SlideShare a Scribd company logo
1 of 12
Lecture 9: Multiple Access
Protocols
Taxonomy of Multiple Access
Protocols
• Random Access Protocols
– Aloha
– Slotted Aloha
– Carrier sense multiple access (CSMA): Ethernet
– Group random access
• Controlled Access Protocols
– Predetermined allocation (TDMA)
– Reservation protocols
– Token passing protocols
Aloha
• If you have a packet, just send it.
• If multiple people try it and so there is
collision, then try resending it later!
• Theoretical analysis (based on Poisson
distribution) shows a throughput of only
18%.
Slotted Aloha
• Synchronous, that is time is divided into slots
• Slot size is equal to the transmission time of a
packet
• When you are ready, transmit at the start of the
time slot.
• Doubles the efficiency of Aloha (38% throughput)
• But requires synchronization!
Carrier Sense Multiple Access
• CSMA
• Listen to channel. If busy then wait for a
random time and then listen again. If not
busy then transmit
• Collision may still happen
p-persistent CSMA
• Quite like CSMA.
• But, when the channel is idle then you
transmit with probability p. Otherwise,
even when it is idle, you wait for a random
time before you listen to the channel.
CSMA/CD
• CSMA with collision detection(CD):
– Listen while you are sending packets
– Stop sending when collision happens
• Wait random time before you attempt to
resend.
• IEEE 802.3 standard
• Used in coaxial cable. You do exponetial
backoff.
Group Random Access
• Instead of random backoff, use a structured
search to find one unit to transmit
• First enable a group.
• If collision happens, then divide the group
into two parts and let one part try.
Token Passing
• Form a circular list. Pass a token around.
Whoever has the token can transmit.
• Only the station that wants to trasmit, seize
the token and release it after successful
transmission.
Reservation Aloha
• Channel is divided into time slots of equal size.
• Each slot is large enough to transmit a packet.
• Slots are arranged into frames of equal size.
• Frame size is proportional to propagation delay.
• Units compete for slots. Once a unit gets a slot, it
retains the slot (across frames) until it no longer
needs it.
• Efficient for bursty data but no so for single
packet.
FIFO Reservation
• Channel is divided into slots. Units compete and
make reservation for these slots in FIFO manner.
• Every one keeps track of the order.
• After every M slots, one slot is broken into small
reservation slots using which units try to reserve
next M slots.
• Efficient in handling bursty data. No frame size
limitation. But requires tracking of queue!
Round Robin
• Channel is divided into equal slots where each unit
is a owner of a slot. (Just like TDMA)
• But, others can use the slot of a unit UNTIL the
unit wants it by creating a collision.
• No activity is a signal for others to contend for the
slot.
• Good for burst data. But contend using other
protocols for unused slots.

More Related Content

Similar to Medium Access Control Protocols Karthick

Random Access Protocols topicc in tcp/ip.pptx
Random Access Protocols topicc in tcp/ip.pptxRandom Access Protocols topicc in tcp/ip.pptx
Random Access Protocols topicc in tcp/ip.pptx
Rizwan408930
 
Unit-2 Media Access Protocols.pdf
Unit-2 Media Access Protocols.pdfUnit-2 Media Access Protocols.pdf
Unit-2 Media Access Protocols.pdf
SmtPArunaKumari
 
multipleaccessprotocol-140213082552-phpapp02.pdf
multipleaccessprotocol-140213082552-phpapp02.pdfmultipleaccessprotocol-140213082552-phpapp02.pdf
multipleaccessprotocol-140213082552-phpapp02.pdf
GauravWankar2
 
Multipleaccessprotocol 140213082552-phpapp02
Multipleaccessprotocol 140213082552-phpapp02Multipleaccessprotocol 140213082552-phpapp02
Multipleaccessprotocol 140213082552-phpapp02
arifur rahman
 

Similar to Medium Access Control Protocols Karthick (20)

Mac sub layer
Mac sub layerMac sub layer
Mac sub layer
 
Random Access Protocols topicc in tcp/ip.pptx
Random Access Protocols topicc in tcp/ip.pptxRandom Access Protocols topicc in tcp/ip.pptx
Random Access Protocols topicc in tcp/ip.pptx
 
Multiple access protocols in data communication networks
Multiple access protocols in data communication networksMultiple access protocols in data communication networks
Multiple access protocols in data communication networks
 
link-medium-access-control.pptx
link-medium-access-control.pptxlink-medium-access-control.pptx
link-medium-access-control.pptx
 
CN R16 -UNIT-4.pdf
CN R16 -UNIT-4.pdfCN R16 -UNIT-4.pdf
CN R16 -UNIT-4.pdf
 
Csma(carriers sense-multiple-acess)
Csma(carriers sense-multiple-acess) Csma(carriers sense-multiple-acess)
Csma(carriers sense-multiple-acess)
 
RANDOM ACCESS PROTOCOL IN COMMUNICATION
RANDOM ACCESS PROTOCOL IN COMMUNICATION           RANDOM ACCESS PROTOCOL IN COMMUNICATION
RANDOM ACCESS PROTOCOL IN COMMUNICATION
 
The medium access sublayer
 The medium  access sublayer The medium  access sublayer
The medium access sublayer
 
Wireless LAN in Data Communication & Networking
Wireless LAN in Data Communication & NetworkingWireless LAN in Data Communication & Networking
Wireless LAN in Data Communication & Networking
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
 
Unit-2 Media Access Protocols.pdf
Unit-2 Media Access Protocols.pdfUnit-2 Media Access Protocols.pdf
Unit-2 Media Access Protocols.pdf
 
UNIT-V Wireless Communication.pdf
UNIT-V Wireless Communication.pdfUNIT-V Wireless Communication.pdf
UNIT-V Wireless Communication.pdf
 
Multiple access protocol
Multiple access protocolMultiple access protocol
Multiple access protocol
 
unit1.ppt
unit1.pptunit1.ppt
unit1.ppt
 
clas 8
clas 8clas 8
clas 8
 
multipleaccessprotocol-140213082552-phpapp02.pdf
multipleaccessprotocol-140213082552-phpapp02.pdfmultipleaccessprotocol-140213082552-phpapp02.pdf
multipleaccessprotocol-140213082552-phpapp02.pdf
 
Multipleaccessprotocol 140213082552-phpapp02
Multipleaccessprotocol 140213082552-phpapp02Multipleaccessprotocol 140213082552-phpapp02
Multipleaccessprotocol 140213082552-phpapp02
 
Packet radio protocol
Packet radio protocolPacket radio protocol
Packet radio protocol
 
Csma protocols
Csma protocolsCsma protocols
Csma protocols
 

Recently uploaded

Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
Kamal Acharya
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 

Recently uploaded (20)

A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planes
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech Civil
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEGEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 

Medium Access Control Protocols Karthick

  • 1. Lecture 9: Multiple Access Protocols
  • 2. Taxonomy of Multiple Access Protocols • Random Access Protocols – Aloha – Slotted Aloha – Carrier sense multiple access (CSMA): Ethernet – Group random access • Controlled Access Protocols – Predetermined allocation (TDMA) – Reservation protocols – Token passing protocols
  • 3. Aloha • If you have a packet, just send it. • If multiple people try it and so there is collision, then try resending it later! • Theoretical analysis (based on Poisson distribution) shows a throughput of only 18%.
  • 4. Slotted Aloha • Synchronous, that is time is divided into slots • Slot size is equal to the transmission time of a packet • When you are ready, transmit at the start of the time slot. • Doubles the efficiency of Aloha (38% throughput) • But requires synchronization!
  • 5. Carrier Sense Multiple Access • CSMA • Listen to channel. If busy then wait for a random time and then listen again. If not busy then transmit • Collision may still happen
  • 6. p-persistent CSMA • Quite like CSMA. • But, when the channel is idle then you transmit with probability p. Otherwise, even when it is idle, you wait for a random time before you listen to the channel.
  • 7. CSMA/CD • CSMA with collision detection(CD): – Listen while you are sending packets – Stop sending when collision happens • Wait random time before you attempt to resend. • IEEE 802.3 standard • Used in coaxial cable. You do exponetial backoff.
  • 8. Group Random Access • Instead of random backoff, use a structured search to find one unit to transmit • First enable a group. • If collision happens, then divide the group into two parts and let one part try.
  • 9. Token Passing • Form a circular list. Pass a token around. Whoever has the token can transmit. • Only the station that wants to trasmit, seize the token and release it after successful transmission.
  • 10. Reservation Aloha • Channel is divided into time slots of equal size. • Each slot is large enough to transmit a packet. • Slots are arranged into frames of equal size. • Frame size is proportional to propagation delay. • Units compete for slots. Once a unit gets a slot, it retains the slot (across frames) until it no longer needs it. • Efficient for bursty data but no so for single packet.
  • 11. FIFO Reservation • Channel is divided into slots. Units compete and make reservation for these slots in FIFO manner. • Every one keeps track of the order. • After every M slots, one slot is broken into small reservation slots using which units try to reserve next M slots. • Efficient in handling bursty data. No frame size limitation. But requires tracking of queue!
  • 12. Round Robin • Channel is divided into equal slots where each unit is a owner of a slot. (Just like TDMA) • But, others can use the slot of a unit UNTIL the unit wants it by creating a collision. • No activity is a signal for others to contend for the slot. • Good for burst data. But contend using other protocols for unused slots.