SlideShare una empresa de Scribd logo
1 de 53
Multiple Access
Komunikasi Data

Adapted from lecture slides by Behrouz A. Forouzan
© The McGraw-Hill Companies, Inc. All rights reserved

Anhar, ST., MT
anhar19@gmail.com
http://anhar.staff.unri.ac.id
Jurusan Teknik Elektro
Univ. Riau
Outline





Multiple access mechanisms
Random access
Controlled access
Channelization

2
Data Link Layer
Sublayers of Data Link
Layer

4
Multiple Access Links and
Protocols
Three types of “links”:
 Point-to-point (single wire, e.g. PPP,
SLIP)
 Broadcast (shared wire or medium; e.g,
Ethernet, WiFi/WaveLAN, etc.)



Switched (e.g., switched Ethernet, ATM etc)
Multiple access problem





Example:
Classroom– many people gather together in a
large room
Broadcast medium – air
Human protocols:







“Give everyone a chance to speak”
“Don’t speak until you are spoken to”
“Don’t monopolize the conversation”
“Raise your hand if you have a question”
“Don’t interrupt when someone is speaking”
“Don’t fall asleep when someone else is talking”
Multiple access protocols







In LANs, WiFi, satellite networks
If more than 2 users send @ the same time collision
All collided packets are lost -> waste of bandwidth
Ideally, the MAC protocol for a broadcast channel
with the bit-rate R bps should satisfy:






if only 1 node is sending than the throughput is R
when M nodes have data to send than the throughput is
R/M
decentralized protocol – no master
simple & inexpensive to implement
MAC Protocols: Taxonomy

Three broad classes:
 Channel Partitioning






Random Access





divide channel into smaller “pieces” (time slots,
frequency)
allocate piece to node for exclusive use
allow collisions
“recover” from collisions

“Taking turns”


tightly coordinate shared access to avoid
collisions
Goal: efficient, fair, simple, decentralized
Multiple Access
Mechanisms

9
Random Access
Random Access



Also called contention-based access
No station is assigned to control another

11
Random Access Protocols


In random access or contention methods,
no station is superior to another station
and none is assigned the control over
another. No station permits, or does not
permit, another station to send. At each
instance, a station that has data to send
uses a procedure defined by the protocol
to make a decision on whether or not to
send.
Random Access




1.
2.
3.

4.

If more than one station wants to send,
there is an access conflict -- Collision—
To avoid access conflict each station has
to follow procedure that will answers the
following questions:
When can the station access the medium?
What can the station do if the medium is busy?
How can the station determine the success or failure of the
transmission
What can the station do if there is an access conflict?
ALOHA Network


Developed by Norm Abramson at the Univ. of Hawaii




the guy had interest in surfing and packet switching
mountainous islands → land-based network difficult to install
fully decentralized protocol

ACK
ACK

ACK
ACK
Frames in Pure ALOHA

15
ALOHA Protocol

16
Example


Calculate possible values of TB, when
stations on an ALOHA network are a
maximum of 600 km apart
Tp = (600 × 103) / (3 × 108) = 2 ms



When K=1, TB ∈ {0ms,2ms}



When K=2, TB ∈ {0ms,2ms,4ms,6ms}



:
17
ALOHA: Vulnerable Time

18
ALOHA: Throughput






Assume number of stations trying to
transmit follow Poisson Distribution
The throughput for pure ALOHA is
S = G × e−2G
where G is the average number of frames
requested per frame-time
The maximum throughput


Smax = 0.184 when G= 1/2

19
Example


A pure ALOHA network transmits 200-bit
frames on a shared channel of 200 kbps.
What is the throughput if the system (all
stations together) produces




1000 frames per second
500 frames per second
250 frames per second

20
Slotted ALOHA

21
Slotted ALOHA: Vulnerable Time

22
Slotted ALOHA:
Throughput


The throughput for Slotted ALOHA is
S = G × e−G



where G is the average number of frames
requested per frame-time
The maximum throughput


Smax = 0.368 when G= 1
23
Example


A Slotted ALOHA network transmits 200bit frames on a shared channel of 200
kbps. What is the throughput if the system
(all stations together) produces




1000 frames per second
500 frames per second
250 frames per second

24
Multiple Access Protocols

ALOHA
CSMA


C arrier S ense M ultiple A ccess




"Listen before talk"

Reduce the possibility of collision


But cannot completely eliminate it

26
Collision in CSMA

27
CSMA: Vulnerable Time

28
Persistence Methods


What a station does when channel is idle or busy

29
Persistence Methods

30
CSMA/CD




C arrier S ense M ultiple A ccess with
C ollision D etection
Station monitors channel when sending a
frame

31
Carrier Sensing Multiple Access with
Collision detection (CSMA-CD)


Jika station dp mengetahui apakah collision terjadi,
maka bandwith yang terbuang dpt dikurangi dengan
menghentikan transmisi
Carrier Sensing Multiple Access with
Collision detection (CSMA-CD)
Carrier Sensing Multiple Access with
Collision detection (CSMA-CD)






Station yang mempunyai paket mendeteksi kanal dan
transmit jika kanal idle
Jika kanal sibuk, gunakan strategi dari CSMA (persist,
backoff segera atau persist dengan prob. p)
Jika collision terdeteksi saat transmisi, sinyal short
jamming ditransmisikan untuk meyakinkan semua
station mengetahui terjadi collision sebelum
menghentikan transmisi, selanjutnya algoritma backoff
digunakan untuk rescheduling waktu resensing
Carrier Sensing Multiple Access with
Collision detection (CSMA-CD)


Kanal mempunyai 3 kondisi (state):








sibuk mentransmisikan frame
idle
perioda contention (dimana station berusaha menduduki kanal)

Throughput 1-Persistent CSMA-CD dapat dianalisa dg
asumsi waktu dibagi dalam minislot sebesar 2tprop det
(untuk menjamin station selalu dapat mendeteksi
collision)
Setiap kanal menjadi idle, station memperebutkan
(contend) kanal dengan transmit dan mendengar untuk
mengetahui apakah sukses menduduki kanal
CSMA/CD: Minimum Frame Size




Each frame must be large enough for a sender
to detect a collision
Worst case scenario:



"A" is transmitting
"D" starts transmitting just before A's signal arrives
A

B

C

D

Long enough to
hear colliding signal
from D

36
Example


A CSMA/CD network has a bandwidth of
10 Mbps. If the maximum propagation
time is 25.6 μs, what is the minimum size
of the frame?

37
CSMA/CD: Flow Diagram

38
Multiple Access Protocols

ALOHA
CSMA/CA




C arrier S ense M ultiple A ccess with
C ollision A voidance
Used in a network where collision cannot
be detected


E.g., wireless LAN

IFS – Interframe Space
40
CSMA/ CA
In wireless networks collision is avoided.
 Collisions are avoided through following
strategies:
1. Interframe Space
2. Contention Window
3. Acknowledgment

CSMA/CA: Flow Diagram

contention window
size is 2K-1

After each slot:
- If idle, continue counting
- If busy, stop counting

42
Controlled Access
Control Access




A station must be authorized by someone
(e.g., other stations) before transmitting
Three common methods:




Reservation
Polling
Token passing

44
Reservation




A station must make a reservation before sending
data
Time is divided into intervals





A reservation frame proceeds each time interval
Number of stations and number of time slots in the
reservation frame are equal
Each time slot belongs to a particular station
Polling


Devises are categorized into:








All data exchange must go through the primary station
Primary station controls the link and initiates the session
Secondary station obey the instructions of PS.
PS polls stations




Primary station (PS)
Secondary station (SS)

Asking SS if they have something to send

PS select a SS


Telling it to get ready to receive data
Poll procedure
Select procedure
Token passing










the stations in a network are organized in a logical ring
for each station, there is a predecessor and a successor
for a station to access the channel, it must posses a token
(special packet) that gives the station the right to access the
channel and send its data
once the station has finished its task, the token will then be
passed to the successor (next station)
the station cannot send data until it receives the token again in
the next round
token management is necessary





Every station is limited in the time of token possession
Token must be monitored to ensure no lose or destroyed
Assign priorities to the stations and to the types of data transmitted
To make low-priority stations release the token to high priority stations
Token Passing procedure
Token passing


Logical Ring


in a token passing network, stations do not have to be physically connected
in a ring; the ring can be a logical one.
Channelization
Channelization



Similar to multiplexing
Three schemes




Frequency-Division Multiple Access (FDMA)
Time-Division Multiple Access (TDMA)
Code-Division Multiple Access (CDMA)

53

Más contenido relacionado

La actualidad más candente

Asynchronous Transfer Mode ATM
Asynchronous Transfer Mode  ATMAsynchronous Transfer Mode  ATM
Asynchronous Transfer Mode ATMMadhumita Tamhane
 
Switching
Switching Switching
Switching Abid Ali
 
Multiple Access in Computer Network
Multiple Access in Computer NetworkMultiple Access in Computer Network
Multiple Access in Computer NetworkHitesh Mohapatra
 
IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5Vicky Kumar
 
ASYNCHRONOUS TRANSFER MODE (ATM)
ASYNCHRONOUS TRANSFER MODE (ATM)ASYNCHRONOUS TRANSFER MODE (ATM)
ASYNCHRONOUS TRANSFER MODE (ATM)ZillayHuma Mehmood
 
SOC Verification using SystemVerilog
SOC Verification using SystemVerilog SOC Verification using SystemVerilog
SOC Verification using SystemVerilog Ramdas Mozhikunnath
 
seminar report on multiple access control protocol submitted by munesh
seminar report on multiple access control protocol submitted by munesh seminar report on multiple access control protocol submitted by munesh
seminar report on multiple access control protocol submitted by munesh meenamunesh
 
12 multiple access
12 multiple access12 multiple access
12 multiple accessbheemsain
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesSayed Chhattan Shah
 
ALOHA Protocol (in detail)
ALOHA Protocol (in detail)ALOHA Protocol (in detail)
ALOHA Protocol (in detail)Hinal Lunagariya
 
wn_Chapter_6_MAC.pdf
wn_Chapter_6_MAC.pdfwn_Chapter_6_MAC.pdf
wn_Chapter_6_MAC.pdfyacegod
 
Csma(carriers sense-multiple-acess)
Csma(carriers sense-multiple-acess) Csma(carriers sense-multiple-acess)
Csma(carriers sense-multiple-acess) Rajan Kandel
 
Data link layer
Data link layerData link layer
Data link layersbkbca
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSDr. SELVAGANESAN S
 
high-Speed LANs Chapter06
high-Speed LANs Chapter06high-Speed LANs Chapter06
high-Speed LANs Chapter06daniel ayalew
 

La actualidad más candente (20)

Asynchronous Transfer Mode ATM
Asynchronous Transfer Mode  ATMAsynchronous Transfer Mode  ATM
Asynchronous Transfer Mode ATM
 
Switching
Switching Switching
Switching
 
Multiple Access in Computer Network
Multiple Access in Computer NetworkMultiple Access in Computer Network
Multiple Access in Computer Network
 
Computer networks - Channelization
Computer networks - ChannelizationComputer networks - Channelization
Computer networks - Channelization
 
IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5
 
ASYNCHRONOUS TRANSFER MODE (ATM)
ASYNCHRONOUS TRANSFER MODE (ATM)ASYNCHRONOUS TRANSFER MODE (ATM)
ASYNCHRONOUS TRANSFER MODE (ATM)
 
SOC Verification using SystemVerilog
SOC Verification using SystemVerilog SOC Verification using SystemVerilog
SOC Verification using SystemVerilog
 
seminar report on multiple access control protocol submitted by munesh
seminar report on multiple access control protocol submitted by munesh seminar report on multiple access control protocol submitted by munesh
seminar report on multiple access control protocol submitted by munesh
 
12 multiple access
12 multiple access12 multiple access
12 multiple access
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
 
ALOHA Protocol (in detail)
ALOHA Protocol (in detail)ALOHA Protocol (in detail)
ALOHA Protocol (in detail)
 
wn_Chapter_6_MAC.pdf
wn_Chapter_6_MAC.pdfwn_Chapter_6_MAC.pdf
wn_Chapter_6_MAC.pdf
 
Imt 2000
Imt 2000Imt 2000
Imt 2000
 
Csma(carriers sense-multiple-acess)
Csma(carriers sense-multiple-acess) Csma(carriers sense-multiple-acess)
Csma(carriers sense-multiple-acess)
 
Ch 06
Ch 06Ch 06
Ch 06
 
IEEE 802.11 and Bluetooth
IEEE 802.11 and BluetoothIEEE 802.11 and Bluetooth
IEEE 802.11 and Bluetooth
 
Data link layer
Data link layerData link layer
Data link layer
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
 
high-Speed LANs Chapter06
high-Speed LANs Chapter06high-Speed LANs Chapter06
high-Speed LANs Chapter06
 
Csma
CsmaCsma
Csma
 

Destacado (20)

Aloha
AlohaAloha
Aloha
 
Controlled Access Protocols
Controlled Access ProtocolsControlled Access Protocols
Controlled Access Protocols
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
 
Introduction To Wireless Fading Channels
Introduction To Wireless Fading ChannelsIntroduction To Wireless Fading Channels
Introduction To Wireless Fading Channels
 
CSMA/CA
CSMA/CACSMA/CA
CSMA/CA
 
csma ca
 csma ca csma ca
csma ca
 
Francesco Varanini Information & Comminication Technology iCT come leva strat...
Francesco Varanini Information & Comminication Technology iCT come leva strat...Francesco Varanini Information & Comminication Technology iCT come leva strat...
Francesco Varanini Information & Comminication Technology iCT come leva strat...
 
Plc basics
Plc basicsPlc basics
Plc basics
 
Tugas kelompok jarkom
Tugas kelompok jarkomTugas kelompok jarkom
Tugas kelompok jarkom
 
Lecture 13
Lecture 13Lecture 13
Lecture 13
 
Pure Aloha and Slotted Aloha
Pure Aloha and Slotted AlohaPure Aloha and Slotted Aloha
Pure Aloha and Slotted Aloha
 
Ch13
Ch13Ch13
Ch13
 
Csmaca
CsmacaCsmaca
Csmaca
 
Ch 13
Ch 13Ch 13
Ch 13
 
C07 wireless la-ns
C07 wireless la-nsC07 wireless la-ns
C07 wireless la-ns
 
Carrier Sense Multiple Access (CSMA)
Carrier Sense Multiple Access (CSMA)Carrier Sense Multiple Access (CSMA)
Carrier Sense Multiple Access (CSMA)
 
Ch12
Ch12Ch12
Ch12
 
802.11n Tutorial
802.11n Tutorial802.11n Tutorial
802.11n Tutorial
 
Ch14
Ch14Ch14
Ch14
 
Switching
SwitchingSwitching
Switching
 

Similar a 9 multiple access

M.A.C (Medium Access Control)
M.A.C (Medium Access Control)M.A.C (Medium Access Control)
M.A.C (Medium Access Control)JaironLanda
 
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptxComputer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptxPravinbhargav
 
Network Topologies
Network TopologiesNetwork Topologies
Network TopologiesJason Hando
 
Media Access Control (MAC Layer)
Media Access Control (MAC Layer)Media Access Control (MAC Layer)
Media Access Control (MAC Layer)Meenakshi Paul
 
16 high speedla-ns
16 high speedla-ns16 high speedla-ns
16 high speedla-nsMayur Garg
 
16 high speedla-ns
16 high speedla-ns16 high speedla-ns
16 high speedla-nsMayur Garg
 
Unit-2 Media Access Protocols.pdf
Unit-2 Media Access Protocols.pdfUnit-2 Media Access Protocols.pdf
Unit-2 Media Access Protocols.pdfSmtPArunaKumari
 
WHAT IS MAC-1 presentation for information .pptx
WHAT IS MAC-1 presentation for information  .pptxWHAT IS MAC-1 presentation for information  .pptx
WHAT IS MAC-1 presentation for information .pptxSaqlainKhan39
 
Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...
Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...
Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...Soumen Santra
 
CN R16 -UNIT-4.pdf
CN R16 -UNIT-4.pdfCN R16 -UNIT-4.pdf
CN R16 -UNIT-4.pdfJoshuaeeda1
 

Similar a 9 multiple access (20)

MultipleAccess.ppt
MultipleAccess.pptMultipleAccess.ppt
MultipleAccess.ppt
 
M.A.C (Medium Access Control)
M.A.C (Medium Access Control)M.A.C (Medium Access Control)
M.A.C (Medium Access Control)
 
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptxComputer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptx
 
Network Topologies
Network TopologiesNetwork Topologies
Network Topologies
 
Wired Lan Ethernet - DATA Link Layer
Wired Lan Ethernet - DATA Link LayerWired Lan Ethernet - DATA Link Layer
Wired Lan Ethernet - DATA Link Layer
 
10 high speedla-ns
10 high speedla-ns10 high speedla-ns
10 high speedla-ns
 
Unit 1 mac vsd
Unit 1 mac vsdUnit 1 mac vsd
Unit 1 mac vsd
 
Unit 3 - Data Link Layer - Part B
Unit 3 - Data Link Layer - Part BUnit 3 - Data Link Layer - Part B
Unit 3 - Data Link Layer - Part B
 
Media Access Control (MAC Layer)
Media Access Control (MAC Layer)Media Access Control (MAC Layer)
Media Access Control (MAC Layer)
 
16 high speedla-ns
16 high speedla-ns16 high speedla-ns
16 high speedla-ns
 
16 high speedla-ns
16 high speedla-ns16 high speedla-ns
16 high speedla-ns
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
 
Mac
MacMac
Mac
 
kamalaveni.ppt
kamalaveni.pptkamalaveni.ppt
kamalaveni.ppt
 
Unit-2 Media Access Protocols.pdf
Unit-2 Media Access Protocols.pdfUnit-2 Media Access Protocols.pdf
Unit-2 Media Access Protocols.pdf
 
aloha
alohaaloha
aloha
 
dcn.pdf
dcn.pdfdcn.pdf
dcn.pdf
 
WHAT IS MAC-1 presentation for information .pptx
WHAT IS MAC-1 presentation for information  .pptxWHAT IS MAC-1 presentation for information  .pptx
WHAT IS MAC-1 presentation for information .pptx
 
Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...
Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...
Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...
 
CN R16 -UNIT-4.pdf
CN R16 -UNIT-4.pdfCN R16 -UNIT-4.pdf
CN R16 -UNIT-4.pdf
 

Más de ampas03

Digital 131341 t 27623-analisis kualitas-tinjauan literatur
Digital 131341 t 27623-analisis kualitas-tinjauan literaturDigital 131341 t 27623-analisis kualitas-tinjauan literatur
Digital 131341 t 27623-analisis kualitas-tinjauan literaturampas03
 
Dasar telekomunikasi
Dasar telekomunikasiDasar telekomunikasi
Dasar telekomunikasiampas03
 
komunikasi serat optik
komunikasi serat optikkomunikasi serat optik
komunikasi serat optikampas03
 
Serat Optik
Serat OptikSerat Optik
Serat Optikampas03
 
Network layer m6
Network layer m6Network layer m6
Network layer m6ampas03
 
Materi s-parameter
Materi s-parameterMateri s-parameter
Materi s-parameterampas03
 
Matching impedance
Matching impedanceMatching impedance
Matching impedanceampas03
 
Makalah phase shift keying
Makalah phase shift keyingMakalah phase shift keying
Makalah phase shift keyingampas03
 
Jaringan dan teknologi fiber opti kkkkkkk
Jaringan dan teknologi fiber opti kkkkkkkJaringan dan teknologi fiber opti kkkkkkk
Jaringan dan teknologi fiber opti kkkkkkkampas03
 
Datalink layer m5
Datalink layer m5Datalink layer m5
Datalink layer m5ampas03
 
Bounce diagram technique
Bounce diagram techniqueBounce diagram technique
Bounce diagram techniqueampas03
 
Bahan presentasi
Bahan presentasiBahan presentasi
Bahan presentasiampas03
 
Bab 4 perkembangan dan kemajuan sistem komunikasi bergerak
Bab 4 perkembangan dan kemajuan sistem komunikasi bergerakBab 4 perkembangan dan kemajuan sistem komunikasi bergerak
Bab 4 perkembangan dan kemajuan sistem komunikasi bergerakampas03
 
Bab 3 konsep sistem komunikasi bergerak
Bab 3 konsep sistem komunikasi bergerakBab 3 konsep sistem komunikasi bergerak
Bab 3 konsep sistem komunikasi bergerakampas03
 
Bab 2 arsitektur sistem komunikasi bergerak
Bab 2 arsitektur sistem komunikasi bergerakBab 2 arsitektur sistem komunikasi bergerak
Bab 2 arsitektur sistem komunikasi bergerakampas03
 
Bab 1 pendahuluan
Bab 1 pendahuluanBab 1 pendahuluan
Bab 1 pendahuluanampas03
 
10 wired lan
10 wired lan10 wired lan
10 wired lanampas03
 
10 hub bridgeswitch
10 hub bridgeswitch10 hub bridgeswitch
10 hub bridgeswitchampas03
 
5 multiplexing dan media transmisi(1)
5 multiplexing dan media transmisi(1)5 multiplexing dan media transmisi(1)
5 multiplexing dan media transmisi(1)ampas03
 

Más de ampas03 (20)

Digital 131341 t 27623-analisis kualitas-tinjauan literatur
Digital 131341 t 27623-analisis kualitas-tinjauan literaturDigital 131341 t 27623-analisis kualitas-tinjauan literatur
Digital 131341 t 27623-analisis kualitas-tinjauan literatur
 
Dasar telekomunikasi
Dasar telekomunikasiDasar telekomunikasi
Dasar telekomunikasi
 
komunikasi serat optik
komunikasi serat optikkomunikasi serat optik
komunikasi serat optik
 
Serat Optik
Serat OptikSerat Optik
Serat Optik
 
Network layer m6
Network layer m6Network layer m6
Network layer m6
 
Materi s-parameter
Materi s-parameterMateri s-parameter
Materi s-parameter
 
Matching impedance
Matching impedanceMatching impedance
Matching impedance
 
Makalah phase shift keying
Makalah phase shift keyingMakalah phase shift keying
Makalah phase shift keying
 
Komdat
KomdatKomdat
Komdat
 
Jaringan dan teknologi fiber opti kkkkkkk
Jaringan dan teknologi fiber opti kkkkkkkJaringan dan teknologi fiber opti kkkkkkk
Jaringan dan teknologi fiber opti kkkkkkk
 
Datalink layer m5
Datalink layer m5Datalink layer m5
Datalink layer m5
 
Bounce diagram technique
Bounce diagram techniqueBounce diagram technique
Bounce diagram technique
 
Bahan presentasi
Bahan presentasiBahan presentasi
Bahan presentasi
 
Bab 4 perkembangan dan kemajuan sistem komunikasi bergerak
Bab 4 perkembangan dan kemajuan sistem komunikasi bergerakBab 4 perkembangan dan kemajuan sistem komunikasi bergerak
Bab 4 perkembangan dan kemajuan sistem komunikasi bergerak
 
Bab 3 konsep sistem komunikasi bergerak
Bab 3 konsep sistem komunikasi bergerakBab 3 konsep sistem komunikasi bergerak
Bab 3 konsep sistem komunikasi bergerak
 
Bab 2 arsitektur sistem komunikasi bergerak
Bab 2 arsitektur sistem komunikasi bergerakBab 2 arsitektur sistem komunikasi bergerak
Bab 2 arsitektur sistem komunikasi bergerak
 
Bab 1 pendahuluan
Bab 1 pendahuluanBab 1 pendahuluan
Bab 1 pendahuluan
 
10 wired lan
10 wired lan10 wired lan
10 wired lan
 
10 hub bridgeswitch
10 hub bridgeswitch10 hub bridgeswitch
10 hub bridgeswitch
 
5 multiplexing dan media transmisi(1)
5 multiplexing dan media transmisi(1)5 multiplexing dan media transmisi(1)
5 multiplexing dan media transmisi(1)
 

Último

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 

Último (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 

9 multiple access

  • 1. Multiple Access Komunikasi Data Adapted from lecture slides by Behrouz A. Forouzan © The McGraw-Hill Companies, Inc. All rights reserved Anhar, ST., MT anhar19@gmail.com http://anhar.staff.unri.ac.id Jurusan Teknik Elektro Univ. Riau
  • 2. Outline     Multiple access mechanisms Random access Controlled access Channelization 2
  • 4. Sublayers of Data Link Layer 4
  • 5. Multiple Access Links and Protocols Three types of “links”:  Point-to-point (single wire, e.g. PPP, SLIP)  Broadcast (shared wire or medium; e.g, Ethernet, WiFi/WaveLAN, etc.)  Switched (e.g., switched Ethernet, ATM etc)
  • 6. Multiple access problem     Example: Classroom– many people gather together in a large room Broadcast medium – air Human protocols:       “Give everyone a chance to speak” “Don’t speak until you are spoken to” “Don’t monopolize the conversation” “Raise your hand if you have a question” “Don’t interrupt when someone is speaking” “Don’t fall asleep when someone else is talking”
  • 7. Multiple access protocols     In LANs, WiFi, satellite networks If more than 2 users send @ the same time collision All collided packets are lost -> waste of bandwidth Ideally, the MAC protocol for a broadcast channel with the bit-rate R bps should satisfy:     if only 1 node is sending than the throughput is R when M nodes have data to send than the throughput is R/M decentralized protocol – no master simple & inexpensive to implement
  • 8. MAC Protocols: Taxonomy Three broad classes:  Channel Partitioning    Random Access    divide channel into smaller “pieces” (time slots, frequency) allocate piece to node for exclusive use allow collisions “recover” from collisions “Taking turns”  tightly coordinate shared access to avoid collisions Goal: efficient, fair, simple, decentralized
  • 11. Random Access   Also called contention-based access No station is assigned to control another 11
  • 12. Random Access Protocols  In random access or contention methods, no station is superior to another station and none is assigned the control over another. No station permits, or does not permit, another station to send. At each instance, a station that has data to send uses a procedure defined by the protocol to make a decision on whether or not to send.
  • 13. Random Access   1. 2. 3. 4. If more than one station wants to send, there is an access conflict -- Collision— To avoid access conflict each station has to follow procedure that will answers the following questions: When can the station access the medium? What can the station do if the medium is busy? How can the station determine the success or failure of the transmission What can the station do if there is an access conflict?
  • 14. ALOHA Network  Developed by Norm Abramson at the Univ. of Hawaii    the guy had interest in surfing and packet switching mountainous islands → land-based network difficult to install fully decentralized protocol ACK ACK ACK ACK
  • 15. Frames in Pure ALOHA 15
  • 17. Example  Calculate possible values of TB, when stations on an ALOHA network are a maximum of 600 km apart Tp = (600 × 103) / (3 × 108) = 2 ms  When K=1, TB ∈ {0ms,2ms}  When K=2, TB ∈ {0ms,2ms,4ms,6ms}  : 17
  • 19. ALOHA: Throughput    Assume number of stations trying to transmit follow Poisson Distribution The throughput for pure ALOHA is S = G × e−2G where G is the average number of frames requested per frame-time The maximum throughput  Smax = 0.184 when G= 1/2 19
  • 20. Example  A pure ALOHA network transmits 200-bit frames on a shared channel of 200 kbps. What is the throughput if the system (all stations together) produces    1000 frames per second 500 frames per second 250 frames per second 20
  • 23. Slotted ALOHA: Throughput  The throughput for Slotted ALOHA is S = G × e−G  where G is the average number of frames requested per frame-time The maximum throughput  Smax = 0.368 when G= 1 23
  • 24. Example  A Slotted ALOHA network transmits 200bit frames on a shared channel of 200 kbps. What is the throughput if the system (all stations together) produces    1000 frames per second 500 frames per second 250 frames per second 24
  • 26. CSMA  C arrier S ense M ultiple A ccess   "Listen before talk" Reduce the possibility of collision  But cannot completely eliminate it 26
  • 29. Persistence Methods  What a station does when channel is idle or busy 29
  • 31. CSMA/CD   C arrier S ense M ultiple A ccess with C ollision D etection Station monitors channel when sending a frame 31
  • 32. Carrier Sensing Multiple Access with Collision detection (CSMA-CD)  Jika station dp mengetahui apakah collision terjadi, maka bandwith yang terbuang dpt dikurangi dengan menghentikan transmisi
  • 33. Carrier Sensing Multiple Access with Collision detection (CSMA-CD)
  • 34. Carrier Sensing Multiple Access with Collision detection (CSMA-CD)    Station yang mempunyai paket mendeteksi kanal dan transmit jika kanal idle Jika kanal sibuk, gunakan strategi dari CSMA (persist, backoff segera atau persist dengan prob. p) Jika collision terdeteksi saat transmisi, sinyal short jamming ditransmisikan untuk meyakinkan semua station mengetahui terjadi collision sebelum menghentikan transmisi, selanjutnya algoritma backoff digunakan untuk rescheduling waktu resensing
  • 35. Carrier Sensing Multiple Access with Collision detection (CSMA-CD)  Kanal mempunyai 3 kondisi (state):      sibuk mentransmisikan frame idle perioda contention (dimana station berusaha menduduki kanal) Throughput 1-Persistent CSMA-CD dapat dianalisa dg asumsi waktu dibagi dalam minislot sebesar 2tprop det (untuk menjamin station selalu dapat mendeteksi collision) Setiap kanal menjadi idle, station memperebutkan (contend) kanal dengan transmit dan mendengar untuk mengetahui apakah sukses menduduki kanal
  • 36. CSMA/CD: Minimum Frame Size   Each frame must be large enough for a sender to detect a collision Worst case scenario:   "A" is transmitting "D" starts transmitting just before A's signal arrives A B C D Long enough to hear colliding signal from D 36
  • 37. Example  A CSMA/CD network has a bandwidth of 10 Mbps. If the maximum propagation time is 25.6 μs, what is the minimum size of the frame? 37
  • 40. CSMA/CA   C arrier S ense M ultiple A ccess with C ollision A voidance Used in a network where collision cannot be detected  E.g., wireless LAN IFS – Interframe Space 40
  • 41. CSMA/ CA In wireless networks collision is avoided.  Collisions are avoided through following strategies: 1. Interframe Space 2. Contention Window 3. Acknowledgment 
  • 42. CSMA/CA: Flow Diagram contention window size is 2K-1 After each slot: - If idle, continue counting - If busy, stop counting 42
  • 44. Control Access   A station must be authorized by someone (e.g., other stations) before transmitting Three common methods:    Reservation Polling Token passing 44
  • 45. Reservation   A station must make a reservation before sending data Time is divided into intervals    A reservation frame proceeds each time interval Number of stations and number of time slots in the reservation frame are equal Each time slot belongs to a particular station
  • 46. Polling  Devises are categorized into:       All data exchange must go through the primary station Primary station controls the link and initiates the session Secondary station obey the instructions of PS. PS polls stations   Primary station (PS) Secondary station (SS) Asking SS if they have something to send PS select a SS  Telling it to get ready to receive data
  • 49. Token passing       the stations in a network are organized in a logical ring for each station, there is a predecessor and a successor for a station to access the channel, it must posses a token (special packet) that gives the station the right to access the channel and send its data once the station has finished its task, the token will then be passed to the successor (next station) the station cannot send data until it receives the token again in the next round token management is necessary     Every station is limited in the time of token possession Token must be monitored to ensure no lose or destroyed Assign priorities to the stations and to the types of data transmitted To make low-priority stations release the token to high priority stations
  • 51. Token passing  Logical Ring  in a token passing network, stations do not have to be physically connected in a ring; the ring can be a logical one.
  • 53. Channelization   Similar to multiplexing Three schemes    Frequency-Division Multiple Access (FDMA) Time-Division Multiple Access (TDMA) Code-Division Multiple Access (CDMA) 53