SlideShare a Scribd company logo
12.1
Multiple Access
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
12.2
Data link layer divided into two functionality-oriented sublayers
12.3
Taxonomy of multiple-access protocols discussed in this chapter
12.4
RANDOM ACCESSRANDOM ACCESS
InIn random accessrandom access oror contentioncontention methods, no station ismethods, no station is
superior to another station and none is assigned thesuperior to another station and none is assigned the
control over another. No station permits, or does notcontrol over another. No station permits, or does not
permit, another station to send. At each instance, apermit, another station to send. At each instance, a
station that has data to send uses a procedure definedstation that has data to send uses a procedure defined
by the protocol to make a decision on whether or notby the protocol to make a decision on whether or not
to send.to send.
ALOHA
Carrier Sense Multiple Access
Carrier Sense Multiple Access with Collision Detection
Carrier Sense Multiple Access with Collision Avoidance
Topics discussed in this section:Topics discussed in this section:
12.5
To avoid access conflict or to resolve it when itTo avoid access conflict or to resolve it when it
happens, each station follows a procedure that answerhappens, each station follows a procedure that answer
the following questions:the following questions:
 When can the station access the medium.When can the station access the medium.
What can the station do if the medium is busy.What can the station do if the medium is busy.
How can the station determine the success or failureHow can the station determine the success or failure
of the transmission.of the transmission.
What can the station do if there is an access conflict.What can the station do if there is an access conflict.
12.6
ALOHA
ALOHA, the earliest random access method, was developed at the University of Hawaii
in early 1970. It was designed for a radio (wireless) LAN, but it can be used on any
shared medium.
Pure ALOHA
Slotted ALOHA
12.7
Frames in a pure ALOHA network
12.8
Procedure for pure ALOHA protocol
12.9
Vulnerable time for pure ALOHA protocol
The Vulnerable time, in which there is possibility of collision
12.10
Slotted ALOHA
12.11
Frames in a slotted ALOHA network
12.12
Figure 12.7 Vulnerable time for slotted ALOHA protocol
12.13
CSMA
Carrier Sense Multiple Access
12.14
Space/time model of the collision in CSMA
12.15
Figure 12.9 Vulnerable time in CSMA
12.16
Persistence Method
What Should a station do if the channel is busy.
What should a station do if the channel is idle.
1-Persistence Method
Non Persistence Method
p-Persistence Method
12.17
Behavior of three persistence methods
12.18
Flow diagram for three persistence methods
12.19
Collision of the first bit in CSMA/CD
12.20
Collision and abortion in CSMA/CD
12.21
Flow diagram for the CSMA/CD
12.22
Figure 12.15 Energy level during transmission, idleness, or collision
12.23
Figure 12.16 Timing in CSMA/CA
Interframe Space (IFS)
12.24
In CSMA/CA, the IFS can also be used to
define the priority of a station or a
frame.
Note
12.25
In CSMA/CA, if the station finds the
channel busy, it does not restart the
timer of the contention window;
it stops the timer and restarts it when
the channel becomes idle.
Note
12.26
Figure 12.17 Flow diagram for CSMA/CA
12.27
CONTROLLED ACCESSCONTROLLED ACCESS
InIn controlled accesscontrolled access, the stations consult one another, the stations consult one another
to find which station has the right to send. A stationto find which station has the right to send. A station
cannot send unless it has been authorized by othercannot send unless it has been authorized by other
stations. We discuss three popular controlled-accessstations. We discuss three popular controlled-access
methods.methods.
Reservation
Polling
Token Passing
Topics discussed in this section:Topics discussed in this section:
12.28
Logical ring and physical topology in token-passing access method
Computer Science & Engineering
Assignment
Semester- VI (I & II) Branch: CSE
Subject with Code: Computer Networks (IT-305-F)
-----------------------------------------------------------------------------------------------
Q:1 Explain Lacal Area Network.
Q:2 Explain IEEE 802 standards in Detail.

More Related Content

What's hot

Media Access Control
Media Access ControlMedia Access Control
Media Access Control
VijayaLakshmi514
 
3.Medium Access Control
3.Medium Access Control3.Medium Access Control
3.Medium Access ControlSonali Chauhan
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
HusnainHadi
 
seminar report on multiple access control protocol submitted by munesh
seminar report on multiple access control protocol submitted by munesh seminar report on multiple access control protocol submitted by munesh
seminar report on multiple access control protocol submitted by munesh meenamunesh
 
Multiple Access Control Protocol (MAC Protocol) Networking
Multiple Access Control Protocol (MAC Protocol) Networking Multiple Access Control Protocol (MAC Protocol) Networking
Multiple Access Control Protocol (MAC Protocol) Networking
Nitish Awasthi (anitish_225)
 
Multiple access protocols in data communication networks
Multiple access protocols in data communication networksMultiple access protocols in data communication networks
Multiple access protocols in data communication networks
Nt Arvind
 
clas 8
clas 8clas 8
clas 8
FairuzFatemi
 
Multiple access control protocol
Multiple access control protocol Multiple access control protocol
Multiple access control protocol
meenamunesh
 
The mac layer
The mac layerThe mac layer
The mac layeraazamk
 
aloha
alohaaloha
aloha
DeepikaT13
 
Media Access Control (MAC Layer)
Media Access Control (MAC Layer)Media Access Control (MAC Layer)
Media Access Control (MAC Layer)
Meenakshi Paul
 
CSMA /CD PPT ON SLIDESHARE
CSMA /CD PPT ON SLIDESHARECSMA /CD PPT ON SLIDESHARE
CSMA /CD PPT ON SLIDESHARE
Khushboo Pal
 
Aloha
AlohaAloha
Aloha
mangal das
 
Csma protocols
Csma protocolsCsma protocols
Csma protocols
Manal Shah
 
MAC
MACMAC
Csmaca
CsmacaCsmaca
Csmaca
Oka Danil
 

What's hot (20)

Media Access Control
Media Access ControlMedia Access Control
Media Access Control
 
3.Medium Access Control
3.Medium Access Control3.Medium Access Control
3.Medium Access Control
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
 
seminar report on multiple access control protocol submitted by munesh
seminar report on multiple access control protocol submitted by munesh seminar report on multiple access control protocol submitted by munesh
seminar report on multiple access control protocol submitted by munesh
 
Multiple Access Control Protocol (MAC Protocol) Networking
Multiple Access Control Protocol (MAC Protocol) Networking Multiple Access Control Protocol (MAC Protocol) Networking
Multiple Access Control Protocol (MAC Protocol) Networking
 
Multiple access protocols in data communication networks
Multiple access protocols in data communication networksMultiple access protocols in data communication networks
Multiple access protocols in data communication networks
 
clas 8
clas 8clas 8
clas 8
 
Multiple access control protocol
Multiple access control protocol Multiple access control protocol
Multiple access control protocol
 
The medium access sublayer
 The medium  access sublayer The medium  access sublayer
The medium access sublayer
 
The mac layer
The mac layerThe mac layer
The mac layer
 
aloha
alohaaloha
aloha
 
Media Access Control (MAC Layer)
Media Access Control (MAC Layer)Media Access Control (MAC Layer)
Media Access Control (MAC Layer)
 
csma ca
 csma ca csma ca
csma ca
 
CSMA /CD PPT ON SLIDESHARE
CSMA /CD PPT ON SLIDESHARECSMA /CD PPT ON SLIDESHARE
CSMA /CD PPT ON SLIDESHARE
 
Aloha
AlohaAloha
Aloha
 
Csma protocols
Csma protocolsCsma protocols
Csma protocols
 
Chapter4 1
Chapter4 1Chapter4 1
Chapter4 1
 
MAC
MACMAC
MAC
 
Mac
MacMac
Mac
 
Csmaca
CsmacaCsmaca
Csmaca
 

Similar to multiple access

mutiple acces protocol.ppt
mutiple acces protocol.pptmutiple acces protocol.ppt
mutiple acces protocol.ppt
rocky781582
 
mac-protocols
mac-protocols mac-protocols
mac-protocols
DivyaKS18
 
Multiple Access ppt in Object Oriented Programming
Multiple Access ppt in Object Oriented ProgrammingMultiple Access ppt in Object Oriented Programming
Multiple Access ppt in Object Oriented Programming
arnavytstudio2814
 
3b multiple access
3b multiple access3b multiple access
3b multiple access
kavish dani
 
Multiple Access in wireless communication
Multiple Access in wireless communicationMultiple Access in wireless communication
Multiple Access in wireless communication
Maulik Togadiya
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communication
panditadesh123
 
Ch12
Ch12Ch12
Unit_3_WSN.pptx
Unit_3_WSN.pptxUnit_3_WSN.pptx
Unit_3_WSN.pptx
nooralleema
 
unit 3 Multiple Access.ppt
unit 3 Multiple Access.pptunit 3 Multiple Access.ppt
unit 3 Multiple Access.ppt
zmulani8
 
Computer network
Computer networkComputer network
Computer network
sweetysweety8
 
IV_UNIT.ppt
IV_UNIT.pptIV_UNIT.ppt
IV_UNIT.ppt
ShantanuDharekar
 
Multiple acessing
Multiple acessing Multiple acessing
Multiple acessing
Piyush Sarin
 
12 Multiple Access
12 Multiple Access12 Multiple Access
12 Multiple Access
Ahmar Hashmi
 
specialized-mac-sdmafdmatdma-and-cdma.pdf
specialized-mac-sdmafdmatdma-and-cdma.pdfspecialized-mac-sdmafdmatdma-and-cdma.pdf
specialized-mac-sdmafdmatdma-and-cdma.pdf
ianeroman
 
Introduction to networking
Introduction to networkingIntroduction to networking
Introduction to networking
IdealGraphics
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Pallepati Vasavi
 
Ch12
Ch12Ch12
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptxComputer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptx
Pravinbhargav
 

Similar to multiple access (20)

Ch12
Ch12Ch12
Ch12
 
mutiple acces protocol.ppt
mutiple acces protocol.pptmutiple acces protocol.ppt
mutiple acces protocol.ppt
 
mac-protocols
mac-protocols mac-protocols
mac-protocols
 
Multiple Access ppt in Object Oriented Programming
Multiple Access ppt in Object Oriented ProgrammingMultiple Access ppt in Object Oriented Programming
Multiple Access ppt in Object Oriented Programming
 
3b multiple access
3b multiple access3b multiple access
3b multiple access
 
Multiple Access in wireless communication
Multiple Access in wireless communicationMultiple Access in wireless communication
Multiple Access in wireless communication
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communication
 
Ch12
Ch12Ch12
Ch12
 
Ch12
Ch12Ch12
Ch12
 
Unit_3_WSN.pptx
Unit_3_WSN.pptxUnit_3_WSN.pptx
Unit_3_WSN.pptx
 
unit 3 Multiple Access.ppt
unit 3 Multiple Access.pptunit 3 Multiple Access.ppt
unit 3 Multiple Access.ppt
 
Computer network
Computer networkComputer network
Computer network
 
IV_UNIT.ppt
IV_UNIT.pptIV_UNIT.ppt
IV_UNIT.ppt
 
Multiple acessing
Multiple acessing Multiple acessing
Multiple acessing
 
12 Multiple Access
12 Multiple Access12 Multiple Access
12 Multiple Access
 
specialized-mac-sdmafdmatdma-and-cdma.pdf
specialized-mac-sdmafdmatdma-and-cdma.pdfspecialized-mac-sdmafdmatdma-and-cdma.pdf
specialized-mac-sdmafdmatdma-and-cdma.pdf
 
Introduction to networking
Introduction to networkingIntroduction to networking
Introduction to networking
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
 
Ch12
Ch12Ch12
Ch12
 
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptxComputer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptx
 

More from AKSHIT KOHLI

Surveilance ppt
Surveilance ppt Surveilance ppt
Surveilance ppt
AKSHIT KOHLI
 
ELECTRICAL AND ELECTRONICS MEASURING INSTRUMETNTS,CRO,CRT,PROBES,OSCILLOSCOPES
ELECTRICAL AND ELECTRONICS MEASURING INSTRUMETNTS,CRO,CRT,PROBES,OSCILLOSCOPESELECTRICAL AND ELECTRONICS MEASURING INSTRUMETNTS,CRO,CRT,PROBES,OSCILLOSCOPES
ELECTRICAL AND ELECTRONICS MEASURING INSTRUMETNTS,CRO,CRT,PROBES,OSCILLOSCOPES
AKSHIT KOHLI
 
VIRTUAL CIRCUIT NETWORKS, atm , frame relay
VIRTUAL CIRCUIT NETWORKS, atm , frame relayVIRTUAL CIRCUIT NETWORKS, atm , frame relay
VIRTUAL CIRCUIT NETWORKS, atm , frame relay
AKSHIT KOHLI
 
LAYER PROTOCOL ,SONET,SDH
LAYER PROTOCOL ,SONET,SDHLAYER PROTOCOL ,SONET,SDH
LAYER PROTOCOL ,SONET,SDH
AKSHIT KOHLI
 
ETHERNET
ETHERNETETHERNET
ETHERNET
AKSHIT KOHLI
 
data queue data base ,MAN
data queue data base ,MANdata queue data base ,MAN
data queue data base ,MAN
AKSHIT KOHLI
 
lan connecting device
lan connecting devicelan connecting device
lan connecting device
AKSHIT KOHLI
 
local area network
 local area network local area network
local area network
AKSHIT KOHLI
 
ipv4
ipv4ipv4
transfer protocols,ftp,smtp,pop,imap
transfer protocols,ftp,smtp,pop,imaptransfer protocols,ftp,smtp,pop,imap
transfer protocols,ftp,smtp,pop,imap
AKSHIT KOHLI
 
internet protocols
internet protocolsinternet protocols
internet protocols
AKSHIT KOHLI
 
tcp ip protocols
tcp ip protocolstcp ip protocols
tcp ip protocols
AKSHIT KOHLI
 
udp , tcp ,sctp
udp , tcp ,sctpudp , tcp ,sctp
udp , tcp ,sctp
AKSHIT KOHLI
 
icmp , igmp
icmp , igmpicmp , igmp
icmp , igmp
AKSHIT KOHLI
 
network layer
network layernetwork layer
network layer
AKSHIT KOHLI
 
osi model
osi modelosi model
osi model
AKSHIT KOHLI
 
transmission mode
transmission modetransmission mode
transmission mode
AKSHIT KOHLI
 
computer networks
computer networks computer networks
computer networks
AKSHIT KOHLI
 
topologycomputer networking basics
topologycomputer networking basicstopologycomputer networking basics
topologycomputer networking basics
AKSHIT KOHLI
 

More from AKSHIT KOHLI (19)

Surveilance ppt
Surveilance ppt Surveilance ppt
Surveilance ppt
 
ELECTRICAL AND ELECTRONICS MEASURING INSTRUMETNTS,CRO,CRT,PROBES,OSCILLOSCOPES
ELECTRICAL AND ELECTRONICS MEASURING INSTRUMETNTS,CRO,CRT,PROBES,OSCILLOSCOPESELECTRICAL AND ELECTRONICS MEASURING INSTRUMETNTS,CRO,CRT,PROBES,OSCILLOSCOPES
ELECTRICAL AND ELECTRONICS MEASURING INSTRUMETNTS,CRO,CRT,PROBES,OSCILLOSCOPES
 
VIRTUAL CIRCUIT NETWORKS, atm , frame relay
VIRTUAL CIRCUIT NETWORKS, atm , frame relayVIRTUAL CIRCUIT NETWORKS, atm , frame relay
VIRTUAL CIRCUIT NETWORKS, atm , frame relay
 
LAYER PROTOCOL ,SONET,SDH
LAYER PROTOCOL ,SONET,SDHLAYER PROTOCOL ,SONET,SDH
LAYER PROTOCOL ,SONET,SDH
 
ETHERNET
ETHERNETETHERNET
ETHERNET
 
data queue data base ,MAN
data queue data base ,MANdata queue data base ,MAN
data queue data base ,MAN
 
lan connecting device
lan connecting devicelan connecting device
lan connecting device
 
local area network
 local area network local area network
local area network
 
ipv4
ipv4ipv4
ipv4
 
transfer protocols,ftp,smtp,pop,imap
transfer protocols,ftp,smtp,pop,imaptransfer protocols,ftp,smtp,pop,imap
transfer protocols,ftp,smtp,pop,imap
 
internet protocols
internet protocolsinternet protocols
internet protocols
 
tcp ip protocols
tcp ip protocolstcp ip protocols
tcp ip protocols
 
udp , tcp ,sctp
udp , tcp ,sctpudp , tcp ,sctp
udp , tcp ,sctp
 
icmp , igmp
icmp , igmpicmp , igmp
icmp , igmp
 
network layer
network layernetwork layer
network layer
 
osi model
osi modelosi model
osi model
 
transmission mode
transmission modetransmission mode
transmission mode
 
computer networks
computer networks computer networks
computer networks
 
topologycomputer networking basics
topologycomputer networking basicstopologycomputer networking basics
topologycomputer networking basics
 

Recently uploaded

Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
BrazilAccount1
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
SupreethSP4
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 

Recently uploaded (20)

Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 

multiple access

  • 1. 12.1 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
  • 2. 12.2 Data link layer divided into two functionality-oriented sublayers
  • 3. 12.3 Taxonomy of multiple-access protocols discussed in this chapter
  • 4. 12.4 RANDOM ACCESSRANDOM ACCESS InIn random accessrandom access oror contentioncontention methods, no station ismethods, no station is superior to another station and none is assigned thesuperior to another station and none is assigned the control over another. No station permits, or does notcontrol over another. No station permits, or does not permit, another station to send. At each instance, apermit, another station to send. At each instance, a station that has data to send uses a procedure definedstation that has data to send uses a procedure defined by the protocol to make a decision on whether or notby the protocol to make a decision on whether or not to send.to send. ALOHA Carrier Sense Multiple Access Carrier Sense Multiple Access with Collision Detection Carrier Sense Multiple Access with Collision Avoidance Topics discussed in this section:Topics discussed in this section:
  • 5. 12.5 To avoid access conflict or to resolve it when itTo avoid access conflict or to resolve it when it happens, each station follows a procedure that answerhappens, each station follows a procedure that answer the following questions:the following questions:  When can the station access the medium.When can the station access the medium. What can the station do if the medium is busy.What can the station do if the medium is busy. How can the station determine the success or failureHow can the station determine the success or failure of the transmission.of the transmission. What can the station do if there is an access conflict.What can the station do if there is an access conflict.
  • 6. 12.6 ALOHA ALOHA, the earliest random access method, was developed at the University of Hawaii in early 1970. It was designed for a radio (wireless) LAN, but it can be used on any shared medium. Pure ALOHA Slotted ALOHA
  • 7. 12.7 Frames in a pure ALOHA network
  • 8. 12.8 Procedure for pure ALOHA protocol
  • 9. 12.9 Vulnerable time for pure ALOHA protocol The Vulnerable time, in which there is possibility of collision
  • 11. 12.11 Frames in a slotted ALOHA network
  • 12. 12.12 Figure 12.7 Vulnerable time for slotted ALOHA protocol
  • 14. 12.14 Space/time model of the collision in CSMA
  • 16. 12.16 Persistence Method What Should a station do if the channel is busy. What should a station do if the channel is idle. 1-Persistence Method Non Persistence Method p-Persistence Method
  • 17. 12.17 Behavior of three persistence methods
  • 18. 12.18 Flow diagram for three persistence methods
  • 19. 12.19 Collision of the first bit in CSMA/CD
  • 21. 12.21 Flow diagram for the CSMA/CD
  • 22. 12.22 Figure 12.15 Energy level during transmission, idleness, or collision
  • 23. 12.23 Figure 12.16 Timing in CSMA/CA Interframe Space (IFS)
  • 24. 12.24 In CSMA/CA, the IFS can also be used to define the priority of a station or a frame. Note
  • 25. 12.25 In CSMA/CA, if the station finds the channel busy, it does not restart the timer of the contention window; it stops the timer and restarts it when the channel becomes idle. Note
  • 26. 12.26 Figure 12.17 Flow diagram for CSMA/CA
  • 27. 12.27 CONTROLLED ACCESSCONTROLLED ACCESS InIn controlled accesscontrolled access, the stations consult one another, the stations consult one another to find which station has the right to send. A stationto find which station has the right to send. A station cannot send unless it has been authorized by othercannot send unless it has been authorized by other stations. We discuss three popular controlled-accessstations. We discuss three popular controlled-access methods.methods. Reservation Polling Token Passing Topics discussed in this section:Topics discussed in this section:
  • 28. 12.28 Logical ring and physical topology in token-passing access method
  • 29. Computer Science & Engineering Assignment Semester- VI (I & II) Branch: CSE Subject with Code: Computer Networks (IT-305-F) ----------------------------------------------------------------------------------------------- Q:1 Explain Lacal Area Network. Q:2 Explain IEEE 802 standards in Detail.