Data Link Control and Multiple Access
Data Link Control and Multiple Access
Multiple Access
Samson A.
[email protected]
School of Electrical & Computer Engineering,
Hawassa Institute of Technology
Data link layer sub-layers
December 2019 2
Media Access Control (MAC) Sublayer
December 2019 3
Multiple Access Protocols
• Many protocols have been devised to handle access to a shared
link. All of these protocols belong to a sub layer in the data-
link layer called media access control (MAC).
• They are categorized into three groups
December 2019 4
1. Random Access Protocol:
– ALOHA, CSMA, CSMA/CD, CSMA/CA,
» These protocols are mostly used in LANs and WANs
2. Controlled - access protocols:
– Reservation, Polling, and Token-passing
» Some of these protocols are used in LANs
3. Channelization protocols:
– FDMA, TDMA, and CDMA
» These protocols are used in cellular telephony
December 2019 5
Random Access
December 2019 7
• The random-access methods have evolved from ALOHA
• ALOHA - which uses a very simple procedure called
multiple access (MA).
• The random-access was improved with the addition of a
procedure that forces the station to sense the medium
before transmitting.
• This was called Carrier Sense Multiple Access (CSMA)
• CSMA later evolved into two parallel methods:
• CSMA/CD:- which tells the station what to do when a collision
is detected, and
• CSMA/CA:- which tries to avoid the collision.
December 2019 8
ALOHA
December 2019 9
Pure ALOHA
• The original ALOHA protocol is called pure ALOHA.
• The idea is that each station sends a frame whenever it has a
frame to send multiple access
• However, since there is only one channel to share, there is the
possibility of collision between frames from different stations.
December 2019 10
Frame collisions in pure ALOHA
December 2019 12
Frame collisions in slotted ALOHA
December 2019 13
Carrier Sense Multiple Access (CSMA)
December 2019 14
• CSMA can reduce the possibility of collision, but it
cannot eliminate it because of propagation delay
– When a station sends a frame, it takes a very short time for
the first bit to reach every station and for every station to
sense it.
– In other words, a station may sense the medium and find it
idle, only because the first bit sent by another station has
not yet been received
• The vulnerable time for CSMA is the propagation time Tp
(see above figure)
December 2019 15
Persistence Methods
December 2019 16
December 2019 17
1-Persistent
December 2019 18
Non-persistent
December 2019 19
p-Persistent
December 2019 20
CSMA/CD
December 2019 21
•In ALOHA (MA): we first transmit the entire frame and then wait for an
acknowledgment.
•In CSMA method: the station sense the media. If the line idle, transmit
the frame.
•In CSMA/CD: transmission and collision detection are continuous
processes.
December 2019 22
CSMA/CA
December 2019 23
Inter frame Space (IFS)
December 2019 24
Contention Window
December 2019 25
,,,,,……..
December 2019 26
Acknowledgment
December 2019 27
Controlled Access
• In this method, stations consult one another to find
which station has the right to send.
• A station cannot send unless it has been authorized by
other stations.
• There are three controlled-access methods
1. Reservation
2. Polling
3. Token-passing
December 2019 30
Reservation
• In the reservation method, a station needs to make a
reservation before sending data.
• In each time interval, a reservation frame precedes the
data frames. If there are N stations in the system, there are
exactly N reservation mini slots in the reservation frame.
• When a station needs to send a data frame, it makes a reservation
in its own mini slot.
December 2019 31
Polling
• Polling works with topologies in which one device is
designated as a primary station and the other devices are
secondary stations.
• All data exchanges must be made through the primary
device.
• The primary device controls the link; the secondary
devices follow its instructions.
• It is up to the primary device to determine which device is
allowed to use the channel at a given time.
• This method uses poll and select functions to prevent
collisions. However, the drawback is if the primary
station fails, the system goes down.
December 2019 32
Token Passing
December 2019 33
• But how is the right to access the channel passed from
one station to another?
• In this method, a special packet called a token circulates
through the ring.
• The possession of the token gives the station the right to
access the channel and send its data.
• When a station has some data to send, it waits until it
receives the token from its predecessor. It then holds the
token and sends its data. When the station has no more
data to send, it releases the token, passing it to the next
logical station in the ring.
• The station cannot send data until it receives the token
again in the next round.
December 2019 34
Logical Ring
December 2019 35
Channelization
December 2019 36
FDMA
December 2019 37
December 2019 38
FDMA vs FDM
December 2019 39
• FDMA, on the other hand, is an access method in the
data-link layer.
• The data link layer in each station tells its physical layer to
make a band pass signal from the data passed to it.
• The signal must be created in the allocated band.
• There is no physical multiplexer at the physical layer.
• The signals created at each station are automatically band
pass-filtered.
• They are mixed when they are sent to the common channel.
December 2019 40
TDMA
December 2019 41
December 2019 42
TDMA vs TDM
December 2019 43
CDMA
December 2019 44