CH 12 PDF
CH 12 PDF
Networking by
Forouzan fourth edition
Chapter 12
Multiple Access
12.1
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000
Multiple Access
In Chapter 11 we discussed data link control, a mechanism
which provides a link with reliable communication. In the
protocols we described, we assumed that there is an
available dedicated link (or channel) between the sender
and the receiver. This assumption may or may not be true.
If, indeed, we have a dedicated link, as when we connect
to the Internet using PPP as the data link control protocol,
then the assumption is true and we do not need anything
else.
PPP: point-to-point protocol(byte oriented ) which provides
connections over multiple links and has a very simple
mechanism for error control.
12.2
We can consider the data link layer as two sublayers.
The upper sublayer is responsible for data link control
and error control is called the logical link control (LLC)
layer .
The lower sublayer is responsible for resolving access to
12.3
Figure 12.1 Data link layer divided into two functionality-oriented sublayers
12.4
The problem of controlling the access to the medium
is similar to the rules of speaking in an assembly. The
procedures guarantee that the right to speak is up held
and ensure that two people do not speak at the same
time, do not interrupt each other.
12.5
Figure 12.2 Taxonomy of multiple-access protocols discussed in this chapter
12.6
12-1 RANDOM ACCESS
In random access or contention methods, no station
is superior to another station and none is assigned
the control over another. No station permits, or does
not permit, another station to send. At each instance,
a station that has data to send uses a procedure
defined by the protocol to make a decision on
whether or not to send. The decision depends on the
state of the medium (idle or busy).
Topics discussed in this section:
ALOHA
Carrier Sense Multiple Access
Carrier Sense Multiple Access with Collision Detection
Carrier Sense Multiple Access with Collision Avoidance
12.7
Two features give this method its name. First, there is no
scheduled time for a station to transmit. Transmission is random
among the stations. That is why these methods are called random
access. Second, no rules specify which station should send next.
Stations compete with one another to access the medium. That is
why these methods are also called contention methods.
In a random access method, each station has the right to the
medium without being controlled by any other station. However,
if more than one station tries to send, there is an access conflict-
collision-and the frames will be either destroyed or modified.
12.8
ALOHA
It was designed for a radio (wireless) LAN, but it can be used on
any shared medium. The medium is shared between the stations.
When a station sends data, another station may attempt to do so
at the same time. The data from the two stations collide .
The original ALOHA protocol is a simple, but elegant protocol.
The idea is that each station sends a frame whenever it has a
frame to send. Figure 12.3 shows an example of frame collisions
in pure ALOHA. Some of these frames collide because
multiple frames are in contention for the shared channel.
12.9
Figure 12.3 Frames in a pure ALOHA network
Pure ALOHA:
1. Each station sends a frame whenever is has a frame to send
2. One channel to share, possibility of collision between frames from different stations
12.10
Figure 12.4 Procedure for pure ALOHA protocol
12.11
Figure 12.5 Vulnerable time for pure ALOHA protocol
12.12
Figure 12.6 Frames in a slotted ALOHA network
Slotted ALOHA:
1. We divide the time into slots and force the station to send only at the beginning of
the time slot
12.13
Figure 12.7 Vulnerable time for slotted ALOHA protocol
12.14
Carrier Sense Multiple Access (CSMA)
12.15
What should a station do if the channel is busy or idle? Three methods
have been devised are:
I-Persistent The I-persistent method is simple and straightforward. In
this method, after the station finds the line idle, it sends its frame
immediately (with probability I).
This method has the highest chance of collision because two or more
stations may find the line idle and send their frames immediately,
Ethernet uses this method.
Nonpersistent In the nonpersistent method, a station that has a frame
to send senses the line. If the line is idle, it sends immediately. If the
line is not idle, it waits a random amount of time and then senses the
line again. The nonpersistent approach reduces the chance of collision
because it is unlikely that two or more stations will wait the same
amount of time and retry to send simultaneously. However, this
method reduces the efficiency of the network because the medium
remains idle when there may be stations with frames to send.
12.16
p-Persistent The p-persistent method is used if the
channel has time slots with a slot duration equal to or
greater than the maximum propagation time.
12.17
Figure 12.10 Behavior of three persistence methods
1-Persistent-after station
finds the line idle, send
its frame
Nonpersistent-senses the
line; idle: sends
immediately; not idle:
waits random amount of
time and senses again
p-Persistent-the channel
has time slots with
duration equal to or
greater than max
propagation time
12.18
Figure 12.11 Flow diagram for three persistence methods
12.19
Carrier Sense Multiple Access with Collision
Detection (CSMA/CD)
12.20
Example 12.5 (Minimum frame size)
12.22
12-2 CONTROLLED ACCESS
12.23
Reservation
12.25
polling
Polling works with topologies in which one device is
designated as a primary station and the other devices are
secondary stations. All data exchanges must be made through
the primary device even when the ultimate destination is a
secondary device.
The primary device controls the link; the secondary devices
follow its instructions. It is up to the primary device to
determine which device is allowed to use the channel at a
given time. The primary device, therefore, is always the
initiator of a session (see Figure 12-19).
12.26
Figure 12.19 Select and poll functions in polling access method
Polling – one device as primary station and the other device as secondary station
Select – primary device wants to send data to secondary device, secondary device
gets ready to receive
Poll – primary device solicits (ask) transmissions from secondary devices
12.27
The poll function is used by the primary device to solicit
transmissions from the secondary devices. When the primary is
ready to receive data, it must ask (poll) each device in turn if it
has anything to send. When the first secondary is approached, it
responds either with a NAK frame if it has nothing to send or
with data (in the form of a data frame) if it does.
12.28
Token passing – stations in network organized in a logical ring –
predecessor and successor
Bus ring (token bus) - stations are connected to single cable called bus,
but make logical ring
Star ring - physical topology star, wiring inside hub makes the ring
12.29
Figure 12.20 Logical ring and physical topology in token-passing access method
12.30
12-3 CHANNELIZATION (Beyond class scope)
Examples of Channelization:
Frequency-Division Multiple Access (FDMA)
Time-Division Multiple Access (TDMA)
Code-Division Multiple Access (CDMA)
12.31
Frequency-Division Multiple Access (FDMA)
12.32
Time-Division Multiple Access (TDMA)
12.33
In TDMA, the bandwidth is just one
channel that is timeshared between
different stations.
12.34
Code-Division Multiple Access (CDMA)