Multiple Access
Hitesh Mohapatra
Class Note
Data link layer divided into two functionality-oriented sublayers
Taxonomy of multiple-access protocols discussed in
this chapter
ALOHA
Random Access
Frames in a pure ALOHA network
Importance Relevance Significance
• To maximize the
bandwidth
utilization
• ALOHA
• Carrier Sense
Multiple Access
• Carrier Sense
Multiple Access with
Collision Detection
• Carrier Sense
Multiple Access with
Collision Avoidance
• In random access or
contention methods, no
station is superior to
another station and none
is assigned the control
over another. No station
permits, or does not
permit, another station
to send. At each instance,
a station that has data to
send uses a procedure
defined by the protocol
to make a decision on
whether or not to send.
• No idle state
How to achieve the maximum utilization?
• Multiple send/receive
• Avoid Collision
• Avoid Trafficking
2
1
3
4
Procedure for pure ALOHA protocol
Vulnerable time for pure ALOHA protocol
Frames in a slotted ALOHA network
Vulnerable time for slotted ALOHA protocol
Space/time model of the collision in CSMA
Vulnerable time in CSMA
Behavior of three
persistence methods
Flow diagram for three
persistence methods
Collision of the first bit in CSMA/CD
Collision and abortion in CSMA/CD
Flow diagram for the
CSMA/CD
Energy level during transmission, idleness, or
collision
Timing in CSMA/CA
Note In CSMA/CA, if the station
finds the channel busy, it
does not restart the timer
of the contention window;
it stops the timer and
restarts it when the
channel becomes idle.In CSMA/CA, the
IFS can also be
used to define the
priority of a
station or a frame.
Flow diagram for CSMA/CA
Controlled Access
Controlled Access
In controlled access, the stations
consult one another to find which
station has the right to send. A station
cannot send unless it has been
authorized by other stations. We
discuss three popular controlled-
access methods.
1. Reservation
2. Polling
3. Token Passing
Reservation access method
Select and poll functions in polling access method
Logical ring and physical topology in token-passing
access method
Channelization
Channelization
Channelization is a multiple-
access method in which the
available bandwidth of a link
is shared in time, frequency,
or through code, between
different stations. In this
section, we discuss three
channelization protocols.
1. Frequency-Division Multiple Access (FDMA)
2. Time-Division Multiple Access (TDMA)
3. Code-Division Multiple Access (CDMA)
FDMA
In FDMA, the
available
bandwidth
of the common
channel is divided
into bands that
are separated by
guard bands.
TDMA
In TDMA, the
bandwidth is just one
channel that is
timeshared between
different stations.
CDMA
In CDMA, one
channel carries
all transmissions
simultaneously.
Simple idea of communication with code
Chip sequences
Data representation in CDMA
Sharing channel in CDMA
Digital signal created by four stations in CDMA
Decoding of the composite signal for one in CDMA
General rule and
examples of creating
Walsh tables
The number of
sequences in a
Walsh table needs to
be N = 2m.
Reference
Author: Behrouz A. Forouzan
Publication:· Book
Data Communications and Networking (McGraw-Hill Forouzan Networking)
McGraw-Hill Higher Education ©2007
ISBN:0072967757
Wired LANs: Ethernet
IEEE STANDARDS
In 1985, the Computer Society of the
IEEE started a project, called Project
802, to set standards to enable
intercommunication among equipment
from a variety of manufacturers. Project
802 is a way of specifying functions of
the physical layer and the data link layer
of major LAN protocols.
1. Data Link Layer
2. Physical Layer
STANDARD ETHERNET
The original Ethernet was created in 1976 at Xerox’s Palo
Alto Research Centre (PARC). Since then, it has gone
through four generations. We briefly discuss the
Standard (or traditional) Ethernet in this section.
1. MAC Sublayer
2. Physical Layer
Ethernet evolution through four generations
802.3 MAC frame
Minimum and maximum lengths
Frame length:
Minimum: 64 bytes (512 bits)
Maximum: 1518 bytes (12,144 bits)
Example of an Ethernet address in
hexadecimal notation
Unicast and multicast addresses
Note
The least significant bit of the
first byte
defines the type of address.
If the bit is 0, the address is
unicast;
otherwise, it is multicast.
The broadcast
destination address is a
special case of the
multicast address in
which all bits are 1s.
Categories of Standard Ethernet
Encoding in a Standard Ethernet implementation
10Base5 implementation
10Base2 implementation
10Base-T implementation
10Base-F implementation
Summary of Standard Ethernet
implementations
CHANGES IN THE STANDARD
CHANGES IN THE STANDARD
The 10-Mbps Standard Ethernet has
gone through several changes before
moving to the higher data rates. These
changes actually opened the road to the
evolution of the Ethernet to become
compatible with other high-data-rate
LANs.
1. Bridged Ethernet
2. Switched Ethernet
3. Full-Duplex Ethernet
Sharing bandwidth
A network with and without a bridge
Collision domains in an unbridged network
and a bridged network
Switched Ethernet
Full-duplex switched Ethernet
AsKAny Question
hiteshmohapatra@yahoo.com

Multiple Access in Computer Network