SlideShare a Scribd company logo
COMPUTER NETWORKS
CA - 727
Multiple Access
Prateek Soni
205114026
Multiple Access
1
On the basis of functionality oriented sublayers :
DATA LINK LAYER
# Data Link Control - for data link control
# Multiple Access Resolution - for resolving access to shared media
Note : if the link is dedicated, we do not require the lower sublayer.
* Dedicated – line / channel reserved exclusively for one type of communication.
Multiple Access
2
Multiple Access Links
• Point to Point : networks are those in which, when a message is
sent from one computer to another, it actually has to be sent via
other computers in the network.
• Broadcast : networks have a single channel that is shared by all the
machines in the network.
When nodes or stations are connected and use a common link,
called a multipoint or broadcast link (or network), we need a
Multiple Access protocol to coordinate access to the link.
Multiple Access
3
Definition
Multiple Access (protocols) allows several terminals
connected to the same multi-point transmission medium to transmit
over it and to share its capacity.
It allows several data streams or signals to share the
same communication channel or physical medium.
Multiple Access
4
RANDOM ACCESS METHODS
• No station is superior to another station.
• None is assigned the control over another.
• No station permits, or does not permit, another station to send.
• At each instance, a station that has data to send uses a procedure defined by the
protocol to make a decision on whether or not to send.
• Random Access Protocols :
ALOHA
Carrier Sense Multiple Access (CSMA)
Carrier Sense Multiple Access with Collision Detection (CSMA/CD)
Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)
Multiple Access
5
1. ALOHA and its variants
• One of the earliest multiple access scheme
• Just sent it!
• Wait for ack
• If no ack, try again after a random waiting time
• No back off
Multiple Access
6
Pure ALOHA
• CONCEPT - Each station sends a frame, when it has frame to send.
• Since only one channel to share, there is a possibility of collision between frames
of different stations.
• Frames in Pure ALOHA network :
Multiple Access
7
Procedure for Pure ALOHA protocol
Multiple Access
8
Vulnerable time for Pure ALOHA protocol
Multiple Access
9
Slotted ALOHA
• To improve the efficiency of Pure ALOHA.
• CONCEPT - Divide the time into slots of Tfr and force the station to send only at
the beginning of the time slot.
Multiple Access
10
Vulnerable time for Slotted ALOHA
Multiple Access
11
2. Carrier Sense Multiple Access
• To minimize the chance of collision and increase the performance.
• CONCEPT - Each Station listen before sending i.e. “Listen before Talk”.
• It reduce collisions but cannot eliminate it.
• Space/Time model of collision in CSMA :
Multiple Access
12
Vulnerable time in CSMA
Multiple Access
13
Persistence Methods
What should a station do if the channel is busy?
What should a channel do if channel is idle?
Three Methods devised to answer these questions :
• I - persistence method : the station finds the line idle, it sends its frame
immediately.
• Non persistence method : a station that has a frame to send senses the line. If
the line is idle, it sends immediately. If the line is not idle, it waits a random
amount of time and then senses the line again.
• P - persistence method : is used if the channel has time slots with a slot duration
equal to or greater than the maximum propagation time. The p-persistent
approach combines the advantages of the other two strategies.
Multiple Access
14
Behaviour of three Persistence Methods
Multiple Access
15
Flow Diagram of three Persistence Methods
Multiple Access
16
3. CSMA/CD
• Employ algorithm to handle collision.
• A station monitors the medium after it sends a frame to see if the transmission
was successful. If so, the station is finished. If, however, there is a collision, the
frame is sent again.
• Collision of first bit in CSMA/CD :
Multiple Access
17
Flow diagram of CSMA/CD
Multiple Access
18
4. CSMA/CA
• Basic Idea - is that a station needs to be able to receive while transmitting to
detect a collision.
• When there is no collision, the station receives one signal: its own signal. When
there is a collision, the station receives two signals: its own signal and the signal
transmitted by a second station.
• Timing in CSMA/CA :
Multiple Access
19
Flow Diagram of CSMA/CA
Multiple Access
20
CONTROLLED ACCESS METHODS
• Stations consult one another to find which station has the right to
send.
• A station cannot send unless it has been authorized by other
stations.
• Three Popular Controlled access methods :-
Reservation
Polling
Token Passing
Multiple Access
21
1. Reservation
• A station needs to make a reservation before sending data.
• Time is divided into intervals.
• In each interval, a reservation frame precedes the data frames sent in that
interval.
• If there are N stations in the system, there are exactly N reservation minislots in
the reservation frame.
• Reservation access method :
Multiple Access
22
2. Polling
• Polling works with topologies.
• One device acts as PRIMARY station and the other devices acts as SECONDARY
stations; Primary device is the initiator of a session.
• All data exchanges must be made through the primary device.
• Primary device controls the link; the secondary devices follow its instructions.
• Select and Poll functions in polling access methods :
Multiple Access
23
Select -
The select function is used whenever the primary device has something to send.
If the primary is neither sending nor receiving data, it knows the link is available. If it
has something to send, the primary device sends it.
So the primary must alert the secondary to the upcoming transmission and wait for
an acknowledgment of the secondary's ready status. Before sending data, the primary
creates and transmits a select (SEL) frame, one field of which includes the address of
the intended secondary.
Poll -
The poll function is used by the primary device to solicit transmissions from the
secondary devices. When the primary is ready to receive data, it must ask (poll) each
device in turn if it has anything to send. When the first secondary is approached, it
responds either with a NAK frame if it has nothing to send or with data (in the form of
a data frame) if it does. If the response is negative (a NAK frame), then the primary
polls the next secondary in the same manner until it finds one with data to send.
When the response is positive (a data frame), the primary reads the frame and
returns an acknowledgment (ACK frame), verifying its receipt.Multiple Access
24
3. Token Passing
• The stations in a network are organized in a logical ring.
• For each station, there is a predecessor and a successor.
• The right to this access has been passed from the predecessor to the current
station. The right will be passed to the successor when the current station has
no more data to send.
• The RIGHT passed from by means of special packet called “TOKEN”.
Multiple Access
25
Logical ring and physical topology in Token-passing
Multiple Access
26
CHANNELIZATION ACCESS METHOD
• Bandwidth of Link is shared in time, frequency or through code,
between different stations.
• Three Channelization protocol :
Frequency-Division Multiple Access (FDMA)
Time-Division Multiple Access (TDMA)
Code-Division Multiple Access (CDMA)
Multiple Access
27
1. Frequency-Division Multiple Access (FDMA)
• Available bandwidth is divided into frequency bands.
• Each band is reserved for a specific station.
• Each station also uses a bandpass filter to confine the transmitter frequencies.
Multiple Access
28
2. Time-Division Multiple Access (TDMA)
• Stations share the bandwidth of the channel in time.
• Each station is allocated a time slot during which it can send data.
• Time Division Multiple Access :
Multiple Access
29
3. Code-Division Multiple Access (CDMA)
• CDMA differs from FDMA because only one channel occupies the entire
bandwidth of the link.
• CDMA differs from TDMA because all stations can send data simultaneously;
there is no timesharing.
• Simple IDEA of Communication with code :
Multiple Access
30
Chips
• CDMA is based on coding theory. Each station is assigned a code, which is a
sequence of numbers called chips.
• Chip Sequence :
• These are the orthogonal sequences and have the following properties:
1. Each sequence is made of N elements, where N is the number of stations.
2. If we multiply a sequence by a number, every element in the sequence is
multiplied by that element. This is called multiplication of a sequence by a
scalar.
For example 2 * [+1 +1-1-1]=[+2+2-2-2]
Multiple Access
31
3. If we multiply two equal sequences, element by element, and add the results, we get
N, where N is the number of elements in the each sequence. This is called the inner
product of two equal sequences.
For example,
[+1 +1 -1 -1] *[+1 +1 -1 -1] = 1 + 1 + 1 + 1 = 4
4. If we multiply two different sequences, element by element, and add the results, we
get 0. This is called inner product of two different sequences.
For example,
[+1 +1 -1 -1] * [+1 +1 +1 +1] = 1 + 1- 1- 1= 0
5. Adding two sequences means adding the corresponding elements. The result is
another sequence.
For example,
[+1 +1 -1 -1] + [+1 +1 +1 +1]=[+2 +2 0 0]
Multiple Access
32
Data Representation
If a station needs to send a 0 bit, it encodes it as -1; if it needs to send
a 1 bit, it encodes it as +1. When a station is idle, it sends no signal,
which is interpreted as a 0.
Multiple Access
33
Sharing Channel in CDMA
Multiple Access
34
Sequence generation
• To generate chip sequences, we use a Walsh table, which is a two-dimensional
table with an equal number of rows and columns.
Multiple Access
35
References :
> Data Communications and Networking by Behrouz A . Forouzan.
> Wikipedia
Thank you
Multiple Access
36

More Related Content

What's hot

Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks
Divya Tiwari
 
Ethernet Computer network
Ethernet Computer networkEthernet Computer network
Ethernet Computer network
miteshppt
 
Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer
Dr. SELVAGANESAN S
 
Controlled Access Protocols
Controlled Access ProtocolsControlled Access Protocols
Controlled Access Protocols
Pruthviraj Konu
 
Mobile IP - pavankumar_912
Mobile IP - pavankumar_912Mobile IP - pavankumar_912
Mobile IP - pavankumar_912
Pavan Kumar Sindgi
 
Switching Concepts presentation
Switching Concepts presentationSwitching Concepts presentation
Switching Concepts presentation
zameer Abbas
 
Network Layer
Network LayerNetwork Layer
Network Layer
Dr Shashikant Athawale
 
Synchronous and Asynchronous Transmission
Synchronous and Asynchronous TransmissionSynchronous and Asynchronous Transmission
Synchronous and Asynchronous Transmission
Adeel Rasheed
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)
Parvesh Taneja
 
Computer networks - Channelization
Computer networks - ChannelizationComputer networks - Channelization
Computer networks - Channelization
Elambaruthi Elambaruthi
 
Distance Vector & Link state Routing Algorithm
Distance Vector & Link state Routing AlgorithmDistance Vector & Link state Routing Algorithm
Distance Vector & Link state Routing Algorithm
MOHIT AGARWAL
 
Application Layer
Application Layer Application Layer
Application Layer
Dr Shashikant Athawale
 
WLAN
WLANWLAN
Media Access Layer
Media Access LayerMedia Access Layer
Media Access Layer
Kamal Acharya
 
Token Ring : 802.5
Token Ring : 802.5Token Ring : 802.5
Token Ring : 802.5
Pnkj_Sharma
 
IEEE 802.11
IEEE 802.11IEEE 802.11
IEEE 802.11
Ramasubbu .P
 
Introduction of tcp, ip & udp
Introduction of tcp, ip & udpIntroduction of tcp, ip & udp
Introduction of tcp, ip & udprahul kundu
 

What's hot (20)

Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks
 
Ethernet Computer network
Ethernet Computer networkEthernet Computer network
Ethernet Computer network
 
Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer
 
Controlled Access Protocols
Controlled Access ProtocolsControlled Access Protocols
Controlled Access Protocols
 
Ppt of routing protocols
Ppt of routing protocolsPpt of routing protocols
Ppt of routing protocols
 
The medium access sublayer
 The medium  access sublayer The medium  access sublayer
The medium access sublayer
 
Mobile IP - pavankumar_912
Mobile IP - pavankumar_912Mobile IP - pavankumar_912
Mobile IP - pavankumar_912
 
Switching Concepts presentation
Switching Concepts presentationSwitching Concepts presentation
Switching Concepts presentation
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Synchronous and Asynchronous Transmission
Synchronous and Asynchronous TransmissionSynchronous and Asynchronous Transmission
Synchronous and Asynchronous Transmission
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)
 
Computer networks - Channelization
Computer networks - ChannelizationComputer networks - Channelization
Computer networks - Channelization
 
Distance Vector & Link state Routing Algorithm
Distance Vector & Link state Routing AlgorithmDistance Vector & Link state Routing Algorithm
Distance Vector & Link state Routing Algorithm
 
Application Layer
Application Layer Application Layer
Application Layer
 
WLAN
WLANWLAN
WLAN
 
Media Access Layer
Media Access LayerMedia Access Layer
Media Access Layer
 
Token Ring : 802.5
Token Ring : 802.5Token Ring : 802.5
Token Ring : 802.5
 
Mac sub layer
Mac sub layerMac sub layer
Mac sub layer
 
IEEE 802.11
IEEE 802.11IEEE 802.11
IEEE 802.11
 
Introduction of tcp, ip & udp
Introduction of tcp, ip & udpIntroduction of tcp, ip & udp
Introduction of tcp, ip & udp
 

Viewers also liked

Dc chapter 13
Dc chapter   13Dc chapter   13
Dc chapter 13TechiNerd
 
Multiple Access Networking
Multiple Access NetworkingMultiple Access Networking
Multiple Access Networking
Shashi Kumar
 
Multiple access control protocol
Multiple access control protocol Multiple access control protocol
Multiple access control protocol
meenamunesh
 
3b multiple access
3b multiple access3b multiple access
3b multiple access
kavish dani
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
tes31
 
Multiple acessing
Multiple acessing Multiple acessing
Multiple acessing
Piyush Sarin
 
802.11 wireless lan
802.11 wireless lan802.11 wireless lan
802.11 wireless lanMohd Arif
 
3.Medium Access Control
3.Medium Access Control3.Medium Access Control
3.Medium Access ControlSonali Chauhan
 
M.A.C (Medium Access Control)
M.A.C (Medium Access Control)M.A.C (Medium Access Control)
M.A.C (Medium Access Control)
JaironLanda
 
Multiple Access Techniques for 5G
Multiple Access Techniques for 5GMultiple Access Techniques for 5G
Multiple Access Techniques for 5G
Sitha Sok
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
Maria Akther
 
Satellite Multiple Access Schemes
Satellite Multiple Access SchemesSatellite Multiple Access Schemes
Satellite Multiple Access SchemesDileep Kadavarath
 
Errror Detection and Correction
Errror Detection and CorrectionErrror Detection and Correction
Errror Detection and CorrectionMahesh Kumar Attri
 
Multiple acces techniques
Multiple acces techniquesMultiple acces techniques
Multiple acces techniques
paramsidhu89
 
FDMA-TDMA-CDMA
FDMA-TDMA-CDMAFDMA-TDMA-CDMA
FDMA-TDMA-CDMA
Sammar Khan
 
Error control, parity check, check sum, vrc
Error control, parity check, check sum, vrcError control, parity check, check sum, vrc
Error control, parity check, check sum, vrcHuawei Technologies
 

Viewers also liked (20)

Dc chapter 13
Dc chapter   13Dc chapter   13
Dc chapter 13
 
Multiple Access Networking
Multiple Access NetworkingMultiple Access Networking
Multiple Access Networking
 
Multiple access control protocol
Multiple access control protocol Multiple access control protocol
Multiple access control protocol
 
3b multiple access
3b multiple access3b multiple access
3b multiple access
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
 
Multiple access protocol
Multiple access protocolMultiple access protocol
Multiple access protocol
 
Multiple acessing
Multiple acessing Multiple acessing
Multiple acessing
 
802.11 wireless lan
802.11 wireless lan802.11 wireless lan
802.11 wireless lan
 
3.Medium Access Control
3.Medium Access Control3.Medium Access Control
3.Medium Access Control
 
M.A.C (Medium Access Control)
M.A.C (Medium Access Control)M.A.C (Medium Access Control)
M.A.C (Medium Access Control)
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
 
Ch12
Ch12Ch12
Ch12
 
Multiple Access Techniques for 5G
Multiple Access Techniques for 5GMultiple Access Techniques for 5G
Multiple Access Techniques for 5G
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
 
Satellite Multiple Access Schemes
Satellite Multiple Access SchemesSatellite Multiple Access Schemes
Satellite Multiple Access Schemes
 
Errror Detection and Correction
Errror Detection and CorrectionErrror Detection and Correction
Errror Detection and Correction
 
Multiple acces techniques
Multiple acces techniquesMultiple acces techniques
Multiple acces techniques
 
CSMA/CD
CSMA/CDCSMA/CD
CSMA/CD
 
FDMA-TDMA-CDMA
FDMA-TDMA-CDMAFDMA-TDMA-CDMA
FDMA-TDMA-CDMA
 
Error control, parity check, check sum, vrc
Error control, parity check, check sum, vrcError control, parity check, check sum, vrc
Error control, parity check, check sum, vrc
 

Similar to Multiple Access Methods

Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
upamatechverse
 
CN Unit 2 - cs8591.pptx
CN Unit 2 - cs8591.pptxCN Unit 2 - cs8591.pptx
CN Unit 2 - cs8591.pptx
Pondinesh2
 
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptxComputer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptx
Pravinbhargav
 
WHAT IS MAC-1 presentation for information .pptx
WHAT IS MAC-1 presentation for information  .pptxWHAT IS MAC-1 presentation for information  .pptx
WHAT IS MAC-1 presentation for information .pptx
SaqlainKhan39
 
Wireless LAN in Data Communication & Networking
Wireless LAN in Data Communication & NetworkingWireless LAN in Data Communication & Networking
Wireless LAN in Data Communication & Networking
Sweta Kumari Barnwal
 
CSC 424 -Lecture 5n8 2022.pptx
CSC 424 -Lecture 5n8 2022.pptxCSC 424 -Lecture 5n8 2022.pptx
CSC 424 -Lecture 5n8 2022.pptx
NoraNjepuome3
 
clas 8
clas 8clas 8
clas 8
FairuzFatemi
 
Multiple access protocols in data communication networks
Multiple access protocols in data communication networksMultiple access protocols in data communication networks
Multiple access protocols in data communication networks
Nt Arvind
 
1 networking devices 2014
1 networking devices 20141 networking devices 2014
1 networking devices 2014
Zuhaib Zaroon
 
the Multiple Access SLIDE for university students
the Multiple Access SLIDE for university studentsthe Multiple Access SLIDE for university students
the Multiple Access SLIDE for university students
novrain1
 
seminar report on multiple access control protocol submitted by munesh
seminar report on multiple access control protocol submitted by munesh seminar report on multiple access control protocol submitted by munesh
seminar report on multiple access control protocol submitted by munesh meenamunesh
 
Unit-2 Media Access Protocols.pdf
Unit-2 Media Access Protocols.pdfUnit-2 Media Access Protocols.pdf
Unit-2 Media Access Protocols.pdf
SmtPArunaKumari
 
link-medium-access-control.pptx
link-medium-access-control.pptxlink-medium-access-control.pptx
link-medium-access-control.pptx
patrickwang85
 
datalinklayer-200201062315 (1).pptx
datalinklayer-200201062315 (1).pptxdatalinklayer-200201062315 (1).pptx
datalinklayer-200201062315 (1).pptx
MeenaAnusha1
 
Data link control notes
Data link control notesData link control notes
Data link control notes
invertis university
 
Introduction to backwards learning algorithm
Introduction to backwards learning algorithmIntroduction to backwards learning algorithm
Introduction to backwards learning algorithm
Roshan Karunarathna
 
multiacess protocol
multiacess protocolmultiacess protocol
multiacess protocol
Kanwal Khan
 
Transport layer
Transport layerTransport layer
Transport layer
arvind pandey
 
9 multiple access
9 multiple access9 multiple access
9 multiple accessampas03
 
Unit 3 - Data Link Layer - Part B
Unit 3 - Data Link Layer - Part BUnit 3 - Data Link Layer - Part B
Unit 3 - Data Link Layer - Part B
Chandan Gupta Bhagat
 

Similar to Multiple Access Methods (20)

Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
CN Unit 2 - cs8591.pptx
CN Unit 2 - cs8591.pptxCN Unit 2 - cs8591.pptx
CN Unit 2 - cs8591.pptx
 
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptxComputer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptx
 
WHAT IS MAC-1 presentation for information .pptx
WHAT IS MAC-1 presentation for information  .pptxWHAT IS MAC-1 presentation for information  .pptx
WHAT IS MAC-1 presentation for information .pptx
 
Wireless LAN in Data Communication & Networking
Wireless LAN in Data Communication & NetworkingWireless LAN in Data Communication & Networking
Wireless LAN in Data Communication & Networking
 
CSC 424 -Lecture 5n8 2022.pptx
CSC 424 -Lecture 5n8 2022.pptxCSC 424 -Lecture 5n8 2022.pptx
CSC 424 -Lecture 5n8 2022.pptx
 
clas 8
clas 8clas 8
clas 8
 
Multiple access protocols in data communication networks
Multiple access protocols in data communication networksMultiple access protocols in data communication networks
Multiple access protocols in data communication networks
 
1 networking devices 2014
1 networking devices 20141 networking devices 2014
1 networking devices 2014
 
the Multiple Access SLIDE for university students
the Multiple Access SLIDE for university studentsthe Multiple Access SLIDE for university students
the Multiple Access SLIDE for university students
 
seminar report on multiple access control protocol submitted by munesh
seminar report on multiple access control protocol submitted by munesh seminar report on multiple access control protocol submitted by munesh
seminar report on multiple access control protocol submitted by munesh
 
Unit-2 Media Access Protocols.pdf
Unit-2 Media Access Protocols.pdfUnit-2 Media Access Protocols.pdf
Unit-2 Media Access Protocols.pdf
 
link-medium-access-control.pptx
link-medium-access-control.pptxlink-medium-access-control.pptx
link-medium-access-control.pptx
 
datalinklayer-200201062315 (1).pptx
datalinklayer-200201062315 (1).pptxdatalinklayer-200201062315 (1).pptx
datalinklayer-200201062315 (1).pptx
 
Data link control notes
Data link control notesData link control notes
Data link control notes
 
Introduction to backwards learning algorithm
Introduction to backwards learning algorithmIntroduction to backwards learning algorithm
Introduction to backwards learning algorithm
 
multiacess protocol
multiacess protocolmultiacess protocol
multiacess protocol
 
Transport layer
Transport layerTransport layer
Transport layer
 
9 multiple access
9 multiple access9 multiple access
9 multiple access
 
Unit 3 - Data Link Layer - Part B
Unit 3 - Data Link Layer - Part BUnit 3 - Data Link Layer - Part B
Unit 3 - Data Link Layer - Part B
 

Recently uploaded

Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
ArianaBusciglio
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
Kartik Tiwari
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 

Recently uploaded (20)

Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 

Multiple Access Methods

  • 1. COMPUTER NETWORKS CA - 727 Multiple Access Prateek Soni 205114026 Multiple Access 1
  • 2. On the basis of functionality oriented sublayers : DATA LINK LAYER # Data Link Control - for data link control # Multiple Access Resolution - for resolving access to shared media Note : if the link is dedicated, we do not require the lower sublayer. * Dedicated – line / channel reserved exclusively for one type of communication. Multiple Access 2
  • 3. Multiple Access Links • Point to Point : networks are those in which, when a message is sent from one computer to another, it actually has to be sent via other computers in the network. • Broadcast : networks have a single channel that is shared by all the machines in the network. When nodes or stations are connected and use a common link, called a multipoint or broadcast link (or network), we need a Multiple Access protocol to coordinate access to the link. Multiple Access 3
  • 4. Definition Multiple Access (protocols) allows several terminals connected to the same multi-point transmission medium to transmit over it and to share its capacity. It allows several data streams or signals to share the same communication channel or physical medium. Multiple Access 4
  • 5. RANDOM ACCESS METHODS • No station is superior to another station. • None is assigned the control over another. • No station permits, or does not permit, another station to send. • At each instance, a station that has data to send uses a procedure defined by the protocol to make a decision on whether or not to send. • Random Access Protocols : ALOHA Carrier Sense Multiple Access (CSMA) Carrier Sense Multiple Access with Collision Detection (CSMA/CD) Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) Multiple Access 5
  • 6. 1. ALOHA and its variants • One of the earliest multiple access scheme • Just sent it! • Wait for ack • If no ack, try again after a random waiting time • No back off Multiple Access 6
  • 7. Pure ALOHA • CONCEPT - Each station sends a frame, when it has frame to send. • Since only one channel to share, there is a possibility of collision between frames of different stations. • Frames in Pure ALOHA network : Multiple Access 7
  • 8. Procedure for Pure ALOHA protocol Multiple Access 8
  • 9. Vulnerable time for Pure ALOHA protocol Multiple Access 9
  • 10. Slotted ALOHA • To improve the efficiency of Pure ALOHA. • CONCEPT - Divide the time into slots of Tfr and force the station to send only at the beginning of the time slot. Multiple Access 10
  • 11. Vulnerable time for Slotted ALOHA Multiple Access 11
  • 12. 2. Carrier Sense Multiple Access • To minimize the chance of collision and increase the performance. • CONCEPT - Each Station listen before sending i.e. “Listen before Talk”. • It reduce collisions but cannot eliminate it. • Space/Time model of collision in CSMA : Multiple Access 12
  • 13. Vulnerable time in CSMA Multiple Access 13
  • 14. Persistence Methods What should a station do if the channel is busy? What should a channel do if channel is idle? Three Methods devised to answer these questions : • I - persistence method : the station finds the line idle, it sends its frame immediately. • Non persistence method : a station that has a frame to send senses the line. If the line is idle, it sends immediately. If the line is not idle, it waits a random amount of time and then senses the line again. • P - persistence method : is used if the channel has time slots with a slot duration equal to or greater than the maximum propagation time. The p-persistent approach combines the advantages of the other two strategies. Multiple Access 14
  • 15. Behaviour of three Persistence Methods Multiple Access 15
  • 16. Flow Diagram of three Persistence Methods Multiple Access 16
  • 17. 3. CSMA/CD • Employ algorithm to handle collision. • A station monitors the medium after it sends a frame to see if the transmission was successful. If so, the station is finished. If, however, there is a collision, the frame is sent again. • Collision of first bit in CSMA/CD : Multiple Access 17
  • 18. Flow diagram of CSMA/CD Multiple Access 18
  • 19. 4. CSMA/CA • Basic Idea - is that a station needs to be able to receive while transmitting to detect a collision. • When there is no collision, the station receives one signal: its own signal. When there is a collision, the station receives two signals: its own signal and the signal transmitted by a second station. • Timing in CSMA/CA : Multiple Access 19
  • 20. Flow Diagram of CSMA/CA Multiple Access 20
  • 21. CONTROLLED ACCESS METHODS • Stations consult one another to find which station has the right to send. • A station cannot send unless it has been authorized by other stations. • Three Popular Controlled access methods :- Reservation Polling Token Passing Multiple Access 21
  • 22. 1. Reservation • A station needs to make a reservation before sending data. • Time is divided into intervals. • In each interval, a reservation frame precedes the data frames sent in that interval. • If there are N stations in the system, there are exactly N reservation minislots in the reservation frame. • Reservation access method : Multiple Access 22
  • 23. 2. Polling • Polling works with topologies. • One device acts as PRIMARY station and the other devices acts as SECONDARY stations; Primary device is the initiator of a session. • All data exchanges must be made through the primary device. • Primary device controls the link; the secondary devices follow its instructions. • Select and Poll functions in polling access methods : Multiple Access 23
  • 24. Select - The select function is used whenever the primary device has something to send. If the primary is neither sending nor receiving data, it knows the link is available. If it has something to send, the primary device sends it. So the primary must alert the secondary to the upcoming transmission and wait for an acknowledgment of the secondary's ready status. Before sending data, the primary creates and transmits a select (SEL) frame, one field of which includes the address of the intended secondary. Poll - The poll function is used by the primary device to solicit transmissions from the secondary devices. When the primary is ready to receive data, it must ask (poll) each device in turn if it has anything to send. When the first secondary is approached, it responds either with a NAK frame if it has nothing to send or with data (in the form of a data frame) if it does. If the response is negative (a NAK frame), then the primary polls the next secondary in the same manner until it finds one with data to send. When the response is positive (a data frame), the primary reads the frame and returns an acknowledgment (ACK frame), verifying its receipt.Multiple Access 24
  • 25. 3. Token Passing • The stations in a network are organized in a logical ring. • For each station, there is a predecessor and a successor. • The right to this access has been passed from the predecessor to the current station. The right will be passed to the successor when the current station has no more data to send. • The RIGHT passed from by means of special packet called “TOKEN”. Multiple Access 25
  • 26. Logical ring and physical topology in Token-passing Multiple Access 26
  • 27. CHANNELIZATION ACCESS METHOD • Bandwidth of Link is shared in time, frequency or through code, between different stations. • Three Channelization protocol : Frequency-Division Multiple Access (FDMA) Time-Division Multiple Access (TDMA) Code-Division Multiple Access (CDMA) Multiple Access 27
  • 28. 1. Frequency-Division Multiple Access (FDMA) • Available bandwidth is divided into frequency bands. • Each band is reserved for a specific station. • Each station also uses a bandpass filter to confine the transmitter frequencies. Multiple Access 28
  • 29. 2. Time-Division Multiple Access (TDMA) • Stations share the bandwidth of the channel in time. • Each station is allocated a time slot during which it can send data. • Time Division Multiple Access : Multiple Access 29
  • 30. 3. Code-Division Multiple Access (CDMA) • CDMA differs from FDMA because only one channel occupies the entire bandwidth of the link. • CDMA differs from TDMA because all stations can send data simultaneously; there is no timesharing. • Simple IDEA of Communication with code : Multiple Access 30
  • 31. Chips • CDMA is based on coding theory. Each station is assigned a code, which is a sequence of numbers called chips. • Chip Sequence : • These are the orthogonal sequences and have the following properties: 1. Each sequence is made of N elements, where N is the number of stations. 2. If we multiply a sequence by a number, every element in the sequence is multiplied by that element. This is called multiplication of a sequence by a scalar. For example 2 * [+1 +1-1-1]=[+2+2-2-2] Multiple Access 31
  • 32. 3. If we multiply two equal sequences, element by element, and add the results, we get N, where N is the number of elements in the each sequence. This is called the inner product of two equal sequences. For example, [+1 +1 -1 -1] *[+1 +1 -1 -1] = 1 + 1 + 1 + 1 = 4 4. If we multiply two different sequences, element by element, and add the results, we get 0. This is called inner product of two different sequences. For example, [+1 +1 -1 -1] * [+1 +1 +1 +1] = 1 + 1- 1- 1= 0 5. Adding two sequences means adding the corresponding elements. The result is another sequence. For example, [+1 +1 -1 -1] + [+1 +1 +1 +1]=[+2 +2 0 0] Multiple Access 32
  • 33. Data Representation If a station needs to send a 0 bit, it encodes it as -1; if it needs to send a 1 bit, it encodes it as +1. When a station is idle, it sends no signal, which is interpreted as a 0. Multiple Access 33
  • 34. Sharing Channel in CDMA Multiple Access 34
  • 35. Sequence generation • To generate chip sequences, we use a Walsh table, which is a two-dimensional table with an equal number of rows and columns. Multiple Access 35
  • 36. References : > Data Communications and Networking by Behrouz A . Forouzan. > Wikipedia Thank you Multiple Access 36