SlideShare una empresa de Scribd logo
1 de 12
PRESENTATION OF COMPUTER NETWORKING
TOPIC:- CARRIERS SENSE
MULTIPLE ACCESS(CSMA)
CARRIER SENSE MULTIPLE
ACCESS (CSMA)
•CSMA protocol was developed to overcome the problem found in
ALOHA i.e. to minimize the chances of collision, so as to
improve the performance.
•CSMA protocol is based on the principle of ‘carrier sense’.
•The chances of collision can be reduce to great extent if a station
senses the channel before trying to use it.
• Although CSMA can reduce the possibility of collision, but it
cannot eliminate it completely.
•The chances of collision still exist because of propagation delay.
•There are three different types of CSMA protocols :-
(i) 1-Persistent CSMA
(ii) Non-Persistent CSMA
(iii) P-Persistent CSMA
CSMA
1-PERSISTENT NON-PERSISTENT 3-PERSISTENT
1-Persistent CSMA
•In this method, station that wants to transmit data continuously sense
the Channel to check whether the channel is idle or busy.
•If the channel is busy , the station waits until it becomes idle.
•When the station detects an idle channel, it immediately transmits
the frame with probability 1. Hence it is called 1-persistent CSMA.
•This method has the highest chance of collision because two or
more station may find channel to be idle at the same time and
transmit their frames.
•When the collision occurs, the stations wait a random amount of
time and start all over again.
Drawback of 1-persistent
•The propagation delay time greatly affects this protocol. Let us suppose,
just after the station 1 begins its transmission, station 2 also become
ready to send its data and sense the channel. If the station 1 signal has not
yet reached station 2, station 2 will sense the channel to be idle and will
begin its transmission. This will result in collision.
•Even if propagation delay time is zero, collision will still occur. If two stations
become ready in the middle of third station’s transmission both stations will
wait until the transmission of first station ends and both will begin their
transmission exactly simultaneously. This will also result in collision.
COUNTINOUSLY SENSES
SENSES & TRANSMIT
TIME
BUSY CHANNEL
IDLE CHANNEL
CHANNEL?
STATION CAN TRANSMIT
IDLE
BUSY
Non –persistent CSMA
•A station that has a frame to send senses the channel.
•If the channel is idle, it sense immediately.
•If the channel is busy, it waits a random amount of time
and then senses the channel again.
•In non-persistent CSMA the station does not continuously
sense the channel for purpose of capturing it when it
defects the end of precious transmission .
Advantages of non-persistent
•It reduces the chances of collision because the stations wait a
random amount of time. It is unlikely that two or more stations
Will wait for same amount of time and will retransmit at the
same time.
Disadvantages of non-persistent
•It reduces the efficiency of network because the channel
remains idle when there may be station with frames to send.
This is due to the fact that the stations wait a random amount
of time after the collision.
channel Wait randomly
idle
Busy
Station can transmit
Sense & transmit
Sense Sense
Wait
(Random time)
wait
time
Busy channel
p-persistent CSMA
•This method is used when channel has time slots such that the time slot
duration is equal to or greater than the maximum propagation delay time.
•Whenever a station becomes ready to send the channel.
•If channel is busy, station waits until next slot.
•If the channel is idle, it transmits with a probability p.
•With the probability q=1-p, the station then waits for the beginning of the
next time slot.
•If the next slot is also idle, it either transmits or wait again with probabilities p and q.
•This process is repeated till either frame has been transmitted or another station has
begun transmitting.
•In case of the transmission by another station, the station act as though a collision has
occurred and it waits a random amount of time and starts again.
Advantages of p-persistent
•it reduce the chances of collision and improve the efficiency of the network.
COUNTINOUSLY SENSES
PROBABLITIY OUTCOME DOES NOT ALLOW
TRANSMISSION
Time slot Time slot Time slot
TRANSMIT
TIME
IDLE
CHANNEL? WAIT A
SLOT
PROBABLITY
OUTCOME?
CHANNEL?
Acts as though collision has occurred & start
again
<_PBUSY
STATION CAN START
BUSY
IDLE
>P
PRESENTATION IS OVER
HOUSE IS
OPEN
FOR

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

CSMA/CA
CSMA/CACSMA/CA
CSMA/CA
 
Congestion control
Congestion controlCongestion control
Congestion control
 
Congestion control in TCP
Congestion control in TCPCongestion control in TCP
Congestion control in TCP
 
Csma protocols
Csma protocolsCsma protocols
Csma protocols
 
Data link layer
Data link layerData link layer
Data link layer
 
Carrier Sense Multiple Access (CSMA)
Carrier Sense Multiple Access (CSMA)Carrier Sense Multiple Access (CSMA)
Carrier Sense Multiple Access (CSMA)
 
Mac layer
Mac  layerMac  layer
Mac layer
 
Computer networks - Channelization
Computer networks - ChannelizationComputer networks - Channelization
Computer networks - Channelization
 
Transport layer services
Transport layer servicesTransport layer services
Transport layer services
 
ALOHA Protocol (in detail)
ALOHA Protocol (in detail)ALOHA Protocol (in detail)
ALOHA Protocol (in detail)
 
Multiple access control protocol
Multiple access control protocol Multiple access control protocol
Multiple access control protocol
 
Multiplexing
MultiplexingMultiplexing
Multiplexing
 
Packet switching
Packet switchingPacket switching
Packet switching
 
CSMA /CD PPT ON SLIDESHARE
CSMA /CD PPT ON SLIDESHARECSMA /CD PPT ON SLIDESHARE
CSMA /CD PPT ON SLIDESHARE
 
Unit 2 data link control
Unit 2 data link controlUnit 2 data link control
Unit 2 data link control
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
 
Datalinklayer tanenbaum
Datalinklayer tanenbaumDatalinklayer tanenbaum
Datalinklayer tanenbaum
 
Transport layer protocols : TCP and UDP
Transport layer protocols  : TCP and UDPTransport layer protocols  : TCP and UDP
Transport layer protocols : TCP and UDP
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROL
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
 

Similar a Csma(carriers sense-multiple-acess)

CN R16 -UNIT-4.pdf
CN R16 -UNIT-4.pdfCN R16 -UNIT-4.pdf
CN R16 -UNIT-4.pdfJoshuaeeda1
 
the Multiple Access SLIDE for university students
the Multiple Access SLIDE for university studentsthe Multiple Access SLIDE for university students
the Multiple Access SLIDE for university studentsnovrain1
 
Multiple Access Techniques
Multiple Access TechniquesMultiple Access Techniques
Multiple Access Techniquesinayat khan
 
Dc ch09 : high speed la ns and wireless lans
Dc ch09 : high speed la ns and wireless lansDc ch09 : high speed la ns and wireless lans
Dc ch09 : high speed la ns and wireless lansSyaiful Ahdan
 
UNIT-V Wireless Communication.pdf
UNIT-V Wireless Communication.pdfUNIT-V Wireless Communication.pdf
UNIT-V Wireless Communication.pdfvadasairaju143
 
CSMA IN COMPUTER NETWORK
CSMA IN COMPUTER NETWORKCSMA IN COMPUTER NETWORK
CSMA IN COMPUTER NETWORKMuskanDhawan6
 
SLOTTED ALOHA and pure aloha are the category of aloha
SLOTTED ALOHA and pure aloha are the category of alohaSLOTTED ALOHA and pure aloha are the category of aloha
SLOTTED ALOHA and pure aloha are the category of alohaAkshathaM29
 
Multiple access protocols in data communication networks
Multiple access protocols in data communication networksMultiple access protocols in data communication networks
Multiple access protocols in data communication networksNt Arvind
 
WHAT IS MAC-1 presentation for information .pptx
WHAT IS MAC-1 presentation for information  .pptxWHAT IS MAC-1 presentation for information  .pptx
WHAT IS MAC-1 presentation for information .pptxSaqlainKhan39
 
csma (BWU-DCS-20-013).pptx
csma (BWU-DCS-20-013).pptxcsma (BWU-DCS-20-013).pptx
csma (BWU-DCS-20-013).pptxSandipPradhan23
 
Wireless LAN in Data Communication & Networking
Wireless LAN in Data Communication & NetworkingWireless LAN in Data Communication & Networking
Wireless LAN in Data Communication & NetworkingSweta Kumari Barnwal
 
Jaimin chp-4 - media access sub-layer- 2011 batch
Jaimin   chp-4 - media access sub-layer- 2011 batchJaimin   chp-4 - media access sub-layer- 2011 batch
Jaimin chp-4 - media access sub-layer- 2011 batchJaimin Jani
 
multiacess protocol
multiacess protocolmultiacess protocol
multiacess protocolKanwal Khan
 
MEDIUM-ACCESS CONTROL SUB LAYER.ppt
MEDIUM-ACCESS CONTROL SUB LAYER.pptMEDIUM-ACCESS CONTROL SUB LAYER.ppt
MEDIUM-ACCESS CONTROL SUB LAYER.pptDrTThendralCompSci
 

Similar a Csma(carriers sense-multiple-acess) (20)

CN R16 -UNIT-4.pdf
CN R16 -UNIT-4.pdfCN R16 -UNIT-4.pdf
CN R16 -UNIT-4.pdf
 
the Multiple Access SLIDE for university students
the Multiple Access SLIDE for university studentsthe Multiple Access SLIDE for university students
the Multiple Access SLIDE for university students
 
Multiple Access Techniques
Multiple Access TechniquesMultiple Access Techniques
Multiple Access Techniques
 
Dc ch09 : high speed la ns and wireless lans
Dc ch09 : high speed la ns and wireless lansDc ch09 : high speed la ns and wireless lans
Dc ch09 : high speed la ns and wireless lans
 
Mac sub layer
Mac sub layerMac sub layer
Mac sub layer
 
UNIT-V Wireless Communication.pdf
UNIT-V Wireless Communication.pdfUNIT-V Wireless Communication.pdf
UNIT-V Wireless Communication.pdf
 
CSMA IN COMPUTER NETWORK
CSMA IN COMPUTER NETWORKCSMA IN COMPUTER NETWORK
CSMA IN COMPUTER NETWORK
 
The medium access sublayer
 The medium  access sublayer The medium  access sublayer
The medium access sublayer
 
SLOTTED ALOHA and pure aloha are the category of aloha
SLOTTED ALOHA and pure aloha are the category of alohaSLOTTED ALOHA and pure aloha are the category of aloha
SLOTTED ALOHA and pure aloha are the category of aloha
 
Multiple access protocols in data communication networks
Multiple access protocols in data communication networksMultiple access protocols in data communication networks
Multiple access protocols in data communication networks
 
WHAT IS MAC-1 presentation for information .pptx
WHAT IS MAC-1 presentation for information  .pptxWHAT IS MAC-1 presentation for information  .pptx
WHAT IS MAC-1 presentation for information .pptx
 
Lecture 10
Lecture 10Lecture 10
Lecture 10
 
csma (BWU-DCS-20-013).pptx
csma (BWU-DCS-20-013).pptxcsma (BWU-DCS-20-013).pptx
csma (BWU-DCS-20-013).pptx
 
Wireless LAN in Data Communication & Networking
Wireless LAN in Data Communication & NetworkingWireless LAN in Data Communication & Networking
Wireless LAN in Data Communication & Networking
 
Jaimin chp-4 - media access sub-layer- 2011 batch
Jaimin   chp-4 - media access sub-layer- 2011 batchJaimin   chp-4 - media access sub-layer- 2011 batch
Jaimin chp-4 - media access sub-layer- 2011 batch
 
csmacd.pptx
csmacd.pptxcsmacd.pptx
csmacd.pptx
 
csmacd.pptx
csmacd.pptxcsmacd.pptx
csmacd.pptx
 
multiacess protocol
multiacess protocolmultiacess protocol
multiacess protocol
 
MEDIUM-ACCESS CONTROL SUB LAYER.ppt
MEDIUM-ACCESS CONTROL SUB LAYER.pptMEDIUM-ACCESS CONTROL SUB LAYER.ppt
MEDIUM-ACCESS CONTROL SUB LAYER.ppt
 
Unit 3 - Data Link Layer - Part B
Unit 3 - Data Link Layer - Part BUnit 3 - Data Link Layer - Part B
Unit 3 - Data Link Layer - Part B
 

Más de Rajan Kandel

Why study bsc csit
Why study bsc csitWhy study bsc csit
Why study bsc csitRajan Kandel
 
Why BSCCSIT after plus two
Why BSCCSIT after plus twoWhy BSCCSIT after plus two
Why BSCCSIT after plus twoRajan Kandel
 
Vehicle Information System
Vehicle Information SystemVehicle Information System
Vehicle Information SystemRajan Kandel
 
CSIT Association of Nepal
CSIT Association of NepalCSIT Association of Nepal
CSIT Association of NepalRajan Kandel
 
Basic guide to writing an essay
Basic guide to writing an essayBasic guide to writing an essay
Basic guide to writing an essayRajan Kandel
 
Computerization in Andhra Preadesh
Computerization in Andhra PreadeshComputerization in Andhra Preadesh
Computerization in Andhra PreadeshRajan Kandel
 
Calibration and validation model (Simulation )
Calibration and validation model (Simulation )Calibration and validation model (Simulation )
Calibration and validation model (Simulation )Rajan Kandel
 
E governance in malaysia
E governance in malaysiaE governance in malaysia
E governance in malaysiaRajan Kandel
 
Linux Memory Management
Linux Memory ManagementLinux Memory Management
Linux Memory ManagementRajan Kandel
 

Más de Rajan Kandel (11)

Why study bsc csit
Why study bsc csitWhy study bsc csit
Why study bsc csit
 
Why BSCCSIT after plus two
Why BSCCSIT after plus twoWhy BSCCSIT after plus two
Why BSCCSIT after plus two
 
Tourist arrival
Tourist arrivalTourist arrival
Tourist arrival
 
Vehicle Information System
Vehicle Information SystemVehicle Information System
Vehicle Information System
 
CSIT Association of Nepal
CSIT Association of NepalCSIT Association of Nepal
CSIT Association of Nepal
 
Basic guide to writing an essay
Basic guide to writing an essayBasic guide to writing an essay
Basic guide to writing an essay
 
Computerization in Andhra Preadesh
Computerization in Andhra PreadeshComputerization in Andhra Preadesh
Computerization in Andhra Preadesh
 
Calibration and validation model (Simulation )
Calibration and validation model (Simulation )Calibration and validation model (Simulation )
Calibration and validation model (Simulation )
 
E governance in malaysia
E governance in malaysiaE governance in malaysia
E governance in malaysia
 
Linux Memory Management
Linux Memory ManagementLinux Memory Management
Linux Memory Management
 
Linux vs windows
Linux vs windowsLinux vs windows
Linux vs windows
 

Último

Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 

Último (20)

Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 

Csma(carriers sense-multiple-acess)

  • 1. PRESENTATION OF COMPUTER NETWORKING TOPIC:- CARRIERS SENSE MULTIPLE ACCESS(CSMA)
  • 2. CARRIER SENSE MULTIPLE ACCESS (CSMA) •CSMA protocol was developed to overcome the problem found in ALOHA i.e. to minimize the chances of collision, so as to improve the performance. •CSMA protocol is based on the principle of ‘carrier sense’. •The chances of collision can be reduce to great extent if a station senses the channel before trying to use it. • Although CSMA can reduce the possibility of collision, but it cannot eliminate it completely. •The chances of collision still exist because of propagation delay.
  • 3.
  • 4. •There are three different types of CSMA protocols :- (i) 1-Persistent CSMA (ii) Non-Persistent CSMA (iii) P-Persistent CSMA CSMA 1-PERSISTENT NON-PERSISTENT 3-PERSISTENT
  • 5. 1-Persistent CSMA •In this method, station that wants to transmit data continuously sense the Channel to check whether the channel is idle or busy. •If the channel is busy , the station waits until it becomes idle. •When the station detects an idle channel, it immediately transmits the frame with probability 1. Hence it is called 1-persistent CSMA. •This method has the highest chance of collision because two or more station may find channel to be idle at the same time and transmit their frames. •When the collision occurs, the stations wait a random amount of time and start all over again.
  • 6. Drawback of 1-persistent •The propagation delay time greatly affects this protocol. Let us suppose, just after the station 1 begins its transmission, station 2 also become ready to send its data and sense the channel. If the station 1 signal has not yet reached station 2, station 2 will sense the channel to be idle and will begin its transmission. This will result in collision. •Even if propagation delay time is zero, collision will still occur. If two stations become ready in the middle of third station’s transmission both stations will wait until the transmission of first station ends and both will begin their transmission exactly simultaneously. This will also result in collision. COUNTINOUSLY SENSES SENSES & TRANSMIT TIME BUSY CHANNEL IDLE CHANNEL CHANNEL? STATION CAN TRANSMIT IDLE BUSY
  • 7. Non –persistent CSMA •A station that has a frame to send senses the channel. •If the channel is idle, it sense immediately. •If the channel is busy, it waits a random amount of time and then senses the channel again. •In non-persistent CSMA the station does not continuously sense the channel for purpose of capturing it when it defects the end of precious transmission .
  • 8. Advantages of non-persistent •It reduces the chances of collision because the stations wait a random amount of time. It is unlikely that two or more stations Will wait for same amount of time and will retransmit at the same time. Disadvantages of non-persistent •It reduces the efficiency of network because the channel remains idle when there may be station with frames to send. This is due to the fact that the stations wait a random amount of time after the collision.
  • 9. channel Wait randomly idle Busy Station can transmit Sense & transmit Sense Sense Wait (Random time) wait time Busy channel
  • 10. p-persistent CSMA •This method is used when channel has time slots such that the time slot duration is equal to or greater than the maximum propagation delay time. •Whenever a station becomes ready to send the channel. •If channel is busy, station waits until next slot. •If the channel is idle, it transmits with a probability p. •With the probability q=1-p, the station then waits for the beginning of the next time slot. •If the next slot is also idle, it either transmits or wait again with probabilities p and q. •This process is repeated till either frame has been transmitted or another station has begun transmitting. •In case of the transmission by another station, the station act as though a collision has occurred and it waits a random amount of time and starts again. Advantages of p-persistent •it reduce the chances of collision and improve the efficiency of the network.
  • 11. COUNTINOUSLY SENSES PROBABLITIY OUTCOME DOES NOT ALLOW TRANSMISSION Time slot Time slot Time slot TRANSMIT TIME IDLE CHANNEL? WAIT A SLOT PROBABLITY OUTCOME? CHANNEL? Acts as though collision has occurred & start again <_PBUSY STATION CAN START BUSY IDLE >P