SlideShare a Scribd company logo
ATAL BIHARI VAJPAYEE UNIVERSITY
BILASPUR (C.G)
DEPARTMENT OF COMPUTER SCIENCE AND APPLICATION
TOPIC : MULTIPLE ACCESS PROTOCOL
PRESENTED BY : PRAVIN BHARGAV AND SURYKANT RATREY
SUBMITTED TO MISS ANKITA JAISWAL
SUBJECT : COMPUTER NETWORK
PRAVIN
BHARGAV
SURYAKANT
RATRE
 Random Access Protocol
ALOHA
CSMA
CSMA/CD
CSMA/CA
 Controlled Access Protocol
 Channelization Protocol
The data link layer is used in a computer network to
transmit the data between two devices or nodes . It is
responsible to flow control and the error control in the
data link control . It is also the second last layer of Open
System Interconnection(OSI)Model.
Data Link Layer
Data Link
Control
A data link control is a reliable channel for transmitting
the data over a dedicated link using various techniques
such as framing , error control and flow control of data
packets in the computer network.
Multiple
Access
Protocol
The multiple access
protocol is used for
decrease the collision
if there is no dedicated
link present
For example
A teacher
gives a
question to
students then
All students
are give their
answer at the
same time
Then teacher
will be
manage to all
students.
Multiple
Access
Protocols
Random
Access
Protocols
Controlled
Access
Protocols
Channelization
Protocols
Multiple Access Protocols can
be subdivided further as :
1.Random Access
Protocol
In this ,all station have same priority in which no one station have more
priority more than other station . Any station can send the data
depending apon the medium’s situation (idol or busy).
Random access protocols are further subdivided as:
Random
Access
Protocols
Aloha
CSMA
CSMA/CD
CSMA/CA
(A) ALOHA
It is designed for wireless LAN (Local Area Network) but can also be
used in a shared medium to transmit data. Using this method, any
station can transmit data across a network simultaneously when a
data frameset is available for transmission.
Pure
Aloha:
The station can transmit data at any time is called the pure
aloha .When two or more station transmit the data
simultaneously, there is a chance of collision and the
frames are destroyed. In pure aloha the sender will except
acknowledgement from the receiver if that is not received
so the sender assums that the frame has been destroyed.
After the collision the station waits for random amount of
times.
Slotted
Aloha:
Carrier Sense Multiple Access is used for when two or
more stations start sending their signals over the data link
layer. Carrier sense multiple access requires that each
stations first check the state of the medium before
sending.
CSMA
1-Persistent
Non-Persistent
P-Persistent
Non-
Persistent:
It first assesses the channel before transmitting data; if the
channel is idle, the node transmits data right away. If not, the
station must wait for an arbitrary amount of time (not
continuously), and when it discovers the channel is empty, it
sends the frames.
1-
Persistent:
It senses the shared channel first and delivers
the data right away if the channel is idle. If not,
it must wait and continuously track for the
channel to become idle and then broadcast the
frame without condition as soon as it does. It
is an aggressive transmission algorithm.
P-Persistent:
It consists of the 1-Persistent and Non-
Persistent modes combined. Each node
observes the channel in the P-Persistent mode,
and if the channel is idle, it sends a frame with
a P probability. If the data is not transferred,
the frame restarts with the following time slot
after waiting for a (q = 1-p probability) random
period.
CSMA/CD
Carrier Sense Multiple Access /Collision Detection is a media
access control mathod. CSMA/CD is one such technique where
the different stations have to follow this protocol and detect the
collision. This protocol decides which station will transmit when
so that data reaches the destination without corruption.
CSMA/CA
It is a Carrier Sense Multiple Access /Collision Avoidence in
this when the station send the data and sender receive the
acknowledgment that means the data has successfully
transmitted if the occur will be come then there will be use of
the INTERFRAME SPACE mathod there are if the station is idol
but yet station does not send the data that will be wait.
Controlled Access Protocol :-
In the controlled access protocols all stations need to
consult each other to find out which station has the right
to send the data .It grant permission to send only one
node at a time simultaneously to avoid collisions .
Types of Controlled Access Protocols
Controlled
Access
Protocols
Reservation
Polling
Token
Passing
1. Reservation :-
In Reservation a station
need to create a reservation
before sending the data.
We divide a time into intervals.
In each interval, reservation frame for
goes the data frame sent in that
interval.
Reservation time.
Data transmission period of variable
frames.
2. Polling
In this one station act as primary station any other as
secondary station. And work on round robin technique.
3. Token Passing :-
In token passing scheme the station are
connected logically to each other and access to
stations are governed by token.
Channelization
Available bandwidth of a link is shared in time,
frequency or through code among different
stations.
Techniques of channelization
FDMA
FDMA
CDMA
TDMA
FREQUENCY
DIVISION
MULTIPLE ACCESS
In this protocol the available bandwidth is divided into
frequency bands . Each station is allocated to send its
data.
TIME DIVISION
MULTIPLE
ACCESS
In this protocol , the stations share
the bandwidth of the channel in
time interval . Each station is
allocated a time slot during which
it can send the data.
CDMA
It stands for code division multiple access , by this
technique station can access the entire bandwidth of
link anytime here every station is assigned a code
Code
Properties :-
1. We multiply each code by another we get 0.
2. If we multiply code by itself we get station ‘s number.
Coding method (Walsh Table)
W1 = [+1]
W2n = [Wn ] [Wn]
[Wn] [Wn]’ [Wn]’ is compliment of Wn.
2n => no.of station.
Example :- If we have two station which share a link.
W2x1 = [W1] [W1]
[W1] [W1]’
W2 = [+1] [+1]
[+1] [-1]
Code for station 1 -> +1 +1
Code for station 2 -> +1 -1
A 0 bit is represent by -1
A 1 bit is represent by +1
Data bit 0 -> -1
Data bit 1
-> +1
Silence
-> 0
Computer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptx

More Related Content

Similar to Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptx

9 multiple access
9 multiple access9 multiple access
9 multiple access
ampas03
 
Unit_3_WSN.pptx
Unit_3_WSN.pptxUnit_3_WSN.pptx
Unit_3_WSN.pptx
nooralleema
 
The mac layer
The mac layerThe mac layer
The mac layer
aazamk
 
Unit 3 - Data Link Layer - Part B
Unit 3 - Data Link Layer - Part BUnit 3 - Data Link Layer - Part B
Unit 3 - Data Link Layer - Part B
Chandan Gupta Bhagat
 
Multiple Access Methods
Multiple Access MethodsMultiple Access Methods
Multiple Access Methods
Prateek Soni
 
dcn.pdf
dcn.pdfdcn.pdf
dcn.pdf
TapanManik
 
Data link control notes
Data link control notesData link control notes
Data link control notes
invertis university
 
clas 8
clas 8clas 8
clas 8
FairuzFatemi
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
upamatechverse
 
Multiole acccess
Multiole acccessMultiole acccess
Multiole acccess
jasscheema
 
Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...
Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...
Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...
Soumen Santra
 
Computer Network MAC Layer Notes as per RGPV syllabus
Computer Network MAC Layer Notes as per RGPV syllabusComputer Network MAC Layer Notes as per RGPV syllabus
Computer Network MAC Layer Notes as per RGPV syllabus
NANDINI SHARMA
 
Multiple Access Control Protocol (MAC Protocol) Networking
Multiple Access Control Protocol (MAC Protocol) Networking Multiple Access Control Protocol (MAC Protocol) Networking
Multiple Access Control Protocol (MAC Protocol) Networking
Nitish Awasthi (anitish_225)
 
tow
towtow
computer network
computer networkcomputer network
computer network
sweetysweety8
 
Week15 lec1
Week15 lec1Week15 lec1
Week15 lec1
syedhaiderraza
 
Wired Lan Ethernet - DATA Link Layer
Wired Lan Ethernet - DATA Link LayerWired Lan Ethernet - DATA Link Layer
Wired Lan Ethernet - DATA Link Layer
Taimoor Muzaffar Gondal
 
Demand Assigned Multiple Access
Demand Assigned Multiple AccessDemand Assigned Multiple Access
Demand Assigned Multiple Access
anushkashastri
 
datalinklayer-200201062315 (1).pptx
datalinklayer-200201062315 (1).pptxdatalinklayer-200201062315 (1).pptx
datalinklayer-200201062315 (1).pptx
MeenaAnusha1
 
Some Ccna basic detail
Some Ccna basic detailSome Ccna basic detail
Some Ccna basic detail
muneebalisyed
 

Similar to Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptx (20)

9 multiple access
9 multiple access9 multiple access
9 multiple access
 
Unit_3_WSN.pptx
Unit_3_WSN.pptxUnit_3_WSN.pptx
Unit_3_WSN.pptx
 
The mac layer
The mac layerThe mac layer
The mac layer
 
Unit 3 - Data Link Layer - Part B
Unit 3 - Data Link Layer - Part BUnit 3 - Data Link Layer - Part B
Unit 3 - Data Link Layer - Part B
 
Multiple Access Methods
Multiple Access MethodsMultiple Access Methods
Multiple Access Methods
 
dcn.pdf
dcn.pdfdcn.pdf
dcn.pdf
 
Data link control notes
Data link control notesData link control notes
Data link control notes
 
clas 8
clas 8clas 8
clas 8
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Multiole acccess
Multiole acccessMultiole acccess
Multiole acccess
 
Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...
Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...
Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...
 
Computer Network MAC Layer Notes as per RGPV syllabus
Computer Network MAC Layer Notes as per RGPV syllabusComputer Network MAC Layer Notes as per RGPV syllabus
Computer Network MAC Layer Notes as per RGPV syllabus
 
Multiple Access Control Protocol (MAC Protocol) Networking
Multiple Access Control Protocol (MAC Protocol) Networking Multiple Access Control Protocol (MAC Protocol) Networking
Multiple Access Control Protocol (MAC Protocol) Networking
 
tow
towtow
tow
 
computer network
computer networkcomputer network
computer network
 
Week15 lec1
Week15 lec1Week15 lec1
Week15 lec1
 
Wired Lan Ethernet - DATA Link Layer
Wired Lan Ethernet - DATA Link LayerWired Lan Ethernet - DATA Link Layer
Wired Lan Ethernet - DATA Link Layer
 
Demand Assigned Multiple Access
Demand Assigned Multiple AccessDemand Assigned Multiple Access
Demand Assigned Multiple Access
 
datalinklayer-200201062315 (1).pptx
datalinklayer-200201062315 (1).pptxdatalinklayer-200201062315 (1).pptx
datalinklayer-200201062315 (1).pptx
 
Some Ccna basic detail
Some Ccna basic detailSome Ccna basic detail
Some Ccna basic detail
 

Recently uploaded

Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfAI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
Techgropse Pvt.Ltd.
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
Claudio Di Ciccio
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 

Recently uploaded (20)

Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfAI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 

Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptx

  • 1. ATAL BIHARI VAJPAYEE UNIVERSITY BILASPUR (C.G) DEPARTMENT OF COMPUTER SCIENCE AND APPLICATION TOPIC : MULTIPLE ACCESS PROTOCOL PRESENTED BY : PRAVIN BHARGAV AND SURYKANT RATREY SUBMITTED TO MISS ANKITA JAISWAL SUBJECT : COMPUTER NETWORK
  • 2. PRAVIN BHARGAV SURYAKANT RATRE  Random Access Protocol ALOHA CSMA CSMA/CD CSMA/CA  Controlled Access Protocol  Channelization Protocol
  • 3. The data link layer is used in a computer network to transmit the data between two devices or nodes . It is responsible to flow control and the error control in the data link control . It is also the second last layer of Open System Interconnection(OSI)Model. Data Link Layer
  • 4.
  • 5. Data Link Control A data link control is a reliable channel for transmitting the data over a dedicated link using various techniques such as framing , error control and flow control of data packets in the computer network.
  • 6. Multiple Access Protocol The multiple access protocol is used for decrease the collision if there is no dedicated link present For example A teacher gives a question to students then All students are give their answer at the same time Then teacher will be manage to all students.
  • 8. 1.Random Access Protocol In this ,all station have same priority in which no one station have more priority more than other station . Any station can send the data depending apon the medium’s situation (idol or busy).
  • 9. Random access protocols are further subdivided as: Random Access Protocols Aloha CSMA CSMA/CD CSMA/CA
  • 10. (A) ALOHA It is designed for wireless LAN (Local Area Network) but can also be used in a shared medium to transmit data. Using this method, any station can transmit data across a network simultaneously when a data frameset is available for transmission.
  • 11. Pure Aloha: The station can transmit data at any time is called the pure aloha .When two or more station transmit the data simultaneously, there is a chance of collision and the frames are destroyed. In pure aloha the sender will except acknowledgement from the receiver if that is not received so the sender assums that the frame has been destroyed. After the collision the station waits for random amount of times.
  • 13. Carrier Sense Multiple Access is used for when two or more stations start sending their signals over the data link layer. Carrier sense multiple access requires that each stations first check the state of the medium before sending.
  • 15. Non- Persistent: It first assesses the channel before transmitting data; if the channel is idle, the node transmits data right away. If not, the station must wait for an arbitrary amount of time (not continuously), and when it discovers the channel is empty, it sends the frames.
  • 16. 1- Persistent: It senses the shared channel first and delivers the data right away if the channel is idle. If not, it must wait and continuously track for the channel to become idle and then broadcast the frame without condition as soon as it does. It is an aggressive transmission algorithm.
  • 17. P-Persistent: It consists of the 1-Persistent and Non- Persistent modes combined. Each node observes the channel in the P-Persistent mode, and if the channel is idle, it sends a frame with a P probability. If the data is not transferred, the frame restarts with the following time slot after waiting for a (q = 1-p probability) random period.
  • 18. CSMA/CD Carrier Sense Multiple Access /Collision Detection is a media access control mathod. CSMA/CD is one such technique where the different stations have to follow this protocol and detect the collision. This protocol decides which station will transmit when so that data reaches the destination without corruption.
  • 19. CSMA/CA It is a Carrier Sense Multiple Access /Collision Avoidence in this when the station send the data and sender receive the acknowledgment that means the data has successfully transmitted if the occur will be come then there will be use of the INTERFRAME SPACE mathod there are if the station is idol but yet station does not send the data that will be wait.
  • 20. Controlled Access Protocol :- In the controlled access protocols all stations need to consult each other to find out which station has the right to send the data .It grant permission to send only one node at a time simultaneously to avoid collisions .
  • 21. Types of Controlled Access Protocols Controlled Access Protocols Reservation Polling Token Passing
  • 22. 1. Reservation :- In Reservation a station need to create a reservation before sending the data.
  • 23. We divide a time into intervals. In each interval, reservation frame for goes the data frame sent in that interval. Reservation time. Data transmission period of variable frames.
  • 24.
  • 25. 2. Polling In this one station act as primary station any other as secondary station. And work on round robin technique.
  • 26.
  • 27.
  • 28. 3. Token Passing :- In token passing scheme the station are connected logically to each other and access to stations are governed by token.
  • 29.
  • 30. Channelization Available bandwidth of a link is shared in time, frequency or through code among different stations.
  • 32. FREQUENCY DIVISION MULTIPLE ACCESS In this protocol the available bandwidth is divided into frequency bands . Each station is allocated to send its data.
  • 33.
  • 34. TIME DIVISION MULTIPLE ACCESS In this protocol , the stations share the bandwidth of the channel in time interval . Each station is allocated a time slot during which it can send the data.
  • 35.
  • 36. CDMA It stands for code division multiple access , by this technique station can access the entire bandwidth of link anytime here every station is assigned a code
  • 37. Code Properties :- 1. We multiply each code by another we get 0. 2. If we multiply code by itself we get station ‘s number.
  • 38.
  • 39. Coding method (Walsh Table) W1 = [+1] W2n = [Wn ] [Wn] [Wn] [Wn]’ [Wn]’ is compliment of Wn. 2n => no.of station. Example :- If we have two station which share a link. W2x1 = [W1] [W1] [W1] [W1]’ W2 = [+1] [+1] [+1] [-1] Code for station 1 -> +1 +1 Code for station 2 -> +1 -1
  • 40. A 0 bit is represent by -1 A 1 bit is represent by +1 Data bit 0 -> -1 Data bit 1 -> +1 Silence -> 0