Unit 1 - Part2 - Multiple Access
Unit 1 - Part2 - Multiple Access
CSE
2
MWC (ESC-CSE-308G)
Medium Access Control (MAC)
Layer
MAC is the layer of LAN/MAN system that controls the
hardware responsible for interaction with the wired, optical
or wireless transmission medium.
(Multiple access).
Control: The transfer of data, manage the flow of data
3
MWC (ESC-CSE-308G)
Figure 1 Data link layer divided into two functionality-oriented sublayers
4
Figure 2 Taxonomy of multiple-access protocols discussed in this chapter
5
12-1 RANDOM ACCESS
7
Figure 4 Procedure for pure ALOHA protocol
8
Example 1
9
Example 1 (continued)
d. For K = 4 ?
10
Figure 5 Vulnerable time for pure ALOHA protocol
11
Example 2
Solution
Average frame transmission time Tfr is 200 bits/200 kbps or
1 ms. The vulnerable time is 2 × 1 ms = 2 ms. This means
no station should send later than 1 ms before this station
starts transmission and no station should start sending
during the one 1-ms period that this station is sending.
12
The throughput for pure ALOHA is
S = G × e −2G .
The maximum throughput
Smax = 0.184 when G= (1/2).
13
Figure 6 Frames in a slotted ALOHA network
14
Note
15
Figure 7 Vulnerable time for slotted ALOHA protocol
16
PURE vs. SLOTTED ALOHA
0.4
0.3
T = throughput = “goodput”
Slotted Aloha
0.2
(success rate)
0.1
Pure Aloha
R = offered load = Np
17
Figure 8 Space/time model of the collision in CSMA
18
Figure 9 Vulnerable time in CSMA
19
Figure 10 Behavior of three persistence methods
20
Figure 11 Flow diagram for three persistence methods
21
Figure 12 Collision of the first bit in CSMA/CD
22
Figure 13 Collision and abortion in CSMA/CD
23
Figure 14 Flow diagram for the CSMA/CD
24
Figure 15 Energy level during transmission, idleness, or collision
25
Figure 16 Timing in CSMA/CA
26
Note
27
Figure 17 Flow diagram for CSMA/CA
28
CONTROLLED ACCESS
29
Figure 18 Reservation access method
30
Figure 19 Select and poll functions in polling access method
31
Figure 20 Logical ring and physical topology in token-passing access method
32
12-3 CHANNELIZATION
33
Note
34
Figure 21 Frequency-division multiple access (FDMA)
35
Note
36
Figure 22 Time-division multiple access (TDMA)
37
Note
38
Note
39
Figure 23 Simple idea of communication with code
40
Figure 24 Chip sequences
41
Figure 25 Data representation in CDMA
42
Figure 26 Sharing channel in CDMA
43
Figure 27 Digital signal created by four stations in CDMA
44