SlideShare a Scribd company logo
1 of 9
Download to read offline
Communication
Networks
Access Control
in datalink layer
[Random Access Methods]
Part 3 – CSMA – CA
Overview of Module - 2
• Framing
• What is Framing
• Types of Framing
• Methods for identifying the
boundaries
• Flow Control
• What is flow control
• Types of flow control
• Access Control
• What is access control
• Types of access control
• Ethernet – IEEE 802.3
• Evolution of Ethernet
• Frame Format of Ethernet
• Access Control for Ethernet
• Performance Evaluation of Ethernet
• WLAN – IEEE 802.11
• Architecture
• Bluetooth
• WIFI
• Zigbee
• 6LowPan
• Network Layer Services
• IPv4
• Packet switching
• Network Layer Protocols
Visit www.youtube.com/GURUKULA for Lecture Videos
Classification of Access Control Mechanism
Visit www.youtube.com/GURUKULA for Lecture Videos
1.D – CSMA – CA [Collision Avoidance]
• In CSMA – CD the station senses the channel only for that
instant and decides the idleness of the channel.
• In this protocol the station, before sending the data senses that ,
is there any other transmissions from other stations for a
particular PERIOD.
• These periods are measured by a special timers called as
Network Allocation Vector (NAV)
• The operation remains as same as the CSMA – CD except the
waiting time. There are 2 timers involved in this process.
➢DIFS – Distributed Coordinated Function Inter Frame Space.
➢SIFS – Short Inter Frame Space.
Important Timers in CSMA - CA
• If station finds that the medium is continuously idle for
Distributed Coordinated Function Inter Frame Space (DIFS)
duration, it is then permitted to transmit a frame. If the
channel is found busy during the DIFS interval, the station
should defer its transmission.
• Short Inter Frame Space (SIFS), is the amount of time in micro
seconds required for a wireless interface to process a
received frame and to respond with a response frame
Visit www.youtube.com/GURUKULA for Lecture Videos
Flow diagram of CSMA - CA
• Before sending a frame the source station
senses the channel for a period of DIFS.
• If the channel is found idle for the entire period
of DIFS then the sender sends the control
frame RTS “Request To Send”
• The receiver takes some time for processing the
received frame and to respond this time is
referred to as SIFS. Then the receiver responds
with the control frame CTS “Clear To Send”
• Other stations are not allowed to sense the
channel during this period
CSMA – CA – Work Flow
Visit www.youtube.com/GURUKULA for Lecture Videos
Session Summary
• Access Control [Similar to people accessing the cell tower]
• Random Access Methods [Checks the channel randomly,
Idle – Transmit, Busy – Check again]
• ALOHA [Pure ALOHA, Slotted ALOHA]
• CSMA [ 1 Persistent, n Persistent, p Persistent]
• CSMA – CD [widely used in Ethernet]
• CSMA – CA [widely used in WLAN]
Visit www.youtube.com/GURUKULA for Lecture Videos
References:
• Behrouz A. Forouzan, ―Data communication and Networking, Fifth
Edition, Tata McGraw – Hill, 2013
• Larry L. Peterson, Bruce S. Davie, ―Computer Networks: A Systems
Approach, Fifth Edition, Morgan Kaufmann Publishers, 2011.
• Few online References (Will be Mentioned in the description Section)
Thank You…

More Related Content

What's hot

3. overview of data communication part 2
3. overview of data communication   part 23. overview of data communication   part 2
3. overview of data communication part 2JAIGANESH SEKAR
 
2.3 access control random access methods - part 1
2.3 access control   random access methods - part 12.3 access control   random access methods - part 1
2.3 access control random access methods - part 1JAIGANESH SEKAR
 
6. data link layer physical addressing
6. data link layer   physical addressing6. data link layer   physical addressing
6. data link layer physical addressingJAIGANESH SEKAR
 
1. introduction to communication networks subject introduction
1. introduction to communication networks   subject introduction1. introduction to communication networks   subject introduction
1. introduction to communication networks subject introductionJAIGANESH SEKAR
 
2.10 network layer services i pv4
2.10 network layer services  i pv42.10 network layer services  i pv4
2.10 network layer services i pv4JAIGANESH SEKAR
 
7. data link layer error detection and correction codes - parity and checksum
7. data link layer   error detection and correction codes - parity and checksum7. data link layer   error detection and correction codes - parity and checksum
7. data link layer error detection and correction codes - parity and checksumJAIGANESH SEKAR
 
Computer networks unit ii
Computer networks    unit iiComputer networks    unit ii
Computer networks unit iiJAIGANESH SEKAR
 
6590 Research Paper Review: MAC Protocol for Multi-Hop Multicast in Adhoc Net...
6590 Research Paper Review: MAC Protocol for Multi-Hop Multicast in Adhoc Net...6590 Research Paper Review: MAC Protocol for Multi-Hop Multicast in Adhoc Net...
6590 Research Paper Review: MAC Protocol for Multi-Hop Multicast in Adhoc Net...Osama M Askoura
 
Switching concepts Data communication and networks
Switching concepts Data communication and networksSwitching concepts Data communication and networks
Switching concepts Data communication and networksNt Arvind
 
Lecture 2 data link layer 1 v1
Lecture 2 data link layer 1 v1Lecture 2 data link layer 1 v1
Lecture 2 data link layer 1 v1Ronoh Kennedy
 

What's hot (20)

2.1 framing
2.1 framing2.1 framing
2.1 framing
 
3. overview of data communication part 2
3. overview of data communication   part 23. overview of data communication   part 2
3. overview of data communication part 2
 
2.3 access control random access methods - part 1
2.3 access control   random access methods - part 12.3 access control   random access methods - part 1
2.3 access control random access methods - part 1
 
6. data link layer physical addressing
6. data link layer   physical addressing6. data link layer   physical addressing
6. data link layer physical addressing
 
1. introduction to communication networks subject introduction
1. introduction to communication networks   subject introduction1. introduction to communication networks   subject introduction
1. introduction to communication networks subject introduction
 
2.10 network layer services i pv4
2.10 network layer services  i pv42.10 network layer services  i pv4
2.10 network layer services i pv4
 
7. data link layer error detection and correction codes - parity and checksum
7. data link layer   error detection and correction codes - parity and checksum7. data link layer   error detection and correction codes - parity and checksum
7. data link layer error detection and correction codes - parity and checksum
 
Computer networks unit ii
Computer networks    unit iiComputer networks    unit ii
Computer networks unit ii
 
6590 Research Paper Review: MAC Protocol for Multi-Hop Multicast in Adhoc Net...
6590 Research Paper Review: MAC Protocol for Multi-Hop Multicast in Adhoc Net...6590 Research Paper Review: MAC Protocol for Multi-Hop Multicast in Adhoc Net...
6590 Research Paper Review: MAC Protocol for Multi-Hop Multicast in Adhoc Net...
 
Chapter07
Chapter07Chapter07
Chapter07
 
5. protocol layering
5. protocol layering5. protocol layering
5. protocol layering
 
Lan overview
Lan overviewLan overview
Lan overview
 
Transport layer
Transport layerTransport layer
Transport layer
 
Adhoc ppt2
Adhoc ppt2Adhoc ppt2
Adhoc ppt2
 
Adhoc
AdhocAdhoc
Adhoc
 
Day 2.1 lan segmentation
Day 2.1 lan segmentationDay 2.1 lan segmentation
Day 2.1 lan segmentation
 
Switching concepts Data communication and networks
Switching concepts Data communication and networksSwitching concepts Data communication and networks
Switching concepts Data communication and networks
 
Switching
SwitchingSwitching
Switching
 
Lecture 2 data link layer 1 v1
Lecture 2 data link layer 1 v1Lecture 2 data link layer 1 v1
Lecture 2 data link layer 1 v1
 
Mac
MacMac
Mac
 

Similar to 2.3b access control random access methods - part 3 - csma ca

Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocaltes31
 
Unit-2 Media Access Protocols.pdf
Unit-2 Media Access Protocols.pdfUnit-2 Media Access Protocols.pdf
Unit-2 Media Access Protocols.pdfSmtPArunaKumari
 
Using buffer mechanisms in FIBRE CHANNEL technology
Using buffer mechanisms in FIBRE CHANNEL technologyUsing buffer mechanisms in FIBRE CHANNEL technology
Using buffer mechanisms in FIBRE CHANNEL technologyPavel Bankov
 
Media Access Control
Media Access ControlMedia Access Control
Media Access ControlHusnainHadi
 
Thesis Presentation on Renewal theory based 802.15.6 latest.pptx
Thesis Presentation on Renewal theory based 802.15.6 latest.pptxThesis Presentation on Renewal theory based 802.15.6 latest.pptx
Thesis Presentation on Renewal theory based 802.15.6 latest.pptxssuserc02c1f
 
datalinklayer-200201062315 (1).pptx
datalinklayer-200201062315 (1).pptxdatalinklayer-200201062315 (1).pptx
datalinklayer-200201062315 (1).pptxMeenaAnusha1
 
WSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC ProtocolWSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC ProtocolArunChokkalingam
 
MEDIUM-ACCESS CONTROL SUB LAYER.ppt
MEDIUM-ACCESS CONTROL SUB LAYER.pptMEDIUM-ACCESS CONTROL SUB LAYER.ppt
MEDIUM-ACCESS CONTROL SUB LAYER.pptDrTThendralCompSci
 
Wireless Sensor Network
Wireless Sensor Network Wireless Sensor Network
Wireless Sensor Network Dr Praveen Jain
 
Traffic-adaptive Medium Access Protocol
Traffic-adaptive Medium Access ProtocolTraffic-adaptive Medium Access Protocol
Traffic-adaptive Medium Access ProtocolGaurav Chauhan
 
Securing management, control & data plane
Securing management, control & data planeSecuring management, control & data plane
Securing management, control & data planeNetProtocol Xpert
 
Data Link Control Protocols
Data Link Control ProtocolsData Link Control Protocols
Data Link Control ProtocolsTechiNerd
 
integrated and diffrentiated services
 integrated and diffrentiated services integrated and diffrentiated services
integrated and diffrentiated servicesRishabh Gupta
 
Basic switch and switch configuration.pptx
Basic switch and switch configuration.pptxBasic switch and switch configuration.pptx
Basic switch and switch configuration.pptxitwkd
 
Network protocols and vulnerabilities
Network protocols and vulnerabilitiesNetwork protocols and vulnerabilities
Network protocols and vulnerabilitiesG Prachi
 
CCNA Training in Bangalore | Best Networking course in Bangalore
CCNA Training in Bangalore | Best Networking course in BangaloreCCNA Training in Bangalore | Best Networking course in Bangalore
CCNA Training in Bangalore | Best Networking course in BangaloreTIB Academy
 

Similar to 2.3b access control random access methods - part 3 - csma ca (20)

Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
 
Unit-2 Media Access Protocols.pdf
Unit-2 Media Access Protocols.pdfUnit-2 Media Access Protocols.pdf
Unit-2 Media Access Protocols.pdf
 
Data link layer
Data link layerData link layer
Data link layer
 
Using buffer mechanisms in FIBRE CHANNEL technology
Using buffer mechanisms in FIBRE CHANNEL technologyUsing buffer mechanisms in FIBRE CHANNEL technology
Using buffer mechanisms in FIBRE CHANNEL technology
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
 
Thesis Presentation on Renewal theory based 802.15.6 latest.pptx
Thesis Presentation on Renewal theory based 802.15.6 latest.pptxThesis Presentation on Renewal theory based 802.15.6 latest.pptx
Thesis Presentation on Renewal theory based 802.15.6 latest.pptx
 
voip_wireless_wipro.ppt
voip_wireless_wipro.pptvoip_wireless_wipro.ppt
voip_wireless_wipro.ppt
 
datalinklayer-200201062315 (1).pptx
datalinklayer-200201062315 (1).pptxdatalinklayer-200201062315 (1).pptx
datalinklayer-200201062315 (1).pptx
 
WSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC ProtocolWSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC Protocol
 
MEDIUM-ACCESS CONTROL SUB LAYER.ppt
MEDIUM-ACCESS CONTROL SUB LAYER.pptMEDIUM-ACCESS CONTROL SUB LAYER.ppt
MEDIUM-ACCESS CONTROL SUB LAYER.ppt
 
Wireless Sensor Network
Wireless Sensor Network Wireless Sensor Network
Wireless Sensor Network
 
Traffic-adaptive Medium Access Protocol
Traffic-adaptive Medium Access ProtocolTraffic-adaptive Medium Access Protocol
Traffic-adaptive Medium Access Protocol
 
Securing management, control & data plane
Securing management, control & data planeSecuring management, control & data plane
Securing management, control & data plane
 
WiFi - IEEE 802.11
WiFi - IEEE 802.11WiFi - IEEE 802.11
WiFi - IEEE 802.11
 
Data Link Control Protocols
Data Link Control ProtocolsData Link Control Protocols
Data Link Control Protocols
 
Qo s 09-integrated and red
Qo s 09-integrated and redQo s 09-integrated and red
Qo s 09-integrated and red
 
integrated and diffrentiated services
 integrated and diffrentiated services integrated and diffrentiated services
integrated and diffrentiated services
 
Basic switch and switch configuration.pptx
Basic switch and switch configuration.pptxBasic switch and switch configuration.pptx
Basic switch and switch configuration.pptx
 
Network protocols and vulnerabilities
Network protocols and vulnerabilitiesNetwork protocols and vulnerabilities
Network protocols and vulnerabilities
 
CCNA Training in Bangalore | Best Networking course in Bangalore
CCNA Training in Bangalore | Best Networking course in BangaloreCCNA Training in Bangalore | Best Networking course in Bangalore
CCNA Training in Bangalore | Best Networking course in Bangalore
 

More from JAIGANESH SEKAR

Ec8551 communication networks mcq question bank
Ec8551   communication networks mcq question bank Ec8551   communication networks mcq question bank
Ec8551 communication networks mcq question bank JAIGANESH SEKAR
 
2.10b network layer services i pv4 - variable length subnetting
2.10b network layer services  i pv4 - variable length subnetting2.10b network layer services  i pv4 - variable length subnetting
2.10b network layer services i pv4 - variable length subnettingJAIGANESH SEKAR
 
2.10a network layer services i pv4 - fixed length subnetting
2.10a network layer services  i pv4 - fixed length subnetting2.10a network layer services  i pv4 - fixed length subnetting
2.10a network layer services i pv4 - fixed length subnettingJAIGANESH SEKAR
 
9. data link layer error correction codes - hamming code
9. data link layer   error correction codes - hamming code9. data link layer   error correction codes - hamming code
9. data link layer error correction codes - hamming codeJAIGANESH SEKAR
 
8. data link layer error detection and correction codes - crc
8. data link layer   error detection and correction codes - crc8. data link layer   error detection and correction codes - crc
8. data link layer error detection and correction codes - crcJAIGANESH SEKAR
 
2. overview of data communication part 1
2. overview of data communication   part 12. overview of data communication   part 1
2. overview of data communication part 1JAIGANESH SEKAR
 
Ever Noticed the Rings on Your Head Phone Jack - Explainer
Ever Noticed the Rings on Your Head Phone Jack - ExplainerEver Noticed the Rings on Your Head Phone Jack - Explainer
Ever Noticed the Rings on Your Head Phone Jack - ExplainerJAIGANESH SEKAR
 
Minimum Shift Keying - MSK Full Derivation
Minimum Shift Keying - MSK Full DerivationMinimum Shift Keying - MSK Full Derivation
Minimum Shift Keying - MSK Full DerivationJAIGANESH SEKAR
 
4.5 equalizers and its types
4.5   equalizers and its types4.5   equalizers and its types
4.5 equalizers and its typesJAIGANESH SEKAR
 
4.4 diversity combining techniques
4.4   diversity combining techniques4.4   diversity combining techniques
4.4 diversity combining techniquesJAIGANESH SEKAR
 
4.2 concepts of diversity
4.2   concepts of diversity4.2   concepts of diversity
4.2 concepts of diversityJAIGANESH SEKAR
 
4.1 effects of multipth propagation
4.1   effects of multipth propagation4.1   effects of multipth propagation
4.1 effects of multipth propagationJAIGANESH SEKAR
 
3.3 modulation formats msk and gmsk
3.3 modulation formats   msk and gmsk3.3 modulation formats   msk and gmsk
3.3 modulation formats msk and gmskJAIGANESH SEKAR
 

More from JAIGANESH SEKAR (14)

Ec8551 communication networks mcq question bank
Ec8551   communication networks mcq question bank Ec8551   communication networks mcq question bank
Ec8551 communication networks mcq question bank
 
2.10b network layer services i pv4 - variable length subnetting
2.10b network layer services  i pv4 - variable length subnetting2.10b network layer services  i pv4 - variable length subnetting
2.10b network layer services i pv4 - variable length subnetting
 
2.10a network layer services i pv4 - fixed length subnetting
2.10a network layer services  i pv4 - fixed length subnetting2.10a network layer services  i pv4 - fixed length subnetting
2.10a network layer services i pv4 - fixed length subnetting
 
9. data link layer error correction codes - hamming code
9. data link layer   error correction codes - hamming code9. data link layer   error correction codes - hamming code
9. data link layer error correction codes - hamming code
 
8. data link layer error detection and correction codes - crc
8. data link layer   error detection and correction codes - crc8. data link layer   error detection and correction codes - crc
8. data link layer error detection and correction codes - crc
 
2. overview of data communication part 1
2. overview of data communication   part 12. overview of data communication   part 1
2. overview of data communication part 1
 
Ever Noticed the Rings on Your Head Phone Jack - Explainer
Ever Noticed the Rings on Your Head Phone Jack - ExplainerEver Noticed the Rings on Your Head Phone Jack - Explainer
Ever Noticed the Rings on Your Head Phone Jack - Explainer
 
Minimum Shift Keying - MSK Full Derivation
Minimum Shift Keying - MSK Full DerivationMinimum Shift Keying - MSK Full Derivation
Minimum Shift Keying - MSK Full Derivation
 
4.5 equalizers and its types
4.5   equalizers and its types4.5   equalizers and its types
4.5 equalizers and its types
 
4.4 diversity combining techniques
4.4   diversity combining techniques4.4   diversity combining techniques
4.4 diversity combining techniques
 
4.3 types of diversity
4.3  types of diversity4.3  types of diversity
4.3 types of diversity
 
4.2 concepts of diversity
4.2   concepts of diversity4.2   concepts of diversity
4.2 concepts of diversity
 
4.1 effects of multipth propagation
4.1   effects of multipth propagation4.1   effects of multipth propagation
4.1 effects of multipth propagation
 
3.3 modulation formats msk and gmsk
3.3 modulation formats   msk and gmsk3.3 modulation formats   msk and gmsk
3.3 modulation formats msk and gmsk
 

Recently uploaded

chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 

Recently uploaded (20)

chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 

2.3b access control random access methods - part 3 - csma ca

  • 1. Communication Networks Access Control in datalink layer [Random Access Methods] Part 3 – CSMA – CA
  • 2. Overview of Module - 2 • Framing • What is Framing • Types of Framing • Methods for identifying the boundaries • Flow Control • What is flow control • Types of flow control • Access Control • What is access control • Types of access control • Ethernet – IEEE 802.3 • Evolution of Ethernet • Frame Format of Ethernet • Access Control for Ethernet • Performance Evaluation of Ethernet • WLAN – IEEE 802.11 • Architecture • Bluetooth • WIFI • Zigbee • 6LowPan • Network Layer Services • IPv4 • Packet switching • Network Layer Protocols Visit www.youtube.com/GURUKULA for Lecture Videos
  • 3. Classification of Access Control Mechanism Visit www.youtube.com/GURUKULA for Lecture Videos
  • 4. 1.D – CSMA – CA [Collision Avoidance] • In CSMA – CD the station senses the channel only for that instant and decides the idleness of the channel. • In this protocol the station, before sending the data senses that , is there any other transmissions from other stations for a particular PERIOD. • These periods are measured by a special timers called as Network Allocation Vector (NAV) • The operation remains as same as the CSMA – CD except the waiting time. There are 2 timers involved in this process. ➢DIFS – Distributed Coordinated Function Inter Frame Space. ➢SIFS – Short Inter Frame Space.
  • 5. Important Timers in CSMA - CA • If station finds that the medium is continuously idle for Distributed Coordinated Function Inter Frame Space (DIFS) duration, it is then permitted to transmit a frame. If the channel is found busy during the DIFS interval, the station should defer its transmission. • Short Inter Frame Space (SIFS), is the amount of time in micro seconds required for a wireless interface to process a received frame and to respond with a response frame Visit www.youtube.com/GURUKULA for Lecture Videos
  • 6. Flow diagram of CSMA - CA • Before sending a frame the source station senses the channel for a period of DIFS. • If the channel is found idle for the entire period of DIFS then the sender sends the control frame RTS “Request To Send” • The receiver takes some time for processing the received frame and to respond this time is referred to as SIFS. Then the receiver responds with the control frame CTS “Clear To Send” • Other stations are not allowed to sense the channel during this period
  • 7. CSMA – CA – Work Flow Visit www.youtube.com/GURUKULA for Lecture Videos
  • 8. Session Summary • Access Control [Similar to people accessing the cell tower] • Random Access Methods [Checks the channel randomly, Idle – Transmit, Busy – Check again] • ALOHA [Pure ALOHA, Slotted ALOHA] • CSMA [ 1 Persistent, n Persistent, p Persistent] • CSMA – CD [widely used in Ethernet] • CSMA – CA [widely used in WLAN] Visit www.youtube.com/GURUKULA for Lecture Videos
  • 9. References: • Behrouz A. Forouzan, ―Data communication and Networking, Fifth Edition, Tata McGraw – Hill, 2013 • Larry L. Peterson, Bruce S. Davie, ―Computer Networks: A Systems Approach, Fifth Edition, Morgan Kaufmann Publishers, 2011. • Few online References (Will be Mentioned in the description Section) Thank You…