This document summarizes multiple access protocols used in computer networks at the data link layer. It discusses random access protocols like CSMA/CD and CSMA/CA that allow nodes to transmit randomly. It also covers controlled access protocols like reservation, polling, and token passing that require nodes to get permission before transmitting. Finally, it describes channelization techniques for sharing bandwidth, including FDMA, TDMA, and CDMA that divide the channel by frequency, time, or code respectively.
Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...Soumen Santra
Media Access Protocol (MAC)
Carrier Sense Multiple Access With Collision Detection (CSMA/CD)
Definition
Introduction
Features
Principle
Flowchart
Collision Mechanism
COLLISION DETECTION METHODS
Slot Time
Non-Persistent CSMA/CD
Efficiency
Advantages
Disadvantages
Detail Discussion with Mathematical Formula
Channelization is a multiple-access method in which the available bandwidth of a link is shared in time, frequency, or through code, between different stations. The three channelization protocols are FDMA, TDMA, and CDMA
Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...Soumen Santra
Media Access Protocol (MAC)
Carrier Sense Multiple Access With Collision Detection (CSMA/CD)
Definition
Introduction
Features
Principle
Flowchart
Collision Mechanism
COLLISION DETECTION METHODS
Slot Time
Non-Persistent CSMA/CD
Efficiency
Advantages
Disadvantages
Detail Discussion with Mathematical Formula
Channelization is a multiple-access method in which the available bandwidth of a link is shared in time, frequency, or through code, between different stations. The three channelization protocols are FDMA, TDMA, and CDMA
In the seven-layer OSI model of computer networking, media access control (MAC) data communication protocol is a sublayer of the data link layer (layer 2). The MAC sublayer provides addressing and channel access control mechanisms that make it possible for several terminals or network nodes to communicate within a multiple access network that incorporates a shared medium, e.g. an Ethernet network. The hardware that implements the MAC is referred to as a media access controller.
The MAC sublayer acts as an interface between the logical link control (LLC) sublayer and the network's physical layer. The MAC layer emulates a full-duplex logical communication channel in a multi-point network. This channel may provide unicast, multicast or broadcast communication service.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
In the seven-layer OSI model of computer networking, media access control (MAC) data communication protocol is a sublayer of the data link layer (layer 2). The MAC sublayer provides addressing and channel access control mechanisms that make it possible for several terminals or network nodes to communicate within a multiple access network that incorporates a shared medium, e.g. an Ethernet network. The hardware that implements the MAC is referred to as a media access controller.
The MAC sublayer acts as an interface between the logical link control (LLC) sublayer and the network's physical layer. The MAC layer emulates a full-duplex logical communication channel in a multi-point network. This channel may provide unicast, multicast or broadcast communication service.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
3. 1. Introduction
Data Link layer sublayers:
Data Link Control
• Framing, flow control, error control, protocols.
Medium Access Resolution
• Medium access control
Data Link layer
Data Link Control
Multiple-Access Resolution
3
5. 2. Random Access
Also called contention method
no station has control over another.
No station permits/does not permit, another station to
send.
At each instance, a station that has data to send uses
a procedure defined by the protocol to make a
decision on whether or not to send.
It’s a random method because the transmission
is random among the stations.
It’s called a contention method because stations
compete with one another to access the medium
5
6. 2.1 CSMA/CD
Carrier Sense Multiple Access with Collision
Detection (CSMA/CD)
Control access to the medium
When a node wants to transmit information, it
first “listens” to the network (or medium).
If no one is transmitting over the network, the node
begins transmission
It is however possible for two nodes to transmit
simultaneously thinking that the network is clear
6
7. CSMA/CD
When two nodes transmit at the same time, a
collision occurs
The first station to detect the collision sends a
jamming signal into the network
Both nodes back off, wait for a random period of
time and then re-transmit
7
9. Minimum Frame Size
Any station must discover collision before ending
transmission, because stations don’t listen after
finishing transmission
If a station succeeds to send the last bit of a
frame without collision, it considers the frame’s
been sent successfully and discards it from
buffer, and starts handling the next frame.
Time required to transmit a frame, Tfr , must be
as much as at least twice the propagation time,
TP , on the medium
9
10. Minimum Frame Size
Assume that the involved stations, A and B, are situated
at the end of the medium
The signal needs to propagate from A to B in TP, and if a
collision takes place at B, another TP is required for the
signal to propagate to A
So in order to discover the collision, A needs to be in
sending state after at least 2 x TP
10
Packet almost at
B at TP - ε
Packet starts at
time 0
Collision at time
TP
Noise burst gets back
to A at 2TP
11. Minimum Frame Size
1st bit collision
At t1: A starts sending
At t2: C starts sending
At t3: C detects collision and aborts
At t3: A detects collision and aborts 11
12. Minimum Frame Size
Exercise
A network using CSMA/CD has a bandwidth of 10
Mbps. If the maximum propagation time (including all
sort of delay and ignoring the time needed to send a
jamming signal) is 25,6 s, what is the minimum size
of the frame?
Solution
• Tf = 2 * Tp = 51.2 s
• the minimum frame length =
10 x 106 x 51.2 x 10-6 =
512 bits (64 bytes)
This is the minimum frame length of a traditional
Ethernet frame 12
13. Exercise
A network using CSMA/CD has a bandwidth of 100
Mbps. If the maximum propagation time (including
all sort of delay and ignoring the time needed to
send a jamming signal) is 20,0 s, what is the
minimum size of the frame?
13
14. 2.2 CSMA/CA
Carrier Sense Multiple Access with Collision
Avoidance
Control access to the medium in wireless networks
In wireless networks, collision detection is not
effective
Collision avoidance is used
Collision avoidance strategies:
Inter-Frame Space (IFS)
Contention Window
Acknowledgement
14
15. Inter-frame space (IFS)
A station senses the medium till it becomes free
(ie, not busy),
next it waits for an IFS time,
Then it waits for a contention time.
15
16. Contention Window
The contention window is an amount of time divided
into slots.
A station that is ready to send chooses a random
number of slots as its wait time.
The number of slots in the window changes according
to the binary exponential back-off strategy.
i.e., 1 slot first time, 2 slots 2nd time,4 slots 3rd time, etc
Note: If the station finds the channel busy, it does not
restart the process;
it just stops the timer and restarts it when the channel
becomes idle.
16
17. Acknowledgement
With all these precautions, there still may be a
collision resulting in destroyed data.
In addition, the data may be corrupted during
transmission.
The positive acknowledgement and the time-out
timer can help guarantee that the receiver has
received the frame.
17
18. 3. Controlled Access
Stations consult one another to find which
station has the right to send
Prior to transmission, a station get authorization
to send from other stations.
Controlled access methods:
Reservation
Polling
Token Passing
18
19. 3.1 Reservation
a station needs to make a reservation before
sending data
Time is divided into intervals.
In each interval, a reservation frame precedes
the data frames sent in that interval.
19
20. 3.2 Polling
Polling works with topologies in which one
device is designated as a primary station and
the other devices are secondary stations.
Stations exchange data through the primary
20
21. 3.3 Token Passing
Stations are organized in logical ring
Every station has predecessor and successor
A station can send if it holds the token
When finishing transmission, it passes the token to its
successor.
21
22. 4. Channelization
Available bandwidth of a link is shared in time,
frequency, or through code, between stations.
In this section,
we discuss three channelization protocols:
Frequency-Division Multiple Access (FDMA)
Time-Division Multiple Access (TDMA)
Code-Division Multiple Access (CDMA)
22
25. 4.3. CDMA
One channel carries all transmissions simultaneously
25
26. Chips
Each station is assigned a code, which is a
sequence of numbers, called chips
multiplication by number
2. [+1 +1-1-1]=[+2+2-2-2]
Multiplication of two equal sequences
[+1 +1 -1 -1] • [+1 +1 +1 +1] = 1 + 1 - 1 - 1 = 0
[+1 +1-1 -1] . [+1 +1 -1 -1] = 1 + 1 + 1 + 1 = 4
Addition of 2 sequences
[+1+1-1-1]+[+1+1+1+1]=[+2+2 0 0] 26
27. Data Representation
If a station needs to send a 0 bit, it encodes it
as -1;
if a station needs to send a 1 bit, it encodes it as
+1
When a station is idle, it sends no signal, which
is interpreted as a 0
27
29. Sequence Generation
Walsh table is used to generate chip sequences
Walsh table is a two-dimensional table with an equal
number of rows and columns
29
30. Example
Find the chips for a network with
a. Two stations
b. Four stations
Solution
We can use the rows of W2 and W4 in the precedent
Figure
a. For a two-station network, we have [+1 +1] and [+1 -
1].
b. For a four-station network we have [+1 +1 +1 +1], [+1
-1 +1 -1], [+1 +1 -1 -1], and [+1-1-1 +1].
30