This document discusses multiple access protocols that allow multiple devices to share a common communication channel or transmission medium. It begins by explaining that the data link layer has two sublayers - the data link control sublayer and the multiple access resolution sublayer, which is used to resolve access to shared media. It then describes different types of multiple access links and defines multiple access protocols. The rest of the document discusses various random access methods like ALOHA, CSMA, controlled access methods like polling and token passing, and channelization access methods like FDMA, TDMA, and CDMA. It provides details on the concepts, procedures, and flow diagrams of these different multiple access protocols.
Carrier-sense multiple access with collision detection (CSMA/CD) is a media access control method used most notably in early Ethernet technology for local area networking.Carrier-sense multiple access with collision detection is a media access control method used most notably in early Ethernet technology for local area networking. It uses carrier-sensing to defer transmissions until no other stations are transmitting.
Carrier-sense multiple access with collision detection (CSMA/CD) is a media access control method used most notably in early Ethernet technology for local area networking.Carrier-sense multiple access with collision detection is a media access control method used most notably in early Ethernet technology for local area networking. It uses carrier-sensing to defer transmissions until no other stations are transmitting.
Channelization is a multiple-access method in which the available bandwidth of a link is shared in time, frequency, or through code, between different stations. The three channelization protocols are FDMA, TDMA, and CDMA
Channelization is a multiple-access method in which the available bandwidth of a link is shared in time, frequency, or through code, between different stations. The three channelization protocols are FDMA, TDMA, and CDMA
Introduction to Multiple Access Protocol.pptxupamatechverse
Data link layer is divided into two sub layers:
Logical link control (LLC) layer: The upper sub layer is responsible for data link control i.e. for flow and error control.
Media access control (MAC) layer: The lower sub layer is responsible for resolving access to the shared media. If the channel is dedicated, we do not need the lower sub layer.
this is a presentation i made to give some introduction to the backward learning algorithm hope it would be use full.Many places were referred to get information here
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
2. On the basis of functionality oriented sublayers :
DATA LINK LAYER
# Data Link Control - for data link control
# Multiple Access Resolution - for resolving access to shared media
Note : if the link is dedicated, we do not require the lower sublayer.
* Dedicated – line / channel reserved exclusively for one type of communication.
Multiple Access
2
3. Multiple Access Links
• Point to Point : networks are those in which, when a message is
sent from one computer to another, it actually has to be sent via
other computers in the network.
• Broadcast : networks have a single channel that is shared by all the
machines in the network.
When nodes or stations are connected and use a common link,
called a multipoint or broadcast link (or network), we need a
Multiple Access protocol to coordinate access to the link.
Multiple Access
3
4. Definition
Multiple Access (protocols) allows several terminals
connected to the same multi-point transmission medium to transmit
over it and to share its capacity.
It allows several data streams or signals to share the
same communication channel or physical medium.
Multiple Access
4
5. RANDOM ACCESS METHODS
• No station is superior to another station.
• None is assigned the control over another.
• No station permits, or does not permit, another station to send.
• At each instance, a station that has data to send uses a procedure defined by the
protocol to make a decision on whether or not to send.
• Random Access Protocols :
ALOHA
Carrier Sense Multiple Access (CSMA)
Carrier Sense Multiple Access with Collision Detection (CSMA/CD)
Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)
Multiple Access
5
6. 1. ALOHA and its variants
• One of the earliest multiple access scheme
• Just sent it!
• Wait for ack
• If no ack, try again after a random waiting time
• No back off
Multiple Access
6
7. Pure ALOHA
• CONCEPT - Each station sends a frame, when it has frame to send.
• Since only one channel to share, there is a possibility of collision between frames
of different stations.
• Frames in Pure ALOHA network :
Multiple Access
7
10. Slotted ALOHA
• To improve the efficiency of Pure ALOHA.
• CONCEPT - Divide the time into slots of Tfr and force the station to send only at
the beginning of the time slot.
Multiple Access
10
12. 2. Carrier Sense Multiple Access
• To minimize the chance of collision and increase the performance.
• CONCEPT - Each Station listen before sending i.e. “Listen before Talk”.
• It reduce collisions but cannot eliminate it.
• Space/Time model of collision in CSMA :
Multiple Access
12
14. Persistence Methods
What should a station do if the channel is busy?
What should a channel do if channel is idle?
Three Methods devised to answer these questions :
• I - persistence method : the station finds the line idle, it sends its frame
immediately.
• Non persistence method : a station that has a frame to send senses the line. If
the line is idle, it sends immediately. If the line is not idle, it waits a random
amount of time and then senses the line again.
• P - persistence method : is used if the channel has time slots with a slot duration
equal to or greater than the maximum propagation time. The p-persistent
approach combines the advantages of the other two strategies.
Multiple Access
14
16. Flow Diagram of three Persistence Methods
Multiple Access
16
17. 3. CSMA/CD
• Employ algorithm to handle collision.
• A station monitors the medium after it sends a frame to see if the transmission
was successful. If so, the station is finished. If, however, there is a collision, the
frame is sent again.
• Collision of first bit in CSMA/CD :
Multiple Access
17
19. 4. CSMA/CA
• Basic Idea - is that a station needs to be able to receive while transmitting to
detect a collision.
• When there is no collision, the station receives one signal: its own signal. When
there is a collision, the station receives two signals: its own signal and the signal
transmitted by a second station.
• Timing in CSMA/CA :
Multiple Access
19
21. CONTROLLED ACCESS METHODS
• Stations consult one another to find which station has the right to
send.
• A station cannot send unless it has been authorized by other
stations.
• Three Popular Controlled access methods :-
Reservation
Polling
Token Passing
Multiple Access
21
22. 1. Reservation
• A station needs to make a reservation before sending data.
• Time is divided into intervals.
• In each interval, a reservation frame precedes the data frames sent in that
interval.
• If there are N stations in the system, there are exactly N reservation minislots in
the reservation frame.
• Reservation access method :
Multiple Access
22
23. 2. Polling
• Polling works with topologies.
• One device acts as PRIMARY station and the other devices acts as SECONDARY
stations; Primary device is the initiator of a session.
• All data exchanges must be made through the primary device.
• Primary device controls the link; the secondary devices follow its instructions.
• Select and Poll functions in polling access methods :
Multiple Access
23
24. Select -
The select function is used whenever the primary device has something to send.
If the primary is neither sending nor receiving data, it knows the link is available. If it
has something to send, the primary device sends it.
So the primary must alert the secondary to the upcoming transmission and wait for
an acknowledgment of the secondary's ready status. Before sending data, the primary
creates and transmits a select (SEL) frame, one field of which includes the address of
the intended secondary.
Poll -
The poll function is used by the primary device to solicit transmissions from the
secondary devices. When the primary is ready to receive data, it must ask (poll) each
device in turn if it has anything to send. When the first secondary is approached, it
responds either with a NAK frame if it has nothing to send or with data (in the form of
a data frame) if it does. If the response is negative (a NAK frame), then the primary
polls the next secondary in the same manner until it finds one with data to send.
When the response is positive (a data frame), the primary reads the frame and
returns an acknowledgment (ACK frame), verifying its receipt.Multiple Access
24
25. 3. Token Passing
• The stations in a network are organized in a logical ring.
• For each station, there is a predecessor and a successor.
• The right to this access has been passed from the predecessor to the current
station. The right will be passed to the successor when the current station has
no more data to send.
• The RIGHT passed from by means of special packet called “TOKEN”.
Multiple Access
25
26. Logical ring and physical topology in Token-passing
Multiple Access
26
27. CHANNELIZATION ACCESS METHOD
• Bandwidth of Link is shared in time, frequency or through code,
between different stations.
• Three Channelization protocol :
Frequency-Division Multiple Access (FDMA)
Time-Division Multiple Access (TDMA)
Code-Division Multiple Access (CDMA)
Multiple Access
27
28. 1. Frequency-Division Multiple Access (FDMA)
• Available bandwidth is divided into frequency bands.
• Each band is reserved for a specific station.
• Each station also uses a bandpass filter to confine the transmitter frequencies.
Multiple Access
28
29. 2. Time-Division Multiple Access (TDMA)
• Stations share the bandwidth of the channel in time.
• Each station is allocated a time slot during which it can send data.
• Time Division Multiple Access :
Multiple Access
29
30. 3. Code-Division Multiple Access (CDMA)
• CDMA differs from FDMA because only one channel occupies the entire
bandwidth of the link.
• CDMA differs from TDMA because all stations can send data simultaneously;
there is no timesharing.
• Simple IDEA of Communication with code :
Multiple Access
30
31. Chips
• CDMA is based on coding theory. Each station is assigned a code, which is a
sequence of numbers called chips.
• Chip Sequence :
• These are the orthogonal sequences and have the following properties:
1. Each sequence is made of N elements, where N is the number of stations.
2. If we multiply a sequence by a number, every element in the sequence is
multiplied by that element. This is called multiplication of a sequence by a
scalar.
For example 2 * [+1 +1-1-1]=[+2+2-2-2]
Multiple Access
31
32. 3. If we multiply two equal sequences, element by element, and add the results, we get
N, where N is the number of elements in the each sequence. This is called the inner
product of two equal sequences.
For example,
[+1 +1 -1 -1] *[+1 +1 -1 -1] = 1 + 1 + 1 + 1 = 4
4. If we multiply two different sequences, element by element, and add the results, we
get 0. This is called inner product of two different sequences.
For example,
[+1 +1 -1 -1] * [+1 +1 +1 +1] = 1 + 1- 1- 1= 0
5. Adding two sequences means adding the corresponding elements. The result is
another sequence.
For example,
[+1 +1 -1 -1] + [+1 +1 +1 +1]=[+2 +2 0 0]
Multiple Access
32
33. Data Representation
If a station needs to send a 0 bit, it encodes it as -1; if it needs to send
a 1 bit, it encodes it as +1. When a station is idle, it sends no signal,
which is interpreted as a 0.
Multiple Access
33
35. Sequence generation
• To generate chip sequences, we use a Walsh table, which is a two-dimensional
table with an equal number of rows and columns.
Multiple Access
35
36. References :
> Data Communications and Networking by Behrouz A . Forouzan.
> Wikipedia
Thank you
Multiple Access
36