: Data Communication and Computer Networks

Slides:



Advertisements
Similar presentations
EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
Advertisements

12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Multiple access What if multiple machines are sharing the same link?
Multiple Access Methods. When nodes or stations are connected and use a common link (cable or air), called a multipoint or broadcast link, we need a.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 12 Multiple Access Figure 12.1 Data link layer divided into two functionality-oriented sublayers Figure 12.2 Taxonomy of multiple-access protocols.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Medium Access Control Sublayer
Shashank Srivastava Motilal Nehru National Institute Of Technology, Allahabad Medium Access Control.
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
Multiple Access Protocols Chapter 6 of Hiroshi Harada Book
Wireless Application Protocol
McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Chapter 12 Multiple Access Figure 12.1 Data link layer divided into two functionality-oriented sublayers Figure 12.2 Taxonomy of multiple-access protocols.
1 21\09\2010 Unit-III Multiple Access Unit – 3 MULTIPLE ACCESS.
Multiple Access Protocol ผศ. ดร. อนันต์ ผลเพิ่ม Asst.Prof.Anan Phonphoem, Ph.D. Computer Engineering Department.
جلسه یازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Unit-II Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. © The McGraw-Hill Companies, Inc. Medium Access Control Asst. Prof. Chaiporn.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Multiple Access.
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
1 Kyung Hee University Chapter 12 Multiple Access.
Multiple Access. INTRODUCTION The medium access sub layer is the bottom part of data link layer. The medium access sub layer is known as MAC(Medium access.
Chapter 6 Multiple Radio Access
1 Kyung Hee University Chapter 12 Multiple Access.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Ch 12. Multiple Access. Multiple Access for Shared Link Dedicated link – Point-to-point connection is sufficient Shared link – Link is not dedicated –
Department of Computer Science, University of Peshawar Multiple Access.
Chapter 12 Media Access Control (MAC) Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 12 Multiple Access
1 Kyung Hee University Prof. Choong Seon HONG Multiple Access.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 13 Multiple Access.
Chapter 13 Multiple Access.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 13 Multiple Access.
Chapter 12 Media Access Control (MAC)
UNIT 3 MULTIPLE ACCESS Adapted from lecture slides by Behrouz A. Forouzan © The McGraw-Hill Companies, Inc. All rights reserved.
Multiple Access. Figure 12.1 Data link layer divided into two functionality-oriented sublayers.
Network Operations & administration CS 4592 Lecture 18 Instructor: Ibrahim Tariq.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
Part III. Data Link Layer
Multiple Access Methods
MEDIUM ACCESS CONTROL PROTOCOL
Data link layer divided into two functionality-oriented sublayers
Chapter 12 Multiple Access.
Chapter 12 Multiple Access
Part III Datalink Layer 10.
Multiple Access Problem: When two or more nodes transmit at the same time, their frames will collide and the link bandwidth is wasted during collision.
Multiple Access Mahesh Jangid Assistant Professor JVW University.
Subject Name: Computer Communication Networks Subject Code: 10EC71
Chapter 12 Multiple Access
Chapter 12 Multiple Access
Figure 12.1 Data link layer divided into two functionality-oriented sublayers Networks can be divided into two categories: those using point-to-point.
Communication Networks NETW 501
Multiple Access Methods
Chapter 13 Multiple Access.
Chapter 12 Multiple Access
Chapter 12 Multiple Access
Chapter 13 Multiple Access
Data Communication Networks
Chapter 13 Multiple Access
Multiple Access Methods
Chapter 6 Multiple Radio Access.
Multiple Access Control (MAC) Protocols
Part III Datalink Layer 10.
Chapter 12 Media Access Control (MAC)
Chapter 12 Media Access Control (MAC)
Presentation transcript:

01204325: Data Communication and Computer Networks Multiple Access 01204325: Data Communication and Computer Networks Asst. Prof. Chaiporn Jaikaeo, Ph.D. chaiporn.j@ku.ac.th http://www.cpe.ku.ac.th/~cpj Computer Engineering Department Kasetsart University, Bangkok, Thailand Adapted from lecture slides by Behrouz A. Forouzan © The McGraw-Hill Companies, Inc. All rights reserved

Outline Multiple access mechanisms Random access Controlled access Channelization

Sublayers of Data Link Layer

Multiple Access Mechanisms

Random Access

Random Access Also called contention-based access No station is assigned to control another

ALOHA Network

Frames in Pure ALOHA

ALOHA Protocol

Example Calculate possible values of TB when stations on an ALOHA network are a maximum of 600 km apart Tp = (600 × 103) / (3 × 108) = 2 ms When K=1, TB  {0ms,2ms} When K=2, TB  {0ms,2ms,4ms,6ms} :

ALOHA: Vulnerable Time

ALOHA: Throughput Assume number of stations trying to transmit follow Poisson Distribution The throughput for pure ALOHA is S = G × e−2G where G is the average number of frames requested per frame-time The maximum throughput Smax = 0.184 when G= 1/2

Example A pure ALOHA network transmits 200-bit frames on a shared channel of 200 kbps. What is the throughput if the system (all stations together) produces 1000 frames per second 500 frames per second 250 frames per second

Slotted ALOHA

Slotted ALOHA: Vulnerable Time

Slotted ALOHA: Throughput The throughput for Slotted ALOHA is S = G × e−G where G is the average number of frames requested per frame-time The maximum throughput Smax = 0.368 when G= 1

Example A Slotted ALOHA network transmits 200-bit frames on a shared channel of 200 kbps. What is the throughput if the system (all stations together) produces 1000 frames per second 500 frames per second 250 frames per second

CSMA Carrier Sense Multiple Access Reduce the possibility of collision "Listen before talk" Reduce the possibility of collision But cannot completely eliminate it

Collision in CSMA B C

CSMA: Vulnerable Time

Persistence Methods What a station does when channel is idle or busy

Persistence Methods

CSMA/CD Carrier Sense Multiple Access with Collision Detection Station monitors channel while sending a frame

Energy Levels

CSMA/CD: Minimum Frame Size Each frame must be large enough for a sender to detect a collision Worst case scenario: "A" is transmitting "D" starts transmitting just before A's signal arrives A B C D Long enough to hear colliding signal from D

Example A CSMA/CD network has a bandwidth of 10 Mbps. If the maximum propagation time is 25.6 μs, what is the minimum size of the frame?

CSMA/CD: Flow Diagram

CSMA/CA Carrier Sense Multiple Access with Collision Avoidance Used in a network where collision cannot be detected E.g., wireless LAN IFS – Interframe Space

contention window size is 2K-1 CSMA/CA: Flow Diagram contention window size is 2K-1 After each slot: - If idle, continue counting - If busy, stop counting

Controlled Access

Control Access A station must be authorized by someone (e.g., other stations) before transmitting Three common methods: Reservation Polling Token passing

Reservation Method

Polling Method

Token Passing

Channelization

Channelization Similar to multiplexing Three schemes Frequency-Division Multiple Access (FDMA) Time-Division Multiple Access (TDMA) Code-Division Multiple Access (CDMA)

FDMA

TDMA

CDMA One channel carries all transmissions at the same time Each channel is separated by code

CDMA: Chip Sequences Each station is assigned a unique chip sequence Chip sequences are orthogonal vectors Inner product of any pair must be zero With N stations, sequences must have the following properties: They are of length N Their self inner product is always N

CDMA: Bit Representation

Transmission in CDMA

CDMA Encoding

Signal Created by CDMA

CDMA Decoding

Sequence Generation Common method: Walsh Table Number of sequences is always a power of two

Example: Walsh Table Find chip sequences for eight stations

Example: Walsh Table There are 80 stations in a CDMA network. What is the length of the sequences generated by Walsh Table?