SlideShare a Scribd company logo
4
Most read
5
Most read
7
Most read
Multiple Access Protocols
Multiple Access Protocols
• Random Access Protocols
– Aloha
– Slotted Aloha
– Carrier sense multiple access (CSMA): Ethernet
– Group random access
• Controlled Access Protocols
– Predetermined allocation (TDMA)
– Reservation protocols
– Token passing protocols
Aloha
• If you have a packet, just send it.
• If multiple people try it and so there is
collision, then try resending it later!
• Theoretical analysis (based on Poisson
distribution) shows a throughput of only
18%.
Slotted Aloha
• Synchronous, that is time is divided into slots
• Slot size is equal to the transmission time of a
packet
• When you are ready, transmit at the start of the
time slot.
• Doubles the efficiency of Aloha (38% throughput)
• But requires synchronization!
Carrier Sense Multiple Access
• CSMA
• Listen to channel. If busy then wait for a
random time and then listen again. If not
busy then transmit
• Collision may still happen
p-persistent CSMA
• Quite like CSMA.
• But, when the channel is idle then you
transmit with probability p. Otherwise,
even when it is idle, you wait for a random
time before you listen to the channel.
CSMA/CD
• CSMA with collision detection(CD):
– Listen while you are sending packets
– Stop sending when collision happens
• Wait random time before you attempt to
resend.
• IEEE 802.3 standard
• Used in coaxial cable. You do exponetial
backoff.
Group Random Access
• Instead of random backoff, use a structured
search to find one unit to transmit
• First enable a group.
• If collision happens, then divide the group
into two parts and let one part try.
Token Passing
• Form a circular list. Pass a token around.
Whoever has the token can transmit.
• Only the station that wants to trasmit, seize
the token and release it after successful
transmission.
Reservation Aloha
• Channel is divided into time slots of equal size.
• Each slot is large enough to transmit a packet.
• Slots are arranged into frames of equal size.
• Frame size is proportional to propagation delay.
• Units compete for slots. Once a unit gets a slot, it
retains the slot (across frames) until it no longer
needs it.
• Efficient for bursty data but no so for single
packet.
FIFO Reservation
• Channel is divided into slots. Units compete and
make reservation for these slots in FIFO manner.
• Every one keeps track of the order.
• After every M slots, one slot is broken into small
reservation slots using which units try to reserve
next M slots.
• Efficient in handling bursty data. No frame size
limitation. But requires tracking of queue!
Round Robin
• Channel is divided into equal slots where each unit
is a owner of a slot. (Just like TDMA)
• But, others can use the slot of a unit UNTIL the
unit wants it by creating a collision.
• No activity is a signal for others to contend for the
slot.
• Good for burst data. But contend using other
protocols for unused slots.
Thank you
Ad

Recommended

PPTX
Multiple Access Protocal
tes31
 
PPTX
Data link layer
Mukesh Chinta
 
PPTX
SLOTTED ALOHA and pure aloha are the category of aloha
AkshathaM29
 
PPTX
Arp and rarp
Nita Dalla
 
PPTX
The medium access sublayer
Lal Bahadur Gehlot
 
PPTX
Computer network switching
Shivani Godha
 
PPTX
User datagram protocol (udp)
Ramola Dhande
 
PPTX
Multiplexing
Neeraj Garwal
 
PPTX
Transmission impairments(presentation)
Vivek Kumar
 
PPT
TOKEN BUS & TOKEN RING.ppt
shanthishyam
 
PPTX
ALOHA Protocol (in detail)
Hinal Lunagariya
 
PDF
Multiple Access in Computer Network
Hitesh Mohapatra
 
PPT
Mac layer
Shubham Kansal
 
PPTX
Media Access Control
VijayaLakshmi514
 
PPTX
Multiple access protocol
Merlin Florrence
 
PPTX
Network software
SakthiVinoth78
 
PPTX
Error control
Bhupendra sahu
 
PPTX
Csma cd and csma-ca
kazim Hussain
 
PPTX
Transmission Control Protocol (TCP)
k33a
 
PPT
Sliding window protocol
Shehara Abeythunga
 
PPTX
Synchronous and Asynchronous Transmission
Adeel Rasheed
 
PPTX
Distance Vector & Link state Routing Algorithm
MOHIT AGARWAL
 
PPT
Synchronization in distributed systems
SHATHAN
 
PPT
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Dr. SELVAGANESAN S
 
PDF
Multiplexing
Aman Jaiswal
 
PPT
Csma
myrajendra
 
PPTX
Routing algorithms
Parameswaran Selvakumar
 
PPT
Medium Access Control Protocols Karthick
Karthick Selvaraj
 
PPTX
ADITYA PPT.pptx
1A245MohitTitarmare
 

More Related Content

What's hot (20)

PPTX
Transmission impairments(presentation)
Vivek Kumar
 
PPT
TOKEN BUS & TOKEN RING.ppt
shanthishyam
 
PPTX
ALOHA Protocol (in detail)
Hinal Lunagariya
 
PDF
Multiple Access in Computer Network
Hitesh Mohapatra
 
PPT
Mac layer
Shubham Kansal
 
PPTX
Media Access Control
VijayaLakshmi514
 
PPTX
Multiple access protocol
Merlin Florrence
 
PPTX
Network software
SakthiVinoth78
 
PPTX
Error control
Bhupendra sahu
 
PPTX
Csma cd and csma-ca
kazim Hussain
 
PPTX
Transmission Control Protocol (TCP)
k33a
 
PPT
Sliding window protocol
Shehara Abeythunga
 
PPTX
Synchronous and Asynchronous Transmission
Adeel Rasheed
 
PPTX
Distance Vector & Link state Routing Algorithm
MOHIT AGARWAL
 
PPT
Synchronization in distributed systems
SHATHAN
 
PPT
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Dr. SELVAGANESAN S
 
PDF
Multiplexing
Aman Jaiswal
 
PPT
Csma
myrajendra
 
PPTX
Routing algorithms
Parameswaran Selvakumar
 
Transmission impairments(presentation)
Vivek Kumar
 
TOKEN BUS & TOKEN RING.ppt
shanthishyam
 
ALOHA Protocol (in detail)
Hinal Lunagariya
 
Multiple Access in Computer Network
Hitesh Mohapatra
 
Mac layer
Shubham Kansal
 
Media Access Control
VijayaLakshmi514
 
Multiple access protocol
Merlin Florrence
 
Network software
SakthiVinoth78
 
Error control
Bhupendra sahu
 
Csma cd and csma-ca
kazim Hussain
 
Transmission Control Protocol (TCP)
k33a
 
Sliding window protocol
Shehara Abeythunga
 
Synchronous and Asynchronous Transmission
Adeel Rasheed
 
Distance Vector & Link state Routing Algorithm
MOHIT AGARWAL
 
Synchronization in distributed systems
SHATHAN
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Dr. SELVAGANESAN S
 
Multiplexing
Aman Jaiswal
 
Routing algorithms
Parameswaran Selvakumar
 

Similar to MULTIPLE ACCESS PROTOCOL COMPUTER NETWORKS (20)

PPT
Medium Access Control Protocols Karthick
Karthick Selvaraj
 
PPTX
ADITYA PPT.pptx
1A245MohitTitarmare
 
PDF
Mac
Nitesh Singh
 
PPTX
note9 (1).pptx on medium access control protocols
sadiariasat10
 
PPT
note9.ppt
lavanyas92
 
PPT
note_vc.ppt
NilamHonmane
 
PPT
aloha
DeepikaT13
 
PPTX
Multipleaccessprotocol 140213082552-phpapp02
arifur rahman
 
PDF
multipleaccessprotocol-140213082552-phpapp02.pdf
GauravWankar2
 
PDF
CN-unit-iii.pdf computer network presentaion
mansvi202401
 
DOCX
seminar report on multiple access control protocol submitted by munesh
meenamunesh
 
PPT
Mac sub layer
DIKSHA_LAHRANI
 
PPTX
Media Access Control
HusnainHadi
 
PPTX
Unit 3 - Data Link Layer - Part B
Chandan Gupta Bhagat
 
PPT
MEDIUM-ACCESS CONTROL SUB LAYER.ppt
DrTThendralCompSci
 
PPT
Unit 1 mac vsd
SHUBHAM MORGAONKAR
 
PDF
Medium range protocol and multiple access
sushmitjivtode4
 
PPTX
link-medium-access-control.pptx
patrickwang85
 
PDF
Lec9 on Computer Networks by Tarun Mangla.pdf
ShivamSawarn2
 
Medium Access Control Protocols Karthick
Karthick Selvaraj
 
ADITYA PPT.pptx
1A245MohitTitarmare
 
note9 (1).pptx on medium access control protocols
sadiariasat10
 
note9.ppt
lavanyas92
 
note_vc.ppt
NilamHonmane
 
aloha
DeepikaT13
 
Multipleaccessprotocol 140213082552-phpapp02
arifur rahman
 
multipleaccessprotocol-140213082552-phpapp02.pdf
GauravWankar2
 
CN-unit-iii.pdf computer network presentaion
mansvi202401
 
seminar report on multiple access control protocol submitted by munesh
meenamunesh
 
Mac sub layer
DIKSHA_LAHRANI
 
Media Access Control
HusnainHadi
 
Unit 3 - Data Link Layer - Part B
Chandan Gupta Bhagat
 
MEDIUM-ACCESS CONTROL SUB LAYER.ppt
DrTThendralCompSci
 
Unit 1 mac vsd
SHUBHAM MORGAONKAR
 
Medium range protocol and multiple access
sushmitjivtode4
 
link-medium-access-control.pptx
patrickwang85
 
Lec9 on Computer Networks by Tarun Mangla.pdf
ShivamSawarn2
 
Ad

More from garishma bhatia (19)

PPTX
Peephole optimization techniques
garishma bhatia
 
PPTX
Vm migration techniques
garishma bhatia
 
PPTX
Denial of service
garishma bhatia
 
PPTX
Iot + cloud
garishma bhatia
 
PPTX
WORKFLOW OF THE PROCESS IN SPM
garishma bhatia
 
PPTX
MULTILEVEL QUEUE SCHEDULING
garishma bhatia
 
PPTX
Constructor overloading & method overloading
garishma bhatia
 
PPTX
BLOCKCHAIN TECHNOLOGY
garishma bhatia
 
PPTX
Knapsack problem
garishma bhatia
 
PPTX
PRIM'S ALGORITHM
garishma bhatia
 
PPTX
Data types IN JAVA
garishma bhatia
 
PPTX
Data Algorithms And Analysis
garishma bhatia
 
DOCX
VEHICLE REGISTRATION PROJECT
garishma bhatia
 
PPTX
WIFI TECH
garishma bhatia
 
PPTX
MATCHING GRAPH THEORY
garishma bhatia
 
PPTX
Garishma se
garishma bhatia
 
PPTX
Garishma xcs
garishma bhatia
 
PPTX
Garishma maTHS
garishma bhatia
 
PPTX
Garishma ec
garishma bhatia
 
Peephole optimization techniques
garishma bhatia
 
Vm migration techniques
garishma bhatia
 
Denial of service
garishma bhatia
 
Iot + cloud
garishma bhatia
 
WORKFLOW OF THE PROCESS IN SPM
garishma bhatia
 
MULTILEVEL QUEUE SCHEDULING
garishma bhatia
 
Constructor overloading & method overloading
garishma bhatia
 
BLOCKCHAIN TECHNOLOGY
garishma bhatia
 
Knapsack problem
garishma bhatia
 
PRIM'S ALGORITHM
garishma bhatia
 
Data types IN JAVA
garishma bhatia
 
Data Algorithms And Analysis
garishma bhatia
 
VEHICLE REGISTRATION PROJECT
garishma bhatia
 
WIFI TECH
garishma bhatia
 
MATCHING GRAPH THEORY
garishma bhatia
 
Garishma se
garishma bhatia
 
Garishma xcs
garishma bhatia
 
Garishma maTHS
garishma bhatia
 
Garishma ec
garishma bhatia
 
Ad

Recently uploaded (20)

PDF
Abraham Silberschatz-Operating System Concepts (9th,2012.12).pdf
Shabista Imam
 
PPTX
Mobile database systems 20254545645.pptx
herosh1968
 
PPTX
Deep Learning for Natural Language Processing_FDP on 16 June 2025 MITS.pptx
resming1
 
PDF
Complete University of Calculus :: 2nd edition
Shabista Imam
 
PDF
special_edition_using_visual_foxpro_6.pdf
Shabista Imam
 
PDF
Proposal for folders structure division in projects.pdf
Mohamed Ahmed
 
PDF
FUNDAMENTALS OF COMPUTER ORGANIZATION AND ARCHITECTURE
Shabista Imam
 
PDF
Rapid Prototyping for XR: Lecture 1 Introduction to Prototyping
Mark Billinghurst
 
PPTX
Comparison of Flexible and Rigid Pavements in Bangladesh
Arifur Rahman
 
PPTX
MATERIAL SCIENCE LECTURE NOTES FOR DIPLOMA STUDENTS
SAMEER VISHWAKARMA
 
PPTX
Industrial internet of things IOT Week-3.pptx
KNaveenKumarECE
 
PPTX
LECTURE 7 COMPUTATIONS OF LEVELING DATA APRIL 2025.pptx
rr22001247
 
PPTX
Data Structures Module 3 Binary Trees Binary Search Trees Tree Traversals AVL...
resming1
 
PDF
Rapid Prototyping for XR: Lecture 3 - Video and Paper Prototyping
Mark Billinghurst
 
PDF
May 2025: Top 10 Read Articles in Data Mining & Knowledge Management Process
IJDKP
 
PDF
Rapid Prototyping for XR: Lecture 4 - High Level Prototyping.
Mark Billinghurst
 
PPTX
Tesla-Stock-Analysis-and-Forecast.pptx (1).pptx
moonsony54
 
PPTX
Industry 4.o the fourth revolutionWeek-2.pptx
KNaveenKumarECE
 
PPTX
Structural Wonderers_new and ancient.pptx
nikopapa113
 
PDF
International Journal of Advanced Information Technology (IJAIT)
ijait
 
Abraham Silberschatz-Operating System Concepts (9th,2012.12).pdf
Shabista Imam
 
Mobile database systems 20254545645.pptx
herosh1968
 
Deep Learning for Natural Language Processing_FDP on 16 June 2025 MITS.pptx
resming1
 
Complete University of Calculus :: 2nd edition
Shabista Imam
 
special_edition_using_visual_foxpro_6.pdf
Shabista Imam
 
Proposal for folders structure division in projects.pdf
Mohamed Ahmed
 
FUNDAMENTALS OF COMPUTER ORGANIZATION AND ARCHITECTURE
Shabista Imam
 
Rapid Prototyping for XR: Lecture 1 Introduction to Prototyping
Mark Billinghurst
 
Comparison of Flexible and Rigid Pavements in Bangladesh
Arifur Rahman
 
MATERIAL SCIENCE LECTURE NOTES FOR DIPLOMA STUDENTS
SAMEER VISHWAKARMA
 
Industrial internet of things IOT Week-3.pptx
KNaveenKumarECE
 
LECTURE 7 COMPUTATIONS OF LEVELING DATA APRIL 2025.pptx
rr22001247
 
Data Structures Module 3 Binary Trees Binary Search Trees Tree Traversals AVL...
resming1
 
Rapid Prototyping for XR: Lecture 3 - Video and Paper Prototyping
Mark Billinghurst
 
May 2025: Top 10 Read Articles in Data Mining & Knowledge Management Process
IJDKP
 
Rapid Prototyping for XR: Lecture 4 - High Level Prototyping.
Mark Billinghurst
 
Tesla-Stock-Analysis-and-Forecast.pptx (1).pptx
moonsony54
 
Industry 4.o the fourth revolutionWeek-2.pptx
KNaveenKumarECE
 
Structural Wonderers_new and ancient.pptx
nikopapa113
 
International Journal of Advanced Information Technology (IJAIT)
ijait
 

MULTIPLE ACCESS PROTOCOL COMPUTER NETWORKS

  • 2. Multiple Access Protocols • Random Access Protocols – Aloha – Slotted Aloha – Carrier sense multiple access (CSMA): Ethernet – Group random access • Controlled Access Protocols – Predetermined allocation (TDMA) – Reservation protocols – Token passing protocols
  • 3. Aloha • If you have a packet, just send it. • If multiple people try it and so there is collision, then try resending it later! • Theoretical analysis (based on Poisson distribution) shows a throughput of only 18%.
  • 4. Slotted Aloha • Synchronous, that is time is divided into slots • Slot size is equal to the transmission time of a packet • When you are ready, transmit at the start of the time slot. • Doubles the efficiency of Aloha (38% throughput) • But requires synchronization!
  • 5. Carrier Sense Multiple Access • CSMA • Listen to channel. If busy then wait for a random time and then listen again. If not busy then transmit • Collision may still happen
  • 6. p-persistent CSMA • Quite like CSMA. • But, when the channel is idle then you transmit with probability p. Otherwise, even when it is idle, you wait for a random time before you listen to the channel.
  • 7. CSMA/CD • CSMA with collision detection(CD): – Listen while you are sending packets – Stop sending when collision happens • Wait random time before you attempt to resend. • IEEE 802.3 standard • Used in coaxial cable. You do exponetial backoff.
  • 8. Group Random Access • Instead of random backoff, use a structured search to find one unit to transmit • First enable a group. • If collision happens, then divide the group into two parts and let one part try.
  • 9. Token Passing • Form a circular list. Pass a token around. Whoever has the token can transmit. • Only the station that wants to trasmit, seize the token and release it after successful transmission.
  • 10. Reservation Aloha • Channel is divided into time slots of equal size. • Each slot is large enough to transmit a packet. • Slots are arranged into frames of equal size. • Frame size is proportional to propagation delay. • Units compete for slots. Once a unit gets a slot, it retains the slot (across frames) until it no longer needs it. • Efficient for bursty data but no so for single packet.
  • 11. FIFO Reservation • Channel is divided into slots. Units compete and make reservation for these slots in FIFO manner. • Every one keeps track of the order. • After every M slots, one slot is broken into small reservation slots using which units try to reserve next M slots. • Efficient in handling bursty data. No frame size limitation. But requires tracking of queue!
  • 12. Round Robin • Channel is divided into equal slots where each unit is a owner of a slot. (Just like TDMA) • But, others can use the slot of a unit UNTIL the unit wants it by creating a collision. • No activity is a signal for others to contend for the slot. • Good for burst data. But contend using other protocols for unused slots.