Unit 2 (DCN) v1
Unit 2 (DCN) v1
Pure ALOHA
• In pure ALOHA, the stations transmit frames whenever they
have data to send.
• When two or more stations transmit simultaneously, there
is collision and the frames are destroyed.
• In pure ALOHA, whenever any station transmits a frame, it
expects the acknowledgement from the receiver.
• If acknowledgement is not received within specified time,
the station assumes that the frame (or acknowledgement)
has been destroyed.
• If the frame is destroyed because of collision the station
waits for a random amount of time and sends it again. This
waiting time must be random otherwise same frames will
collide again and again.
• Therefore pure ALOHA dictates that when time-out period
passes, each station must wait for a random amount of time
before re-sending its frame. This randomness will help avoid
more collisions.
• Figure shows an example of frame collisions in pure ALOHA.
Slotted ALOHA
• Slotted ALOHA was invented to improve the efficiency of
pure ALOHA as chances of collision in pure ALOHA are very
high.
• In slotted ALOHA, the time of the shared channel is divided
into discrete intervals called slots.
• The stations can send a frame only at the beginning of the
slot and only one frame is sent in each slot.
Controlled Access
Controlled access protocols ensure that only one device uses
the network at a time. Think of it like taking turns in a
conversation so everyone can speak without talking over
each other.
In this, the data is sent by that station which is approved by
all other stations.
The three controlled-access methods are:
Reservation
Polling
Token Passing
Channelization
In this, the available bandwidth of the link is shared in time,
frequency and code to multiple stations to access channel
simultaneously.
Frequency Division Multiple Access (FDMA): The available
bandwidth is divided into separate bands, each allocated to a
different station. Guard bands are added to prevent overlap,
reducing crosstalk and noise.
Time Division Multiple Access (TDMA): The bandwidth is
shared by dividing time into slots, with each station assigned
a specific slot for data transmission. Synchronization
overhead is managed by adding synchronization bits, and
guard bands address propagation delays.
Code Division Multiple Access (CDMA): All transmissions
share the same channel simultaneously, using different codes
(like languages) to differentiate between signals. This allows
multiple stations to transmit simultaneously without dividing
bandwidth or time.
Orthogonal Frequency Division Multiple Access (OFDMA):
The available bandwidth is split into small subcarriers to
improve performance. Data is transmitted through these
subcarriers, making it a key technology in 5G networks.
Features of Multiple Access Protocols
Contention-Based Access: Multiple access protocols are
typically contention-based, meaning that multiple
devices compete for access to the communication
channel. This can lead to collisions if two or more
devices transmit at the same time, which can result in
data loss and decreased network performance.
Carrier Sense Multiple Access (CSMA): CSMA is a widely
used multiple access protocol in which devices listen for
carrier signals on the communication channel before
transmitting. If a carrier signal is detected, the device
waits for a random amount of time before attempting to
transmit to reduce the likelihood of collisions.
Collision Detection (CD): CD is a feature of some
multiple access protocols that allows devices to detect
when a collision has occurred and take appropriate
action, such as backing off and retrying the transmission.
Collision Avoidance (CA): CA is a feature of some
multiple access protocols that attempts to avoid
collisions by assigning time slots to devices for
transmission.
Token Passing: Token passing is a multiple access
protocol in which devices pass a special token between
each other to gain access to the communication
channel. Devices can only transmit data when they hold
the token, which ensures that only one device can
transmit at a time.
Bandwidth Utilization: Multiple access protocols can
affect the overall bandwidth utilization of a network. For
example, contention-based protocols may result in lower
bandwidth utilization due to collisions, while token
passing protocols may result in higher bandwidth
utilization due to the controlled access to the
communication channel.
In the IEEE 802 reference model of computer networking,
the logical link control (LLC) data communication
protocol layer is the upper sublayer of the data link
layer (layer 2) of the seven-layer OSI model. The LLC sublayer
acts as an interface between the medium access
control (MAC) sublayer and the network layer.
A MAC address consists of six hexadecimal numbers. The
highest possible hexadecimal number is FF:FF:FF:FF:FF:FF,
which is a broadcast address. The first three bytes contain a
manufacturer code and the last three bytes contain a unique
station ID. You can view the MAC address on most systems
with the following commands.
Windows ME, 9x: winipcfg (navigate the graphical user
interface (GUI) to find the MAC address)
Windows NT, XP, Vista, 2000, 2003, 2008: ipconfig/all
Data Link
The Data Link layer, also known as Layer 2, starts moving
towards more logical concepts versus the physical
layer below it.
These concepts include identifying individual systems on a
network based on some form of addressing scheme,
definitions of how packets of data should be formed for
network communications, and how the integrity of the
communication should be maintained through error
correction routines. The Data Link layer has two
sublayers, logical link control (LLC) and media access
control (MAC).
Media Access Control
The MAC sublayer is the interface between the Physical
layer and the LLC sublayer. At this sublayer, every device is
assigned an address. In today’s common use, this is a MAC
address. On any given network, each device must have a
unique MAC address that can be factory set when the device
is manufactured or set manually.
Logical Link Control
The LLC is the Data Link layer closest to the Network layer.
The LLC header will contain the protocol stack of the
packet. For example, if you are on a TCP/IP (Transmission
Control Protocol/Internet Protocol) network and request
access to a resource, the LLC sublayer will identify that
the Network layer protocol being used is IP.