Multiplexing and Multiple Access
Multiplexing and Multiple Access
6.4
devices, the link can be shared.
6.27
to prevent eavesdropping and jamming.
• To achieve these goals, spread spectrum techniques
add redundancy.
6.28
Frequency hopping spread spectrum (FHSS)
6.29
Frequency selection in FHSS
6.30
FHSS cycles
6.31
Bandwidth sharing
6.32
Figure 6.32 DSSS
6.33
DSSS example
6.34
Multiple Access
Taxonomy of multiple-access protocols
12.36
RANDOM ACCESS
• In random access or contention methods, no station is superior
to another station and none is assigned the control over another.
• No station permits, or does not permit, another station to send.
• At each instance, a station that has data to send uses a procedure
defined by the protocol to make a decision on whether or not to
send.
PURE ALOHA
12.39
Procedure for pure ALOHA protocol
Vulnerable time for pure ALOHA protocol
seconds
Frames in a slotted ALOHA network
12.44
Vulnerable time for slotted ALOHA protocol
The throughput for slotted ALOHA is
S = G × e−G .
CSMA/CD works well for wired network. but not for wireless network.
Why?
ACK :
Even with all these precautions , there may still be collisions or damaged
data because of noise. So positive ACK and time out timer can guarantee
that ,the Rx receives the frame.
Flow diagram for CSMA/CA
CONTROLLED ACCESS
• In controlled access, the stations consult one another to find
which station has the right to send.
• A station cannot send unless it has been authorized by other
stations. Three popular controlled-access methods.
• Reservation
• Polling
• Token Passing
Reservation access method
12.63
Select and poll functions in polling access method
12.64
Logical ring and physical topology in token-passing access method
12.65
CHANNELIZATION
• Channelization is a multiple-access method in which the
available bandwidth of a link is shared in time, frequency, or
through code, between different stations.
• Three channelization protocols.
1.Frequency-Division Multiple Access (FDMA)
2.Time-Division Multiple Access (TDMA)
3.Code-Division Multiple Access (CDMA)
Frequency-division multiple access (FDMA)
In FDMA, the available bandwidth
• of the common channel is divided into bands that are separated
by guard bands.
Q: What is difference between FDMA and FDM?
FDM :
It is physical layer technique-
Eg. Telephone system
FDMA:
It is an access method ( MAC) in data link layer.
Eg. Radio stations using FM
What is difference between FDM and FDMA ? And FDD.
FDM FDMA
station
Decoding of the composite signal for one in CDMA
General rule and examples of creating Walsh tables