SlideShare a Scribd company logo
Multiple Access
Data link layer divided into two functionality-oriented sublayers
 LOGIC LINK CONTROL-Error and flow control
 MAC LAYER-Multiple access resolution
Taxonomy of multiple-access protocols discussed in this chapter
RANDOM ACCESS
In random access or contention methods
>No scheduling of time station
>No rule that which station should send next
Protocol used in this method-
ALOHA
Carrier Sense Multiple Access
Carrier Sense Multiple Access with Collision Detection
Carrier Sense Multiple Access with Collision Avoidance
 >1972-for Radio
 >Pure/Slotted
 >Globally used
 >Acknowledgement
 >Back off time TB
 >Vulnerable time-Time in which possibility of collision
ALOHA
12.6
Frames in a pure ALOHA network
 >Carrier sense multiple access
 >Vulnerable time-Time need to propagate from one to another
 >Senses the medium
 >Method- 1.Persistent I
2. Non Persistent- Random amount of time
3.P-Persiustance- change of slot duration> max
propagation time
CSMA
12.8
Figure 12.10 Behavior of three persistence methods
 >Carrier sense multiple access/collision Detection
 >Arguments algorithm to handle for collision
 >Monitors
CSMA/CD
12.10
Figure 12.16 CSMA/CA
 >Carrier sense multiple access/collision avoidance
 >Two signal
 >For wireless –because collision cannot be detected
 >Three strategy-Interframe Space(short ifs high priority)
Contention window
Acknowledgement
CSMA/CA
Flow diagram for CSMA/CA
12.13
CONTROLLED ACCESS
In controlled access, the stations consult one another
to find which station has the right to send. A station
cannot send unless it has been authorized by other
stations.
Reservation
Polling
Token Passing
Three popular controlled-access methods
Reservation access method
Select and poll functions in polling access method
>Primary device
>Link is available
>Select-selection of primary
>Poll-primary device verify and allow to transmit
Logical ring and physical topology in token-passing access method
CHANNELIZATION
Channelization is a multiple-access method in which
the available bandwidth of a link is shared in time,
frequency, or through code, between different stations.
Frequency-Division Multiple Access (FDMA)-Guard band
Time-Division Multiple Access (TDMA)-Access method of DLL to control PL
Code-Division Multiple Access (CDMA)-One chanel all transmission, simuntaniously
Protocol

More Related Content

What's hot

Link-Level Flow and Error Control Chapter11
Link-Level Flow and Error Control Chapter11Link-Level Flow and Error Control Chapter11
Link-Level Flow and Error Control Chapter11
daniel ayalew
 
TCP Traffic Control Chapter12
TCP Traffic Control Chapter12TCP Traffic Control Chapter12
TCP Traffic Control Chapter12
daniel ayalew
 
It802 d mobilecommunicationspart4
It802 d mobilecommunicationspart4It802 d mobilecommunicationspart4
It802 d mobilecommunicationspart4
Debasis Das
 
Lect21 09-11
Lect21 09-11Lect21 09-11
Lect21 09-11
Mahesh Kumar Attri
 
Call flow comparison gsm umts
Call flow comparison gsm umtsCall flow comparison gsm umts
Call flow comparison gsm umts
sivakumar D
 
Snooping TCP
Snooping TCPSnooping TCP
Snooping TCP
Sushant Kushwaha
 
Layer 3 messages (2G)
Layer 3 messages (2G)Layer 3 messages (2G)
Layer 3 messages (2G)
Abdulrahman Fady
 
Introduction to packet service evolution & new technologies
Introduction to packet service evolution & new technologiesIntroduction to packet service evolution & new technologies
Introduction to packet service evolution & new technologies
Sokunth Che
 
Csma protocols
Csma protocolsCsma protocols
Csma protocols
Manal Shah
 
Ch 12
Ch 12Ch 12
Distributed contention based mac protocol for cognitive radio
Distributed contention based mac protocol for cognitive radioDistributed contention based mac protocol for cognitive radio
Distributed contention based mac protocol for cognitive radio
Iffat Anjum
 
It 802 d_Mobile Communications_part 2
It 802 d_Mobile Communications_part 2It 802 d_Mobile Communications_part 2
It 802 d_Mobile Communications_part 2
Debasis Das
 
It 802 d_Mobile Communications_part 2
It 802 d_Mobile Communications_part 2It 802 d_Mobile Communications_part 2
It 802 d_Mobile Communications_part 2
Debasis Das
 
M.A.C (Medium Access Control)
M.A.C (Medium Access Control)M.A.C (Medium Access Control)
M.A.C (Medium Access Control)
JaironLanda
 
11gsmpo b-en-gsmgsmnetworksdcchcongestionsolutions-word-201009-130915134031-p...
11gsmpo b-en-gsmgsmnetworksdcchcongestionsolutions-word-201009-130915134031-p...11gsmpo b-en-gsmgsmnetworksdcchcongestionsolutions-word-201009-130915134031-p...
11gsmpo b-en-gsmgsmnetworksdcchcongestionsolutions-word-201009-130915134031-p...
Emmanuel Msumali
 
Traffic and Congestion Control in ATM Networks Chapter 13
Traffic and Congestion Control in ATM Networks Chapter 13Traffic and Congestion Control in ATM Networks Chapter 13
Traffic and Congestion Control in ATM Networks Chapter 13
daniel ayalew
 
MAC seminar
MAC seminarMAC seminar
MAC seminar
Mridula Sharma
 
A distributed multi channel mac protocol for ad hoc wireless networks
A distributed multi channel mac protocol for ad hoc wireless networksA distributed multi channel mac protocol for ad hoc wireless networks
A distributed multi channel mac protocol for ad hoc wireless networks
ieeeprojectschennai
 
43096827 gsm-timers
43096827 gsm-timers43096827 gsm-timers
43096827 gsm-timers
Sanwari Lal
 
T Tcp
T TcpT Tcp

What's hot (20)

Link-Level Flow and Error Control Chapter11
Link-Level Flow and Error Control Chapter11Link-Level Flow and Error Control Chapter11
Link-Level Flow and Error Control Chapter11
 
TCP Traffic Control Chapter12
TCP Traffic Control Chapter12TCP Traffic Control Chapter12
TCP Traffic Control Chapter12
 
It802 d mobilecommunicationspart4
It802 d mobilecommunicationspart4It802 d mobilecommunicationspart4
It802 d mobilecommunicationspart4
 
Lect21 09-11
Lect21 09-11Lect21 09-11
Lect21 09-11
 
Call flow comparison gsm umts
Call flow comparison gsm umtsCall flow comparison gsm umts
Call flow comparison gsm umts
 
Snooping TCP
Snooping TCPSnooping TCP
Snooping TCP
 
Layer 3 messages (2G)
Layer 3 messages (2G)Layer 3 messages (2G)
Layer 3 messages (2G)
 
Introduction to packet service evolution & new technologies
Introduction to packet service evolution & new technologiesIntroduction to packet service evolution & new technologies
Introduction to packet service evolution & new technologies
 
Csma protocols
Csma protocolsCsma protocols
Csma protocols
 
Ch 12
Ch 12Ch 12
Ch 12
 
Distributed contention based mac protocol for cognitive radio
Distributed contention based mac protocol for cognitive radioDistributed contention based mac protocol for cognitive radio
Distributed contention based mac protocol for cognitive radio
 
It 802 d_Mobile Communications_part 2
It 802 d_Mobile Communications_part 2It 802 d_Mobile Communications_part 2
It 802 d_Mobile Communications_part 2
 
It 802 d_Mobile Communications_part 2
It 802 d_Mobile Communications_part 2It 802 d_Mobile Communications_part 2
It 802 d_Mobile Communications_part 2
 
M.A.C (Medium Access Control)
M.A.C (Medium Access Control)M.A.C (Medium Access Control)
M.A.C (Medium Access Control)
 
11gsmpo b-en-gsmgsmnetworksdcchcongestionsolutions-word-201009-130915134031-p...
11gsmpo b-en-gsmgsmnetworksdcchcongestionsolutions-word-201009-130915134031-p...11gsmpo b-en-gsmgsmnetworksdcchcongestionsolutions-word-201009-130915134031-p...
11gsmpo b-en-gsmgsmnetworksdcchcongestionsolutions-word-201009-130915134031-p...
 
Traffic and Congestion Control in ATM Networks Chapter 13
Traffic and Congestion Control in ATM Networks Chapter 13Traffic and Congestion Control in ATM Networks Chapter 13
Traffic and Congestion Control in ATM Networks Chapter 13
 
MAC seminar
MAC seminarMAC seminar
MAC seminar
 
A distributed multi channel mac protocol for ad hoc wireless networks
A distributed multi channel mac protocol for ad hoc wireless networksA distributed multi channel mac protocol for ad hoc wireless networks
A distributed multi channel mac protocol for ad hoc wireless networks
 
43096827 gsm-timers
43096827 gsm-timers43096827 gsm-timers
43096827 gsm-timers
 
T Tcp
T TcpT Tcp
T Tcp
 

Viewers also liked

3b multiple access
3b multiple access3b multiple access
3b multiple access
kavish dani
 
Dc chapter 13
Dc chapter   13Dc chapter   13
Dc chapter 13
TechiNerd
 
Multiple Access Methods
Multiple Access MethodsMultiple Access Methods
Multiple Access Methods
Prateek Soni
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
tes31
 
802.11 wireless lan
802.11 wireless lan802.11 wireless lan
802.11 wireless lan
Mohd Arif
 
3.Medium Access Control
3.Medium Access Control3.Medium Access Control
3.Medium Access Control
Sonali Chauhan
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
Anuj Gupta
 
Multiple access protocol
Multiple access protocolMultiple access protocol
Multiple access protocol
Merlin Florrence
 
FDMA-TDMA-CDMA
FDMA-TDMA-CDMAFDMA-TDMA-CDMA
FDMA-TDMA-CDMA
Sammar Khan
 
Medium Access Control
Medium Access ControlMedium Access Control
Medium Access Control
anishgoel
 
Wireless networking
Wireless networkingWireless networking
Wireless networking
Online
 
Multiple access techniques for wireless communications
Multiple access techniques for wireless communicationsMultiple access techniques for wireless communications
Multiple access techniques for wireless communications
METHODIST COLLEGE OF ENGG & TECH
 
Multiple access control protocol
Multiple access control protocol Multiple access control protocol
Multiple access control protocol
meenamunesh
 
Wireless Local Area Networks
Wireless Local Area NetworksWireless Local Area Networks
Wireless Local Area Networks
Don Norwood
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)
Parvesh Taneja
 

Viewers also liked (15)

3b multiple access
3b multiple access3b multiple access
3b multiple access
 
Dc chapter 13
Dc chapter   13Dc chapter   13
Dc chapter 13
 
Multiple Access Methods
Multiple Access MethodsMultiple Access Methods
Multiple Access Methods
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
 
802.11 wireless lan
802.11 wireless lan802.11 wireless lan
802.11 wireless lan
 
3.Medium Access Control
3.Medium Access Control3.Medium Access Control
3.Medium Access Control
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
 
Multiple access protocol
Multiple access protocolMultiple access protocol
Multiple access protocol
 
FDMA-TDMA-CDMA
FDMA-TDMA-CDMAFDMA-TDMA-CDMA
FDMA-TDMA-CDMA
 
Medium Access Control
Medium Access ControlMedium Access Control
Medium Access Control
 
Wireless networking
Wireless networkingWireless networking
Wireless networking
 
Multiple access techniques for wireless communications
Multiple access techniques for wireless communicationsMultiple access techniques for wireless communications
Multiple access techniques for wireless communications
 
Multiple access control protocol
Multiple access control protocol Multiple access control protocol
Multiple access control protocol
 
Wireless Local Area Networks
Wireless Local Area NetworksWireless Local Area Networks
Wireless Local Area Networks
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)
 

Similar to Multiple acessing

mutiple acces protocol.ppt
mutiple acces protocol.pptmutiple acces protocol.ppt
mutiple acces protocol.ppt
rocky781582
 
mac-protocols
mac-protocols mac-protocols
mac-protocols
DivyaKS18
 
unit 3 Multiple Access.ppt
unit 3 Multiple Access.pptunit 3 Multiple Access.ppt
unit 3 Multiple Access.ppt
zmulani8
 
Media Access Control (MAC Layer)
Media Access Control (MAC Layer)Media Access Control (MAC Layer)
Media Access Control (MAC Layer)
Meenakshi Paul
 
Multiple Access in wireless communication
Multiple Access in wireless communicationMultiple Access in wireless communication
Multiple Access in wireless communication
Maulik Togadiya
 
Multiple Access in Computer Network
Multiple Access in Computer NetworkMultiple Access in Computer Network
Multiple Access in Computer Network
Hitesh Mohapatra
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communication
panditadesh123
 
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptxComputer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptx
Pravinbhargav
 
3 mediumaccesscontrol-090302072045-phpapp01
3 mediumaccesscontrol-090302072045-phpapp013 mediumaccesscontrol-090302072045-phpapp01
3 mediumaccesscontrol-090302072045-phpapp01
vinaone
 
Unit_3_WSN.pptx
Unit_3_WSN.pptxUnit_3_WSN.pptx
Unit_3_WSN.pptx
nooralleema
 
WHAT IS MAC-1 presentation for information .pptx
WHAT IS MAC-1 presentation for information  .pptxWHAT IS MAC-1 presentation for information  .pptx
WHAT IS MAC-1 presentation for information .pptx
SaqlainKhan39
 
9 multiple access
9 multiple access9 multiple access
9 multiple access
ampas03
 
Class work 7,computer_network_317
Class work 7,computer_network_317Class work 7,computer_network_317
Class work 7,computer_network_317
Khondoker Sadia
 
MultipleAccess.ppt
MultipleAccess.pptMultipleAccess.ppt
MultipleAccess.ppt
Jayaprasanna4
 
Computer network
Computer networkComputer network
Computer network
sweetysweety8
 
AIU_CN_2.pptx
AIU_CN_2.pptxAIU_CN_2.pptx
AIU_CN_2.pptx
GasanBaalbaky
 
Introduction to networking
Introduction to networkingIntroduction to networking
Introduction to networking
IdealGraphics
 
Multiple Access Control Protocol (MAC Protocol) Networking
Multiple Access Control Protocol (MAC Protocol) Networking Multiple Access Control Protocol (MAC Protocol) Networking
Multiple Access Control Protocol (MAC Protocol) Networking
Nitish Awasthi (anitish_225)
 
Multiple Access ppt in Object Oriented Programming
Multiple Access ppt in Object Oriented ProgrammingMultiple Access ppt in Object Oriented Programming
Multiple Access ppt in Object Oriented Programming
arnavytstudio2814
 
Demand Assigned Multiple Access
Demand Assigned Multiple AccessDemand Assigned Multiple Access
Demand Assigned Multiple Access
anushkashastri
 

Similar to Multiple acessing (20)

mutiple acces protocol.ppt
mutiple acces protocol.pptmutiple acces protocol.ppt
mutiple acces protocol.ppt
 
mac-protocols
mac-protocols mac-protocols
mac-protocols
 
unit 3 Multiple Access.ppt
unit 3 Multiple Access.pptunit 3 Multiple Access.ppt
unit 3 Multiple Access.ppt
 
Media Access Control (MAC Layer)
Media Access Control (MAC Layer)Media Access Control (MAC Layer)
Media Access Control (MAC Layer)
 
Multiple Access in wireless communication
Multiple Access in wireless communicationMultiple Access in wireless communication
Multiple Access in wireless communication
 
Multiple Access in Computer Network
Multiple Access in Computer NetworkMultiple Access in Computer Network
Multiple Access in Computer Network
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communication
 
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptxComputer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptx
 
3 mediumaccesscontrol-090302072045-phpapp01
3 mediumaccesscontrol-090302072045-phpapp013 mediumaccesscontrol-090302072045-phpapp01
3 mediumaccesscontrol-090302072045-phpapp01
 
Unit_3_WSN.pptx
Unit_3_WSN.pptxUnit_3_WSN.pptx
Unit_3_WSN.pptx
 
WHAT IS MAC-1 presentation for information .pptx
WHAT IS MAC-1 presentation for information  .pptxWHAT IS MAC-1 presentation for information  .pptx
WHAT IS MAC-1 presentation for information .pptx
 
9 multiple access
9 multiple access9 multiple access
9 multiple access
 
Class work 7,computer_network_317
Class work 7,computer_network_317Class work 7,computer_network_317
Class work 7,computer_network_317
 
MultipleAccess.ppt
MultipleAccess.pptMultipleAccess.ppt
MultipleAccess.ppt
 
Computer network
Computer networkComputer network
Computer network
 
AIU_CN_2.pptx
AIU_CN_2.pptxAIU_CN_2.pptx
AIU_CN_2.pptx
 
Introduction to networking
Introduction to networkingIntroduction to networking
Introduction to networking
 
Multiple Access Control Protocol (MAC Protocol) Networking
Multiple Access Control Protocol (MAC Protocol) Networking Multiple Access Control Protocol (MAC Protocol) Networking
Multiple Access Control Protocol (MAC Protocol) Networking
 
Multiple Access ppt in Object Oriented Programming
Multiple Access ppt in Object Oriented ProgrammingMultiple Access ppt in Object Oriented Programming
Multiple Access ppt in Object Oriented Programming
 
Demand Assigned Multiple Access
Demand Assigned Multiple AccessDemand Assigned Multiple Access
Demand Assigned Multiple Access
 

Recently uploaded

Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 

Recently uploaded (20)

Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 

Multiple acessing

  • 2. Data link layer divided into two functionality-oriented sublayers  LOGIC LINK CONTROL-Error and flow control  MAC LAYER-Multiple access resolution
  • 3. Taxonomy of multiple-access protocols discussed in this chapter
  • 4. RANDOM ACCESS In random access or contention methods >No scheduling of time station >No rule that which station should send next Protocol used in this method- ALOHA Carrier Sense Multiple Access Carrier Sense Multiple Access with Collision Detection Carrier Sense Multiple Access with Collision Avoidance
  • 5.  >1972-for Radio  >Pure/Slotted  >Globally used  >Acknowledgement  >Back off time TB  >Vulnerable time-Time in which possibility of collision ALOHA
  • 6. 12.6 Frames in a pure ALOHA network
  • 7.  >Carrier sense multiple access  >Vulnerable time-Time need to propagate from one to another  >Senses the medium  >Method- 1.Persistent I 2. Non Persistent- Random amount of time 3.P-Persiustance- change of slot duration> max propagation time CSMA
  • 8. 12.8 Figure 12.10 Behavior of three persistence methods
  • 9.  >Carrier sense multiple access/collision Detection  >Arguments algorithm to handle for collision  >Monitors CSMA/CD
  • 11.  >Carrier sense multiple access/collision avoidance  >Two signal  >For wireless –because collision cannot be detected  >Three strategy-Interframe Space(short ifs high priority) Contention window Acknowledgement CSMA/CA
  • 12. Flow diagram for CSMA/CA
  • 13. 12.13 CONTROLLED ACCESS In controlled access, the stations consult one another to find which station has the right to send. A station cannot send unless it has been authorized by other stations. Reservation Polling Token Passing Three popular controlled-access methods
  • 15. Select and poll functions in polling access method >Primary device >Link is available >Select-selection of primary >Poll-primary device verify and allow to transmit
  • 16. Logical ring and physical topology in token-passing access method
  • 17. CHANNELIZATION Channelization is a multiple-access method in which the available bandwidth of a link is shared in time, frequency, or through code, between different stations. Frequency-Division Multiple Access (FDMA)-Guard band Time-Division Multiple Access (TDMA)-Access method of DLL to control PL Code-Division Multiple Access (CDMA)-One chanel all transmission, simuntaniously Protocol