SlideShare a Scribd company logo
1 of 53
Multiple Access
Komunikasi Data

Adapted from lecture slides by Behrouz A. Forouzan
© The McGraw-Hill Companies, Inc. All rights reserved

Anhar, ST., MT
anhar19@gmail.com
http://anhar.staff.unri.ac.id
Jurusan Teknik Elektro
Univ. Riau
Outline





Multiple access mechanisms
Random access
Controlled access
Channelization

2
Data Link Layer
Sublayers of Data Link
Layer

4
Multiple Access Links and
Protocols
Three types of “links”:
 Point-to-point (single wire, e.g. PPP,
SLIP)
 Broadcast (shared wire or medium; e.g,
Ethernet, WiFi/WaveLAN, etc.)



Switched (e.g., switched Ethernet, ATM etc)
Multiple access problem





Example:
Classroom– many people gather together in a
large room
Broadcast medium – air
Human protocols:







“Give everyone a chance to speak”
“Don’t speak until you are spoken to”
“Don’t monopolize the conversation”
“Raise your hand if you have a question”
“Don’t interrupt when someone is speaking”
“Don’t fall asleep when someone else is talking”
Multiple access protocols







In LANs, WiFi, satellite networks
If more than 2 users send @ the same time collision
All collided packets are lost -> waste of bandwidth
Ideally, the MAC protocol for a broadcast channel
with the bit-rate R bps should satisfy:






if only 1 node is sending than the throughput is R
when M nodes have data to send than the throughput is
R/M
decentralized protocol – no master
simple & inexpensive to implement
MAC Protocols: Taxonomy

Three broad classes:
 Channel Partitioning






Random Access





divide channel into smaller “pieces” (time slots,
frequency)
allocate piece to node for exclusive use
allow collisions
“recover” from collisions

“Taking turns”


tightly coordinate shared access to avoid
collisions
Goal: efficient, fair, simple, decentralized
Multiple Access
Mechanisms

9
Random Access
Random Access



Also called contention-based access
No station is assigned to control another

11
Random Access Protocols


In random access or contention methods,
no station is superior to another station
and none is assigned the control over
another. No station permits, or does not
permit, another station to send. At each
instance, a station that has data to send
uses a procedure defined by the protocol
to make a decision on whether or not to
send.
Random Access




1.
2.
3.

4.

If more than one station wants to send,
there is an access conflict -- Collision—
To avoid access conflict each station has
to follow procedure that will answers the
following questions:
When can the station access the medium?
What can the station do if the medium is busy?
How can the station determine the success or failure of the
transmission
What can the station do if there is an access conflict?
ALOHA Network


Developed by Norm Abramson at the Univ. of Hawaii




the guy had interest in surfing and packet switching
mountainous islands → land-based network difficult to install
fully decentralized protocol

ACK
ACK

ACK
ACK
Frames in Pure ALOHA

15
ALOHA Protocol

16
Example


Calculate possible values of TB, when
stations on an ALOHA network are a
maximum of 600 km apart
Tp = (600 × 103) / (3 × 108) = 2 ms



When K=1, TB ∈ {0ms,2ms}



When K=2, TB ∈ {0ms,2ms,4ms,6ms}



:
17
ALOHA: Vulnerable Time

18
ALOHA: Throughput






Assume number of stations trying to
transmit follow Poisson Distribution
The throughput for pure ALOHA is
S = G × e−2G
where G is the average number of frames
requested per frame-time
The maximum throughput


Smax = 0.184 when G= 1/2

19
Example


A pure ALOHA network transmits 200-bit
frames on a shared channel of 200 kbps.
What is the throughput if the system (all
stations together) produces




1000 frames per second
500 frames per second
250 frames per second

20
Slotted ALOHA

21
Slotted ALOHA: Vulnerable Time

22
Slotted ALOHA:
Throughput


The throughput for Slotted ALOHA is
S = G × e−G



where G is the average number of frames
requested per frame-time
The maximum throughput


Smax = 0.368 when G= 1
23
Example


A Slotted ALOHA network transmits 200bit frames on a shared channel of 200
kbps. What is the throughput if the system
(all stations together) produces




1000 frames per second
500 frames per second
250 frames per second

24
Multiple Access Protocols

ALOHA
CSMA


C arrier S ense M ultiple A ccess




"Listen before talk"

Reduce the possibility of collision


But cannot completely eliminate it

26
Collision in CSMA

27
CSMA: Vulnerable Time

28
Persistence Methods


What a station does when channel is idle or busy

29
Persistence Methods

30
CSMA/CD




C arrier S ense M ultiple A ccess with
C ollision D etection
Station monitors channel when sending a
frame

31
Carrier Sensing Multiple Access with
Collision detection (CSMA-CD)


Jika station dp mengetahui apakah collision terjadi,
maka bandwith yang terbuang dpt dikurangi dengan
menghentikan transmisi
Carrier Sensing Multiple Access with
Collision detection (CSMA-CD)
Carrier Sensing Multiple Access with
Collision detection (CSMA-CD)






Station yang mempunyai paket mendeteksi kanal dan
transmit jika kanal idle
Jika kanal sibuk, gunakan strategi dari CSMA (persist,
backoff segera atau persist dengan prob. p)
Jika collision terdeteksi saat transmisi, sinyal short
jamming ditransmisikan untuk meyakinkan semua
station mengetahui terjadi collision sebelum
menghentikan transmisi, selanjutnya algoritma backoff
digunakan untuk rescheduling waktu resensing
Carrier Sensing Multiple Access with
Collision detection (CSMA-CD)


Kanal mempunyai 3 kondisi (state):








sibuk mentransmisikan frame
idle
perioda contention (dimana station berusaha menduduki kanal)

Throughput 1-Persistent CSMA-CD dapat dianalisa dg
asumsi waktu dibagi dalam minislot sebesar 2tprop det
(untuk menjamin station selalu dapat mendeteksi
collision)
Setiap kanal menjadi idle, station memperebutkan
(contend) kanal dengan transmit dan mendengar untuk
mengetahui apakah sukses menduduki kanal
CSMA/CD: Minimum Frame Size




Each frame must be large enough for a sender
to detect a collision
Worst case scenario:



"A" is transmitting
"D" starts transmitting just before A's signal arrives
A

B

C

D

Long enough to
hear colliding signal
from D

36
Example


A CSMA/CD network has a bandwidth of
10 Mbps. If the maximum propagation
time is 25.6 μs, what is the minimum size
of the frame?

37
CSMA/CD: Flow Diagram

38
Multiple Access Protocols

ALOHA
CSMA/CA




C arrier S ense M ultiple A ccess with
C ollision A voidance
Used in a network where collision cannot
be detected


E.g., wireless LAN

IFS – Interframe Space
40
CSMA/ CA
In wireless networks collision is avoided.
 Collisions are avoided through following
strategies:
1. Interframe Space
2. Contention Window
3. Acknowledgment

CSMA/CA: Flow Diagram

contention window
size is 2K-1

After each slot:
- If idle, continue counting
- If busy, stop counting

42
Controlled Access
Control Access




A station must be authorized by someone
(e.g., other stations) before transmitting
Three common methods:




Reservation
Polling
Token passing

44
Reservation




A station must make a reservation before sending
data
Time is divided into intervals





A reservation frame proceeds each time interval
Number of stations and number of time slots in the
reservation frame are equal
Each time slot belongs to a particular station
Polling


Devises are categorized into:








All data exchange must go through the primary station
Primary station controls the link and initiates the session
Secondary station obey the instructions of PS.
PS polls stations




Primary station (PS)
Secondary station (SS)

Asking SS if they have something to send

PS select a SS


Telling it to get ready to receive data
Poll procedure
Select procedure
Token passing










the stations in a network are organized in a logical ring
for each station, there is a predecessor and a successor
for a station to access the channel, it must posses a token
(special packet) that gives the station the right to access the
channel and send its data
once the station has finished its task, the token will then be
passed to the successor (next station)
the station cannot send data until it receives the token again in
the next round
token management is necessary





Every station is limited in the time of token possession
Token must be monitored to ensure no lose or destroyed
Assign priorities to the stations and to the types of data transmitted
To make low-priority stations release the token to high priority stations
Token Passing procedure
Token passing


Logical Ring


in a token passing network, stations do not have to be physically connected
in a ring; the ring can be a logical one.
Channelization
Channelization



Similar to multiplexing
Three schemes




Frequency-Division Multiple Access (FDMA)
Time-Division Multiple Access (TDMA)
Code-Division Multiple Access (CDMA)

53

More Related Content

What's hot

Multiple Access in Computer Network
Multiple Access in Computer NetworkMultiple Access in Computer Network
Multiple Access in Computer NetworkHitesh Mohapatra
 
CSMA /CD PPT ON SLIDESHARE
CSMA /CD PPT ON SLIDESHARECSMA /CD PPT ON SLIDESHARE
CSMA /CD PPT ON SLIDESHAREKhushboo Pal
 
Mobile transport layer .
Mobile transport layer .Mobile transport layer .
Mobile transport layer .junnubabu
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)k33a
 
User datagram protocol (udp)
User datagram protocol (udp)User datagram protocol (udp)
User datagram protocol (udp)Ramola Dhande
 
Topology,Switching and Routing
Topology,Switching and RoutingTopology,Switching and Routing
Topology,Switching and RoutingAnushiya Ram
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSDr. SELVAGANESAN S
 
Csma(carriers sense-multiple-acess)
Csma(carriers sense-multiple-acess) Csma(carriers sense-multiple-acess)
Csma(carriers sense-multiple-acess) Rajan Kandel
 
Asynchronous Transfer Mode
Asynchronous Transfer ModeAsynchronous Transfer Mode
Asynchronous Transfer ModeNishant Munjal
 
TCP - Transmission Control Protocol
TCP - Transmission Control ProtocolTCP - Transmission Control Protocol
TCP - Transmission Control ProtocolPeter R. Egli
 
Qos Quality of services
Qos   Quality of services Qos   Quality of services
Qos Quality of services HayderThary
 
IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11Keshav Maheshwari
 

What's hot (20)

Data link layer
Data link layer Data link layer
Data link layer
 
CSMA/CA
CSMA/CACSMA/CA
CSMA/CA
 
Multiple Access in Computer Network
Multiple Access in Computer NetworkMultiple Access in Computer Network
Multiple Access in Computer Network
 
CSMA /CD PPT ON SLIDESHARE
CSMA /CD PPT ON SLIDESHARECSMA /CD PPT ON SLIDESHARE
CSMA /CD PPT ON SLIDESHARE
 
Chap 8 switching
Chap 8 switchingChap 8 switching
Chap 8 switching
 
The medium access sublayer
 The medium  access sublayer The medium  access sublayer
The medium access sublayer
 
Icmp
IcmpIcmp
Icmp
 
Mobile transport layer .
Mobile transport layer .Mobile transport layer .
Mobile transport layer .
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
 
User datagram protocol (udp)
User datagram protocol (udp)User datagram protocol (udp)
User datagram protocol (udp)
 
Csma cd and csma-ca
Csma cd and csma-caCsma cd and csma-ca
Csma cd and csma-ca
 
Data link layer
Data link layerData link layer
Data link layer
 
Topology,Switching and Routing
Topology,Switching and RoutingTopology,Switching and Routing
Topology,Switching and Routing
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
 
Csma(carriers sense-multiple-acess)
Csma(carriers sense-multiple-acess) Csma(carriers sense-multiple-acess)
Csma(carriers sense-multiple-acess)
 
Asynchronous Transfer Mode
Asynchronous Transfer ModeAsynchronous Transfer Mode
Asynchronous Transfer Mode
 
Spanning tree protocol
Spanning tree protocolSpanning tree protocol
Spanning tree protocol
 
TCP - Transmission Control Protocol
TCP - Transmission Control ProtocolTCP - Transmission Control Protocol
TCP - Transmission Control Protocol
 
Qos Quality of services
Qos   Quality of services Qos   Quality of services
Qos Quality of services
 
IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11
 

Viewers also liked

Multiple access control protocol
Multiple access control protocol Multiple access control protocol
Multiple access control protocol meenamunesh
 
ALOHA Protocol (in detail)
ALOHA Protocol (in detail)ALOHA Protocol (in detail)
ALOHA Protocol (in detail)Hinal Lunagariya
 
Controlled Access Protocols
Controlled Access ProtocolsControlled Access Protocols
Controlled Access ProtocolsPruthviraj Konu
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocaltes31
 
Introduction To Wireless Fading Channels
Introduction To Wireless Fading ChannelsIntroduction To Wireless Fading Channels
Introduction To Wireless Fading ChannelsNitin Jain
 
Francesco Varanini Information & Comminication Technology iCT come leva strat...
Francesco Varanini Information & Comminication Technology iCT come leva strat...Francesco Varanini Information & Comminication Technology iCT come leva strat...
Francesco Varanini Information & Comminication Technology iCT come leva strat...Francesco Varanini
 
Pure Aloha and Slotted Aloha
Pure Aloha and Slotted AlohaPure Aloha and Slotted Aloha
Pure Aloha and Slotted AlohaChun-Kang Luo
 
C07 wireless la-ns
C07 wireless la-nsC07 wireless la-ns
C07 wireless la-nsRio Nguyen
 
seminar report on multiple access control protocol submitted by munesh
seminar report on multiple access control protocol submitted by munesh seminar report on multiple access control protocol submitted by munesh
seminar report on multiple access control protocol submitted by munesh meenamunesh
 
Carrier Sense Multiple Access (CSMA)
Carrier Sense Multiple Access (CSMA)Carrier Sense Multiple Access (CSMA)
Carrier Sense Multiple Access (CSMA)Mohammed Abuibaid
 

Viewers also liked (20)

Multiple access control protocol
Multiple access control protocol Multiple access control protocol
Multiple access control protocol
 
Aloha
AlohaAloha
Aloha
 
ALOHA Protocol (in detail)
ALOHA Protocol (in detail)ALOHA Protocol (in detail)
ALOHA Protocol (in detail)
 
Controlled Access Protocols
Controlled Access ProtocolsControlled Access Protocols
Controlled Access Protocols
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
 
Introduction To Wireless Fading Channels
Introduction To Wireless Fading ChannelsIntroduction To Wireless Fading Channels
Introduction To Wireless Fading Channels
 
CSMA/CA
CSMA/CACSMA/CA
CSMA/CA
 
csma ca
 csma ca csma ca
csma ca
 
Francesco Varanini Information & Comminication Technology iCT come leva strat...
Francesco Varanini Information & Comminication Technology iCT come leva strat...Francesco Varanini Information & Comminication Technology iCT come leva strat...
Francesco Varanini Information & Comminication Technology iCT come leva strat...
 
Plc basics
Plc basicsPlc basics
Plc basics
 
Tugas kelompok jarkom
Tugas kelompok jarkomTugas kelompok jarkom
Tugas kelompok jarkom
 
Lecture 13
Lecture 13Lecture 13
Lecture 13
 
Pure Aloha and Slotted Aloha
Pure Aloha and Slotted AlohaPure Aloha and Slotted Aloha
Pure Aloha and Slotted Aloha
 
Ch13
Ch13Ch13
Ch13
 
Csmaca
CsmacaCsmaca
Csmaca
 
Ch 13
Ch 13Ch 13
Ch 13
 
C07 wireless la-ns
C07 wireless la-nsC07 wireless la-ns
C07 wireless la-ns
 
seminar report on multiple access control protocol submitted by munesh
seminar report on multiple access control protocol submitted by munesh seminar report on multiple access control protocol submitted by munesh
seminar report on multiple access control protocol submitted by munesh
 
Carrier Sense Multiple Access (CSMA)
Carrier Sense Multiple Access (CSMA)Carrier Sense Multiple Access (CSMA)
Carrier Sense Multiple Access (CSMA)
 
Ch12
Ch12Ch12
Ch12
 

Similar to 9 multiple access

M.A.C (Medium Access Control)
M.A.C (Medium Access Control)M.A.C (Medium Access Control)
M.A.C (Medium Access Control)JaironLanda
 
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptxComputer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptxPravinbhargav
 
Network Topologies
Network TopologiesNetwork Topologies
Network TopologiesJason Hando
 
Media Access Control (MAC Layer)
Media Access Control (MAC Layer)Media Access Control (MAC Layer)
Media Access Control (MAC Layer)Meenakshi Paul
 
16 high speedla-ns
16 high speedla-ns16 high speedla-ns
16 high speedla-nsMayur Garg
 
16 high speedla-ns
16 high speedla-ns16 high speedla-ns
16 high speedla-nsMayur Garg
 
Unit-2 Media Access Protocols.pdf
Unit-2 Media Access Protocols.pdfUnit-2 Media Access Protocols.pdf
Unit-2 Media Access Protocols.pdfSmtPArunaKumari
 
WHAT IS MAC-1 presentation for information .pptx
WHAT IS MAC-1 presentation for information  .pptxWHAT IS MAC-1 presentation for information  .pptx
WHAT IS MAC-1 presentation for information .pptxSaqlainKhan39
 
Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...
Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...
Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...Soumen Santra
 
CN R16 -UNIT-4.pdf
CN R16 -UNIT-4.pdfCN R16 -UNIT-4.pdf
CN R16 -UNIT-4.pdfJoshuaeeda1
 
Multiple Access Methods
Multiple Access MethodsMultiple Access Methods
Multiple Access MethodsPrateek Soni
 

Similar to 9 multiple access (20)

MultipleAccess.ppt
MultipleAccess.pptMultipleAccess.ppt
MultipleAccess.ppt
 
M.A.C (Medium Access Control)
M.A.C (Medium Access Control)M.A.C (Medium Access Control)
M.A.C (Medium Access Control)
 
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptxComputer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptx
 
Network Topologies
Network TopologiesNetwork Topologies
Network Topologies
 
Wired Lan Ethernet - DATA Link Layer
Wired Lan Ethernet - DATA Link LayerWired Lan Ethernet - DATA Link Layer
Wired Lan Ethernet - DATA Link Layer
 
10 high speedla-ns
10 high speedla-ns10 high speedla-ns
10 high speedla-ns
 
Unit 1 mac vsd
Unit 1 mac vsdUnit 1 mac vsd
Unit 1 mac vsd
 
Unit 3 - Data Link Layer - Part B
Unit 3 - Data Link Layer - Part BUnit 3 - Data Link Layer - Part B
Unit 3 - Data Link Layer - Part B
 
Media Access Control (MAC Layer)
Media Access Control (MAC Layer)Media Access Control (MAC Layer)
Media Access Control (MAC Layer)
 
16 high speedla-ns
16 high speedla-ns16 high speedla-ns
16 high speedla-ns
 
16 high speedla-ns
16 high speedla-ns16 high speedla-ns
16 high speedla-ns
 
Mac
MacMac
Mac
 
kamalaveni.ppt
kamalaveni.pptkamalaveni.ppt
kamalaveni.ppt
 
Unit-2 Media Access Protocols.pdf
Unit-2 Media Access Protocols.pdfUnit-2 Media Access Protocols.pdf
Unit-2 Media Access Protocols.pdf
 
aloha
alohaaloha
aloha
 
dcn.pdf
dcn.pdfdcn.pdf
dcn.pdf
 
WHAT IS MAC-1 presentation for information .pptx
WHAT IS MAC-1 presentation for information  .pptxWHAT IS MAC-1 presentation for information  .pptx
WHAT IS MAC-1 presentation for information .pptx
 
Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...
Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...
Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...
 
CN R16 -UNIT-4.pdf
CN R16 -UNIT-4.pdfCN R16 -UNIT-4.pdf
CN R16 -UNIT-4.pdf
 
Multiple Access Methods
Multiple Access MethodsMultiple Access Methods
Multiple Access Methods
 

More from ampas03

Digital 131341 t 27623-analisis kualitas-tinjauan literatur
Digital 131341 t 27623-analisis kualitas-tinjauan literaturDigital 131341 t 27623-analisis kualitas-tinjauan literatur
Digital 131341 t 27623-analisis kualitas-tinjauan literaturampas03
 
Dasar telekomunikasi
Dasar telekomunikasiDasar telekomunikasi
Dasar telekomunikasiampas03
 
komunikasi serat optik
komunikasi serat optikkomunikasi serat optik
komunikasi serat optikampas03
 
Serat Optik
Serat OptikSerat Optik
Serat Optikampas03
 
Network layer m6
Network layer m6Network layer m6
Network layer m6ampas03
 
Materi s-parameter
Materi s-parameterMateri s-parameter
Materi s-parameterampas03
 
Matching impedance
Matching impedanceMatching impedance
Matching impedanceampas03
 
Makalah phase shift keying
Makalah phase shift keyingMakalah phase shift keying
Makalah phase shift keyingampas03
 
Jaringan dan teknologi fiber opti kkkkkkk
Jaringan dan teknologi fiber opti kkkkkkkJaringan dan teknologi fiber opti kkkkkkk
Jaringan dan teknologi fiber opti kkkkkkkampas03
 
Datalink layer m5
Datalink layer m5Datalink layer m5
Datalink layer m5ampas03
 
Bounce diagram technique
Bounce diagram techniqueBounce diagram technique
Bounce diagram techniqueampas03
 
Bahan presentasi
Bahan presentasiBahan presentasi
Bahan presentasiampas03
 
Bab 4 perkembangan dan kemajuan sistem komunikasi bergerak
Bab 4 perkembangan dan kemajuan sistem komunikasi bergerakBab 4 perkembangan dan kemajuan sistem komunikasi bergerak
Bab 4 perkembangan dan kemajuan sistem komunikasi bergerakampas03
 
Bab 3 konsep sistem komunikasi bergerak
Bab 3 konsep sistem komunikasi bergerakBab 3 konsep sistem komunikasi bergerak
Bab 3 konsep sistem komunikasi bergerakampas03
 
Bab 2 arsitektur sistem komunikasi bergerak
Bab 2 arsitektur sistem komunikasi bergerakBab 2 arsitektur sistem komunikasi bergerak
Bab 2 arsitektur sistem komunikasi bergerakampas03
 
Bab 1 pendahuluan
Bab 1 pendahuluanBab 1 pendahuluan
Bab 1 pendahuluanampas03
 
10 wired lan
10 wired lan10 wired lan
10 wired lanampas03
 
10 hub bridgeswitch
10 hub bridgeswitch10 hub bridgeswitch
10 hub bridgeswitchampas03
 
5 multiplexing dan media transmisi(1)
5 multiplexing dan media transmisi(1)5 multiplexing dan media transmisi(1)
5 multiplexing dan media transmisi(1)ampas03
 

More from ampas03 (20)

Digital 131341 t 27623-analisis kualitas-tinjauan literatur
Digital 131341 t 27623-analisis kualitas-tinjauan literaturDigital 131341 t 27623-analisis kualitas-tinjauan literatur
Digital 131341 t 27623-analisis kualitas-tinjauan literatur
 
Dasar telekomunikasi
Dasar telekomunikasiDasar telekomunikasi
Dasar telekomunikasi
 
komunikasi serat optik
komunikasi serat optikkomunikasi serat optik
komunikasi serat optik
 
Serat Optik
Serat OptikSerat Optik
Serat Optik
 
Network layer m6
Network layer m6Network layer m6
Network layer m6
 
Materi s-parameter
Materi s-parameterMateri s-parameter
Materi s-parameter
 
Matching impedance
Matching impedanceMatching impedance
Matching impedance
 
Makalah phase shift keying
Makalah phase shift keyingMakalah phase shift keying
Makalah phase shift keying
 
Komdat
KomdatKomdat
Komdat
 
Jaringan dan teknologi fiber opti kkkkkkk
Jaringan dan teknologi fiber opti kkkkkkkJaringan dan teknologi fiber opti kkkkkkk
Jaringan dan teknologi fiber opti kkkkkkk
 
Datalink layer m5
Datalink layer m5Datalink layer m5
Datalink layer m5
 
Bounce diagram technique
Bounce diagram techniqueBounce diagram technique
Bounce diagram technique
 
Bahan presentasi
Bahan presentasiBahan presentasi
Bahan presentasi
 
Bab 4 perkembangan dan kemajuan sistem komunikasi bergerak
Bab 4 perkembangan dan kemajuan sistem komunikasi bergerakBab 4 perkembangan dan kemajuan sistem komunikasi bergerak
Bab 4 perkembangan dan kemajuan sistem komunikasi bergerak
 
Bab 3 konsep sistem komunikasi bergerak
Bab 3 konsep sistem komunikasi bergerakBab 3 konsep sistem komunikasi bergerak
Bab 3 konsep sistem komunikasi bergerak
 
Bab 2 arsitektur sistem komunikasi bergerak
Bab 2 arsitektur sistem komunikasi bergerakBab 2 arsitektur sistem komunikasi bergerak
Bab 2 arsitektur sistem komunikasi bergerak
 
Bab 1 pendahuluan
Bab 1 pendahuluanBab 1 pendahuluan
Bab 1 pendahuluan
 
10 wired lan
10 wired lan10 wired lan
10 wired lan
 
10 hub bridgeswitch
10 hub bridgeswitch10 hub bridgeswitch
10 hub bridgeswitch
 
5 multiplexing dan media transmisi(1)
5 multiplexing dan media transmisi(1)5 multiplexing dan media transmisi(1)
5 multiplexing dan media transmisi(1)
 

Recently uploaded

Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 

9 multiple access

  • 1. Multiple Access Komunikasi Data Adapted from lecture slides by Behrouz A. Forouzan © The McGraw-Hill Companies, Inc. All rights reserved Anhar, ST., MT anhar19@gmail.com http://anhar.staff.unri.ac.id Jurusan Teknik Elektro Univ. Riau
  • 2. Outline     Multiple access mechanisms Random access Controlled access Channelization 2
  • 4. Sublayers of Data Link Layer 4
  • 5. Multiple Access Links and Protocols Three types of “links”:  Point-to-point (single wire, e.g. PPP, SLIP)  Broadcast (shared wire or medium; e.g, Ethernet, WiFi/WaveLAN, etc.)  Switched (e.g., switched Ethernet, ATM etc)
  • 6. Multiple access problem     Example: Classroom– many people gather together in a large room Broadcast medium – air Human protocols:       “Give everyone a chance to speak” “Don’t speak until you are spoken to” “Don’t monopolize the conversation” “Raise your hand if you have a question” “Don’t interrupt when someone is speaking” “Don’t fall asleep when someone else is talking”
  • 7. Multiple access protocols     In LANs, WiFi, satellite networks If more than 2 users send @ the same time collision All collided packets are lost -> waste of bandwidth Ideally, the MAC protocol for a broadcast channel with the bit-rate R bps should satisfy:     if only 1 node is sending than the throughput is R when M nodes have data to send than the throughput is R/M decentralized protocol – no master simple & inexpensive to implement
  • 8. MAC Protocols: Taxonomy Three broad classes:  Channel Partitioning    Random Access    divide channel into smaller “pieces” (time slots, frequency) allocate piece to node for exclusive use allow collisions “recover” from collisions “Taking turns”  tightly coordinate shared access to avoid collisions Goal: efficient, fair, simple, decentralized
  • 11. Random Access   Also called contention-based access No station is assigned to control another 11
  • 12. Random Access Protocols  In random access or contention methods, no station is superior to another station and none is assigned the control over another. No station permits, or does not permit, another station to send. At each instance, a station that has data to send uses a procedure defined by the protocol to make a decision on whether or not to send.
  • 13. Random Access   1. 2. 3. 4. If more than one station wants to send, there is an access conflict -- Collision— To avoid access conflict each station has to follow procedure that will answers the following questions: When can the station access the medium? What can the station do if the medium is busy? How can the station determine the success or failure of the transmission What can the station do if there is an access conflict?
  • 14. ALOHA Network  Developed by Norm Abramson at the Univ. of Hawaii    the guy had interest in surfing and packet switching mountainous islands → land-based network difficult to install fully decentralized protocol ACK ACK ACK ACK
  • 15. Frames in Pure ALOHA 15
  • 17. Example  Calculate possible values of TB, when stations on an ALOHA network are a maximum of 600 km apart Tp = (600 × 103) / (3 × 108) = 2 ms  When K=1, TB ∈ {0ms,2ms}  When K=2, TB ∈ {0ms,2ms,4ms,6ms}  : 17
  • 19. ALOHA: Throughput    Assume number of stations trying to transmit follow Poisson Distribution The throughput for pure ALOHA is S = G × e−2G where G is the average number of frames requested per frame-time The maximum throughput  Smax = 0.184 when G= 1/2 19
  • 20. Example  A pure ALOHA network transmits 200-bit frames on a shared channel of 200 kbps. What is the throughput if the system (all stations together) produces    1000 frames per second 500 frames per second 250 frames per second 20
  • 23. Slotted ALOHA: Throughput  The throughput for Slotted ALOHA is S = G × e−G  where G is the average number of frames requested per frame-time The maximum throughput  Smax = 0.368 when G= 1 23
  • 24. Example  A Slotted ALOHA network transmits 200bit frames on a shared channel of 200 kbps. What is the throughput if the system (all stations together) produces    1000 frames per second 500 frames per second 250 frames per second 24
  • 26. CSMA  C arrier S ense M ultiple A ccess   "Listen before talk" Reduce the possibility of collision  But cannot completely eliminate it 26
  • 29. Persistence Methods  What a station does when channel is idle or busy 29
  • 31. CSMA/CD   C arrier S ense M ultiple A ccess with C ollision D etection Station monitors channel when sending a frame 31
  • 32. Carrier Sensing Multiple Access with Collision detection (CSMA-CD)  Jika station dp mengetahui apakah collision terjadi, maka bandwith yang terbuang dpt dikurangi dengan menghentikan transmisi
  • 33. Carrier Sensing Multiple Access with Collision detection (CSMA-CD)
  • 34. Carrier Sensing Multiple Access with Collision detection (CSMA-CD)    Station yang mempunyai paket mendeteksi kanal dan transmit jika kanal idle Jika kanal sibuk, gunakan strategi dari CSMA (persist, backoff segera atau persist dengan prob. p) Jika collision terdeteksi saat transmisi, sinyal short jamming ditransmisikan untuk meyakinkan semua station mengetahui terjadi collision sebelum menghentikan transmisi, selanjutnya algoritma backoff digunakan untuk rescheduling waktu resensing
  • 35. Carrier Sensing Multiple Access with Collision detection (CSMA-CD)  Kanal mempunyai 3 kondisi (state):      sibuk mentransmisikan frame idle perioda contention (dimana station berusaha menduduki kanal) Throughput 1-Persistent CSMA-CD dapat dianalisa dg asumsi waktu dibagi dalam minislot sebesar 2tprop det (untuk menjamin station selalu dapat mendeteksi collision) Setiap kanal menjadi idle, station memperebutkan (contend) kanal dengan transmit dan mendengar untuk mengetahui apakah sukses menduduki kanal
  • 36. CSMA/CD: Minimum Frame Size   Each frame must be large enough for a sender to detect a collision Worst case scenario:   "A" is transmitting "D" starts transmitting just before A's signal arrives A B C D Long enough to hear colliding signal from D 36
  • 37. Example  A CSMA/CD network has a bandwidth of 10 Mbps. If the maximum propagation time is 25.6 μs, what is the minimum size of the frame? 37
  • 40. CSMA/CA   C arrier S ense M ultiple A ccess with C ollision A voidance Used in a network where collision cannot be detected  E.g., wireless LAN IFS – Interframe Space 40
  • 41. CSMA/ CA In wireless networks collision is avoided.  Collisions are avoided through following strategies: 1. Interframe Space 2. Contention Window 3. Acknowledgment 
  • 42. CSMA/CA: Flow Diagram contention window size is 2K-1 After each slot: - If idle, continue counting - If busy, stop counting 42
  • 44. Control Access   A station must be authorized by someone (e.g., other stations) before transmitting Three common methods:    Reservation Polling Token passing 44
  • 45. Reservation   A station must make a reservation before sending data Time is divided into intervals    A reservation frame proceeds each time interval Number of stations and number of time slots in the reservation frame are equal Each time slot belongs to a particular station
  • 46. Polling  Devises are categorized into:       All data exchange must go through the primary station Primary station controls the link and initiates the session Secondary station obey the instructions of PS. PS polls stations   Primary station (PS) Secondary station (SS) Asking SS if they have something to send PS select a SS  Telling it to get ready to receive data
  • 49. Token passing       the stations in a network are organized in a logical ring for each station, there is a predecessor and a successor for a station to access the channel, it must posses a token (special packet) that gives the station the right to access the channel and send its data once the station has finished its task, the token will then be passed to the successor (next station) the station cannot send data until it receives the token again in the next round token management is necessary     Every station is limited in the time of token possession Token must be monitored to ensure no lose or destroyed Assign priorities to the stations and to the types of data transmitted To make low-priority stations release the token to high priority stations
  • 51. Token passing  Logical Ring  in a token passing network, stations do not have to be physically connected in a ring; the ring can be a logical one.
  • 53. Channelization   Similar to multiplexing Three schemes    Frequency-Division Multiple Access (FDMA) Time-Division Multiple Access (TDMA) Code-Division Multiple Access (CDMA) 53