SlideShare a Scribd company logo
1 of 20
PROFESSIONAL COMMUNICATION
(BPC-251)
SESSION 2017-18
PRESENTATION
ON
TOPIC- “Multiple Access Control Protocol”
SUBMITTED TO- SUBMITTED BY-
MR. AMRITANSH MISHRA NITISH AWASTHI
Assistant Professor B.TECH.CS
Roll No. 1710303009
INVERTIS UNIVERSITY BAREILLY
Established by Govt. of U.P. u/s 2f of UGC Act, 1956 vide U.P. Act 22 of 2010.
 Protocol is a set of rules that govern “Data
Communication”.
 Multiple access method allows several terminals
connected to the same multi-point transmission
medium (Broadcast network) to transmit over it
and to share its capacity.
Examples of shared physical media are wireless
networks, bus networks, ring networks and
point-to-point links operating in half-duplex
mode.
Issues in Multiple Access Control Protocol:
 WHO is going to use the channel?
 WHEN the channel is going to be used?
 For HOW much time the channel is used?
Random
Access
Protocol
Aloha
CSMA/CD
CSMA/CA
Control
Access
Protocol
Reservation
Pooling
Token
Passing
Channelization
Protocol
FDMA
TDMA
CDMA
 Single channel is shared by large number of hosts.
 Each channel can transmit whenever it desires
(check medium is idle or busy).
 No Scheduled time for a station to transmit , that’s
why these methods are called “Random access”.
 Anytime you can transmit data.
 Collision occurs, Acknowledgement facility available to know
whether data is successfully transmitted or failed.
 No need for collision detection.
 If failed than after random amount of time (Back off time)
retransmit, if not get ACK.
There are two versions of Aloha System.
 Pure Aloha
 Slotted Aloha
 ‘Sense before transmit’ or ‘ Listen before talk’.
 Stations are connected to shared channel
 In wireless communication, when a receiver is within the range of
two active transmitters.
The resulting signal will get garbled (Most of the time).
 CSMA/CD is unsuitable in this situation. There are so called
“Hidden Station Problem” and “Exposed Station Problem” that
can be solved by CSMA/CA.
CSMA/CA
 Sender Sends a short frame called “Request to Send” (RTS) to
destination.
 Destination responds with a short “Clear to Send” (CTS) frame.
General Principle these Protocol follow:
 Stations consult each other
 Stations cannot send, until it is authorized by others.
Methods-
 Reservation
 Polling Method
 Token Passing Method
Features:
 Time is divided into intervals.
In each interval Station makes a reservation, before sending
data.
 If there are ‘N’ stations in the System, there are exactly ‘N’
reservation mini slots in the reservation frame.
Features:
 Works with Topologies.
 In this, one device is designated as Primary
Station; and other devices are Secondary
Station.
It has two functions:
 Select function: It is used whenever Primary
has something to send.
 Polling function: It is used when Primary
wants to receive data.
Features:
 In this, the stations in a network are
organized in a logical Ring.
 In this method, a special packet called a
Token circulates through ring.
 The possession of the token gives the station
right to access the channel and sends its
data.
It is a Multiple-access method in which the
available bandwidth of a link is shared in
‘Time’, ‘Frequency’ or ‘Through Code’.
Methods:
 TDMA (Time Division Multiple Access)
 FDMA (Frequency Division Multiple Access)
 CDMA (Code Division Multiple Access)
It is a process of dividing one channel or
bandwidth into multiple individual band for
use by Single User.
Ex- AMPS (1G Cellular Networks)
It divides band into time Slot.
Ex- GSM (2G Cellular networks-Europe)
 Used in Several wireless broadcast channels
(cellular, satellite, etc) standards
 Same bandwidth is occupied by all the users,
however they are all assigned own “chipping”
sequence (i.e., code) to encode data.
 encoded signal = (original data) X (chipping
sequence)
Multiple Access Control Protocol

More Related Content

What's hot

Media Access and Internetworking
Media Access and InternetworkingMedia Access and Internetworking
Media Access and InternetworkingN.Jagadish Kumar
 
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..Chandra Meena
 
Mac protocols of adhoc network
Mac protocols of adhoc networkMac protocols of adhoc network
Mac protocols of adhoc networkshashi712
 
seminar report on multiple access control protocol submitted by munesh
seminar report on multiple access control protocol submitted by munesh seminar report on multiple access control protocol submitted by munesh
seminar report on multiple access control protocol submitted by munesh meenamunesh
 
Controlled Access Protocols
Controlled Access ProtocolsControlled Access Protocols
Controlled Access ProtocolsPruthviraj Konu
 
3.Medium Access Control
3.Medium Access Control3.Medium Access Control
3.Medium Access ControlSonali Chauhan
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocolsbarodia_1437
 
M.A.C (Medium Access Control)
M.A.C (Medium Access Control)M.A.C (Medium Access Control)
M.A.C (Medium Access Control)JaironLanda
 
Mac adhoc (1)
Mac adhoc (1)Mac adhoc (1)
Mac adhoc (1)hinalala
 
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2Sushant Kushwaha
 
Lan access control methods
Lan access control methodsLan access control methods
Lan access control methodsbwire sedrick
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocaltes31
 
Medium Access PROTOCOL b yENGR. FAWAD KHAN UET BANNU KP PAKISTAN
Medium Access PROTOCOL b yENGR.  FAWAD KHAN UET BANNU KP PAKISTANMedium Access PROTOCOL b yENGR.  FAWAD KHAN UET BANNU KP PAKISTAN
Medium Access PROTOCOL b yENGR. FAWAD KHAN UET BANNU KP PAKISTANirfan sami
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocolsMenaga Selvaraj
 

What's hot (20)

Multiple access protocol
Multiple access protocolMultiple access protocol
Multiple access protocol
 
Media Access and Internetworking
Media Access and InternetworkingMedia Access and Internetworking
Media Access and Internetworking
 
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..
 
Mac protocols of adhoc network
Mac protocols of adhoc networkMac protocols of adhoc network
Mac protocols of adhoc network
 
seminar report on multiple access control protocol submitted by munesh
seminar report on multiple access control protocol submitted by munesh seminar report on multiple access control protocol submitted by munesh
seminar report on multiple access control protocol submitted by munesh
 
Controlled Access Protocols
Controlled Access ProtocolsControlled Access Protocols
Controlled Access Protocols
 
3.Medium Access Control
3.Medium Access Control3.Medium Access Control
3.Medium Access Control
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocols
 
M.A.C (Medium Access Control)
M.A.C (Medium Access Control)M.A.C (Medium Access Control)
M.A.C (Medium Access Control)
 
Mac adhoc (1)
Mac adhoc (1)Mac adhoc (1)
Mac adhoc (1)
 
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2
 
Lan access control methods
Lan access control methodsLan access control methods
Lan access control methods
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
 
clas 8
clas 8clas 8
clas 8
 
10 high speedla-ns
10 high speedla-ns10 high speedla-ns
10 high speedla-ns
 
Mac adhoc
Mac adhocMac adhoc
Mac adhoc
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
 
Medium Access PROTOCOL b yENGR. FAWAD KHAN UET BANNU KP PAKISTAN
Medium Access PROTOCOL b yENGR.  FAWAD KHAN UET BANNU KP PAKISTANMedium Access PROTOCOL b yENGR.  FAWAD KHAN UET BANNU KP PAKISTAN
Medium Access PROTOCOL b yENGR. FAWAD KHAN UET BANNU KP PAKISTAN
 
Lecture 6
Lecture 6Lecture 6
Lecture 6
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
 

Similar to Multiple Access Control Protocol

Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptxComputer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptxPravinbhargav
 
Introduction to networking
Introduction to networkingIntroduction to networking
Introduction to networkingIdealGraphics
 
Computer networks lan
Computer networks lanComputer networks lan
Computer networks lanDeepak John
 
9 multiple access
9 multiple access9 multiple access
9 multiple accessampas03
 
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETsSimulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETsIOSR Journals
 
The mac layer
The mac layerThe mac layer
The mac layeraazamk
 
Multiole acccess
Multiole acccessMultiole acccess
Multiole acccessjasscheema
 
QoS -Aware Spectrum Sharing for Multi-Channel Vehicular Network
QoS -Aware Spectrum Sharing for Multi-Channel Vehicular NetworkQoS -Aware Spectrum Sharing for Multi-Channel Vehicular Network
QoS -Aware Spectrum Sharing for Multi-Channel Vehicular NetworkIJSRD
 
WHAT IS MAC-1 presentation for information .pptx
WHAT IS MAC-1 presentation for information  .pptxWHAT IS MAC-1 presentation for information  .pptx
WHAT IS MAC-1 presentation for information .pptxSaqlainKhan39
 
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...IJECEIAES
 
Communication Networks basics and very important topic
Communication Networks basics and very important topicCommunication Networks basics and very important topic
Communication Networks basics and very important topicKAUSHIKKADIUM
 
Lecture 07
Lecture 07Lecture 07
Lecture 07Chyon Ju
 
Mac protocol for wmn
Mac protocol for wmnMac protocol for wmn
Mac protocol for wmnmmjalbiaty
 
Study on Performance of Simulation Analysis on Multimedia Network
Study on Performance of Simulation Analysis on Multimedia NetworkStudy on Performance of Simulation Analysis on Multimedia Network
Study on Performance of Simulation Analysis on Multimedia NetworkIRJET Journal
 
Cm chou 20050124
Cm chou 20050124Cm chou 20050124
Cm chou 20050124hinalala
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communicationpanditadesh123
 

Similar to Multiple Access Control Protocol (20)

Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptxComputer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptx
 
Introduction to networking
Introduction to networkingIntroduction to networking
Introduction to networking
 
ShortPaper
ShortPaperShortPaper
ShortPaper
 
Computer networks lan
Computer networks lanComputer networks lan
Computer networks lan
 
9 multiple access
9 multiple access9 multiple access
9 multiple access
 
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETsSimulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
 
The mac layer
The mac layerThe mac layer
The mac layer
 
Multiole acccess
Multiole acccessMultiole acccess
Multiole acccess
 
QoS -Aware Spectrum Sharing for Multi-Channel Vehicular Network
QoS -Aware Spectrum Sharing for Multi-Channel Vehicular NetworkQoS -Aware Spectrum Sharing for Multi-Channel Vehicular Network
QoS -Aware Spectrum Sharing for Multi-Channel Vehicular Network
 
WHAT IS MAC-1 presentation for information .pptx
WHAT IS MAC-1 presentation for information  .pptxWHAT IS MAC-1 presentation for information  .pptx
WHAT IS MAC-1 presentation for information .pptx
 
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
 
Communication Networks basics and very important topic
Communication Networks basics and very important topicCommunication Networks basics and very important topic
Communication Networks basics and very important topic
 
Unit_3_WSN.pptx
Unit_3_WSN.pptxUnit_3_WSN.pptx
Unit_3_WSN.pptx
 
Lecture 07
Lecture 07Lecture 07
Lecture 07
 
dcn.pdf
dcn.pdfdcn.pdf
dcn.pdf
 
Mac protocol for wmn
Mac protocol for wmnMac protocol for wmn
Mac protocol for wmn
 
Study on Performance of Simulation Analysis on Multimedia Network
Study on Performance of Simulation Analysis on Multimedia NetworkStudy on Performance of Simulation Analysis on Multimedia Network
Study on Performance of Simulation Analysis on Multimedia Network
 
Cm chou 20050124
Cm chou 20050124Cm chou 20050124
Cm chou 20050124
 
Gsm By Aziz
Gsm By AzizGsm By Aziz
Gsm By Aziz
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communication
 

Recently uploaded

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 

Recently uploaded (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 

Multiple Access Control Protocol

  • 1. PROFESSIONAL COMMUNICATION (BPC-251) SESSION 2017-18 PRESENTATION ON TOPIC- “Multiple Access Control Protocol” SUBMITTED TO- SUBMITTED BY- MR. AMRITANSH MISHRA NITISH AWASTHI Assistant Professor B.TECH.CS Roll No. 1710303009 INVERTIS UNIVERSITY BAREILLY Established by Govt. of U.P. u/s 2f of UGC Act, 1956 vide U.P. Act 22 of 2010.
  • 2.  Protocol is a set of rules that govern “Data Communication”.  Multiple access method allows several terminals connected to the same multi-point transmission medium (Broadcast network) to transmit over it and to share its capacity. Examples of shared physical media are wireless networks, bus networks, ring networks and point-to-point links operating in half-duplex mode.
  • 3. Issues in Multiple Access Control Protocol:  WHO is going to use the channel?  WHEN the channel is going to be used?  For HOW much time the channel is used?
  • 5.  Single channel is shared by large number of hosts.  Each channel can transmit whenever it desires (check medium is idle or busy).  No Scheduled time for a station to transmit , that’s why these methods are called “Random access”.
  • 6.  Anytime you can transmit data.  Collision occurs, Acknowledgement facility available to know whether data is successfully transmitted or failed.  No need for collision detection.  If failed than after random amount of time (Back off time) retransmit, if not get ACK. There are two versions of Aloha System.  Pure Aloha  Slotted Aloha
  • 7.
  • 8.
  • 9.  ‘Sense before transmit’ or ‘ Listen before talk’.  Stations are connected to shared channel
  • 10.
  • 11.  In wireless communication, when a receiver is within the range of two active transmitters. The resulting signal will get garbled (Most of the time).  CSMA/CD is unsuitable in this situation. There are so called “Hidden Station Problem” and “Exposed Station Problem” that can be solved by CSMA/CA. CSMA/CA  Sender Sends a short frame called “Request to Send” (RTS) to destination.  Destination responds with a short “Clear to Send” (CTS) frame.
  • 12. General Principle these Protocol follow:  Stations consult each other  Stations cannot send, until it is authorized by others. Methods-  Reservation  Polling Method  Token Passing Method
  • 13. Features:  Time is divided into intervals. In each interval Station makes a reservation, before sending data.  If there are ‘N’ stations in the System, there are exactly ‘N’ reservation mini slots in the reservation frame.
  • 14. Features:  Works with Topologies.  In this, one device is designated as Primary Station; and other devices are Secondary Station. It has two functions:  Select function: It is used whenever Primary has something to send.  Polling function: It is used when Primary wants to receive data.
  • 15. Features:  In this, the stations in a network are organized in a logical Ring.  In this method, a special packet called a Token circulates through ring.  The possession of the token gives the station right to access the channel and sends its data.
  • 16. It is a Multiple-access method in which the available bandwidth of a link is shared in ‘Time’, ‘Frequency’ or ‘Through Code’. Methods:  TDMA (Time Division Multiple Access)  FDMA (Frequency Division Multiple Access)  CDMA (Code Division Multiple Access)
  • 17. It is a process of dividing one channel or bandwidth into multiple individual band for use by Single User. Ex- AMPS (1G Cellular Networks)
  • 18. It divides band into time Slot. Ex- GSM (2G Cellular networks-Europe)
  • 19.  Used in Several wireless broadcast channels (cellular, satellite, etc) standards  Same bandwidth is occupied by all the users, however they are all assigned own “chipping” sequence (i.e., code) to encode data.  encoded signal = (original data) X (chipping sequence)