SlideShare a Scribd company logo
1 of 29
Networking Fundamentals
MULTIPLE ACCESS
12.1
Data link layer divided into two functionality-oriented sublayers
12.2
Taxonomy of multiple-access protocols
12.3
RANDOM ACCESSRANDOM ACCESS
• InIn random accessrandom access oror contentioncontention methods, no stationmethods, no station
is superior to another station and none is assignedis superior to another station and none is assigned
the control over another.the control over another.
• No station permits, or does not permit, anotherNo station permits, or does not permit, another
station to send.station to send.
• At each instance, a station that has data to sendAt each instance, a station that has data to send
uses a procedure defined by the protocol to make auses a procedure defined by the protocol to make a
decision on whether or not to send.decision on whether or not to send.
12.4
12.5
Frames in a pure ALOHA network
12.6
1. Each station sends a frame when it has a frame to send. Thus likelihood of collisions.
2. If Ack timed-out, each station waits a random amount of time, TB, before resending.
3. After Kmax (normally = 15) No. of resending attempts, must give up and try later.
12.7
Space/time model of the collision in CSMA
12.8
B’s
C’s
Vulnerable time in CSMA
12.9
Behavior of three persistence methods- What to do if channel busy or idle
12.10
After finding line idle
sends immediately, ie.
with probability 1. Max
chance of collisions
If line idle sends
immediately, else waits
random amount of
time. Reduced
collisions
If line idle sends with
prob p, else waits for
next slot.
Flow diagram for three persistence methods
12.11
12.12
Note, quickly terminating damaged frames saves time and bandwidth.
Collision of the first bit in CSMA/CD
12.13
Collision and abortion in CSMA/CD
12.14
Qn. What about the Minimum Frame Size?
12.15
A network using CSMA/CD has a bandwidth of 10 Mbps.
If the maximum propagation time (including the delays in
the devices and ignoring the time needed to send a
jamming signal, as we see later) is 25.6 ÎĽs, what is the
minimum size of the frame?
Example
Solution
The frame transmission time is Tfr = 2 Ă— Tp = 51.2 ÎĽs.
This means, in the worst case, a station needs to transmit
for a period of 51.2 ÎĽs to detect the collision. The
minimum size of the frame is 10 Mbps Ă— 51.2 ÎĽs = 512
bits or 64 bytes. This is actually the minimum size of the
frame for Standard Ethernet.
12.16
Flow diagram for the CSMA/CD
12.17
Energy level during transmission, idleness, or collision
12.18
12.19
Timing in CSMA/CA
12.20
In CSMA/CA, the IFS (time allowed for a
distant frame to reach another station)
can also be used to define the priority of
a station or a frame.
Note
12.21
Contention window is an amount of time
divided into slots; A station ready to
transmit, chooses a random No. of slots
as its wait time.
Note
12.22
In CSMA/CA, if the station finds the
channel busy, it does not restart the
timer of the contention;
it stops the timer and restarts it when
the channel becomes idle.
Note
12.23
Flow diagram for CSMA/CA
12.24
CONTROLLED ACCESSCONTROLLED ACCESS
InIn controlled accesscontrolled access, the stations consult one another, the stations consult one another
to find which station has the right to send. A stationto find which station has the right to send. A station
cannot send unless it has been authorized by othercannot send unless it has been authorized by other
stations. We discuss three popular controlled-accessstations. We discuss three popular controlled-access
methods.methods.
12.25
Reservation Access Method
12.26
Select and poll functions in Polling Access Method
12.27
12.28
Logical ring and physical topology in token-passing access method
12.29

More Related Content

What's hot

seminar report on multiple access control protocol submitted by munesh
seminar report on multiple access control protocol submitted by munesh seminar report on multiple access control protocol submitted by munesh
seminar report on multiple access control protocol submitted by munesh meenamunesh
 
3.Medium Access Control
3.Medium Access Control3.Medium Access Control
3.Medium Access ControlSonali Chauhan
 
Media Access Control
Media Access ControlMedia Access Control
Media Access ControlVijayaLakshmi514
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLjunnubabu
 
Multiple access control protocol
Multiple access control protocol Multiple access control protocol
Multiple access control protocol meenamunesh
 
819 Static Channel Allocation
819 Static Channel Allocation819 Static Channel Allocation
819 Static Channel Allocationtechbed
 
Multiple access in Communication Netwroks
Multiple access in Communication NetwroksMultiple access in Communication Netwroks
Multiple access in Communication Netwroksaounraza007
 
Csma cd and csma-ca
Csma cd and csma-caCsma cd and csma-ca
Csma cd and csma-cakazim Hussain
 
Csma protocols
Csma protocolsCsma protocols
Csma protocolsManal Shah
 
Multiple access protocol
Multiple access protocolMultiple access protocol
Multiple access protocolMerlin Florrence
 
Unit 2 data link control
Unit 2 data link controlUnit 2 data link control
Unit 2 data link controlVishal kakade
 
5 digital datacomm
5 digital datacomm5 digital datacomm
5 digital datacommHattori Sidek
 

What's hot (20)

seminar report on multiple access control protocol submitted by munesh
seminar report on multiple access control protocol submitted by munesh seminar report on multiple access control protocol submitted by munesh
seminar report on multiple access control protocol submitted by munesh
 
3.Medium Access Control
3.Medium Access Control3.Medium Access Control
3.Medium Access Control
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
 
Mac
MacMac
Mac
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROL
 
Lecture 6
Lecture 6Lecture 6
Lecture 6
 
Multiple access control protocol
Multiple access control protocol Multiple access control protocol
Multiple access control protocol
 
819 Static Channel Allocation
819 Static Channel Allocation819 Static Channel Allocation
819 Static Channel Allocation
 
Multiple access in Communication Netwroks
Multiple access in Communication NetwroksMultiple access in Communication Netwroks
Multiple access in Communication Netwroks
 
HIGH SPEED NETWORKS
HIGH SPEED NETWORKSHIGH SPEED NETWORKS
HIGH SPEED NETWORKS
 
MAC
MACMAC
MAC
 
clas 8
clas 8clas 8
clas 8
 
Csma cd and csma-ca
Csma cd and csma-caCsma cd and csma-ca
Csma cd and csma-ca
 
Csma protocols
Csma protocolsCsma protocols
Csma protocols
 
Multiple access protocol
Multiple access protocolMultiple access protocol
Multiple access protocol
 
Unit 2 data link control
Unit 2 data link controlUnit 2 data link control
Unit 2 data link control
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
 
Sliding window protocol
Sliding window protocolSliding window protocol
Sliding window protocol
 
Unit 1 mac vsd
Unit 1 mac vsdUnit 1 mac vsd
Unit 1 mac vsd
 
5 digital datacomm
5 digital datacomm5 digital datacomm
5 digital datacomm
 

Viewers also liked

Multiple Access Methods
Multiple Access MethodsMultiple Access Methods
Multiple Access MethodsPrateek Soni
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocaltes31
 
Multiple acessing
Multiple acessing Multiple acessing
Multiple acessing Piyush Sarin
 
Dc chapter 13
Dc chapter   13Dc chapter   13
Dc chapter 13TechiNerd
 
Multiple Access Networking
Multiple Access NetworkingMultiple Access Networking
Multiple Access NetworkingShashi Kumar
 
802.11 wireless lan
802.11 wireless lan802.11 wireless lan
802.11 wireless lanMohd Arif
 
Mac protocols
Mac protocolsMac protocols
Mac protocolsAnuj Gupta
 
Multiple Access Techniques for 5G
Multiple Access Techniques for 5GMultiple Access Techniques for 5G
Multiple Access Techniques for 5GSitha Sok
 
Satellite Multiple Access Schemes
Satellite Multiple Access SchemesSatellite Multiple Access Schemes
Satellite Multiple Access SchemesDileep Kadavarath
 
Multiple acces techniques
Multiple acces techniquesMultiple acces techniques
Multiple acces techniquesparamsidhu89
 
FDMA-TDMA-CDMA
FDMA-TDMA-CDMAFDMA-TDMA-CDMA
FDMA-TDMA-CDMASammar Khan
 
Medium Access Control
Medium Access ControlMedium Access Control
Medium Access Controlanishgoel
 
Wireless networking
Wireless networkingWireless networking
Wireless networkingOnline
 
Multiple access techniques for wireless communications
Multiple access techniques for wireless communicationsMultiple access techniques for wireless communications
Multiple access techniques for wireless communicationsMETHODIST COLLEGE OF ENGG & TECH
 
Wireless Local Area Networks
Wireless Local Area NetworksWireless Local Area Networks
Wireless Local Area NetworksDon Norwood
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)Parvesh Taneja
 

Viewers also liked (16)

Multiple Access Methods
Multiple Access MethodsMultiple Access Methods
Multiple Access Methods
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
 
Multiple acessing
Multiple acessing Multiple acessing
Multiple acessing
 
Dc chapter 13
Dc chapter   13Dc chapter   13
Dc chapter 13
 
Multiple Access Networking
Multiple Access NetworkingMultiple Access Networking
Multiple Access Networking
 
802.11 wireless lan
802.11 wireless lan802.11 wireless lan
802.11 wireless lan
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
 
Multiple Access Techniques for 5G
Multiple Access Techniques for 5GMultiple Access Techniques for 5G
Multiple Access Techniques for 5G
 
Satellite Multiple Access Schemes
Satellite Multiple Access SchemesSatellite Multiple Access Schemes
Satellite Multiple Access Schemes
 
Multiple acces techniques
Multiple acces techniquesMultiple acces techniques
Multiple acces techniques
 
FDMA-TDMA-CDMA
FDMA-TDMA-CDMAFDMA-TDMA-CDMA
FDMA-TDMA-CDMA
 
Medium Access Control
Medium Access ControlMedium Access Control
Medium Access Control
 
Wireless networking
Wireless networkingWireless networking
Wireless networking
 
Multiple access techniques for wireless communications
Multiple access techniques for wireless communicationsMultiple access techniques for wireless communications
Multiple access techniques for wireless communications
 
Wireless Local Area Networks
Wireless Local Area NetworksWireless Local Area Networks
Wireless Local Area Networks
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)
 

Similar to Networking Fundamentals: Multiple Access Protocols

Multiple Access ppt in Object Oriented Programming
Multiple Access ppt in Object Oriented ProgrammingMultiple Access ppt in Object Oriented Programming
Multiple Access ppt in Object Oriented Programmingarnavytstudio2814
 
Media Access Control (MAC Layer)
Media Access Control (MAC Layer)Media Access Control (MAC Layer)
Media Access Control (MAC Layer)Meenakshi Paul
 
Unit_3_WSN.pptx
Unit_3_WSN.pptxUnit_3_WSN.pptx
Unit_3_WSN.pptxnooralleema
 
Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...
Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...
Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...Soumen Santra
 
12 Multiple Access
12 Multiple Access12 Multiple Access
12 Multiple AccessAhmar Hashmi
 
Carrier-sense multiple access with collision detection (CSMA/CD)
Carrier-sense multiple access with collision detection (CSMA/CD)Carrier-sense multiple access with collision detection (CSMA/CD)
Carrier-sense multiple access with collision detection (CSMA/CD)university of Malakand Dir Lower
 
MultipleAccess.ppt
MultipleAccess.pptMultipleAccess.ppt
MultipleAccess.pptJayaprasanna4
 
MEDIUM ACCESS CONTROL Sublayer IN CN.ppt
MEDIUM ACCESS CONTROL Sublayer IN CN.pptMEDIUM ACCESS CONTROL Sublayer IN CN.ppt
MEDIUM ACCESS CONTROL Sublayer IN CN.pptssuser35e92d
 
3-MACSublayer.ppt
3-MACSublayer.ppt3-MACSublayer.ppt
3-MACSublayer.pptDigiPlexus
 
Jaimin chp-4 - media access sub-layer- 2011 batch
Jaimin   chp-4 - media access sub-layer- 2011 batchJaimin   chp-4 - media access sub-layer- 2011 batch
Jaimin chp-4 - media access sub-layer- 2011 batchJaimin Jani
 
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptxComputer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptxPravinbhargav
 
Mac protocol for wmn
Mac protocol for wmnMac protocol for wmn
Mac protocol for wmnmmjalbiaty
 
Unit-2 Media Access Protocols.pdf
Unit-2 Media Access Protocols.pdfUnit-2 Media Access Protocols.pdf
Unit-2 Media Access Protocols.pdfSmtPArunaKumari
 
Technical seminar
Technical seminarTechnical seminar
Technical seminarAkansha Verma
 

Similar to Networking Fundamentals: Multiple Access Protocols (20)

Multiple Access ppt in Object Oriented Programming
Multiple Access ppt in Object Oriented ProgrammingMultiple Access ppt in Object Oriented Programming
Multiple Access ppt in Object Oriented Programming
 
Media Access Control (MAC Layer)
Media Access Control (MAC Layer)Media Access Control (MAC Layer)
Media Access Control (MAC Layer)
 
ch12.ppt
ch12.pptch12.ppt
ch12.ppt
 
Unit_3_WSN.pptx
Unit_3_WSN.pptxUnit_3_WSN.pptx
Unit_3_WSN.pptx
 
AIU_CN_2.pptx
AIU_CN_2.pptxAIU_CN_2.pptx
AIU_CN_2.pptx
 
Ch12
Ch12Ch12
Ch12
 
Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...
Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...
Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...
 
12 Multiple Access
12 Multiple Access12 Multiple Access
12 Multiple Access
 
Ch12
Ch12Ch12
Ch12
 
Ch12
Ch12Ch12
Ch12
 
Carrier-sense multiple access with collision detection (CSMA/CD)
Carrier-sense multiple access with collision detection (CSMA/CD)Carrier-sense multiple access with collision detection (CSMA/CD)
Carrier-sense multiple access with collision detection (CSMA/CD)
 
MultipleAccess.ppt
MultipleAccess.pptMultipleAccess.ppt
MultipleAccess.ppt
 
Mac
MacMac
Mac
 
MEDIUM ACCESS CONTROL Sublayer IN CN.ppt
MEDIUM ACCESS CONTROL Sublayer IN CN.pptMEDIUM ACCESS CONTROL Sublayer IN CN.ppt
MEDIUM ACCESS CONTROL Sublayer IN CN.ppt
 
3-MACSublayer.ppt
3-MACSublayer.ppt3-MACSublayer.ppt
3-MACSublayer.ppt
 
Jaimin chp-4 - media access sub-layer- 2011 batch
Jaimin   chp-4 - media access sub-layer- 2011 batchJaimin   chp-4 - media access sub-layer- 2011 batch
Jaimin chp-4 - media access sub-layer- 2011 batch
 
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptxComputer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptx
 
Mac protocol for wmn
Mac protocol for wmnMac protocol for wmn
Mac protocol for wmn
 
Unit-2 Media Access Protocols.pdf
Unit-2 Media Access Protocols.pdfUnit-2 Media Access Protocols.pdf
Unit-2 Media Access Protocols.pdf
 
Technical seminar
Technical seminarTechnical seminar
Technical seminar
 

More from kavish dani

4d routing
4d routing4d routing
4d routingkavish dani
 
4b internet protocol
4b internet protocol4b internet protocol
4b internet protocolkavish dani
 
4a logical laddressing
4a logical laddressing4a logical laddressing
4a logical laddressingkavish dani
 
4c Address Mapping, Error Reporting and Multicasting
4c Address Mapping, Error Reporting and Multicasting4c Address Mapping, Error Reporting and Multicasting
4c Address Mapping, Error Reporting and Multicastingkavish dani
 
1b network models
1b network models1b network models
1b network modelskavish dani
 
3d connecting networks
3d connecting networks3d connecting networks
3d connecting networkskavish dani
 
3c ethernet
3c ethernet3c ethernet
3c ethernetkavish dani
 
3a data link layer continued
3a data link layer continued3a data link layer continued
3a data link layer continuedkavish dani
 
3a data link layer
3a data link layer 3a data link layer
3a data link layer kavish dani
 
2c wired transmission
2c wired transmission2c wired transmission
2c wired transmissionkavish dani
 
2b switching in networks
2b switching in networks2b switching in networks
2b switching in networkskavish dani
 
2a transmission media
2a transmission  media2a transmission  media
2a transmission mediakavish dani
 
1a introduction to network fundamentals
1a introduction to network fundamentals1a introduction to network fundamentals
1a introduction to network fundamentalskavish dani
 
5 forces model
5 forces model5 forces model
5 forces modelkavish dani
 

More from kavish dani (14)

4d routing
4d routing4d routing
4d routing
 
4b internet protocol
4b internet protocol4b internet protocol
4b internet protocol
 
4a logical laddressing
4a logical laddressing4a logical laddressing
4a logical laddressing
 
4c Address Mapping, Error Reporting and Multicasting
4c Address Mapping, Error Reporting and Multicasting4c Address Mapping, Error Reporting and Multicasting
4c Address Mapping, Error Reporting and Multicasting
 
1b network models
1b network models1b network models
1b network models
 
3d connecting networks
3d connecting networks3d connecting networks
3d connecting networks
 
3c ethernet
3c ethernet3c ethernet
3c ethernet
 
3a data link layer continued
3a data link layer continued3a data link layer continued
3a data link layer continued
 
3a data link layer
3a data link layer 3a data link layer
3a data link layer
 
2c wired transmission
2c wired transmission2c wired transmission
2c wired transmission
 
2b switching in networks
2b switching in networks2b switching in networks
2b switching in networks
 
2a transmission media
2a transmission  media2a transmission  media
2a transmission media
 
1a introduction to network fundamentals
1a introduction to network fundamentals1a introduction to network fundamentals
1a introduction to network fundamentals
 
5 forces model
5 forces model5 forces model
5 forces model
 

Recently uploaded

ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
EMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxEMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxElton John Embodo
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
The Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World PoliticsThe Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World PoliticsRommel Regala
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
Presentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxPresentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxRosabel UA
 

Recently uploaded (20)

YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
EMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxEMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docx
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
The Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World PoliticsThe Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World Politics
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
Presentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxPresentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptx
 

Networking Fundamentals: Multiple Access Protocols

  • 2. Data link layer divided into two functionality-oriented sublayers 12.2
  • 4. RANDOM ACCESSRANDOM ACCESS • InIn random accessrandom access oror contentioncontention methods, no stationmethods, no station is superior to another station and none is assignedis superior to another station and none is assigned the control over another.the control over another. • No station permits, or does not permit, anotherNo station permits, or does not permit, another station to send.station to send. • At each instance, a station that has data to sendAt each instance, a station that has data to send uses a procedure defined by the protocol to make auses a procedure defined by the protocol to make a decision on whether or not to send.decision on whether or not to send. 12.4
  • 6. Frames in a pure ALOHA network 12.6 1. Each station sends a frame when it has a frame to send. Thus likelihood of collisions. 2. If Ack timed-out, each station waits a random amount of time, TB, before resending. 3. After Kmax (normally = 15) No. of resending attempts, must give up and try later.
  • 8. Space/time model of the collision in CSMA 12.8 B’s C’s
  • 9. Vulnerable time in CSMA 12.9
  • 10. Behavior of three persistence methods- What to do if channel busy or idle 12.10 After finding line idle sends immediately, ie. with probability 1. Max chance of collisions If line idle sends immediately, else waits random amount of time. Reduced collisions If line idle sends with prob p, else waits for next slot.
  • 11. Flow diagram for three persistence methods 12.11
  • 12. 12.12 Note, quickly terminating damaged frames saves time and bandwidth.
  • 13. Collision of the first bit in CSMA/CD 12.13
  • 14. Collision and abortion in CSMA/CD 12.14 Qn. What about the Minimum Frame Size?
  • 15. 12.15
  • 16. A network using CSMA/CD has a bandwidth of 10 Mbps. If the maximum propagation time (including the delays in the devices and ignoring the time needed to send a jamming signal, as we see later) is 25.6 ÎĽs, what is the minimum size of the frame? Example Solution The frame transmission time is Tfr = 2 Ă— Tp = 51.2 ÎĽs. This means, in the worst case, a station needs to transmit for a period of 51.2 ÎĽs to detect the collision. The minimum size of the frame is 10 Mbps Ă— 51.2 ÎĽs = 512 bits or 64 bytes. This is actually the minimum size of the frame for Standard Ethernet. 12.16
  • 17. Flow diagram for the CSMA/CD 12.17
  • 18. Energy level during transmission, idleness, or collision 12.18
  • 19. 12.19
  • 21. In CSMA/CA, the IFS (time allowed for a distant frame to reach another station) can also be used to define the priority of a station or a frame. Note 12.21
  • 22. Contention window is an amount of time divided into slots; A station ready to transmit, chooses a random No. of slots as its wait time. Note 12.22
  • 23. In CSMA/CA, if the station finds the channel busy, it does not restart the timer of the contention; it stops the timer and restarts it when the channel becomes idle. Note 12.23
  • 24. Flow diagram for CSMA/CA 12.24
  • 25. CONTROLLED ACCESSCONTROLLED ACCESS InIn controlled accesscontrolled access, the stations consult one another, the stations consult one another to find which station has the right to send. A stationto find which station has the right to send. A station cannot send unless it has been authorized by othercannot send unless it has been authorized by other stations. We discuss three popular controlled-accessstations. We discuss three popular controlled-access methods.methods. 12.25
  • 27. Select and poll functions in Polling Access Method 12.27
  • 28. 12.28
  • 29. Logical ring and physical topology in token-passing access method 12.29