CN Unit 3
CN Unit 3
CN Unit 3
Random Access
In this protocol, all the station has the equal priority to send the data over a
channel.
In random access protocol, one or more stations cannot depend on another station
All station send a data simultaneously
Flow chart of CSMA/CD
CSMA/CA
It is a carrier sense multiple access/collision avoidance network protocol
for carrier transmission of data frames
It is a protocol that works with a medium access control layer.
When a data frame is sent to a channel, it receives an acknowledgment to
check whether the channel is clear. If the station receives only a single (own)
acknowledgments, that means the data frame has been successfully
transmitted to the receiver. But if it gets two signals (its own and one more in
which the collision of frames), a collision of the frame occurs in the shared
channel. Detects the collision of the frame when a sender receives an
acknowledgment signal.
Following are the methods used in the CSMA/ CA to avoid the collision:
Interframe space: In this method, the station waits for the channel to become idle,
and if it gets the channel is idle, it does not immediately send the data. Instead of
this, it waits for some time, and this time period is called the Interframe space or
IFS. However, the IFS time is often used to define the priority of the station.
Contention window: In the Contention window, the total time is divided into
different slots. When the station/ sender is ready to transmit the data frame, it
chooses a random slot number of slots as wait time. If the channel is still busy, it
does not restart the entire process, except that it restarts the timer only to send
data packets when the channel is inactive.
CONTROLLED ACCESS
In the Controlled access technique, all stations need to consult with one
another in order to find out which station has the right to send the data.
The controlled access protocols mainly grant permission to send only one
node at a time; thus in order to avoid the collisions among the shared
mediums.
No station can send the data unless it has been authorized by the other
stations.
The protocols lies under the category of Controlled access are as follows:
Example
2. Polling
The polling method mainly works with those topologies where one device is
designated as the primary station and the other device is designated as the
secondary station.
All the exchange of data must be made through the primary device even
though the final destination is the secondary device.
Thus to impose order on a network that is of independent users, and in order
to establish one station in the network that will act as a controller and
periodically polls all other stations is simply referred to as polling.
The Primary device mainly controls the link while the secondary device
follows the instructions of the primary device.
Therefore the primary device is always an initiator of the session.
Poll function
In case if primary devices want to receive the data, then it usually asks the
secondary devices if they have anything to send. This is commonly known
as Poll Function.
There is a poll function that is mainly used by the primary devices in order
to solicit transmissions from the secondary devices.
When the primary device is ready to receive the data then it
must ask(poll) each secondary device in turn if it has anything to send.
If the secondary device has data to transmit then it sends the data frame,
otherwise, it sends a negative acknowledgment (NAK).
After that in case of the negative response, the primary then polls the next
secondary, in the same manner until it finds the one with the data to send.
When the primary device received a positive response that means (a data
frame), then the primary devices reads the frame and then returns an
acknowledgment (ACK )frame,
Select Function
In case, if the primary device wants to send the data then it tells the
secondary devices in order to get ready to receive the data. This is commonly
known as the Select function.
Thus the select function is used by the primary device when it has
something to send.
We had already told you that the primary device always controls the link.
Before sending the data frame, a select (SEL ) frame is created and
transmitted by the primary device, and one field of the SEL frame includes
the address of the intended secondary.
The primary device alerts the secondary devices for the upcoming
transmission and after that wait for an acknowledgment (ACK) of the
secondary devices.
3. Token Passing
Channelization
Advantages of FDMA
This technique is efficient when the traffic is uniformly constant.
In case if the channel is not in use then it sits idle.
FDMA is simple algorithmically and the complexity is less.
For FDMA there is no restriction regarding the type of baseband or the type of
modulation.
Disadvantages of FDMA
By using FDMA, the maximum flow rate per channel is fixed and small.
In FDMA, the available bandwidth of the common channel is divided into bands
that are separated by guard bands.
CDMA technique differs from the FDMA and TDMA because only one channel
occupies the entire bandwidth of the link.
The CDMA technique simply means communication with different codes.
In the CDMA technique, there is only one channel that carries all the
transmission simultaneously.
The data from the different stations can be transmitted simultaneously but
using different code languages.
Advantages of CDMA
FDMA stands for TDMA stands for CDMA stands for Code
Frequency Division Time Division Division Multiple Access.
Multiple Access. Multiple Access.
The rate of data is low. The rate of data is The rate of data is high.
medium.
1. Standard Ethernet
2. Fast Ethernet
3. Gigabyte Ethernet
4.10 Gigabyte Ethernet
1. Standard Ethernet:
The Preamble consists of seven bytes all of the form 10101010, and is used by
the receiver to allow it to establish bit synchronization. It alert the receiving
system.
SFD it consist of 0’s and 1’s,it is start frame delimiter
Addressing
E.g.: 4A:30:10:21:10; 1A
Various types of address in Ethernet are Unicast, Multicast and broad cast
30:00110000 10:00010000
10:00010000 1A:00011010
Categories of Slandered Ethernet
1.10Base 5: In this implementation thick coaxial cable is used and length is 500m
2.10 Base 2: In this implementation thin coaxial cable is used and length is 185m
3.10 Base T: In this implementation 2 UTP cable is used and length is 100m
4.10 Base F: In this implementation 2 Fiber cable is used and length is 100m
Here 10 represent a Data rate, Base represent a digital signal and 5 represent a
length of the cable.
1.100Base TX: In this implementation 2 pair of UTP and STP cables are used and
length is 100m
2.100 Base FX: In this implementation 2 wire fiber cable is used and length is
185m
3.100 Base T4: In this implementation 4 wire UTP cable is used and length is
100m
Ethernet Protocol
The most popular and oldest LAN technology is Ethernet Protocol, so it is more
frequently used in LAN environments which are used in almost all networks like
offices, homes, public places, enterprises, and universities. Ethernet has gained
huge popularity because of its maximum rates over longer distances using optical
media.
Voice over Internet Protocol (VoIP), is a technology that allowing you to make
voice calls over a broadband Internet connection instead of an analog (regular)
phone line. Some VoIP services allow you to call people using the same service,
but others may allow you to call anyone. They can have a telephone number –
including local, long-distance, mobile, and international numbers or not. Some
VoIP services only work over your computer or a special VoIP phone while other
services allow you to use a traditional phone connected to a VoIP adapter.
How VoIP / Internet Voice Works – Voice is converted into a digital signal by
VoIP services that travel over the Internet. If the regular phone number is called,
the signal is converted to a regular telephone signal i.e. an analog signal before it
reaches the destination.
VoIP can allow you to make a call directly from a computer having a special VoIP
phone, or a traditional phone connected to a special adapter. Wireless hot spots in
locations such as airports, hospitals, cafes, etc allow you to connect to the
Internet and can enable you to use VoIP service wirelessly.