Multiple Access 1 2 Taxonomy of multipleaccess protocols

  • Slides: 34
Download presentation
Multiple Access 1

Multiple Access 1

2

2

Taxonomy of multiple-access protocols discussed in this chapter 3

Taxonomy of multiple-access protocols discussed in this chapter 3

RANDOM ACCESS In random access or contention methods, no station is superior to another

RANDOM ACCESS In random access or contention methods, no station is superior to another station and none is assigned the control over another. No station permits, or does not permit, another station to send. At each instance, a station that has data to send uses a procedure defined by the protocol to make a decision on whether or not to send. 4

Frames in a pure ALOHA network 5

Frames in a pure ALOHA network 5

Procedure for pure ALOHA protocol 6

Procedure for pure ALOHA protocol 6

Vulnerable time for pure ALOHA protocol 7

Vulnerable time for pure ALOHA protocol 7

Frames in a slotted ALOHA network 8

Frames in a slotted ALOHA network 8

Vulnerable time for slotted ALOHA protocol 9

Vulnerable time for slotted ALOHA protocol 9

Space/time model of the collision in CSMA 10

Space/time model of the collision in CSMA 10

Vulnerable time in CSMA 11

Vulnerable time in CSMA 11

Behavior of three persistence methods 12

Behavior of three persistence methods 12

Flow diagram for three persistence methods 13

Flow diagram for three persistence methods 13

Collision of the first bit in CSMA/CD 14

Collision of the first bit in CSMA/CD 14

Collision and abortion in CSMA/CD 15

Collision and abortion in CSMA/CD 15

Flow diagram for the CSMA/CD 16

Flow diagram for the CSMA/CD 16

Energy level during transmission, idleness, or collision 17

Energy level during transmission, idleness, or collision 17

Timing in CSMA/CA 18

Timing in CSMA/CA 18

Flow diagram for CSMA/CA 19

Flow diagram for CSMA/CA 19

CONTROLLED ACCESS In controlled access, the stations consult one another to find which station

CONTROLLED ACCESS In controlled access, the stations consult one another to find which station has the right to send. A station cannot send unless it has been authorized by other stations. We discuss three popular controlled-access methods. 20

Reservation access method 21

Reservation access method 21

Select and poll functions in polling access method 22

Select and poll functions in polling access method 22

Logical ring and physical topology in token-passing access method 23

Logical ring and physical topology in token-passing access method 23

CHANNELIZATION Channelization is a multiple-access method in which the available bandwidth of a link

CHANNELIZATION Channelization is a multiple-access method in which the available bandwidth of a link is shared in time, frequency, or through code, between different stations. In this section, we discuss three channelization protocols. 24

Frequency-division multiple access (FDMA) 25

Frequency-division multiple access (FDMA) 25

Time-division multiple access (TDMA) 26

Time-division multiple access (TDMA) 26

Simple idea of communication with code 27

Simple idea of communication with code 27

Chip sequences 28

Chip sequences 28

Data representation in CDMA 29

Data representation in CDMA 29

Sharing channel in CDMA 30

Sharing channel in CDMA 30

Digital signal created by four stations in CDMA 31

Digital signal created by four stations in CDMA 31

Decoding of the composite signal for one in CDMA 32

Decoding of the composite signal for one in CDMA 32

General rule and examples of creating Walsh tables 33

General rule and examples of creating Walsh tables 33

12. 34

12. 34