communicationMultiple Access in wireless communication
Multiple Access in wireless communication
 
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
 
WLAN
WLANWLAN
WLAN
 
Cdma2000
Cdma2000Cdma2000
Cdma2000
 
Lecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksLecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networks
 
FDMA & TDMA
FDMA & TDMAFDMA & TDMA
FDMA & TDMA
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocols
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROL
 
SPACE DIVISION MULTIPLEXING (SDMA)
SPACE DIVISION MULTIPLEXING (SDMA)SPACE DIVISION MULTIPLEXING (SDMA)
SPACE DIVISION MULTIPLEXING (SDMA)
 
Mobile computing (Wireless) Medium Access Control (MAC)
Mobile computing (Wireless) Medium Access Control (MAC)Mobile computing (Wireless) Medium Access Control (MAC)
Mobile computing (Wireless) Medium Access Control (MAC)
 
Propagation mechanisms
Propagation mechanismsPropagation mechanisms
Propagation mechanisms
 
2.3 time division multiple access
2.3   time division multiple access2.3   time division multiple access
2.3 time division multiple access
 
Frequency hopping spread spectrum
Frequency hopping spread spectrumFrequency hopping spread spectrum
Frequency hopping spread spectrum
 
2.5 capacity calculations of fdma, tdma and cdma
2.5   capacity calculations of fdma, tdma and cdma2.5   capacity calculations of fdma, tdma and cdma
2.5 capacity calculations of fdma, tdma and cdma
 

Similar to Demand assigned and packet reservation multiple access

wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor networkA. Shamel
 
Multiple access procedures
Multiple access proceduresMultiple access procedures
Multiple access proceduresabishajesus
 
CDMA Transmitter and Receiver Implementation Using FPGA
CDMA Transmitter and Receiver Implementation Using FPGACDMA Transmitter and Receiver Implementation Using FPGA
CDMA Transmitter and Receiver Implementation Using FPGAIOSR Journals
 
A STUDY ON THE MAC TECHNOLOGY AND ACCESS NETWORK OVER 3G SYSTEMS
A STUDY ON THE MAC TECHNOLOGY AND ACCESS NETWORK OVER 3G SYSTEMSA STUDY ON THE MAC TECHNOLOGY AND ACCESS NETWORK OVER 3G SYSTEMS
A STUDY ON THE MAC TECHNOLOGY AND ACCESS NETWORK OVER 3G SYSTEMSIJCI JOURNAL
 
Multiple Access in Computer Network
Multiple Access in Computer NetworkMultiple Access in Computer Network
Multiple Access in Computer NetworkHitesh Mohapatra
 
Communication Networks basics and very important topic
Communication Networks basics and very important topicCommunication Networks basics and very important topic
Communication Networks basics and very important topicKAUSHIKKADIUM
 
Factors affecting 2g data speed
Factors affecting 2g data speedFactors affecting 2g data speed
Factors affecting 2g data speedAlfred Ongere
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Assignment of wireless c ommunication
Assignment of wireless c ommunicationAssignment of wireless c ommunication
Assignment of wireless c ommunicationvish0110
 
An Approach to Improve the Quality of Service in OFDMA Relay Networks via Re-...
An Approach to Improve the Quality of Service in OFDMA Relay Networks via Re-...An Approach to Improve the Quality of Service in OFDMA Relay Networks via Re-...
An Approach to Improve the Quality of Service in OFDMA Relay Networks via Re-...iosrjce
 
A Dynamic MAC Protocol for WCDMA Wireless Multimedia Networks
A Dynamic MAC Protocol for WCDMA Wireless Multimedia NetworksA Dynamic MAC Protocol for WCDMA Wireless Multimedia Networks
A Dynamic MAC Protocol for WCDMA Wireless Multimedia NetworksIDES Editor
 
Common protocols
Common protocolsCommon protocols
Common protocolsMr SMAK
 
Cooperation versus multiplexing multicast scheduling algorithms for ofdma rel...
Cooperation versus multiplexing multicast scheduling algorithms for ofdma rel...Cooperation versus multiplexing multicast scheduling algorithms for ofdma rel...
Cooperation versus multiplexing multicast scheduling algorithms for ofdma rel...Shakas Technologies
 

Similar to Demand assigned and packet reservation multiple access (20)

wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
Multiple access procedures
Multiple access proceduresMultiple access procedures
Multiple access procedures
 
CDMA Transmitter and Receiver Implementation Using FPGA
CDMA Transmitter and Receiver Implementation Using FPGACDMA Transmitter and Receiver Implementation Using FPGA
CDMA Transmitter and Receiver Implementation Using FPGA
 
WCN U5.pptx
WCN U5.pptxWCN U5.pptx
WCN U5.pptx
 
A STUDY ON THE MAC TECHNOLOGY AND ACCESS NETWORK OVER 3G SYSTEMS
A STUDY ON THE MAC TECHNOLOGY AND ACCESS NETWORK OVER 3G SYSTEMSA STUDY ON THE MAC TECHNOLOGY AND ACCESS NETWORK OVER 3G SYSTEMS
A STUDY ON THE MAC TECHNOLOGY AND ACCESS NETWORK OVER 3G SYSTEMS
 
Multiple Access in Computer Network
Multiple Access in Computer NetworkMultiple Access in Computer Network
Multiple Access in Computer Network
 
Communication Networks basics and very important topic
Communication Networks basics and very important topicCommunication Networks basics and very important topic
Communication Networks basics and very important topic
 
Factors affecting 2g data speed
Factors affecting 2g data speedFactors affecting 2g data speed
Factors affecting 2g data speed
 
Time division multiple access
Time division multiple accessTime division multiple access
Time division multiple access
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Assignment of wireless c ommunication
Assignment of wireless c ommunicationAssignment of wireless c ommunication
Assignment of wireless c ommunication
 
An Approach to Improve the Quality of Service in OFDMA Relay Networks via Re-...
An Approach to Improve the Quality of Service in OFDMA Relay Networks via Re-...An Approach to Improve the Quality of Service in OFDMA Relay Networks via Re-...
An Approach to Improve the Quality of Service in OFDMA Relay Networks via Re-...
 
K017636570
K017636570K017636570
K017636570
 
A Dynamic MAC Protocol for WCDMA Wireless Multimedia Networks
A Dynamic MAC Protocol for WCDMA Wireless Multimedia NetworksA Dynamic MAC Protocol for WCDMA Wireless Multimedia Networks
A Dynamic MAC Protocol for WCDMA Wireless Multimedia Networks
 
Common protocols
Common protocolsCommon protocols
Common protocols
 
Cooperation versus multiplexing multicast scheduling algorithms for ofdma rel...
Cooperation versus multiplexing multicast scheduling algorithms for ofdma rel...Cooperation versus multiplexing multicast scheduling algorithms for ofdma rel...
Cooperation versus multiplexing multicast scheduling algorithms for ofdma rel...
 
TDMA Technology
TDMA TechnologyTDMA Technology
TDMA Technology
 
v unit (1).pptx
v unit (1).pptxv unit (1).pptx
v unit (1).pptx
 
TDMA
TDMATDMA
TDMA
 
ShortPaper
ShortPaperShortPaper
ShortPaper
 

More from GowriLatha1

Filtering in frequency domain
Filtering in frequency domainFiltering in frequency domain
Filtering in frequency domainGowriLatha1
 
Software engineering
Software engineeringSoftware engineering
Software engineeringGowriLatha1
 
Web services & com+ components
Web services & com+ componentsWeb services & com+ components
Web services & com+ componentsGowriLatha1
 
Comparison with Traditional databases
Comparison with Traditional databasesComparison with Traditional databases
Comparison with Traditional databasesGowriLatha1
 
Comparison with Traditional databases
Comparison with Traditional databasesComparison with Traditional databases
Comparison with Traditional databasesGowriLatha1
 
Inter process communication
Inter process communicationInter process communication
Inter process communicationGowriLatha1
 
computer network
computer networkcomputer network
computer networkGowriLatha1
 
Operating System
Operating SystemOperating System
Operating SystemGowriLatha1
 
Data mining query language
Data mining query languageData mining query language
Data mining query languageGowriLatha1
 
Path & application(ds)2
Path & application(ds)2Path & application(ds)2
Path & application(ds)2GowriLatha1
 

More from GowriLatha1 (20)

Filtering in frequency domain
Filtering in frequency domainFiltering in frequency domain
Filtering in frequency domain
 
Software engineering
Software engineeringSoftware engineering
Software engineering
 
Shadow paging
Shadow pagingShadow paging
Shadow paging
 
Multithreading
MultithreadingMultithreading
Multithreading
 
Hive
HiveHive
Hive
 
Web services & com+ components
Web services & com+ componentsWeb services & com+ components
Web services & com+ components
 
Comparison with Traditional databases
Comparison with Traditional databasesComparison with Traditional databases
Comparison with Traditional databases
 
Recovery system
Recovery systemRecovery system
Recovery system
 
Comparison with Traditional databases
Comparison with Traditional databasesComparison with Traditional databases
Comparison with Traditional databases
 
Static analysis
Static analysisStatic analysis
Static analysis
 
Hema dm
Hema dmHema dm
Hema dm
 
Data reduction
Data reductionData reduction
Data reduction
 
Inter process communication
Inter process communicationInter process communication
Inter process communication
 
computer network
computer networkcomputer network
computer network
 
Operating System
Operating SystemOperating System
Operating System
 
Data mining query language
Data mining query languageData mining query language
Data mining query language
 
Enterprice java
Enterprice javaEnterprice java
Enterprice java
 
Ethernet
EthernetEthernet
Ethernet
 
Java script
Java scriptJava script
Java script
 
Path & application(ds)2
Path & application(ds)2Path & application(ds)2
Path & application(ds)2
 

Recently uploaded

Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 

Recently uploaded (20)

Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 

Demand assigned and packet reservation multiple access

  • 1. BY G.GOWRILATHA,M.Sc(Info Tech) Department Of CS & IT Nadar Saraswathi College Of Arts and Science, Theni.
  • 2. Demand Assigned Multiple Access • Demand Assigned Multiple Access (DAMA) is a name for a central allocation of network resources. it is an operation process that lies above multiple access processes, because it is an administrative, not a technical function. •Demand Assigned Multiple Access (DAMA) is a name for a central allocation of network resources. DAMA is one of the two main techniques for allocating channels to users. • The most multiple-access systems use DAMA in which the available channels are allocated on an as required basis to users. • DAMA is a technique used to assign satellite channels to on an as request basis.
  • 3. Demand Assigned Multiple Access (DAMA) is a technology used to assign a channel to clients that don't need to use it constantly. DAMA systems assign communication channels based on news issued from user terminals to a network security system. Channels are typically a pair of carrier frequencies (one for transmit and one for receive), but can be other fixed bandwidth resources such as timeslots in a TDMA burst plan or even physical party line channels. Once a channel is allocated to a given pair of nodes, it is not available to other users in the network until their session is finished.
  • 4. A. Packet Reservation Multiple Access (PRMA) refers to a multiple access strategy with frames of a fixed number of slots. B. In case a terminal contains a set of data packets or speech segments to deliver, it competes to gain access in any free slot. C. In PRMA, adjacent cells make use of distinct carrier frequencies in line with a cellular reuse plan. The fundamental process of PRMA includes occupying a time slot only at the time of speech talkspurts and releasing the channel at the time of silence periods.
  • 5. PRMA facts: TDMA with slotted ALOHA reservation system Source rates are 32 kbit/sec Frame Duration is 16 msec ( 62.5 frames/sec) 20 slots per frame Channel bit rate is 720 kbit/sec and bandwidth is 720 khz 576 bits per slot (contains 64 bit overhead) Packet dropping rate is 1% Supports data and voice
  • 6. Medium Access Control (MAC) Protocols The role of the MAC protocol [1] is to determine when a node is allowed to transmit its packets. It typically controls all access to the medium. Wireless MAC protocols have been studied extensively since the 1970s. The initial protocols were developed for data and satellite communications. The two major objectives of a multiple access protocol are maximization of the channel capacity utilization and minimization of latency between a station deciding to transmit and able to transmit.
  • 7. High throughput- A high network throughput, or high efficiency, is achieved when the protocol has low overhead and low collision probability. It is also equivalent to low frame delay. Scalability- The network throughput should be unaffected by increases in number of nodes. Naturally, the per-node throughput decreases as the number of active nodes increases but ideally, this should follow a linear decrease. Topology independence- The network throughput should be transparent to network topology changes. In high mobility scenarios, where the rate of nodes joining and leaving the network is high, as well as node velocity, the protocol should be able to maintain a high network throughput. Fairness- The protocol should not give priority to particular nodes over the others. Quality of Service (QoS) - When multiple traffic classes are defined, the protocol should be able to manage the bandwidth resources in order to assign different priorities to real-time and besteffort nodes.
  • 9. CDMA/PRMA Joint Code Division Multiple Access Packet Reservation Multiple Access (CDMA/PRMA) protocol was introduced as a candidate for an uplink protocol for third generation mobile communication. Packet CDMA the time axis is unslotted and packets are granted random access to the channel, in Joint CDMA/PRMA the time axis is slotted, with the slots grouped into frames (as in PRMA) and the access of packets to the channel