Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.

Slides:



Advertisements
Similar presentations
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Advertisements

Multiple access What if multiple machines are sharing the same link?
Multiple Access Methods. When nodes or stations are connected and use a common link (cable or air), called a multipoint or broadcast link, we need a.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Communication Networks Lecture 5 NETW 501-L5: NETW 501-L5: Medium Access Control Dr.-Ing. Khaled Shawky Hassan Room: C3-222, ext: 1204,
Chapter 12 Multiple Access Figure 12.1 Data link layer divided into two functionality-oriented sublayers Figure 12.2 Taxonomy of multiple-access protocols.
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 13 Multiple Access.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
Medium Access Control Sublayer
Shashank Srivastava Motilal Nehru National Institute Of Technology, Allahabad Medium Access Control.
Wireless Application Protocol
: Data Communication and Computer Networks
McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Chapter 12 Multiple Access Figure 12.1 Data link layer divided into two functionality-oriented sublayers Figure 12.2 Taxonomy of multiple-access protocols.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking LANs 2: MAC protocols.
1 21\09\2010 Unit-III Multiple Access Unit – 3 MULTIPLE ACCESS.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
جلسه یازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Unit-II Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. © The McGraw-Hill Companies, Inc. Medium Access Control Asst. Prof. Chaiporn.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Multiple Access.
1 Kyung Hee University Chapter 12 Multiple Access.
1 Kyung Hee University Chapter 12 Multiple Access.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Ch 12. Multiple Access. Multiple Access for Shared Link Dedicated link – Point-to-point connection is sufficient Shared link – Link is not dedicated –
Department of Computer Science, University of Peshawar Multiple Access.
Chapter 12 Media Access Control (MAC) Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 12 Multiple Access
1 Kyung Hee University Prof. Choong Seon HONG Multiple Access.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 13 Multiple Access.
Chapter 13 Multiple Access.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 13 Multiple Access.
Chapter 12 Media Access Control (MAC)
UNIT 3 MULTIPLE ACCESS Adapted from lecture slides by Behrouz A. Forouzan © The McGraw-Hill Companies, Inc. All rights reserved.
Multiple Access. Figure 12.1 Data link layer divided into two functionality-oriented sublayers.
Network Operations & administration CS 4592 Lecture 18 Instructor: Ibrahim Tariq.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
Part III. Data Link Layer
Multiple Access Methods
CSMA/CD Carrier sense multiple access with collision detection (CSMA/CD) is a media access control method used most notably in early Ethernet technology.
Chapter 12 Part 2 Media Access Control (MAC)
Data link layer divided into two functionality-oriented sublayers
Chapter 12 Multiple Access.
Chapter 12 Multiple Access
Part III Datalink Layer 10.
Multiple Access Problem: When two or more nodes transmit at the same time, their frames will collide and the link bandwidth is wasted during collision.
Multiple Access Mahesh Jangid Assistant Professor JVW University.
Subject Name: Computer Communication Networks Subject Code: 10EC71
Chapter 12 Multiple Access
Chapter 12 Multiple Access
Figure 12.1 Data link layer divided into two functionality-oriented sublayers Networks can be divided into two categories: those using point-to-point.
Multiple Access Methods
Chapter 13 Multiple Access.
Chapter 12 Multiple Access
Chapter 12 Multiple Access
Chapter 13 Multiple Access
Chapter 12 Multiple Access
Data Communication Networks
Chapter 13 Multiple Access
CSE 313 Data Communication
Multiple Access Methods
Multiple Access Control (MAC) Protocols
Part III Datalink Layer 10.
Chapter 12 Media Access Control (MAC)
Chapter 12 Media Access Control (MAC)
Presentation transcript:

Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization

Data Communications, Kwangwoon University12-2 Data Link Layer: Two sublayers Data link layer divided into two functionality-oriented sublayers IEEE made this division for LANs

Data Communications, Kwangwoon University12-3 Medium Access Protocols

Data Communications, Kwangwoon University12-4 Random Access Each station has the right to the medium without being controlled by any other station Collision, a access conflict, if more than one station tries to send

Data Communications, Kwangwoon University12-5 ALOHA The earliest random access method developed at the Univ. of Hawaii in the early 1970s Designed for a radio (wireless) LAN Pure ALOHA and Slotted ALOHA Frames in a pure ALOHA network

Data Communications, Kwangwoon University12-6 Pure ALOHA Protocol: Procedure Binary exponential back-off algorithm

Data Communications, Kwangwoon University12-7 Pure ALOHA Protocol Pure ALOHA vulnerable time = 2 x T fr The throughput for pure ALOHA is S = G × e −2G. The maximum throughput S max = when G= (1/2).

Data Communications, Kwangwoon University12-8 Slotted ALOHA Pure ALOHA vulnerable time = 2 x T fr because there is no rule that defines when the station can send Slotted ALOHA was invented to improve the efficiency of pure ALOHA

Data Communications, Kwangwoon University12-9 Slotted ALOHA throughput for slotted ALOHA is S = G × e −G. The maximum throughput S max = when G = 1 Slotted ALOHA vulnerable time = T fr

Data Communications, Kwangwoon University12-10 Carrier Sense Multiple Access (CSMA) CSMA –“Sense before transmit” –“Listen before talk” CSMA can reduce the possibility of collision, but it can not eliminate it

Data Communications, Kwangwoon University12-11 Collision in CSMA

Data Communications, Kwangwoon University12-12 CSMA: Vulnerable Time Vulnerable time for CSMA is the propagation time T p needed for a signal to propagate from one end of the medium to the other

Data Communications, Kwangwoon University12-13 CSMA: Persistence Methods Behavior of 1-persistent, Nonpersistent, p-persistent method

Data Communications, Kwangwoon University12-14 CSMA: Persistence Methods Flow diagram for 1-persistent, Nonpersistent, p-persistent method

Data Communications, Kwangwoon University12-15 Persistence Strategy Nonpersistent strategy –Reduces the chance of collision –Reduces the efficiency of the network 1-persistent –Increases the chance of collision p-persistent –Reduces the chance of collision and improves the efficiency by combining the other two strategies.

Data Communications, Kwangwoon University12-16 CSMA/CD (Collision Detection)

Data Communications, Kwangwoon University12-17 CSMA/CD: Min. Frame Size Example: A network using CSMA/CD has a bandwidth of 10 Mbps. If the maximum propagation time (including the delays in the devices and ignoring the time needed to send a jamming signal, as we see later) is 25.6 μs, what is the minimum size of the frame? Solution The frame transmission time is T fr = 2 × T p = 51.2 μs. This means, in the worst case, a station needs to transmit for a period of 51.2 μs to detect the collision. The minimum size of the frame is 10 Mbps × 51.2 μs = 512 bits or 64 bytes. This is actually the minimum size of the frame for Standard Ethernet.

Data Communications, Kwangwoon University12-18 CSMA/CD: Flow Diagram

Data Communications, Kwangwoon University12-19 CSMA/CD: Energy Level & Throughput Energy level during transmission, idleness, or collision Throughput of CSMA/CD is greater than that of ALOHA The max. throughput occurs at a different value of G and is based on the persistent method and the value of p in the p-persistent approach The max throughput is around 50% when G=1 for 1-persistent, up to 90% when G is between 3 and 8 for non-persistent

Data Communications, Kwangwoon University12-20 CSMA/CA (Collision Avoidance) Invented for wireless network where we cannot detect collisions Collision are avoided through the use of CSMA/CA’s three strategies: the interframe space, the contention windows, and acknowledgement IFS can also be used to define the priority of a station or a frame If the station finds the channel busy, it does not restart the timer of the contention window; it stops the timer and restarts it when the channel becomes idle

Data Communications, Kwangwoon University12-21 CSMA/CA: Flow Diagram

Data Communications, Kwangwoon University12-22 Controlled Access The stations consult one another to find which station has the right to send Reservation/Polling/ Token passing Reservation access method

Data Communications, Kwangwoon University12-23 Polling: Select and Poll Functions

Data Communications, Kwangwoon University12-24 Token Passing Logical Ring and physical topology

Data Communications, Kwangwoon University12-25 Channelization: FDMA FDMA –Available bandwidth of the common channel is divided into bands that are separated by guard bands –FDMA is an access method in data link layer protocol. But, FDM is a physical layer technique

Data Communications, Kwangwoon University12-26 Channelization: TDMA TDMA –The bandwidth is just one channel that is timeshared between different stations –TDMA is an access method. But, TDM is a physical layer technique

Data Communications, Kwangwoon University12-27 Channelization: CDMA One channel carries all transmissions simultaneously Two properties: If we multiply each code by another, we get 0. If we multiply each code by itself, we get 4 Data = (d 1. c 1 + d 2. c 2 + d 3. c 3 + d 4. c 4 ). c 1 = d 1. c 1. c 1 + d 2. c 2. c 1 + d 3. c 3. c 1 + d 4. c 4. c 1 = 4. d 1

Data Communications, Kwangwoon University12-28 CDMA: Chips Sequence of numbers called chips Orthogonal sequences have the following properties: –Each sequence is made of N elements, where N is the number of stations –If we multiply a sequence by a number, every element in the sequence is multiplied by that element (scalar multiplication) –If we multiply two equal sequence, element by element, and add the results, we get N (inner product) –If we multiply two different sequence, element by element, and add the results, we get 0 –Adding two sequence means adding the corresponding elements. The result is another sequence Data representation in CDMA

Data Communications, Kwangwoon University12-29 CDMA: Encoding and Decoding Show how four stations share the link during a 1-bit interval

Data Communications, Kwangwoon University12-30 CDMA: Signal Level Digital signal created by four stations in CDMA using NRZ-L for simplicity

Data Communications, Kwangwoon University12-31 CDMA: Decoding Show how station 3 can detect the data by station 2 by using the code for station 2 Decoding of the composite signal for one in CDMA

Data Communications, Kwangwoon University12-32 CDMA: Sequence Generation To generate chip sequence, we use a Walsh table The number of sequence in a Walsh table needs to be N = 2 m

Data Communications, Kwangwoon University12-33 Sequence Generation: Example Find the chips for a network with a. Two stations b. Four stations Solution a. For a two-station network, we have [+1 +1] and [+1 −1]. b. For a four-station network we have [ ], [+1 −1 +1 −1], [+1 +1 −1 −1], and [+1 −1 −1 +1].