SlideShare a Scribd company logo
Kanwal iqbal
wireless network;
Random Access Protocol:
 In this, all stations have same superiority that is no
station has more priority than another station. Any
station can send data depending on medium’s state(
idle or busy)
 It has two features:
 There is no fixed time for sending data
 There is no fixed sequence of stations sending data
The Random access protocols are further subdivided as:
(a)ALOHA –
It was designed for wireless LAN but is also applicable for
shared medium. In this, multiple stations can transmit data at the
same time and can hence lead to collision and data being
garbled.
Pure Aloha:
When a station sends data it waits for an acknowledgement. If
the acknowledgement doesn’t come within the allotted time then
the station waits for a random amount of time called back-off
time (Tb) and re-sends the data. Since different stations wait for
different amount of time, the probability of further collision
decreases.Vulnerable Time = 2* Frame transmission time
Throughput = G exp{-2*G} Maximum throughput = 0.184 for
G=0.5
 Slotted Aloha:
It is similar to pure aloha, except that we divide time into
slots and sending of data is allowed only at the beginning
of these slots.
 If a station misses out the allowed time, it must wait for
the next slot
 This reduces the probability
of collision.
Vulnerable Time = Frame
transmission time Throughput
= G exp{-*G} Maximum
throughput = 0.368 for G=1
 (b) CSMA – Carrier Sense Multiple Access ensures fewer
collisions as the station is required to first sense the medium
(for idle or busy) before transmitting data. If it is idle then it
sends data, otherwise it waits till the channel becomes idle.
However there is still chance of collision in CSMA due to
propagation delay.
 For example,
 if station A wants to send data, it will first sense the
medium.If it finds the channel idle, it will start sending data.
However, by the time the first bit of data is transmitted
(delayed due to propagation delay) from station A, if station
B requests to send data and senses the medium it will also
find it idle and will also send data. This will result in
collision of data from station A and B.
 CSMA access modes-
 1-persistent:
 The node senses the channel, if idle it sends the data,
otherwise it continuously keeps on checking the medium for
being idle and transmits unconditionally(with 1 probability)
as soon as the channel gets idle.
 Non-Persistent:
 The node senses the channel, if idle it sends the data,
otherwise it checks the medium after a random amount of
time (not continuously) and transmits when found idle.
 P-persistent:
 The node senses the medium, if idle it sends the data with p
probability. If the data is not transmitted ((1-p) probability)
then it waits for some time and checks the medium again, now
if it is found idle then it send with p probability. This repeat
continues until the frame is sent. It is used in Wifi and packet
radio systems
 O-persistent: Superiority of nodes is decided beforehand and
transmission occurs in that order. If the medium is idle, node
waits for its time slot to send data.
 (c) CSMA/CD
 – Carrier sense multiple access with collision detection.
Stations can terminate transmission of data if collision is
detected. For more details refer – Efficiency of CSMA/CD
 (d) CSMA/CA – Carrier sense multiple access with
collision avoidance. The process of collisions detection
involves sender receiving acknowledgement signals. If there
is just one signal(its own) then the data is successfully sent
but if there are two signals(its own and the one with which it
has collided) then it means a collision has occurred. To
distinguish between these two cases, collision must have a
lot of impact on received signal. However it is not so in
wired networks, so CSMA/CA is used in this case.
 CSMA/CA avoids collision by:
 Interframe space – Station waits for medium to become
idle and if found idle it does not immediately send data (to
avoid collision due to propagation delay) rather it waits for a
period of time called Interframe space or IFS. After this
time it again checks the medium for being idle. The IFS
duration depends on the priority of station.
 Contention Window – It is the amount of time divided
into slots. If the sender is ready to send data, it
chooses a random number of slots as wait time which
doubles every time medium is not found idle. If the
medium is found busy it does not restart the entire
process, rather it restarts the timer when the channel is
found idle again.
 Acknowledgement – The sender re-transmits the data
if acknowledgement is not received before time-out.
controlled access protcol:
 controlled access, the stations seek information from one another
to find which station has the right to send. It allows only one
node to send at a time, to avoid collision of messages on shared
medium.
 The three controlled-access methods are:
 Reservation
 Polling
 Token Passing
 Reservation
 In the reservation method, a station needs to make a
reservation before sending data.
 The time line has two kinds of periods:
 Reservation interval of fixed time length
 Data transmission period of variable frames.
 If there are M stations, the reservation interval is divided into
M slots, and each station has one slot.
 Suppose if station 1 has a frame to send, it transmits 1 bit
during the slot 1. No other station is allowed to transmit
during this slot.
 .
 In general, i th station may announce that it has a frame to send
by inserting a 1 bit into i th slot. After all N slots have been
checked, each station knows which stations wish to transmit
 The stations which have reserved their slots transfer their
frames in that order.
 After data transmission period, next reservation interval begins.
 Since everyone agrees on who goes next, there will never be
any collisions.
 The following figure shows a situation with five stations and a
five slot reservation frame. In the first interval, only stations 1,
3, and 4 have made reservations. In the second interval, only
station 1 has made a reservation
 98v
 Polling
 Polling process is similar to the roll-call performed in
class. Just like the teacher, a controller sends a message
to each node in turn.
 In this, one acts as a primary station(controller) and the
others are secondary stations. All data exchanges must
be made through the controller.
 The message sent by the controller contains the address
of the node being selected for granting access.
 Although all nodes receive the message but the
addressed one responds to it and sends data, if any. If
there is no data, usually a “poll reject”(NAK) message is
sent back.
 .
 Problems include high overhead of the polling messages and
high dependence on the reliability of the controller
 Efficiency
Let Tpoll be the time for polling
and Tt be the time required for
transmission of data. Then,
 Efficiency = Tt/(Tt + Tpoll)
 Token Passing
 In token passing scheme, the stations are connected
logically to each other in form of ring and access of
stations is governed by tokens.
 A token is a special bit pattern or a small message, which
circulate from one station to the next in the some
predefined order.
 In Token ring, token is passed from one station to another
adjacent station in the ring whereas incase of Token bus,
each station
 uses the bus to send the token to the next station in some
predefined order.
 In both cases, token represents permission to send. If a
station has a frame queued for transmission when it
receives the token, it can send that frame before it passes
the token to the next station. If it has no queued frame, it
passes the token simply.
 After sending a frame, each station must wait for all N
stations (including itself) to send the token to their
neighbors and the other N – 1 stations to send a frame,
if they have one.
 There exists problems like duplication of token or token
is lost or insertion of new station, removal of a station,
which need be tackled for correct and reliable operation
of this scheme.
 Performance
Performance of token ring can be concluded by 2
parameters:-
 Delay, which is a measure of time between when a
packet is ready and when it is delivered.So, the average
time (delay) required to send a token to the next station
= a/N.
 Throughput, which is a measure of the successful
traffic.
 Throughput, S = 1/(1 +
a/N) for a<1
 S = 1/{a(1 + 1/N)} for
a>1. where N = number of
stations a = Tp/Tt (Tp =
propagation delay and Tt =
transmission delay)
multiacess protocol

More Related Content

What's hot

T mac protocol
T mac protocolT mac protocol
T mac protocol
R Islam
 
Data link layer
Data link layerData link layer
Data link layer
Monu Chaudhary
 
Data link layer tutorial
Data link layer tutorialData link layer tutorial
Data link layer tutorial
Swapnadeep Reloaded
 
5 digital datacomm
5 digital datacomm5 digital datacomm
5 digital datacomm
Hattori Sidek
 
The medium access sublayer
 The medium  access sublayer The medium  access sublayer
The medium access sublayer
Lal Bahadur Gehlot
 
Unit 4
Unit 4Unit 4
Chapter 11: Data Link Control
Chapter 11: Data Link ControlChapter 11: Data Link Control
Chapter 11: Data Link Control
JeoffnaRuth
 
Data link layer elementry protocols
Data link layer elementry protocolsData link layer elementry protocols
Data link layer elementry protocols
sabitha sairam
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
Naiyan Noor
 
data-link layer protocols
data-link layer protocols  data-link layer protocols
data-link layer protocols
BE Smârt
 
Data link layer
Data link layerData link layer
Data link layer
I World Tech
 
PCCN DATA LINK LAYER UNIT 4 NOTES
PCCN DATA LINK LAYER UNIT 4 NOTESPCCN DATA LINK LAYER UNIT 4 NOTES
PCCN DATA LINK LAYER UNIT 4 NOTES
sirishayerraboina
 
MAC
MACMAC
Dcn ppt on data link layer
Dcn ppt on data link layerDcn ppt on data link layer
Dcn ppt on data link layer
roma bora
 
Importance of sliding window protocol
Importance of sliding window protocolImportance of sliding window protocol
Importance of sliding window protocol
eSAT Journals
 
Presentation of computer network on data link layer
Presentation of computer network on data link layerPresentation of computer network on data link layer
Presentation of computer network on data link layer
sumit gyawali
 
Flow control and error control techniques in the data link layer protocol
Flow control and error control techniques in the data link layer protocolFlow control and error control techniques in the data link layer protocol
Flow control and error control techniques in the data link layer protocol
mdmuaj
 
Sliding window protocol
Sliding window protocolSliding window protocol
Sliding window protocol
Rishu Seth
 
Sliding window protocol
Sliding window protocolSliding window protocol
Sliding window protocol
Shehara Abeythunga
 
Mcseminar
McseminarMcseminar
Mcseminar
Ankit Anand
 

What's hot (20)

T mac protocol
T mac protocolT mac protocol
T mac protocol
 
Data link layer
Data link layerData link layer
Data link layer
 
Data link layer tutorial
Data link layer tutorialData link layer tutorial
Data link layer tutorial
 
5 digital datacomm
5 digital datacomm5 digital datacomm
5 digital datacomm
 
The medium access sublayer
 The medium  access sublayer The medium  access sublayer
The medium access sublayer
 
Unit 4
Unit 4Unit 4
Unit 4
 
Chapter 11: Data Link Control
Chapter 11: Data Link ControlChapter 11: Data Link Control
Chapter 11: Data Link Control
 
Data link layer elementry protocols
Data link layer elementry protocolsData link layer elementry protocols
Data link layer elementry protocols
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
 
data-link layer protocols
data-link layer protocols  data-link layer protocols
data-link layer protocols
 
Data link layer
Data link layerData link layer
Data link layer
 
PCCN DATA LINK LAYER UNIT 4 NOTES
PCCN DATA LINK LAYER UNIT 4 NOTESPCCN DATA LINK LAYER UNIT 4 NOTES
PCCN DATA LINK LAYER UNIT 4 NOTES
 
MAC
MACMAC
MAC
 
Dcn ppt on data link layer
Dcn ppt on data link layerDcn ppt on data link layer
Dcn ppt on data link layer
 
Importance of sliding window protocol
Importance of sliding window protocolImportance of sliding window protocol
Importance of sliding window protocol
 
Presentation of computer network on data link layer
Presentation of computer network on data link layerPresentation of computer network on data link layer
Presentation of computer network on data link layer
 
Flow control and error control techniques in the data link layer protocol
Flow control and error control techniques in the data link layer protocolFlow control and error control techniques in the data link layer protocol
Flow control and error control techniques in the data link layer protocol
 
Sliding window protocol
Sliding window protocolSliding window protocol
Sliding window protocol
 
Sliding window protocol
Sliding window protocolSliding window protocol
Sliding window protocol
 
Mcseminar
McseminarMcseminar
Mcseminar
 

Similar to multiacess protocol

Wireless LAN in Data Communication & Networking
Wireless LAN in Data Communication & NetworkingWireless LAN in Data Communication & Networking
Wireless LAN in Data Communication & Networking
Sweta Kumari Barnwal
 
Multiple access protocol
Multiple access protocolMultiple access protocol
Multiple access protocol
NowrinJahanSiam
 
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptxComputer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptx
Pravinbhargav
 
Controlled Access Protocols
Controlled Access ProtocolsControlled Access Protocols
Controlled Access Protocols
Pruthviraj Konu
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
upamatechverse
 
Jaimin chp-4 - media access sub-layer- 2011 batch
Jaimin   chp-4 - media access sub-layer- 2011 batchJaimin   chp-4 - media access sub-layer- 2011 batch
Jaimin chp-4 - media access sub-layer- 2011 batch
Jaimin Jani
 
WHAT IS MAC-1 presentation for information .pptx
WHAT IS MAC-1 presentation for information  .pptxWHAT IS MAC-1 presentation for information  .pptx
WHAT IS MAC-1 presentation for information .pptx
SaqlainKhan39
 
Synchronous mac protocol study
Synchronous mac protocol studySynchronous mac protocol study
Synchronous mac protocol study
Mirthful Nahid
 
CN R16 -UNIT-4.pdf
CN R16 -UNIT-4.pdfCN R16 -UNIT-4.pdf
CN R16 -UNIT-4.pdf
Joshuaeeda1
 
Cotrolled access
Cotrolled accessCotrolled access
Cotrolled access
Maha S
 
the Multiple Access SLIDE for university students
the Multiple Access SLIDE for university studentsthe Multiple Access SLIDE for university students
the Multiple Access SLIDE for university students
novrain1
 
Unit 3 - Data Link Layer - Part B
Unit 3 - Data Link Layer - Part BUnit 3 - Data Link Layer - Part B
Unit 3 - Data Link Layer - Part B
Chandan Gupta Bhagat
 
dcn.pdf
dcn.pdfdcn.pdf
dcn.pdf
TapanManik
 
tow
towtow
Multiple Access ppt in Object Oriented Programming
Multiple Access ppt in Object Oriented ProgrammingMultiple Access ppt in Object Oriented Programming
Multiple Access ppt in Object Oriented Programming
arnavytstudio2814
 
Unit 1 mac vsd
Unit 1 mac vsdUnit 1 mac vsd
Unit 1 mac vsd
SHUBHAM MORGAONKAR
 
Media Access Control (MAC Layer)
Media Access Control (MAC Layer)Media Access Control (MAC Layer)
Media Access Control (MAC Layer)
Meenakshi Paul
 
Multiole acccess
Multiole acccessMultiole acccess
Multiole acccess
jasscheema
 
Wireless lan IEEE standard 802.11 chapter
Wireless lan IEEE standard 802.11 chapterWireless lan IEEE standard 802.11 chapter
Wireless lan IEEE standard 802.11 chapter
annymogalai14
 
Week15 lec1
Week15 lec1Week15 lec1
Week15 lec1
syedhaiderraza
 

Similar to multiacess protocol (20)

Wireless LAN in Data Communication & Networking
Wireless LAN in Data Communication & NetworkingWireless LAN in Data Communication & Networking
Wireless LAN in Data Communication & Networking
 
Multiple access protocol
Multiple access protocolMultiple access protocol
Multiple access protocol
 
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptxComputer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptx
 
Controlled Access Protocols
Controlled Access ProtocolsControlled Access Protocols
Controlled Access Protocols
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Jaimin chp-4 - media access sub-layer- 2011 batch
Jaimin   chp-4 - media access sub-layer- 2011 batchJaimin   chp-4 - media access sub-layer- 2011 batch
Jaimin chp-4 - media access sub-layer- 2011 batch
 
WHAT IS MAC-1 presentation for information .pptx
WHAT IS MAC-1 presentation for information  .pptxWHAT IS MAC-1 presentation for information  .pptx
WHAT IS MAC-1 presentation for information .pptx
 
Synchronous mac protocol study
Synchronous mac protocol studySynchronous mac protocol study
Synchronous mac protocol study
 
CN R16 -UNIT-4.pdf
CN R16 -UNIT-4.pdfCN R16 -UNIT-4.pdf
CN R16 -UNIT-4.pdf
 
Cotrolled access
Cotrolled accessCotrolled access
Cotrolled access
 
the Multiple Access SLIDE for university students
the Multiple Access SLIDE for university studentsthe Multiple Access SLIDE for university students
the Multiple Access SLIDE for university students
 
Unit 3 - Data Link Layer - Part B
Unit 3 - Data Link Layer - Part BUnit 3 - Data Link Layer - Part B
Unit 3 - Data Link Layer - Part B
 
dcn.pdf
dcn.pdfdcn.pdf
dcn.pdf
 
tow
towtow
tow
 
Multiple Access ppt in Object Oriented Programming
Multiple Access ppt in Object Oriented ProgrammingMultiple Access ppt in Object Oriented Programming
Multiple Access ppt in Object Oriented Programming
 
Unit 1 mac vsd
Unit 1 mac vsdUnit 1 mac vsd
Unit 1 mac vsd
 
Media Access Control (MAC Layer)
Media Access Control (MAC Layer)Media Access Control (MAC Layer)
Media Access Control (MAC Layer)
 
Multiole acccess
Multiole acccessMultiole acccess
Multiole acccess
 
Wireless lan IEEE standard 802.11 chapter
Wireless lan IEEE standard 802.11 chapterWireless lan IEEE standard 802.11 chapter
Wireless lan IEEE standard 802.11 chapter
 
Week15 lec1
Week15 lec1Week15 lec1
Week15 lec1
 

Recently uploaded

How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 

Recently uploaded (20)

How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 

multiacess protocol

  • 2. Random Access Protocol:  In this, all stations have same superiority that is no station has more priority than another station. Any station can send data depending on medium’s state( idle or busy)  It has two features:  There is no fixed time for sending data  There is no fixed sequence of stations sending data
  • 3. The Random access protocols are further subdivided as: (a)ALOHA – It was designed for wireless LAN but is also applicable for shared medium. In this, multiple stations can transmit data at the same time and can hence lead to collision and data being garbled. Pure Aloha: When a station sends data it waits for an acknowledgement. If the acknowledgement doesn’t come within the allotted time then the station waits for a random amount of time called back-off time (Tb) and re-sends the data. Since different stations wait for different amount of time, the probability of further collision decreases.Vulnerable Time = 2* Frame transmission time Throughput = G exp{-2*G} Maximum throughput = 0.184 for G=0.5
  • 4.  Slotted Aloha: It is similar to pure aloha, except that we divide time into slots and sending of data is allowed only at the beginning of these slots.  If a station misses out the allowed time, it must wait for the next slot  This reduces the probability of collision. Vulnerable Time = Frame transmission time Throughput = G exp{-*G} Maximum throughput = 0.368 for G=1
  • 5.  (b) CSMA – Carrier Sense Multiple Access ensures fewer collisions as the station is required to first sense the medium (for idle or busy) before transmitting data. If it is idle then it sends data, otherwise it waits till the channel becomes idle. However there is still chance of collision in CSMA due to propagation delay.  For example,  if station A wants to send data, it will first sense the medium.If it finds the channel idle, it will start sending data. However, by the time the first bit of data is transmitted (delayed due to propagation delay) from station A, if station B requests to send data and senses the medium it will also find it idle and will also send data. This will result in collision of data from station A and B.
  • 6.  CSMA access modes-  1-persistent:  The node senses the channel, if idle it sends the data, otherwise it continuously keeps on checking the medium for being idle and transmits unconditionally(with 1 probability) as soon as the channel gets idle.  Non-Persistent:  The node senses the channel, if idle it sends the data, otherwise it checks the medium after a random amount of time (not continuously) and transmits when found idle.
  • 7.  P-persistent:  The node senses the medium, if idle it sends the data with p probability. If the data is not transmitted ((1-p) probability) then it waits for some time and checks the medium again, now if it is found idle then it send with p probability. This repeat continues until the frame is sent. It is used in Wifi and packet radio systems  O-persistent: Superiority of nodes is decided beforehand and transmission occurs in that order. If the medium is idle, node waits for its time slot to send data.  (c) CSMA/CD  – Carrier sense multiple access with collision detection. Stations can terminate transmission of data if collision is detected. For more details refer – Efficiency of CSMA/CD
  • 8.  (d) CSMA/CA – Carrier sense multiple access with collision avoidance. The process of collisions detection involves sender receiving acknowledgement signals. If there is just one signal(its own) then the data is successfully sent but if there are two signals(its own and the one with which it has collided) then it means a collision has occurred. To distinguish between these two cases, collision must have a lot of impact on received signal. However it is not so in wired networks, so CSMA/CA is used in this case.  CSMA/CA avoids collision by:  Interframe space – Station waits for medium to become idle and if found idle it does not immediately send data (to avoid collision due to propagation delay) rather it waits for a period of time called Interframe space or IFS. After this time it again checks the medium for being idle. The IFS duration depends on the priority of station.
  • 9.  Contention Window – It is the amount of time divided into slots. If the sender is ready to send data, it chooses a random number of slots as wait time which doubles every time medium is not found idle. If the medium is found busy it does not restart the entire process, rather it restarts the timer when the channel is found idle again.  Acknowledgement – The sender re-transmits the data if acknowledgement is not received before time-out.
  • 10. controlled access protcol:  controlled access, the stations seek information from one another to find which station has the right to send. It allows only one node to send at a time, to avoid collision of messages on shared medium.
  • 11.  The three controlled-access methods are:  Reservation  Polling  Token Passing  Reservation  In the reservation method, a station needs to make a reservation before sending data.  The time line has two kinds of periods:  Reservation interval of fixed time length  Data transmission period of variable frames.  If there are M stations, the reservation interval is divided into M slots, and each station has one slot.  Suppose if station 1 has a frame to send, it transmits 1 bit during the slot 1. No other station is allowed to transmit during this slot.  .
  • 12.  In general, i th station may announce that it has a frame to send by inserting a 1 bit into i th slot. After all N slots have been checked, each station knows which stations wish to transmit  The stations which have reserved their slots transfer their frames in that order.  After data transmission period, next reservation interval begins.  Since everyone agrees on who goes next, there will never be any collisions.  The following figure shows a situation with five stations and a five slot reservation frame. In the first interval, only stations 1, 3, and 4 have made reservations. In the second interval, only station 1 has made a reservation  98v
  • 13.  Polling  Polling process is similar to the roll-call performed in class. Just like the teacher, a controller sends a message to each node in turn.  In this, one acts as a primary station(controller) and the others are secondary stations. All data exchanges must be made through the controller.  The message sent by the controller contains the address of the node being selected for granting access.  Although all nodes receive the message but the addressed one responds to it and sends data, if any. If there is no data, usually a “poll reject”(NAK) message is sent back.  .
  • 14.  Problems include high overhead of the polling messages and high dependence on the reliability of the controller
  • 15.  Efficiency Let Tpoll be the time for polling and Tt be the time required for transmission of data. Then,  Efficiency = Tt/(Tt + Tpoll)
  • 16.  Token Passing  In token passing scheme, the stations are connected logically to each other in form of ring and access of stations is governed by tokens.  A token is a special bit pattern or a small message, which circulate from one station to the next in the some predefined order.  In Token ring, token is passed from one station to another adjacent station in the ring whereas incase of Token bus, each station  uses the bus to send the token to the next station in some predefined order.  In both cases, token represents permission to send. If a station has a frame queued for transmission when it receives the token, it can send that frame before it passes the token to the next station. If it has no queued frame, it passes the token simply.
  • 17.  After sending a frame, each station must wait for all N stations (including itself) to send the token to their neighbors and the other N – 1 stations to send a frame, if they have one.  There exists problems like duplication of token or token is lost or insertion of new station, removal of a station, which need be tackled for correct and reliable operation of this scheme.
  • 18.  Performance Performance of token ring can be concluded by 2 parameters:-  Delay, which is a measure of time between when a packet is ready and when it is delivered.So, the average time (delay) required to send a token to the next station = a/N.  Throughput, which is a measure of the successful traffic.  Throughput, S = 1/(1 + a/N) for a<1  S = 1/{a(1 + 1/N)} for a>1. where N = number of stations a = Tp/Tt (Tp = propagation delay and Tt = transmission delay)