Eeswar Babu Banala: Associate Professor Vidya Jyothi Institute of Technology Hyderabad Telangana
Eeswar Babu Banala: Associate Professor Vidya Jyothi Institute of Technology Hyderabad Telangana
Eeswar Babu Banala: Associate Professor Vidya Jyothi Institute of Technology Hyderabad Telangana
Associate Professor
Vidya Jyothi Institute of Technology
Hyderabad
Telangana
1
UNIT -II
Multiple
Access
Taxonomy of multiple-access protocols discussed
in this chapter
ALOHA FDMA
Reservation
CSMA TDMA
Polling
CSMA/CD CDMA
Token passing
CSMA/CA
MULTIPLE ACCESS
• When nodes or stations are connected and use a
common link, called a multipoint or broadcast link, we
need a multiple-access protocol to coordinate access to
the link.
• The problem of controlling the access to the medium is
similar to the rules of speaking in an assembly.
• The procedures guarantee that the right to speak is
upheld and ensure that :
- Two people do not speak at the same time
- do not interrupt each other
- do not monopolize the discussion, and so on.
Multiple-access protocols
RANDOM ACCESS
• In random access or contention methods, no
station is superior to another station and none is
assigned the control over another.
• No station permits, or does not permit, another
station to send.
• At each instance, a station that has data to send
uses a procedure defined by the protocol to make
a decision on whether or not to send.
• This decision depends on the state of the
medium (idle or busy)
Two features give this method its name
MA
The random-access methods
CSMA have evolved as
CSMA/CD
CSMA/CA
Random Access
• The random access methods have evolved
from a very interesting protocol known as
ALOHA, which used a very simple procedure
called multiple access (MA).
• The method was improved with the addition
of a procedure that forces the station to sense
the medium before transmitting.
• This was called carrier sense multiple
access(CSMA).
Random Access
• This method later evolved into two parallel
methods:
- carrier sense multiple access with collision
detection (CSMA/CD)
- carrier sense multiple access with collision
avoidance (CSMA/CA).
• CSMA/CD tells the station what to do when a
collision is detected.
• CSMA/CA tries to avoid the collision.
Evolution of random-access methods
Pure aloha:
• ALOHA was developed in 1970.it was designed for a radio LAN,but it
cannot b used on any shared medium.
• Pure aloha: original aloha
• Idea is that each stn sends frame when ever it has frame to send.
• Only one channel to share there is possibility of collision btw frames from
different stations.
• Pure aloha relies on ack from receiver.if ack does not arrive after time out
period stn resends the frame.
• If all stns try to resend their frames after time out,frames collide
again.pure aloha dictates that when timeout period passes ,each stn
waits for random amount of time bfore resending the frame.this time is
called back off time .
ALOHA network
Procedure for ALOHA protocol
K: Number of attempts
Tp : Maximum propagation time
Tfr : Average transmission time for
a frame
TB : Back-off time
(Ta=Rx Tp or R x Tfr
(2 X Tp
K=K+ 1
Kma, is
normally 15
Slotted aloha
• Slotted aloha : was invented to improve the efficiency of pure
aloha.
• here we divide the time into slots tfr s and force the station to
send only at the beginning of time slot.
• Here if station misses to send at beginning of time slot it has
to wait till next time slot.
• But 2 or more stations try to send at same time slot, collision
occurs.
CSMA(carrier sense multiple access)
• In CSMA every station must first listen to the medium before sending.
• principle: sense before transmit or listen before talk.
• It can reduce the possibility of collision but cannot avoid it because of
propagation delay.
• To minimize the chance of collision and, therefore, increase the
performance, the CSMA method was developed.
Collision in CSMA
CSMA(carrier sense multiple access)
• Timing in csma/ca:
found size:
idle binary exponential
continuously sense
IFS
contention window
Local Area
Networks:
Ethernet
Three generations of Ethernet
Traditional Ethernet
MAC Sublayer
Physical Layer
Bridged Ethernet
Switched Ethernet
Full-Duplex Ethernet
802.3 MAC frame
• Preamble:it alerts the receiver to coming frame and enables
synchronization.it is added at physical layer
• Sfd:signals beginning of frame.sfd warns stns that this is last chance for
sync.the last bits 11 alerts the recvr that next field is destination address.
• Max restriction bcoz memory was expensive and it prevents 1 stn from
monopolizing shared medium,blocking other stns that have data to send.
Ethernet addresses in hexadecimal
notation
• Each stn on ehternet n/w has n/w interface card.(NIC).nic fits inside the
stn and provides the stn with 6 byte physical address.
• In unicast dest address defines only 1 recepient,multicast defines group of
adresses,broadcast are all stns on lan.its address is 48 1s.
Categories of traditional Ethernet
• All standard implementations use digital signaling at 10 mbps.at sender
data are converted to digital signal using manchester scheme
MAC Sublayer
Physical Layer
MAC Sublayer
Physical Layer
• 1000 base-T was designed in response to those users who had already
installed this wiring for other pursposes such as fast ethernet.
• Gigabit thernet cannot use manchestor encoding scheme bcoz it involves
very high bandwidth.8b/10b block encoding is used.
Encoding in 1000Base-X
1000Base-T implementation
Encoding in 1000Base-T
Connecting devices
• LANs do not normally operate in isolation.
They are connected to one another or to the
Internet.
• To connect LANs, or segments of LANs, we use
connecting devices.
• Connecting devices can operate in different
layers of the Internet model.
Connecting devices
Repeaters
Hubs
Bridges
Two-Layer Switches
The five categories contain devices which
can be defined as
• 1.Those which operate below the physical layer such as
a passive hub.
• 2.Those which operate at the physical layer (a repeater
or an active hub).
• 3.Those which operate at the physical and data link
layers (a bridge or a two-layer switch).
• 4. Those which operate at the physical, data link, and
network layers (a router or a
• three-layer switch).
• 5. Those which can operate at all five layers (a
gateway).
Connecting devices
Passive Hubs
• A passive hub is just a connector. It connects
the wires coming from different branches.
• The hub is the collision point where the
signals coming from different stations collide.
• This type of a hub is part of the media
• Its location in the Internet model is below the
physical layer.
Repeaters
• A repeater is a device that operates only in the
physical layer.
• Signals that carry information within a network
can travel a fixed distance before it becomes too
weak or corrupted.
• A repeater receives a signal and, regenerates the
original bit pattern.
• The repeater then sends the refreshed signal.
• A repeater can extend the physical length of a
LAN.
Repeater
Note:
A repeater is a regenerator,
not an amplifier.
Function of a repeater