SlideShare a Scribd company logo
1 of 35
MULTIPLE ACCESS PROTOCOL

PRESENTED BY,
J.MERLIN FLORRENCE
I M.Sc
AGENDA
INTORDUCTION
TYPES OF NETWORK LINK

CHANNEL PARITIONING PROTOCOLS
RANDOM ACCESS
Slotted ALOHA

ALOHA
CSMA
TAKING-TURNS PROTOCOLS
LOCAL AREA NETWORKS
TYPES OF NETWORK LINK
Network link

Point-to-point link

Broadcast link

Point-to-point link:
It consists of a single sender at one end of
the link and a single receiver at the other end of
the link.
BROADCAST-LINK
•It can have multiple sending and receiving nodes
all connected to the same, single shared broadcast
channel.
•Examples:
Ethernet, Wireless LAN

Multiple Access Problem:
How to coordinate the access of multiple
sending and receiving to a shared broadcast channel.
Multiple access protocol
Multiple access protocol is used to coordinate
access to the link.
Nodes can regulate their transmission onto the
shared broadcast channel by using Multiple
access protocol.
It is used both wired and wireless local area
Text
network and satellite network.
All nodes are capable of transmitting frame,
more than two nodes can transmit frames at the
same time.
If so, the transmitted frames collide at all of the
receivers.
When there is a collision, none of the receiving
nodes can make any sense of any of the frames that
were transmitted;
In a sense, the signals of the colliding frames
become inextricably tangled together.

Thus, all frames involved in the collision are lost,
and the broad cast channel as wasted during the
collision interval.
To rectify this problem Multiple access protocol
was implemented
Various multiple access channels
Classification of MAP
Multiple Access
Protocol

Channel-Partitioning
protocols

Random Access
Protocol
Taking-turns
Protocols
Channel Partitioning Protocols
Techniques used to partition a broadcast channel’s
are,
• Time-division multiplexing
• Frequency-division multiplexing
For example, if the channel send N nodes and that
the transmission rate of the channel is R bps.
TDM divides time into time frames and further
divides each time frame into N time slots.
TEXT
TEXT
TEXT
Each slot time is then assigned to one of the N
nodes.
whenever a node has a packet to send, it transmits
the packet’s bits during its assigned time slot in the
revolving TDM frame.
TDM is appealing because it eliminates collisions and
is perfectly fair : Each node gets a dedicated
transmission rate of R/N bps during each frame time.
DRAWBACKS:
A node is limited to an average rate of R/N bps even
when it is the only node with packets to send.
A node must always wait for its turn in the
transmission sequence-again, even when it is the only
node with frame to send.
A Four-node TDM and FDM example
TDMA: time division multiple access
Example:

Frequency

4 users

time
FDMA: frequency division multiple access

Frequency

time

CDMA: code division multiple access
 Same frequency and time but different codes.

11
FDM
While TDM shares the broadcast channel in time, FDM divides
the R bps channel into different frequencies and assigns each
frequency to one of the nodes.
FDM creates N smaller channels of R/N bps out of the single,
larger R bps channel.

CDMA:
It is Code Division Multiple Access.
While TDM and FDM assign time slot and frequencies
respectively, to the nodes, CDMA assigns a different code to each
node.
RANDOM ACCESS PROTOCOL
When node has packet to send
Sense the channel.
If it is busy, wait for random amount of time and then
retry.
no a prior coordination among nodes.
All nodes use the same time, frequency and code.

Two or more transmitting nodes ➜ “collision”
Random access MAC protocol specifies how to recover
from collisions -> Exponential backoff.

Examples of random access MAC protocols:
CSMA, CSMA/CA, CSMA/CD
Cont…
Most commonly used random access protocols,
ALOHA
CSMA(Carrier Sense Multiple Access Protocols)
Slotted ALOHA
we assume,
All frames consist of exactly L bits.
Time is divided into slots of size L/R seconds
Nodes start to transmit frames only at the beginning of slots
The nodes are synchronized so that each node knows when the
slots begin.
If two or more frames collide in a slot ; then all the nodes detect
the collision event before the slot ends
Let p be a probability ,that is, a number between o and 1.
the operation of slotted ALOHA in each node is.
When the node has a fresh frame to send, it waits until
the beginning of the next slot and transmits the entire
frame in the slot.
If there isn’t a collision, the node has successfully
transmitted its frame and thus need not consider
retransmitting the frame.
If there is a collision, the node detects the collision
before the end of the slot. The node retransmits its frame
in each subsequent slot with probability p until the frame
is transmitted without a collision
Key:
C : Collision
E : Empty set
S : successful slot

Nodes 1,2 and 3 collide in the first slot. Node 2 finally
succeeds in the fourth slot, node 1 n the eight slot, and
node 3 in the ninth slot
Pros and Cons of Slotted ALOHA
Pros
• single active node can continuously transmit at
full rate of channel
• highly decentralized: only slots in nodes need to
be in sync
• Simple protocol

Cons
• collisions, wasting slots
• idle slots
• nodes may be able to detect collision in less than time to
transmit packet
• clock synchronization
ALOHA
It required that all nodes synchronize their
transmissions to start at the beginning of a slot.

When a frame arrives, the node immediately
transmits the frame in it’s the frame in its entirely into
the broadcast channel.
If a transmitted frame experiences a collision with
one or more other transmissions, the node will then
immediately retransmit the frame with probability p.
Otherwise , the node waits for a frame transmission
time
Efficiency is the long-run fraction of successful slots when
there are many nodes, each with many frames to send
Suppose N nodes with many frames to send, each transmits in
slot with probability p
probability that node 1 has success in a slot = p(1-p)N-1
probability that any node has a success = Np(1-p)N-1
For max efficiency with N nodes, find p* that maximizes
Np(1-p)N-1

For many nodes, take limit of Np*(1-p*)N-1 as N goes to
infinity, gives 1/e = .37
Efficiency is 37%, even with optimal p
unsloted Aloha: simpler, no synchronization
when frame first arrives
transmit immediately
collision probability increases:
frame sent at t0 collides with other frames sent in
[t0-1,t0+1]
P(success by given node) = P(node transmits) .
P(no other node transmits in [t0-1,t0] .
P(no other node transmits in [t0,t0+1]
= p . (1-p)N-1 . (1-p)N-1
= p . (1-p)2(N-1)
choosing optimum p and then letting n ->
Efficiency = 1/(2e) = .18

...
Carrier Sense Multiple
Access(CSMA)
Rules of CSMA and CSMA/CD
Carrier sensing
Collision detection

CARRIER SENSING:
A node is listens to the channel before transmitting.
If a frame from another nodes currently being transmitted into
the channel, a node then waits a random amount of time and
then again senses the channel.
If the channel is sensed to be idle, the node then begins frame
transmission.
Otherwise, the node waits another random amount of time and
repeats this process.
COLLISION DETECTION:
A transmitting node listens to the channel while it is
transmitting.
If it detects that another node is transmitting an
interfering frame, it stops transmitting and uses some
protocol to determine when it should next attempt to
transmit
CSMA: listen before transmit. If channel is sensed
busy, defer transmission
Persistent CSMA: retry immediately when
channel becomes idle (this may cause instability)
Non persistent CSMA: retry after random interval
of time
Note: collisions may still exist, since two stations
may sense the channel idle at the same time ( or
better, within a “vulnerable” window = round trip
delay)
In case of collision, the entire packet transmission
time is wasted
Space-time diagram of two CSMA nodes will
colliding transmission
Collisions can still occur:
Propagation delay means
two nodes may not hear
each other’s transmission

Collision:
Entire packet transmission
time wasted

Note:
Role of distance & propagation
delay in determining collision
probability
CSMA CD (Collision Detection)
CSMA/CD: carrier sensing, deferral as in CSMA
– collisions detected within short time
– colliding transmissions aborted, reducing channel
wastage
• collision detection:
– easy in wired LANs: measure signal strengths,
compare transmitted, received signals
– difficult in wireless LANs: receiver shut off
while transmitting
• human analogy: the polite conversationalist
CSMA/CD: like in CSMA
collisions are detected within a few bit times
Transmission is then aborted, reducing the
channel wastage considerably
persistent retransmission is implemented
Collision detection is easy in wired LANs:
can measure signal strength on the line
Collision detection cannot be done in wireless
LANs :
CSMA/CD can approach channel utilization =1 in
LANs:
low ratio of propagation over frame transmission
time
CSMA/CD collision detection
Comparison
Channel partitioning MAC protocols:
– share channel efficiently and fairly at high load
– inefficient at low load: delay in channel access, 1/N
bandwidth allocated even if only 1 active node
Random access MAC protocols
– efficient at low load: single node can fully utilize channel
– high load: collision overhead

Both these types of protocols have been used in sensor
networks depending on the application needs.
29
TAKING -TURNS PROTOCOL
Taking Turns MAC protocols:
(a) Polling: Master “invites” slaves
- Request/Clear overhead, latency, single
point of failure
(b) Token passing: token is passed from one node to
the next
+ Reduce latency, improve fault
tolerance
- elaborate procedures to recover from
lost token
Comparison
Token passing:
Polling:
• master node “invites”  control token passed from one
slave nodes to transmit node to next sequentially.
 token message
in turn
 concerns:
• Request to Send,
 token overhead
Clear to Send msgs
 latency
• concerns:
– polling overhead
– latency
– single point of failure
(master)



single point of failure (token)
LOCAL AREA NETWORKS(LANs)
It is a connection of nodes with in a campus.
The transmission rate of R, of most LANs very high.
Classes of LAN technology:
Token passing technology(including token ring)
FDDI
TOKEN RING LAN:

The N nodes of the LAN are connected in a ring by direct
links.
The topology of the ring defines the token-passing order.
When a node obtains the token and sends a frame, the frame
propagates around the entire ring, there by creating a virtual
broadcast channel.
FDDI
It was designed for geographically larger LANs,
including Metropolitan Area Network(MAN).
It is efficient to let a frame propagate back to the
sending node once the frame has passed the destination
node.
FDDI has the destination node remove the frame
from the ring.
Multiple access protocol
Multiple access protocol

More Related Content

What's hot

Congestion control
Congestion controlCongestion control
Congestion controlAman Jaiswal
 
Error Detection And Correction
Error Detection And CorrectionError Detection And Correction
Error Detection And CorrectionRenu Kewalramani
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network LayerManoj Kumar
 
Multiple access control protocol
Multiple access control protocol Multiple access control protocol
Multiple access control protocol meenamunesh
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithmBushra M
 
Data link control
Data link controlData link control
Data link controlIffat Anjum
 
ALOHA Protocol (in detail)
ALOHA Protocol (in detail)ALOHA Protocol (in detail)
ALOHA Protocol (in detail)Hinal Lunagariya
 
9 multiple access
9 multiple access9 multiple access
9 multiple accessampas03
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layerNaiyan Noor
 
HDLC(High level Data Link Control)
HDLC(High level Data Link Control)HDLC(High level Data Link Control)
HDLC(High level Data Link Control)sonangrai
 

What's hot (20)

Csma cd and csma-ca
Csma cd and csma-caCsma cd and csma-ca
Csma cd and csma-ca
 
Congestion control
Congestion controlCongestion control
Congestion control
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
 
Data link layer
Data link layer Data link layer
Data link layer
 
Error Detection And Correction
Error Detection And CorrectionError Detection And Correction
Error Detection And Correction
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network Layer
 
Multiplexing
MultiplexingMultiplexing
Multiplexing
 
Multiple access control protocol
Multiple access control protocol Multiple access control protocol
Multiple access control protocol
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
 
Distance vector routing
Distance vector routingDistance vector routing
Distance vector routing
 
Computer networks - Channelization
Computer networks - ChannelizationComputer networks - Channelization
Computer networks - Channelization
 
Transport layer
Transport layer Transport layer
Transport layer
 
Data link control
Data link controlData link control
Data link control
 
Error control
Error controlError control
Error control
 
ALOHA Protocol (in detail)
ALOHA Protocol (in detail)ALOHA Protocol (in detail)
ALOHA Protocol (in detail)
 
9 multiple access
9 multiple access9 multiple access
9 multiple access
 
Flow Control
Flow ControlFlow Control
Flow Control
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
 
HDLC(High level Data Link Control)
HDLC(High level Data Link Control)HDLC(High level Data Link Control)
HDLC(High level Data Link Control)
 
Multiplexing
MultiplexingMultiplexing
Multiplexing
 

Viewers also liked (20)

Frequency Modulation In Data Transmission
Frequency Modulation In Data TransmissionFrequency Modulation In Data Transmission
Frequency Modulation In Data Transmission
 
Buffer Overflow Demo by Saurabh Sharma
Buffer Overflow Demo by Saurabh SharmaBuffer Overflow Demo by Saurabh Sharma
Buffer Overflow Demo by Saurabh Sharma
 
Angle mod for stdnts 25 apr
Angle mod for stdnts  25 aprAngle mod for stdnts  25 apr
Angle mod for stdnts 25 apr
 
تاريخ اولى ثانوى 2014 جزء اول
تاريخ اولى ثانوى 2014  جزء اولتاريخ اولى ثانوى 2014  جزء اول
تاريخ اولى ثانوى 2014 جزء اول
 
Encoding and Decoding
Encoding and DecodingEncoding and Decoding
Encoding and Decoding
 
seminar report on multiple access control protocol submitted by munesh
seminar report on multiple access control protocol submitted by munesh seminar report on multiple access control protocol submitted by munesh
seminar report on multiple access control protocol submitted by munesh
 
The Encoding
The EncodingThe Encoding
The Encoding
 
Hdlc
HdlcHdlc
Hdlc
 
The medium access sublayer
 The medium  access sublayer The medium  access sublayer
The medium access sublayer
 
Chapter3
Chapter3Chapter3
Chapter3
 
HDLC(high level data link control)
HDLC(high level data link control)HDLC(high level data link control)
HDLC(high level data link control)
 
Check sum
Check sumCheck sum
Check sum
 
Farming system
Farming systemFarming system
Farming system
 
Farming
FarmingFarming
Farming
 
Chapter 03 cyclic codes
Chapter 03   cyclic codesChapter 03   cyclic codes
Chapter 03 cyclic codes
 
Ethernet
EthernetEthernet
Ethernet
 
Linear block coding
Linear block codingLinear block coding
Linear block coding
 
Checksum 101
Checksum 101Checksum 101
Checksum 101
 
Encoding/Decoding Stuart Hall
Encoding/Decoding Stuart HallEncoding/Decoding Stuart Hall
Encoding/Decoding Stuart Hall
 
CSMA/CD
CSMA/CDCSMA/CD
CSMA/CD
 

Similar to Multiple access protocol

CN R16 -UNIT-4.pdf
CN R16 -UNIT-4.pdfCN R16 -UNIT-4.pdf
CN R16 -UNIT-4.pdfJoshuaeeda1
 
Jaimin chp-4 - media access sub-layer- 2011 batch
Jaimin   chp-4 - media access sub-layer- 2011 batchJaimin   chp-4 - media access sub-layer- 2011 batch
Jaimin chp-4 - media access sub-layer- 2011 batchJaimin Jani
 
link-medium-access-control.pptx
link-medium-access-control.pptxlink-medium-access-control.pptx
link-medium-access-control.pptxpatrickwang85
 
Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...
Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...
Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...Soumen Santra
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...Pallepati Vasavi
 
Csma protocols
Csma protocolsCsma protocols
Csma protocolsManal Shah
 
MACPresentation based on medium access control mechanism
MACPresentation based on medium access control mechanismMACPresentation based on medium access control mechanism
MACPresentation based on medium access control mechanismsupriyaharlapur1
 
MEDIUM-ACCESS CONTROL SUB LAYER.ppt
MEDIUM-ACCESS CONTROL SUB LAYER.pptMEDIUM-ACCESS CONTROL SUB LAYER.ppt
MEDIUM-ACCESS CONTROL SUB LAYER.pptDrTThendralCompSci
 
Medium Access PROTOCOL b yENGR. FAWAD KHAN UET BANNU KP PAKISTAN
Medium Access PROTOCOL b yENGR.  FAWAD KHAN UET BANNU KP PAKISTANMedium Access PROTOCOL b yENGR.  FAWAD KHAN UET BANNU KP PAKISTAN
Medium Access PROTOCOL b yENGR. FAWAD KHAN UET BANNU KP PAKISTANirfan sami
 
UNIT-V Wireless Communication.pdf
UNIT-V Wireless Communication.pdfUNIT-V Wireless Communication.pdf
UNIT-V Wireless Communication.pdfvadasairaju143
 
Multiple access protocols in data communication networks
Multiple access protocols in data communication networksMultiple access protocols in data communication networks
Multiple access protocols in data communication networksNt Arvind
 
16 high speedla-ns
16 high speedla-ns16 high speedla-ns
16 high speedla-nsMayur Garg
 
16 high speedla-ns
16 high speedla-ns16 high speedla-ns
16 high speedla-nsMayur Garg
 
Packet radio protocol
Packet radio protocolPacket radio protocol
Packet radio protocolPriya Kaushal
 
Chapter_03_Data Link Layer and its protocols.pptx
Chapter_03_Data Link Layer and its protocols.pptxChapter_03_Data Link Layer and its protocols.pptx
Chapter_03_Data Link Layer and its protocols.pptxmsohail37
 
MacProtocols2.ppt
MacProtocols2.pptMacProtocols2.ppt
MacProtocols2.ppt15AnasKhan
 

Similar to Multiple access protocol (20)

CN R16 -UNIT-4.pdf
CN R16 -UNIT-4.pdfCN R16 -UNIT-4.pdf
CN R16 -UNIT-4.pdf
 
Jaimin chp-4 - media access sub-layer- 2011 batch
Jaimin   chp-4 - media access sub-layer- 2011 batchJaimin   chp-4 - media access sub-layer- 2011 batch
Jaimin chp-4 - media access sub-layer- 2011 batch
 
Mac sub layer
Mac sub layerMac sub layer
Mac sub layer
 
link-medium-access-control.pptx
link-medium-access-control.pptxlink-medium-access-control.pptx
link-medium-access-control.pptx
 
Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...
Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...
Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...
 
MAC
MACMAC
MAC
 
Lecture 10
Lecture 10Lecture 10
Lecture 10
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
 
Csma protocols
Csma protocolsCsma protocols
Csma protocols
 
MACPresentation based on medium access control mechanism
MACPresentation based on medium access control mechanismMACPresentation based on medium access control mechanism
MACPresentation based on medium access control mechanism
 
Unit 3 - Data Link Layer - Part B
Unit 3 - Data Link Layer - Part BUnit 3 - Data Link Layer - Part B
Unit 3 - Data Link Layer - Part B
 
MEDIUM-ACCESS CONTROL SUB LAYER.ppt
MEDIUM-ACCESS CONTROL SUB LAYER.pptMEDIUM-ACCESS CONTROL SUB LAYER.ppt
MEDIUM-ACCESS CONTROL SUB LAYER.ppt
 
Medium Access PROTOCOL b yENGR. FAWAD KHAN UET BANNU KP PAKISTAN
Medium Access PROTOCOL b yENGR.  FAWAD KHAN UET BANNU KP PAKISTANMedium Access PROTOCOL b yENGR.  FAWAD KHAN UET BANNU KP PAKISTAN
Medium Access PROTOCOL b yENGR. FAWAD KHAN UET BANNU KP PAKISTAN
 
UNIT-V Wireless Communication.pdf
UNIT-V Wireless Communication.pdfUNIT-V Wireless Communication.pdf
UNIT-V Wireless Communication.pdf
 
Multiple access protocols in data communication networks
Multiple access protocols in data communication networksMultiple access protocols in data communication networks
Multiple access protocols in data communication networks
 
16 high speedla-ns
16 high speedla-ns16 high speedla-ns
16 high speedla-ns
 
16 high speedla-ns
16 high speedla-ns16 high speedla-ns
16 high speedla-ns
 
Packet radio protocol
Packet radio protocolPacket radio protocol
Packet radio protocol
 
Chapter_03_Data Link Layer and its protocols.pptx
Chapter_03_Data Link Layer and its protocols.pptxChapter_03_Data Link Layer and its protocols.pptx
Chapter_03_Data Link Layer and its protocols.pptx
 
MacProtocols2.ppt
MacProtocols2.pptMacProtocols2.ppt
MacProtocols2.ppt
 

Recently uploaded

Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 

Recently uploaded (20)

Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 

Multiple access protocol

  • 1. MULTIPLE ACCESS PROTOCOL PRESENTED BY, J.MERLIN FLORRENCE I M.Sc
  • 2. AGENDA INTORDUCTION TYPES OF NETWORK LINK CHANNEL PARITIONING PROTOCOLS RANDOM ACCESS Slotted ALOHA ALOHA CSMA TAKING-TURNS PROTOCOLS LOCAL AREA NETWORKS
  • 3. TYPES OF NETWORK LINK Network link Point-to-point link Broadcast link Point-to-point link: It consists of a single sender at one end of the link and a single receiver at the other end of the link.
  • 4. BROADCAST-LINK •It can have multiple sending and receiving nodes all connected to the same, single shared broadcast channel. •Examples: Ethernet, Wireless LAN Multiple Access Problem: How to coordinate the access of multiple sending and receiving to a shared broadcast channel.
  • 5. Multiple access protocol Multiple access protocol is used to coordinate access to the link. Nodes can regulate their transmission onto the shared broadcast channel by using Multiple access protocol. It is used both wired and wireless local area Text network and satellite network. All nodes are capable of transmitting frame, more than two nodes can transmit frames at the same time. If so, the transmitted frames collide at all of the receivers.
  • 6. When there is a collision, none of the receiving nodes can make any sense of any of the frames that were transmitted; In a sense, the signals of the colliding frames become inextricably tangled together. Thus, all frames involved in the collision are lost, and the broad cast channel as wasted during the collision interval. To rectify this problem Multiple access protocol was implemented
  • 8. Classification of MAP Multiple Access Protocol Channel-Partitioning protocols Random Access Protocol Taking-turns Protocols
  • 9. Channel Partitioning Protocols Techniques used to partition a broadcast channel’s are, • Time-division multiplexing • Frequency-division multiplexing For example, if the channel send N nodes and that the transmission rate of the channel is R bps. TDM divides time into time frames and further divides each time frame into N time slots. TEXT TEXT TEXT Each slot time is then assigned to one of the N nodes. whenever a node has a packet to send, it transmits the packet’s bits during its assigned time slot in the revolving TDM frame.
  • 10. TDM is appealing because it eliminates collisions and is perfectly fair : Each node gets a dedicated transmission rate of R/N bps during each frame time. DRAWBACKS: A node is limited to an average rate of R/N bps even when it is the only node with packets to send. A node must always wait for its turn in the transmission sequence-again, even when it is the only node with frame to send.
  • 11. A Four-node TDM and FDM example TDMA: time division multiple access Example: Frequency 4 users time FDMA: frequency division multiple access Frequency time CDMA: code division multiple access  Same frequency and time but different codes. 11
  • 12. FDM While TDM shares the broadcast channel in time, FDM divides the R bps channel into different frequencies and assigns each frequency to one of the nodes. FDM creates N smaller channels of R/N bps out of the single, larger R bps channel. CDMA: It is Code Division Multiple Access. While TDM and FDM assign time slot and frequencies respectively, to the nodes, CDMA assigns a different code to each node.
  • 13. RANDOM ACCESS PROTOCOL When node has packet to send Sense the channel. If it is busy, wait for random amount of time and then retry. no a prior coordination among nodes. All nodes use the same time, frequency and code. Two or more transmitting nodes ➜ “collision” Random access MAC protocol specifies how to recover from collisions -> Exponential backoff. Examples of random access MAC protocols: CSMA, CSMA/CA, CSMA/CD
  • 14. Cont… Most commonly used random access protocols, ALOHA CSMA(Carrier Sense Multiple Access Protocols) Slotted ALOHA we assume, All frames consist of exactly L bits. Time is divided into slots of size L/R seconds Nodes start to transmit frames only at the beginning of slots The nodes are synchronized so that each node knows when the slots begin. If two or more frames collide in a slot ; then all the nodes detect the collision event before the slot ends
  • 15. Let p be a probability ,that is, a number between o and 1. the operation of slotted ALOHA in each node is. When the node has a fresh frame to send, it waits until the beginning of the next slot and transmits the entire frame in the slot. If there isn’t a collision, the node has successfully transmitted its frame and thus need not consider retransmitting the frame. If there is a collision, the node detects the collision before the end of the slot. The node retransmits its frame in each subsequent slot with probability p until the frame is transmitted without a collision
  • 16. Key: C : Collision E : Empty set S : successful slot Nodes 1,2 and 3 collide in the first slot. Node 2 finally succeeds in the fourth slot, node 1 n the eight slot, and node 3 in the ninth slot
  • 17. Pros and Cons of Slotted ALOHA Pros • single active node can continuously transmit at full rate of channel • highly decentralized: only slots in nodes need to be in sync • Simple protocol Cons • collisions, wasting slots • idle slots • nodes may be able to detect collision in less than time to transmit packet • clock synchronization
  • 18. ALOHA It required that all nodes synchronize their transmissions to start at the beginning of a slot. When a frame arrives, the node immediately transmits the frame in it’s the frame in its entirely into the broadcast channel. If a transmitted frame experiences a collision with one or more other transmissions, the node will then immediately retransmit the frame with probability p. Otherwise , the node waits for a frame transmission time
  • 19. Efficiency is the long-run fraction of successful slots when there are many nodes, each with many frames to send Suppose N nodes with many frames to send, each transmits in slot with probability p probability that node 1 has success in a slot = p(1-p)N-1 probability that any node has a success = Np(1-p)N-1 For max efficiency with N nodes, find p* that maximizes Np(1-p)N-1 For many nodes, take limit of Np*(1-p*)N-1 as N goes to infinity, gives 1/e = .37 Efficiency is 37%, even with optimal p
  • 20. unsloted Aloha: simpler, no synchronization when frame first arrives transmit immediately collision probability increases: frame sent at t0 collides with other frames sent in [t0-1,t0+1]
  • 21. P(success by given node) = P(node transmits) . P(no other node transmits in [t0-1,t0] . P(no other node transmits in [t0,t0+1] = p . (1-p)N-1 . (1-p)N-1 = p . (1-p)2(N-1) choosing optimum p and then letting n -> Efficiency = 1/(2e) = .18 ...
  • 22. Carrier Sense Multiple Access(CSMA) Rules of CSMA and CSMA/CD Carrier sensing Collision detection CARRIER SENSING: A node is listens to the channel before transmitting. If a frame from another nodes currently being transmitted into the channel, a node then waits a random amount of time and then again senses the channel. If the channel is sensed to be idle, the node then begins frame transmission. Otherwise, the node waits another random amount of time and repeats this process.
  • 23. COLLISION DETECTION: A transmitting node listens to the channel while it is transmitting. If it detects that another node is transmitting an interfering frame, it stops transmitting and uses some protocol to determine when it should next attempt to transmit
  • 24. CSMA: listen before transmit. If channel is sensed busy, defer transmission Persistent CSMA: retry immediately when channel becomes idle (this may cause instability) Non persistent CSMA: retry after random interval of time Note: collisions may still exist, since two stations may sense the channel idle at the same time ( or better, within a “vulnerable” window = round trip delay) In case of collision, the entire packet transmission time is wasted
  • 25. Space-time diagram of two CSMA nodes will colliding transmission Collisions can still occur: Propagation delay means two nodes may not hear each other’s transmission Collision: Entire packet transmission time wasted Note: Role of distance & propagation delay in determining collision probability
  • 26. CSMA CD (Collision Detection) CSMA/CD: carrier sensing, deferral as in CSMA – collisions detected within short time – colliding transmissions aborted, reducing channel wastage • collision detection: – easy in wired LANs: measure signal strengths, compare transmitted, received signals – difficult in wireless LANs: receiver shut off while transmitting • human analogy: the polite conversationalist
  • 27. CSMA/CD: like in CSMA collisions are detected within a few bit times Transmission is then aborted, reducing the channel wastage considerably persistent retransmission is implemented Collision detection is easy in wired LANs: can measure signal strength on the line Collision detection cannot be done in wireless LANs : CSMA/CD can approach channel utilization =1 in LANs: low ratio of propagation over frame transmission time
  • 29. Comparison Channel partitioning MAC protocols: – share channel efficiently and fairly at high load – inefficient at low load: delay in channel access, 1/N bandwidth allocated even if only 1 active node Random access MAC protocols – efficient at low load: single node can fully utilize channel – high load: collision overhead Both these types of protocols have been used in sensor networks depending on the application needs. 29
  • 30. TAKING -TURNS PROTOCOL Taking Turns MAC protocols: (a) Polling: Master “invites” slaves - Request/Clear overhead, latency, single point of failure (b) Token passing: token is passed from one node to the next + Reduce latency, improve fault tolerance - elaborate procedures to recover from lost token
  • 31. Comparison Token passing: Polling: • master node “invites”  control token passed from one slave nodes to transmit node to next sequentially.  token message in turn  concerns: • Request to Send,  token overhead Clear to Send msgs  latency • concerns: – polling overhead – latency – single point of failure (master)  single point of failure (token)
  • 32. LOCAL AREA NETWORKS(LANs) It is a connection of nodes with in a campus. The transmission rate of R, of most LANs very high. Classes of LAN technology: Token passing technology(including token ring) FDDI TOKEN RING LAN: The N nodes of the LAN are connected in a ring by direct links. The topology of the ring defines the token-passing order. When a node obtains the token and sends a frame, the frame propagates around the entire ring, there by creating a virtual broadcast channel.
  • 33. FDDI It was designed for geographically larger LANs, including Metropolitan Area Network(MAN). It is efficient to let a frame propagate back to the sending node once the frame has passed the destination node. FDDI has the destination node remove the frame from the ring.