Professional Documents
Culture Documents
Communication Network
Communication Network
Nitin S Thakare
Department of Electronics & Telecommunication Engineering
PRMIT&R, Badnera
Unit-3. Multiple Access Control Protocols:
• Multiple access protocols are a set of protocols operating in the Medium Access Control
sub-layer (MAC sub-layer) of the Open Systems Interconnection (OSI) model.
• The Data Link Layer is responsible for transmission of data between two nodes. Its main
functions are-
1. Data Link Control
2. Multiple Access Control
• The data link control is responsible for reliable transmission of message over
transmission channel by using techniques framing, error control and flow control for ex.
S&W ARQ, Sliding window ARQ etc.
• If there is a dedicated link between the sender and the receiver then data link control
layer is sufficient.
• However if there is no dedicated link present between stations, then multiple stations
can access the channel simultaneously.
• In that scenario, numerous stations access the channel and broadcast data over it at the
same time.
• It may result in collisions and crosstalk.
• Hence multiple access control protocols are required to
• Thus, protocols are required for sharing data on non dedicated channels.
• That protocols are called as Multiple access protocols which can be classified as
shown below
Fig. Multiple-access protocols
What is Random Access or Contention Techniques :
• Any station can transmit data at any (random) instant of time i.e. any
station/system can access the channel/medium randomly known as RA.
• There are no rules that specifies which station should send data and whose next.
• Because of this, the Stations compete with one another to access the medium,
that’s why these methods are also called as contention methods.
• ALOHA is a earliest random access method, was developed by Norman Abramson and
his associates at the University of Hawaii in early 1970.
• It is a multiple access protocol that allows data to be transmitted over a public network
channel.
• It is a data-link layer protocol that describes how multiple terminals can access the
medium without interfering or conflicting.
• Basically it was designed for a radio (wireless) LAN, but it can be used on any shared
medium.
ALOHA Rules:-
2. Hence collision may occurs and data frames can lost during the transmission of data
through multiple stations.
I. Pure ALOHA
I. Pure ALOHA
• Pure ALOHA allows to station to transmit data whenever they have data to be sent.
• In pure ALOHA when two frames try to occupy the channel at same time, without
checking whether the channel is idle or not idle then there will be collision between
frames and get damaged or lost.
• When any station sends data, it will wait for acknowledgement from receiver.
• If sender does not acknowledged by receiver within the timeout period, then station
waits for a random amount of time, called as back off time (Tb) . And the station may
assume the frame has been lost or destroyed.
• Therefore, it retransmits the frame until all the data are successfully transmitted to the
receiver.
• The vulnerable time, during which a collision may occur in pure ALOHA, is
2 times the frame transmission time
Where,
𝑺 = 𝑮 𝒆−𝟐𝑮
𝑺 = 𝑮 𝒆−𝟐𝑮
• Next figure shows the procedure for pure ALOHA based on Kmax strategy.
fig. Procedure for pure ALOHA protocol
• A pure ALOHA network transmits S =G x e^-2G
200-bit frames on a shared channel
S =0.135
of 200 kbps. What is the throughput
if the system (all stations together) S= 13.5 %
produces
a. 1000 frames per second This means that the throughput is
b. 500 frames per second 1000 X 0.135 =135 frames.
c. 250 frames per second
• Slotted ALOHA was invented to improve the efficiency of pure ALOHA as the
chances of collision of pure ALOHA is high.
• In slotted ALOHA the time is divided into slots of Average frame transmission
time Tfr and force the station to send the frame only at the beginning of the
time slot.
• If station missed out to send frame in allotted time slot, then station must wait
for next slot.
S = G x e^-G
• Then for G =1
• In a random access method, each station has the right to access the medium
without being controlled by any other station.
• However, if more than one station tries to send, there is a collision and the
frames will be either destroyed or modified.
• To avoid collision or to resolve this , each station must follows the some sort of
procedure that answers the following questions:
iii. How can the station determine the success or failure of the transmission?
• The chance of collision can be reduced if a station senses the medium whether
it is busy of idle.
• CSMA can reduce the possibility of collision, but it cannot eliminate it.
• When a station sends a frame, and any other station tries to send a frame during
this time, a collision will occurs.
• The station A sends a frame at time t1 which reaches the station D at time t1 + Tp.
The gray area shows the vulnerable area in time and space.
i. 1-persistent method
• In this method, the station continuously sense the channel as soon as station
finds the line idle, it sends frame immediately (with probability 1).
• This method has the highest chance of collision because two or more stations
may find the line idle and send their frames immediately.
Non-persistent Method
• In the non-persistent method, a station that has a frame to send senses the line.
• If the line is not idle, it waits a random amount of time and then senses the line again.
• The non-persistent approach reduces the chance of collision because it is unlikely that
two or more stations will wait the same amount of time and retry to send
simultaneously.
• However, this method reduces the efficiency of the network because the medium
remains idle when there may be stations with frames to send.
p-Persistent
• The p-persistent method senses the channel continuously.
• If channel is idle, station allow to send data over channel in time slot.
• Channel has time slots with a slot duration equal to or greater than the maximum propagation time.
• Station has to send the data over channel only at the beginning of time slot.
• If station misses the time slot, it can not send data on the channel and has to wait for its time slot.
• In this method, after the station finds the line idle it follows below steps:
2. With probability q = 1 - p, the station waits for the beginning of the next time slot and checks the
line again.
b. If the line is busy, it acts as though a collision has occurred and uses the back-off
procedure.
• The p-persistent approach combines the advantages of the other two strategies.
• Transmission time for C’s frame is, therefore,t3 –t2 and for A’s frame ist4 –t1
• So, the frame transmission time (Tfr) should be at least twice the maximum
propagation time (Tp). This can be deduced when the two stations involved in a
collision are a maximum distance apart.
Fig. Flow diagram for the CSMA/CD
Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)
• We need to avoid collisions on wireless networks because they cannot be
detected.
• Carrier sense multiple access with collision avoidance (CSMA/CA) was invented for
wireless network.
• Collisions are avoided through the use of CSMA/CA's three strategies: the inter-
frame space, the contention window, and acknowledgments, as shown below
• When an idle channel is found, the station does not send data immediately. It
waits for a period of time called the inter-frame space or IFS.
• Even though the channel may appear idle when it is sensed, a distant station
may have already started transmitting, so ISF provides advantage of collision
avoidance.
• If after the IFS time the channel is still idle, the station can send, but it still
needs to wait a time equal to the contention time.
• The IFS variable can also be used to prioritize stations or frame types. For
example, a station that is assigned a shorter IFS has a higher priority.
Contention Window
• The contention window is an amount of time divided into slots.
• A station that is ready to send chooses a random number of slots as its waiting
time.
• The number of slots in the window changes according to the binary
exponential back-off strategy.
• The channel needs to be sensed before and after the IFS. The channel also
needs to be sensed during the contention time.
• For each time slot of the contention window, the channel is sensed.
• If it is found idle, the timer continues.
• if the channel is found busy, the timer is stopped and continues after the
timer becomes idle again.
• This gives priority to the station with the longest waiting time.
• With all these precautions, there still may be a collision resulting in destroyed
data.
• The positive acknowledgment and the time-out timer can help guarantee that
the receiver has received the frame.
Fig. Flow diagram for CSMA/CA
Controlled Access Techniques:
• In controlled access, the stations consult one another to find which station has
the right to send the data.
1. Reservation
2. Polling
3. Token Passing
1. Reservation
• If there are N stations in the system, there are exactly N reservation mini-
slots in the reservation frame.
• The stations that have made reservations can send their data frames after
the reservation frame.
• Fig. below shows a situation with five stations and a five-mini-slot reservation
frame.
• All data exchanges must be made through the primary device even when the
ultimate destination is a secondary device.
• The primary device controls the link; the secondary devices follow its instructions.
• If the primary wants to send data, it tells the secondary to get ready to receive;
this is called select function.
• If the primary wants to receive data, it asks the secondary if they have anything to
send; this is called poll function.
Select function:-
• The select function is used whenever the primary device has something to
send.
• If the primary is neither sending nor receiving data, it indicates that the link is
available.
• If primary has something to send then primary can not directly send the data
because whether the destination is prepared or not to receive the data is not
known to primary.
• So the primary must alert to the secondary (i.e. destination) about the
upcoming transmission and wait for an acknowledgment of the secondary's
ready status.
• Before sending data, the primary creates and transmits a select (SEL) frame,
which also includes the address of the intended secondary.
Poll:-
• The poll function is used by the primary device for asking to the secondary devices
about transmissions of data.
• When the primary is ready to receive data, it must ask (poll) each device is you
have a data to send or not.
• If any secondary does not have data to send, then it responds with a NAK frame
• If the response is negative (a NAK frame), then the primary polls the next
secondary in the same manner until it finds one of the secondary with data to
send.
• If any secondary has data to send then the primary reads the frame and returns
an acknowledgment (ACK frame) & verifying its receipt.
Efficiency:
Let Tpoll be the time for polling and Tt be the time required for transmission of data.
Then,
Efficiency = Tt/ (Tt+ Tpoll)
3. Token Passing
• A station is authorized to send the data whenever it receives special frame called
token.
• So token get passed to every station in some fixed order.
• When node/station receives the token, then it holds token if that station has data
to transmit otherwise it will immediately forward the token to next station.
• If station has data and it holds the token, then station set ups the frames to
transmit it and forward the token to next node.
• In token there is no master node that means it follows the decentralized
approached in sequence hence it is highly efficient in terms of collision.
• But it has problem of failure of node.
• That means if node get fails or neglects to passed the token to another node then
entire channel get crashed.
• Then some recovery procedures must be used to get back the token into
circulation.
fig. Logical ring and physical topology in token-passing access method
Performance of token ring can be concluded by 2 parameters:-
1. Delay, which is a measure of time between when a packet is ready and when it is
delivered.
So, the average time (delay) required to send a token to the next station = a/N.
Throughput:-
a = Tp/Tt
Where,
N = number of stations
Tp = propagation delay
Tt = transmission delay