SlideShare une entreprise Scribd logo
1  sur  25
Chapter 12
Part 2
Media
Access
Control
(MAC)
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
12.2
Figure 12.1: Taxonomy of multiple-access protocols
12.3
12-2 CONTROLLED ACCESS
In controlled access, the stations consult one another
to find which station has the right to send.
A station cannot send unless it has been authorized
by other stations.
We discuss three controlled-access methods:
 Reservation.
 Polling.
 Token Passing.
12.3
12.4
12.2.1 Reservation
In the reservation method, a station needs to make a
reservation before sending data. Time is divided into
intervals. In each interval, a reservation frame
precedes the data frames sent in that interval.
12.5
Figure 12.18: Reservation access method
If there are N stations , there are N reservation minislots. Each minislot belongs to a
station.
The Figure shows a situation with five stations and a five minislot reservation frame.In
the first interval, only stations 1, 3, and 4 have made reservations. In the second
interval, only station 1 has made a reservation.
12.6
12.2.2 Polling
Polling works with topologies in which one device is
designated as a primary station and the other devices are
secondary stations.
All data exchanges must be made through the primary device
even when the ultimate destination is a secondary device.
The primary device controls the link; the secondary devices
follow its instructions. It is up to the primary device to
determine which device is allowed to use the channel at a
given time.
Figure 12.19: Select and poll functions in polling-access method
zzzzzzz
The primary device is always the initiator of a session However, if the primary station fails,
the system goes down.
The select function is used whenever the
primary device has something to send.
Before sending data, the primary creates
and transmits a select (SEL) frame, one
field of which includes the address of the
intended secondary, to alert the secondary
to the upcoming transmission and wait for
an acknowledgment.
When the primary is ready to receive data, it
must ask (poll) each device in turn if it has
anything to send. If the secondary device
response is negative (NAK frame) it means it
has nothing to send. Then the primary polls the
next secondary until it finds one with data to
send. When the response is positive (a data
frame), the primary reads the frame and returns
an acknowledgment (ACK frame), verifying its
receipt.
12.8
12.2.3 Token Passing
In the token-passing method, the stations in a network are
organized in a logical ring.
In other words, for each station, there is a predecessor and a
successor.
The predecessor is the station which is logically before the
station in the ring.
The successor is the station which is after the station in the
ring.
The current station is the one that is accessing the channel
now. The right has been passed from the predecessor to the
current station, and will be passed to the successor when the
current station has no more data to send.
Figure 12.20: Logical ring and physical topology in token-passing access
method
A special packet called a token circulates through the ring. The possession of the token gives
the station the right to access the channel and send its data.
Uses a second ring for
emergencies only, which
operates in the reverse
direction of the main ring.
If one links in the main
ring fails, the system
automatically combines
the two rings to form a
temporary ring.
Each station needs to
have two transmitter
ports and two receiver
ports.
A station sends the
token to its successor
(the next one in line).
The token does not
have to have the
address of the next
successor.
If one of the links fails,
the whole system fails.
The stations are
connected to a single
cable called a bus. They,
make a logical ring,
because each station
knows the address of its
successor. When a
station has finished
sending its data, it
releases the token that
has the address of its
successor. Only the
station with that address
gets the token.
The physical topology
is a star. There is a
hub that acts as the
connector. The
stations are
connected to this ring
through the two wire
connections.
The network is less
prone to failure
because if a link goes
down, it will be
bypassed by the hub.
Adding and removing
stations from the ring
is easier.
12.10
12-3 CHANNELIZATION
Channelization (or channel partition, as it is
sometimes called) is a multiple-access method in
which the available bandwidth of a link is shared in
time, frequency, or through code, among different
stations.
In this section, we discuss three protocols:
 FDMA.
 TDMA.
 CDMA.
12.11
12.3.1 FDMA
In frequency-division multiple access
In frequency-division multiple access (FDMA), the available
bandwidth is divided into frequency bands. Each station is
allocated a band to send its data.
In other words, each band is reserved for a specific station,
and it belongs to the station all the time.
Each station also uses a bandpass filter (transmitting only a
set range of frequencies) to confine the transmitter
frequencies.
To prevent station interferences, the allocated bands are
separated from one another by small guard bands.
12.12
Figure 12.21: Frequency-division multiple access (FDMA)
The available bandwidth of the common channel is divided into bands that are
separated by guard bands.
The data- link layer in each station tells its physical layer to make a bandpass signal
from the data passed to it.
12.13
12.3.2 TDMA
Time-Division Multiple Access
In time-division multiple access (TDMA), the stations
share the bandwidth of the channel in time.
Each station is allocated a time slot during which it can
send data.
Each station transmits its data in its assigned time slot.
12.14
Figure 12.22: Time-division multiple access (TDMA)
The bandwidth is just one channel that is timeshared between different stations.
The data-link layer in each station tells its physical layer to use the allocated time slot.
12.15
12.3.3 CDMA
Code-division multiple access (CDMA) was
conceived several decades ago. Recent advances in
electronic technology have finally made its
implementation possible..
CDMA differs from FDMA in that only one channel
occupies the entire bandwidth of the link.
CDMA differs from TDMA in that all stations can
send data simultaneously; there is no timesharing.
12.16
Figure 12.23: Simple idea of communication with code
To get the data, the receiver multipulies the data on the channel by the code of the sender.
For example, suppose Station 2 wants to get data from station 1. It multiplies the data on the
channel by c1 (the code of station 1).
Because (c1 ⋅ c1) is 4, but (c2 ⋅ c1), (c3 ⋅ c1), and (c4 ⋅ c1) are all 0s, station 2 divides the result
by 4 to get the data from station 1.
Each station is assigned a code. If a station want to send data, it multiplies its data by its code.
The data that go on the channel are the sum of all these multiplication terms.
12.17
Figure 12.24: Chip sequences
The code is a sequence of numbers called chips.
They are carefully selected and have the following properties:
1. Each sequence is made of N elements (N is the number of stations).
2. multiplication of a sequence by a scalar: Every element in the sequence is multiplied by
a number. [+1 +1 +1 +1] . 2 = [+2 +2 +2 +2]
3. Inner product of two equal sequences= N
[+1 +1 +1 +1] . [+1 +1 +1 +1] = +1 +1 +1 +1 = 4
4. Inner product of two different sequences= 0.
[+1 +1 +1 +1] . [+1 -1 -1 +1] = +1 -1 -1 +1 = 0
5. If we add two sequences, the result is another sequence.
[+1 +1 +1 +1] + [+1 -1 +1 -1] = [+2 0 +2 0]
Figure 12.25: Data representation in CDMA
For encoding:
If a station needs to send a 0 bit, it encodes it as −1.
if a station needs to send a 1 bit, it encodes it as +1.
If a station is idle, it sends no signal (interpreted as a 0).
12.19
Figure 12.26: Sharing channel in CDMA
If station 3 is listening to station 2, Station 3 multiplies the total
data on the channel by the code for station 2.
Figure 12.27: Digital signal created by four stations in CDMA
12.21
Figure 12.28: Decoding of the composite signal for one in CDMA
12.22
Figure 12.29: General rules and examples of creating Walsh tables
To generate chip sequences, we use a Walsh table, which is a two-
dimensional table with an equal number of rows and columns,
In the Walsh table, each row is a sequence of chips.
After we select W1,
W2 can be made
from four W1s, with
the last one the
complement of W1.
W4 can be made of
four W2s, with the
last one the
complement of W2.
W8 is composed of
four W4s, and so on.
Find the chips for a network with
a. Two stations
b. Four stations
Example 12.6
12.23
What is the number of sequences if we have 90 stations in
our network?
Example 12. 7
12.24
Prove that a receiving station can get the data sent by a
specific sender if it multiplies the entire data on the channel
by the sender’s chip code and then divides it by the number
of stations.
Example 12.8 Self-Study
12.25

Contenu connexe

Tendances

Zaharaddeen karami lawal distance vector routing
Zaharaddeen karami lawal distance vector routingZaharaddeen karami lawal distance vector routing
Zaharaddeen karami lawal distance vector routingKlawal13
 
Ars msr 1-intradomain
Ars msr 1-intradomainArs msr 1-intradomain
Ars msr 1-intradomainNarcisIlie1
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSDr. SELVAGANESAN S
 
Switching Concept in Networking
Switching Concept in NetworkingSwitching Concept in Networking
Switching Concept in NetworkingSoumen Santra
 
Distance Vector Routing Protocols
Distance Vector Routing ProtocolsDistance Vector Routing Protocols
Distance Vector Routing ProtocolsKABILESH RAMAR
 
Dcn ppt on data link layer
Dcn ppt on data link layerDcn ppt on data link layer
Dcn ppt on data link layerroma bora
 
multiacess protocol
multiacess protocolmultiacess protocol
multiacess protocolKanwal Khan
 
IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5Vicky Kumar
 
Distance Vector & Link state Routing Algorithm
Distance Vector & Link state Routing AlgorithmDistance Vector & Link state Routing Algorithm
Distance Vector & Link state Routing AlgorithmMOHIT AGARWAL
 
Comparative Analysis of Distance Vector Routing & Link State Protocols
Comparative Analysis of Distance Vector Routing & Link State ProtocolsComparative Analysis of Distance Vector Routing & Link State Protocols
Comparative Analysis of Distance Vector Routing & Link State ProtocolsEast West University
 
Presentation of computer network on data link layer
Presentation of computer network on data link layerPresentation of computer network on data link layer
Presentation of computer network on data link layersumit gyawali
 
Ccna free chapter
Ccna free chapterCcna free chapter
Ccna free chapterkvs062003
 
813 Ieeestds 090330072026 Phpapp01
813 Ieeestds 090330072026 Phpapp01813 Ieeestds 090330072026 Phpapp01
813 Ieeestds 090330072026 Phpapp01techbed
 

Tendances (20)

Network switching
Network switchingNetwork switching
Network switching
 
Zaharaddeen karami lawal distance vector routing
Zaharaddeen karami lawal distance vector routingZaharaddeen karami lawal distance vector routing
Zaharaddeen karami lawal distance vector routing
 
Ars msr 1-intradomain
Ars msr 1-intradomainArs msr 1-intradomain
Ars msr 1-intradomain
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
 
Switching Concept in Networking
Switching Concept in NetworkingSwitching Concept in Networking
Switching Concept in Networking
 
Distance Vector Routing Protocols
Distance Vector Routing ProtocolsDistance Vector Routing Protocols
Distance Vector Routing Protocols
 
Routing Algorithm
Routing AlgorithmRouting Algorithm
Routing Algorithm
 
Token ring
Token ringToken ring
Token ring
 
Dcn ppt on data link layer
Dcn ppt on data link layerDcn ppt on data link layer
Dcn ppt on data link layer
 
Token ring 802.5
Token ring 802.5Token ring 802.5
Token ring 802.5
 
multiacess protocol
multiacess protocolmultiacess protocol
multiacess protocol
 
IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5
 
Routing
RoutingRouting
Routing
 
Distance Vector & Link state Routing Algorithm
Distance Vector & Link state Routing AlgorithmDistance Vector & Link state Routing Algorithm
Distance Vector & Link state Routing Algorithm
 
Comparative Analysis of Distance Vector Routing & Link State Protocols
Comparative Analysis of Distance Vector Routing & Link State ProtocolsComparative Analysis of Distance Vector Routing & Link State Protocols
Comparative Analysis of Distance Vector Routing & Link State Protocols
 
Presentation of computer network on data link layer
Presentation of computer network on data link layerPresentation of computer network on data link layer
Presentation of computer network on data link layer
 
Ccna free chapter
Ccna free chapterCcna free chapter
Ccna free chapter
 
813 Ieeestds 090330072026 Phpapp01
813 Ieeestds 090330072026 Phpapp01813 Ieeestds 090330072026 Phpapp01
813 Ieeestds 090330072026 Phpapp01
 
Distance vector routing
Distance vector routingDistance vector routing
Distance vector routing
 
token bus
 token bus token bus
token bus
 

Similaire à ch

Multiple Access ppt in Object Oriented Programming
Multiple Access ppt in Object Oriented ProgrammingMultiple Access ppt in Object Oriented Programming
Multiple Access ppt in Object Oriented Programmingarnavytstudio2814
 
IT_210_Week06_Forouzan_Chapter_13.ppt
IT_210_Week06_Forouzan_Chapter_13.pptIT_210_Week06_Forouzan_Chapter_13.ppt
IT_210_Week06_Forouzan_Chapter_13.pptشحرة فؤاد
 
Media Access Control (MAC Layer)
Media Access Control (MAC Layer)Media Access Control (MAC Layer)
Media Access Control (MAC Layer)Meenakshi Paul
 
Changes in the standard ppt
Changes in the standard pptChanges in the standard ppt
Changes in the standard pptMalik obeisat
 
Osc mac duty cycle with multi helpers ct mode wi-lem technology in wireless s...
Osc mac duty cycle with multi helpers ct mode wi-lem technology in wireless s...Osc mac duty cycle with multi helpers ct mode wi-lem technology in wireless s...
Osc mac duty cycle with multi helpers ct mode wi-lem technology in wireless s...ijwmn
 
Efectos de nodos ieee 802.15.4 zig bee
Efectos de nodos ieee 802.15.4 zig beeEfectos de nodos ieee 802.15.4 zig bee
Efectos de nodos ieee 802.15.4 zig beeGregorio Toro Rivera
 
Lecture 2 Connecting LANs, Backbone Networks, and Virtual LANs.ppt
Lecture 2   Connecting LANs, Backbone Networks, and Virtual LANs.pptLecture 2   Connecting LANs, Backbone Networks, and Virtual LANs.ppt
Lecture 2 Connecting LANs, Backbone Networks, and Virtual LANs.pptabdnazar2003
 
3b multiple access
3b multiple access3b multiple access
3b multiple accesskavish dani
 
12 Multiple Access
12 Multiple Access12 Multiple Access
12 Multiple AccessAhmar Hashmi
 
3a data link layer continued
3a data link layer continued3a data link layer continued
3a data link layer continuedkavish dani
 
data-link layer protocols
data-link layer protocols  data-link layer protocols
data-link layer protocols BE Smârt
 

Similaire à ch (20)

Multiple Access ppt in Object Oriented Programming
Multiple Access ppt in Object Oriented ProgrammingMultiple Access ppt in Object Oriented Programming
Multiple Access ppt in Object Oriented Programming
 
IT_210_Week06_Forouzan_Chapter_13.ppt
IT_210_Week06_Forouzan_Chapter_13.pptIT_210_Week06_Forouzan_Chapter_13.ppt
IT_210_Week06_Forouzan_Chapter_13.ppt
 
ch12.ppt
ch12.pptch12.ppt
ch12.ppt
 
Media Access Control (MAC Layer)
Media Access Control (MAC Layer)Media Access Control (MAC Layer)
Media Access Control (MAC Layer)
 
csma.pdf
csma.pdfcsma.pdf
csma.pdf
 
ieeeeeee802.ppt
ieeeeeee802.pptieeeeeee802.ppt
ieeeeeee802.ppt
 
DCN PPT.pptx
DCN PPT.pptxDCN PPT.pptx
DCN PPT.pptx
 
Changes in the standard ppt
Changes in the standard pptChanges in the standard ppt
Changes in the standard ppt
 
Unit_3_WSN.pptx
Unit_3_WSN.pptxUnit_3_WSN.pptx
Unit_3_WSN.pptx
 
ieee 802.4
ieee 802.4ieee 802.4
ieee 802.4
 
Osc mac duty cycle with multi helpers ct mode wi-lem technology in wireless s...
Osc mac duty cycle with multi helpers ct mode wi-lem technology in wireless s...Osc mac duty cycle with multi helpers ct mode wi-lem technology in wireless s...
Osc mac duty cycle with multi helpers ct mode wi-lem technology in wireless s...
 
Efectos de nodos ieee 802.15.4 zig bee
Efectos de nodos ieee 802.15.4 zig beeEfectos de nodos ieee 802.15.4 zig bee
Efectos de nodos ieee 802.15.4 zig bee
 
Week15 lec1
Week15 lec1Week15 lec1
Week15 lec1
 
Lecture 2 Connecting LANs, Backbone Networks, and Virtual LANs.ppt
Lecture 2   Connecting LANs, Backbone Networks, and Virtual LANs.pptLecture 2   Connecting LANs, Backbone Networks, and Virtual LANs.ppt
Lecture 2 Connecting LANs, Backbone Networks, and Virtual LANs.ppt
 
3b multiple access
3b multiple access3b multiple access
3b multiple access
 
Link layer
Link layerLink layer
Link layer
 
Ch08
Ch08Ch08
Ch08
 
12 Multiple Access
12 Multiple Access12 Multiple Access
12 Multiple Access
 
3a data link layer continued
3a data link layer continued3a data link layer continued
3a data link layer continued
 
data-link layer protocols
data-link layer protocols  data-link layer protocols
data-link layer protocols
 

Plus de Faculty of Engineering, Alexandria University, Egypt (11)

Note 4 physical layer ii (1) spread spectrum(fhss&dsss)
Note 4 physical layer ii (1) spread spectrum(fhss&dsss)Note 4 physical layer ii (1) spread spectrum(fhss&dsss)
Note 4 physical layer ii (1) spread spectrum(fhss&dsss)
 
Note 4 physical layer ii (1) adsl1
Note 4 physical layer ii (1) adsl1Note 4 physical layer ii (1) adsl1
Note 4 physical layer ii (1) adsl1
 
Note 4 physical layer ii (1) adsl
Note 4 physical layer ii (1) adslNote 4 physical layer ii (1) adsl
Note 4 physical layer ii (1) adsl
 
Multi level,multi transition
Multi level,multi transitionMulti level,multi transition
Multi level,multi transition
 
Multi level multi transition
Multi level multi transitionMulti level multi transition
Multi level multi transition
 
Modulation and multiplexing question mcq
Modulation and multiplexing question mcqModulation and multiplexing question mcq
Modulation and multiplexing question mcq
 
Mobile mapping terminology
Mobile mapping terminologyMobile mapping terminology
Mobile mapping terminology
 
RFID Electromagnetic project (rfid)
 RFID Electromagnetic project (rfid) RFID Electromagnetic project (rfid)
RFID Electromagnetic project (rfid)
 
VR
VR VR
VR
 
Project electronics
Project electronicsProject electronics
Project electronics
 
Nano fabrication for beginner
Nano fabrication for beginner Nano fabrication for beginner
Nano fabrication for beginner
 

Dernier

Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network DevicesChandrakantDivate1
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdfKamal Acharya
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersMairaAshraf6
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdfAldoGarca30
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Servicemeghakumariji156
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARKOUSTAV SARKAR
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"mphochane1998
 
Wadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxWadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxNadaHaitham1
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiessarkmank1
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxSCMS School of Architecture
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdfKamal Acharya
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxMuhammadAsimMuhammad6
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityMorshed Ahmed Rahath
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxJuliansyahHarahap1
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEGEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEselvakumar948
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesRAJNEESHKUMAR341697
 

Dernier (20)

Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Wadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxWadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptx
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEGEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planes
 

ch

  • 1. Chapter 12 Part 2 Media Access Control (MAC) Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
  • 2. 12.2 Figure 12.1: Taxonomy of multiple-access protocols
  • 3. 12.3 12-2 CONTROLLED ACCESS In controlled access, the stations consult one another to find which station has the right to send. A station cannot send unless it has been authorized by other stations. We discuss three controlled-access methods:  Reservation.  Polling.  Token Passing. 12.3
  • 4. 12.4 12.2.1 Reservation In the reservation method, a station needs to make a reservation before sending data. Time is divided into intervals. In each interval, a reservation frame precedes the data frames sent in that interval.
  • 5. 12.5 Figure 12.18: Reservation access method If there are N stations , there are N reservation minislots. Each minislot belongs to a station. The Figure shows a situation with five stations and a five minislot reservation frame.In the first interval, only stations 1, 3, and 4 have made reservations. In the second interval, only station 1 has made a reservation.
  • 6. 12.6 12.2.2 Polling Polling works with topologies in which one device is designated as a primary station and the other devices are secondary stations. All data exchanges must be made through the primary device even when the ultimate destination is a secondary device. The primary device controls the link; the secondary devices follow its instructions. It is up to the primary device to determine which device is allowed to use the channel at a given time.
  • 7. Figure 12.19: Select and poll functions in polling-access method zzzzzzz The primary device is always the initiator of a session However, if the primary station fails, the system goes down. The select function is used whenever the primary device has something to send. Before sending data, the primary creates and transmits a select (SEL) frame, one field of which includes the address of the intended secondary, to alert the secondary to the upcoming transmission and wait for an acknowledgment. When the primary is ready to receive data, it must ask (poll) each device in turn if it has anything to send. If the secondary device response is negative (NAK frame) it means it has nothing to send. Then the primary polls the next secondary until it finds one with data to send. When the response is positive (a data frame), the primary reads the frame and returns an acknowledgment (ACK frame), verifying its receipt.
  • 8. 12.8 12.2.3 Token Passing In the token-passing method, the stations in a network are organized in a logical ring. In other words, for each station, there is a predecessor and a successor. The predecessor is the station which is logically before the station in the ring. The successor is the station which is after the station in the ring. The current station is the one that is accessing the channel now. The right has been passed from the predecessor to the current station, and will be passed to the successor when the current station has no more data to send.
  • 9. Figure 12.20: Logical ring and physical topology in token-passing access method A special packet called a token circulates through the ring. The possession of the token gives the station the right to access the channel and send its data. Uses a second ring for emergencies only, which operates in the reverse direction of the main ring. If one links in the main ring fails, the system automatically combines the two rings to form a temporary ring. Each station needs to have two transmitter ports and two receiver ports. A station sends the token to its successor (the next one in line). The token does not have to have the address of the next successor. If one of the links fails, the whole system fails. The stations are connected to a single cable called a bus. They, make a logical ring, because each station knows the address of its successor. When a station has finished sending its data, it releases the token that has the address of its successor. Only the station with that address gets the token. The physical topology is a star. There is a hub that acts as the connector. The stations are connected to this ring through the two wire connections. The network is less prone to failure because if a link goes down, it will be bypassed by the hub. Adding and removing stations from the ring is easier.
  • 10. 12.10 12-3 CHANNELIZATION Channelization (or channel partition, as it is sometimes called) is a multiple-access method in which the available bandwidth of a link is shared in time, frequency, or through code, among different stations. In this section, we discuss three protocols:  FDMA.  TDMA.  CDMA.
  • 11. 12.11 12.3.1 FDMA In frequency-division multiple access In frequency-division multiple access (FDMA), the available bandwidth is divided into frequency bands. Each station is allocated a band to send its data. In other words, each band is reserved for a specific station, and it belongs to the station all the time. Each station also uses a bandpass filter (transmitting only a set range of frequencies) to confine the transmitter frequencies. To prevent station interferences, the allocated bands are separated from one another by small guard bands.
  • 12. 12.12 Figure 12.21: Frequency-division multiple access (FDMA) The available bandwidth of the common channel is divided into bands that are separated by guard bands. The data- link layer in each station tells its physical layer to make a bandpass signal from the data passed to it.
  • 13. 12.13 12.3.2 TDMA Time-Division Multiple Access In time-division multiple access (TDMA), the stations share the bandwidth of the channel in time. Each station is allocated a time slot during which it can send data. Each station transmits its data in its assigned time slot.
  • 14. 12.14 Figure 12.22: Time-division multiple access (TDMA) The bandwidth is just one channel that is timeshared between different stations. The data-link layer in each station tells its physical layer to use the allocated time slot.
  • 15. 12.15 12.3.3 CDMA Code-division multiple access (CDMA) was conceived several decades ago. Recent advances in electronic technology have finally made its implementation possible.. CDMA differs from FDMA in that only one channel occupies the entire bandwidth of the link. CDMA differs from TDMA in that all stations can send data simultaneously; there is no timesharing.
  • 16. 12.16 Figure 12.23: Simple idea of communication with code To get the data, the receiver multipulies the data on the channel by the code of the sender. For example, suppose Station 2 wants to get data from station 1. It multiplies the data on the channel by c1 (the code of station 1). Because (c1 ⋅ c1) is 4, but (c2 ⋅ c1), (c3 ⋅ c1), and (c4 ⋅ c1) are all 0s, station 2 divides the result by 4 to get the data from station 1. Each station is assigned a code. If a station want to send data, it multiplies its data by its code. The data that go on the channel are the sum of all these multiplication terms.
  • 17. 12.17 Figure 12.24: Chip sequences The code is a sequence of numbers called chips. They are carefully selected and have the following properties: 1. Each sequence is made of N elements (N is the number of stations). 2. multiplication of a sequence by a scalar: Every element in the sequence is multiplied by a number. [+1 +1 +1 +1] . 2 = [+2 +2 +2 +2] 3. Inner product of two equal sequences= N [+1 +1 +1 +1] . [+1 +1 +1 +1] = +1 +1 +1 +1 = 4 4. Inner product of two different sequences= 0. [+1 +1 +1 +1] . [+1 -1 -1 +1] = +1 -1 -1 +1 = 0 5. If we add two sequences, the result is another sequence. [+1 +1 +1 +1] + [+1 -1 +1 -1] = [+2 0 +2 0]
  • 18. Figure 12.25: Data representation in CDMA For encoding: If a station needs to send a 0 bit, it encodes it as −1. if a station needs to send a 1 bit, it encodes it as +1. If a station is idle, it sends no signal (interpreted as a 0).
  • 19. 12.19 Figure 12.26: Sharing channel in CDMA If station 3 is listening to station 2, Station 3 multiplies the total data on the channel by the code for station 2.
  • 20. Figure 12.27: Digital signal created by four stations in CDMA
  • 21. 12.21 Figure 12.28: Decoding of the composite signal for one in CDMA
  • 22. 12.22 Figure 12.29: General rules and examples of creating Walsh tables To generate chip sequences, we use a Walsh table, which is a two- dimensional table with an equal number of rows and columns, In the Walsh table, each row is a sequence of chips. After we select W1, W2 can be made from four W1s, with the last one the complement of W1. W4 can be made of four W2s, with the last one the complement of W2. W8 is composed of four W4s, and so on.
  • 23. Find the chips for a network with a. Two stations b. Four stations Example 12.6 12.23
  • 24. What is the number of sequences if we have 90 stations in our network? Example 12. 7 12.24
  • 25. Prove that a receiving station can get the data sent by a specific sender if it multiplies the entire data on the channel by the sender’s chip code and then divides it by the number of stations. Example 12.8 Self-Study 12.25

Notes de l'éditeur

  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20
  21. 21
  22. 22
  23. 23
  24. 24
  25. 25