Mr. Thilak de Silva. BSc. Eng., MSc, CEng, FIE(SL), FIET(UK), CITP(UK), MBCS(UK), MIEEE (USA) M.Sc. in IT - Year 1 Semester II - 2012.

Slides:



Advertisements
Similar presentations
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Advertisements

Multiple access What if multiple machines are sharing the same link?
Multiple Access Methods. When nodes or stations are connected and use a common link (cable or air), called a multipoint or broadcast link, we need a.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Mr. Thilak de Silva. BSc. Eng., MSc, CEng, FIE(SL), FIET(UK), CITP(UK), MBCS(UK), MIEEE (USA) M.Sc. in IT - Year 1 Semester II
Distributed systems Module 1 -Basic networking Teaching unit 1 – LAN standards Ernesto Damiani Free University of Bozen-Bolzano Lesson 1 – Local network.
Lectured By: Vivek Dimri Assistant Professor, CSE Dept. SET, Sharda University, Gr. Noida.
Chapter 12 Multiple Access Figure 12.1 Data link layer divided into two functionality-oriented sublayers Figure 12.2 Taxonomy of multiple-access protocols.
ENGR How do multiple users “share” the airwaves? Multiple Access (MA) techniques: –Time Division MA (TDMA) –Frequency Division MA (FDMA) –Code Division.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 13 Multiple Access.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Medium Access Control Sublayer
Mr. Thilak de Silva. BSc. Eng., MSc, CEng, FIE(SL), FIET(UK), CITP(UK), MBCS(UK), MIEEE (USA) M.Sc. in IT - Year 1 Semester II
SRI LANKA INSTITUTE OF INFORMATION TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY FACULTY OF COMPUTING B.SC. (HONS.) DEGREE IN INFORMATION TECHNOLOGY.
Mr. Thilak de Silva. BSc. Eng., MSc, CEng, FIE(SL), FIET(UK), CITP(UK), MBCS(UK), MIEEE (USA) M.Sc. in IT - Year 1 Semester II
: Data Communication and Computer Networks
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Chapter 12 Multiple Access Figure 12.1 Data link layer divided into two functionality-oriented sublayers Figure 12.2 Taxonomy of multiple-access protocols.
Mr. Thilak de Silva. BSc. Eng., MSc, CEng, FIE(SL), FIET(UK), CITP(UK), MBCS(UK), MIEEE (USA) M.Sc. in IT - Year 1 Semester II
Mr. Thilak de Silva. BSc. Eng., MSc, CEng, FIE(SL), FIET(UK), CITP(UK), MBCS(UK), MIEEE (USA) M.Sc. in IT - Year 1 Semester II
Mr. Thilak de Silva. BSc. Eng., MSc, CEng, FIE(SL), FIET(UK), CITP(UK), MBCS(UK), MIEEE (USA) M.Sc. in IT - Year 1 Semester II
Mr. Thilak de Silva. BSc. Eng., MSc, CEng, FIE(SL), FIET(UK), CITP(UK), MBCS(UK), MIEEE (USA) M.Sc. in IT - Year 1 Semester II
Mr. Thilak de Silva. BSc. Eng., MSc, CEng, FIE(SL), FIET(UK), CITP(UK), MBCS(UK), MIEEE (USA) M.Sc. in IT - Year 1 Semester II
Multiple Access Protocol ผศ. ดร. อนันต์ ผลเพิ่ม Asst.Prof.Anan Phonphoem, Ph.D. Computer Engineering Department.
Mr. Thilak de Silva. BSc. Eng., MSc, CEng, FIE(SL), FIET(UK), CITP(UK), MBCS(UK), MIEEE (USA) M.Sc. in IT - Year 1 Semester II
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. © The McGraw-Hill Companies, Inc. Medium Access Control Asst. Prof. Chaiporn.
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Chapter 12 Multiple Access
1 Kyung Hee University Prof. Choong Seon HONG Multiple Access.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 13 Multiple Access.
Chapter 13 Multiple Access.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 13 Multiple Access.
UNIT 3 MULTIPLE ACCESS Adapted from lecture slides by Behrouz A. Forouzan © The McGraw-Hill Companies, Inc. All rights reserved.
Multiple Access. Figure 12.1 Data link layer divided into two functionality-oriented sublayers.
Network Operations & administration CS 4592 Lecture 18 Instructor: Ibrahim Tariq.
2. Data Link Layer: Medium Access Control. Scheduling.
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
FDMA TDMA CDMA 1 x 1 = 1 1 x = x 1 = x = 1 Low-Bandwidth Signal: High-Bandwidth Spreading Code:...repeated...
Part III. Data Link Layer
Multiple Access Methods
Data link layer divided into two functionality-oriented sublayers
Chapter 12 Multiple Access.
Packetizing Error Detection
Chapter 5 Link Layer and LANs
Sidevõrgud IRT 4060/ IRT 0020 vooruloeng 6 / 20. okt 2004
Chapter 12 Multiple Access
Part III Datalink Layer 10.
Multiple Access Problem: When two or more nodes transmit at the same time, their frames will collide and the link bandwidth is wasted during collision.
Multiple Access Mahesh Jangid Assistant Professor JVW University.
Channel Allocation (MAC)
Subject Name: Computer Communication Networks Subject Code: 10EC71
Figure 12.1 Data link layer divided into two functionality-oriented sublayers Networks can be divided into two categories: those using point-to-point.
Communication Networks NETW 501
Multiple Access Methods
Chapter 13 Multiple Access.
Digital Transmission Lecture o5 Advanced Computer Networks (ACN) 545
Digital Transmission Lecture o5 Advanced Computer Networks (ACN) 545
Chapter 13 Multiple Access
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
Chapter 13 Multiple Access
Lecture 5- Data Link Layer
CSE 313 Data Communication
Cellular Telephone Networks
Multiple Access Methods
Part III Datalink Layer 10.
Chapter 12 Media Access Control (MAC)
Chapter 12 Media Access Control (MAC)
Presentation transcript:

Mr. Thilak de Silva. BSc. Eng., MSc, CEng, FIE(SL), FIET(UK), CITP(UK), MBCS(UK), MIEEE (USA) M.Sc. in IT - Year 1 Semester II

 Source coding methods  Channel coding methods  Data Compression  Data Encryption  Channelization Protocols  Random Access Protocols  Control Access Protocols M.Sc. in IT - Year 1 Semester II

 At the end of this session you will have a basic understanding of source and channel coding methods, data compression and encryption, Channelization Protocols, Random Access Protocols and Control Access Protocols. M.Sc. in IT - Year 1 Semester II

 Haffman coding  Shannon coding  Arithmetic coding M.Sc. in IT - Year 1 Semester II

 Forward Error Correction  Backward Error Correction  Hybrid Error Correction  combination of backward and forward error correction M.Sc. in IT - Year 1 Semester II

Source codingChannel coding Convert to signal Line coding

 Audio compression-MP3  Image compression-JPEG  Video compression-MPEG M.Sc. in IT - Year 1 Semester II

 Eg:- method colombo e q n q o d colombo  DES  RSA M.Sc. in IT - Year 1 Semester II

 Channelization is a multiple access method in which the available bandwidth of the link is shared in time, frequency or through code between different stations.  Eg:-  Frequency Division Multiple Access – FDMA  Time Division Multiple Access – TDMA  Code Division Multiple Access – CDMA M.Sc. in IT - Year 1 Semester II

 Random Access means each station has the right to the medium without being controlled by any other station.  Eg:  ALOHA  Slotted ALOHA  CSMA/CD  CSMA/CA M.Sc. in IT - Year 1 Semester II

 Control access means the stations consult one another to find which station has the right to transmit.  Eg:  Reservation  Polling  Token Passing M.Sc. in IT - Year 1 Semester II