Podcast
Questions and Answers
What is the purpose of the MAC layer in a broadcast link?
What is the purpose of the MAC layer in a broadcast link?
The purpose of the MAC layer in a broadcast link is to coordinate the access of multiple sending/receiving nodes to the shared link.
What is the role of Medium Access Control (MAC) protocols?
What is the role of Medium Access Control (MAC) protocols?
The role of Medium Access Control (MAC) protocols is to minimize collisions in order to utilize the bandwidth.
What is the definition of throughput?
What is the definition of throughput?
Throughput is the amount of data moved successfully from one place to another in a given time period.
What is the definition of propagation delay?
What is the definition of propagation delay?
Signup and view all the answers
What are the main tasks of Multiple Access Protocols?
What are the main tasks of Multiple Access Protocols?
Signup and view all the answers
What are Random Access (or contention) Protocols?
What are Random Access (or contention) Protocols?
Signup and view all the answers
Why are collisions a problem in multiple access networks?
Why are collisions a problem in multiple access networks?
Signup and view all the answers
What is the purpose of the ALOHA scheme?
What is the purpose of the ALOHA scheme?
Signup and view all the answers
What is the advantage of ALOHA protocols?
What is the advantage of ALOHA protocols?
Signup and view all the answers
What is the disadvantage of ALOHA protocols?
What is the disadvantage of ALOHA protocols?
Signup and view all the answers
What is the formula for calculating the maximum propagation delay?
What is the formula for calculating the maximum propagation delay?
Signup and view all the answers
What is the formula for calculating the timeout in the ALOHA scheme?
What is the formula for calculating the timeout in the ALOHA scheme?
Signup and view all the answers
What is the vulnerable time in the pure ALOHA protocol?
What is the vulnerable time in the pure ALOHA protocol?
Signup and view all the answers
What is the maximum throughput in slotted ALOHA?
What is the maximum throughput in slotted ALOHA?
Signup and view all the answers
What is the vulnerable time for CSMA?
What is the vulnerable time for CSMA?
Signup and view all the answers
How does the performance of the protocol change with longer propagation delay?
How does the performance of the protocol change with longer propagation delay?
Signup and view all the answers
What are the three types of CSMA protocols?
What are the three types of CSMA protocols?
Signup and view all the answers
What does a station do in Non-Persistent CSMA if the medium is idle?
What does a station do in Non-Persistent CSMA if the medium is idle?
Signup and view all the answers
What does a station do in Non-Persistent CSMA if the medium is busy?
What does a station do in Non-Persistent CSMA if the medium is busy?
Signup and view all the answers
What is the purpose of 1-Persistent CSMA?
What is the purpose of 1-Persistent CSMA?
Signup and view all the answers
What is the performance of 1-Persistent CSMA when two or more stations become ready at the same time?
What is the performance of 1-Persistent CSMA when two or more stations become ready at the same time?
Signup and view all the answers
What is the purpose of p-Persistent CSMA?
What is the purpose of p-Persistent CSMA?
Signup and view all the answers
What is the condition for stability in p-Persistent CSMA?
What is the condition for stability in p-Persistent CSMA?
Signup and view all the answers
What is the inefficiency of CSMA?
What is the inefficiency of CSMA?
Signup and view all the answers
What is the advantage of CSMA/CD over CSMA?
What is the advantage of CSMA/CD over CSMA?
Signup and view all the answers
How does CSMA/CD detect collisions?
How does CSMA/CD detect collisions?
Signup and view all the answers
What does a station do if a collision is detected in CSMA/CD?
What does a station do if a collision is detected in CSMA/CD?
Signup and view all the answers
What are the restrictions of CSMA/CD?
What are the restrictions of CSMA/CD?
Signup and view all the answers
What are the three methods for controlled access?
What are the three methods for controlled access?
Signup and view all the answers
Explain the Reservation access method.
Explain the Reservation access method.
Signup and view all the answers
What are the two models of Polling?
What are the two models of Polling?
Signup and view all the answers
Explain Centralized polling.
Explain Centralized polling.
Signup and view all the answers
Explain Distributed polling.
Explain Distributed polling.
Signup and view all the answers
What are the two states of the Token-Passing network?
What are the two states of the Token-Passing network?
Signup and view all the answers
Explain the Listen state in the Token-Passing network.
Explain the Listen state in the Token-Passing network.
Signup and view all the answers
Explain the Transmit state in the Token-Passing network.
Explain the Transmit state in the Token-Passing network.
Signup and view all the answers
What is the purpose of the MAC layer in a broadcast link?
What is the purpose of the MAC layer in a broadcast link?
Signup and view all the answers
Why are collisions a problem in multiple access networks?
Why are collisions a problem in multiple access networks?
Signup and view all the answers
What is the main task of Multiple Access Protocols?
What is the main task of Multiple Access Protocols?
Signup and view all the answers
What is the definition of throughput?
What is the definition of throughput?
Signup and view all the answers
What is the formula for calculating the maximum propagation delay?
What is the formula for calculating the maximum propagation delay?
Signup and view all the answers
What does a station do in Non-Persistent CSMA if the medium is busy?
What does a station do in Non-Persistent CSMA if the medium is busy?
Signup and view all the answers
What are the three types of CSMA protocols?
What are the three types of CSMA protocols?
Signup and view all the answers
What is the difference between Pure ALOHA and Slotted ALOHA?
What is the difference between Pure ALOHA and Slotted ALOHA?
Signup and view all the answers
What is the formula for calculating the time out in the Pure ALOHA protocol?
What is the formula for calculating the time out in the Pure ALOHA protocol?
Signup and view all the answers
What is the maximum propagation delay in the Pure ALOHA protocol?
What is the maximum propagation delay in the Pure ALOHA protocol?
Signup and view all the answers
What is the purpose of the random retransmission time in the ALOHA scheme?
What is the purpose of the random retransmission time in the ALOHA scheme?
Signup and view all the answers
What is the maximum throughput in the Pure ALOHA protocol?
What is the maximum throughput in the Pure ALOHA protocol?
Signup and view all the answers
What is the maximum throughput in the Slotted ALOHA protocol?
What is the maximum throughput in the Slotted ALOHA protocol?
Signup and view all the answers
What is the purpose of Carrier Sense in Carrier Sense Multiple Access (CSMA)?
What is the purpose of Carrier Sense in Carrier Sense Multiple Access (CSMA)?
Signup and view all the answers
What is the purpose of CSMA/CD?
What is the purpose of CSMA/CD?
Signup and view all the answers
What are the three types of CSMA protocols?
What are the three types of CSMA protocols?
Signup and view all the answers
Explain the operation of Non-Persistent CSMA.
Explain the operation of Non-Persistent CSMA.
Signup and view all the answers
Explain the operation of 1-Persistent CSMA.
Explain the operation of 1-Persistent CSMA.
Signup and view all the answers
Explain the operation of p-Persistent CSMA.
Explain the operation of p-Persistent CSMA.
Signup and view all the answers
What is the condition for stability in p-Persistent CSMA?
What is the condition for stability in p-Persistent CSMA?
Signup and view all the answers
How does CSMA/CD detect collisions?
How does CSMA/CD detect collisions?
Signup and view all the answers
What are the two methods of Controlled Access?
What are the two methods of Controlled Access?
Signup and view all the answers
Explain Reservation Access Method.
Explain Reservation Access Method.
Signup and view all the answers
Explain Polling.
Explain Polling.
Signup and view all the answers
Explain Token-Passing network.
Explain Token-Passing network.
Signup and view all the answers
What are the three channelization protocols?
What are the three channelization protocols?
Signup and view all the answers
Explain FDMA.
Explain FDMA.
Signup and view all the answers
Explain TDMA.
Explain TDMA.
Signup and view all the answers
Explain CDMA.
Explain CDMA.
Signup and view all the answers
What is the purpose of Medium Access Control (MAC) protocols?
What is the purpose of Medium Access Control (MAC) protocols?
Signup and view all the answers
What is the main task of MAC protocols?
What is the main task of MAC protocols?
Signup and view all the answers
What is the definition of throughput?
What is the definition of throughput?
Signup and view all the answers
What is the problem with collisions in multiple access networks?
What is the problem with collisions in multiple access networks?
Signup and view all the answers
What is the propagation delay?
What is the propagation delay?
Signup and view all the answers
What are the two types of Random Access protocols?
What are the two types of Random Access protocols?
Signup and view all the answers
What is the advantage of contention protocols?
What is the advantage of contention protocols?
Signup and view all the answers
What is the vulnerable time for CSMA?
What is the vulnerable time for CSMA?
Signup and view all the answers
What is the performance of Non-Persistent CSMA?
What is the performance of Non-Persistent CSMA?
Signup and view all the answers
What is the performance of 1-Persistent CSMA?
What is the performance of 1-Persistent CSMA?
Signup and view all the answers
What is the performance of p-Persistent CSMA?
What is the performance of p-Persistent CSMA?
Signup and view all the answers
What is the condition for stability in p-Persistent CSMA?
What is the condition for stability in p-Persistent CSMA?
Signup and view all the answers
What is the inefficiency of CSMA?
What is the inefficiency of CSMA?
Signup and view all the answers
How long does it take to detect a collision?
How long does it take to detect a collision?
Signup and view all the answers
Explain the concept of Controlled Access and provide three methods for implementing it.
Explain the concept of Controlled Access and provide three methods for implementing it.
Signup and view all the answers
Explain the Reservation Access Method for Controlled Access.
Explain the Reservation Access Method for Controlled Access.
Signup and view all the answers
Explain the Polling method for Controlled Access, including both the centralized and distributed polling models.
Explain the Polling method for Controlled Access, including both the centralized and distributed polling models.
Signup and view all the answers
Explain the Token-Passing network method for Controlled Access.
Explain the Token-Passing network method for Controlled Access.
Signup and view all the answers
What is the difference between FDMA and TDMA in channelization protocols?
What is the difference between FDMA and TDMA in channelization protocols?
Signup and view all the answers
Explain the concept of CDMA in channelization protocols.
Explain the concept of CDMA in channelization protocols.
Signup and view all the answers
What are the three types of channelization protocols discussed in the text?
What are the three types of channelization protocols discussed in the text?
Signup and view all the answers
What are the main tasks of Multiple Access Protocols?
What are the main tasks of Multiple Access Protocols?
Signup and view all the answers
What is the purpose of Carrier Sense in Carrier Sense Multiple Access (CSMA)?
What is the purpose of Carrier Sense in Carrier Sense Multiple Access (CSMA)?
Signup and view all the answers
What is the purpose of the ALOHA protocol?
What is the purpose of the ALOHA protocol?
Signup and view all the answers
What is the maximum propagation delay in the Pure ALOHA protocol?
What is the maximum propagation delay in the Pure ALOHA protocol?
Signup and view all the answers
What is the formula for calculating the vulnerable time in the Pure ALOHA protocol?
What is the formula for calculating the vulnerable time in the Pure ALOHA protocol?
Signup and view all the answers
What is the advantage of Slotted ALOHA over Pure ALOHA?
What is the advantage of Slotted ALOHA over Pure ALOHA?
Signup and view all the answers
What is the maximum throughput in the Pure ALOHA protocol?
What is the maximum throughput in the Pure ALOHA protocol?
Signup and view all the answers
What is the difference between Pure ALOHA and Slotted ALOHA?
What is the difference between Pure ALOHA and Slotted ALOHA?
Signup and view all the answers
What is the purpose of Carrier Sense in Carrier Sense Multiple Access (CSMA)?
What is the purpose of Carrier Sense in Carrier Sense Multiple Access (CSMA)?
Signup and view all the answers
What are the three types of CSMA protocols?
What are the three types of CSMA protocols?
Signup and view all the answers
What is the purpose of CSMA/CD?
What is the purpose of CSMA/CD?
Signup and view all the answers
What does a station do in Non-Persistent CSMA if the medium is idle?
What does a station do in Non-Persistent CSMA if the medium is idle?
Signup and view all the answers
What does a station do in Non-Persistent CSMA if the medium is busy?
What does a station do in Non-Persistent CSMA if the medium is busy?
Signup and view all the answers
What is the performance of 1-Persistent CSMA when two or more stations become ready at the same time?
What is the performance of 1-Persistent CSMA when two or more stations become ready at the same time?
Signup and view all the answers
What is the formula for calculating the maximum number of stations in p-Persistent CSMA for stability?
What is the formula for calculating the maximum number of stations in p-Persistent CSMA for stability?
Signup and view all the answers
How does CSMA/CD detect collisions?
How does CSMA/CD detect collisions?
Signup and view all the answers
What is the purpose of the MAC layer in a broadcast link?
What is the purpose of the MAC layer in a broadcast link?
Signup and view all the answers
What is the main task of Multiple Access Protocols?
What is the main task of Multiple Access Protocols?
Signup and view all the answers
What is the definition of throughput?
What is the definition of throughput?
Signup and view all the answers
What is the propagation delay?
What is the propagation delay?
Signup and view all the answers
What are Random Access Protocols?
What are Random Access Protocols?
Signup and view all the answers
What is the disadvantage of collisions in multiple access networks?
What is the disadvantage of collisions in multiple access networks?
Signup and view all the answers
What is the solution to coordinating the access of multiple sending/receiving nodes to a shared link?
What is the solution to coordinating the access of multiple sending/receiving nodes to a shared link?
Signup and view all the answers
What is the purpose of the ALOHA scheme?
What is the purpose of the ALOHA scheme?
Signup and view all the answers
What is the maximum propagation delay in the Pure ALOHA protocol?
What is the maximum propagation delay in the Pure ALOHA protocol?
Signup and view all the answers
What is the formula for calculating the vulnerable time in the Pure ALOHA protocol?
What is the formula for calculating the vulnerable time in the Pure ALOHA protocol?
Signup and view all the answers
What is the advantage of the ALOHA protocols?
What is the advantage of the ALOHA protocols?
Signup and view all the answers
What is the difference between Pure ALOHA and Slotted ALOHA?
What is the difference between Pure ALOHA and Slotted ALOHA?
Signup and view all the answers
What is the purpose of carrier sense in Carrier Sense Multiple Access (CSMA)?
What is the purpose of carrier sense in Carrier Sense Multiple Access (CSMA)?
Signup and view all the answers
What is the maximum throughput in the Slotted ALOHA protocol?
What is the maximum throughput in the Slotted ALOHA protocol?
Signup and view all the answers
Explain the concept of Channelization.
Explain the concept of Channelization.
Signup and view all the answers
What are the two channelization protocols discussed in the text?
What are the two channelization protocols discussed in the text?
Signup and view all the answers
What is FDMA and how does it work?
What is FDMA and how does it work?
Signup and view all the answers
What is TDMA and how does it work?
What is TDMA and how does it work?
Signup and view all the answers
What is CDMA and how does it work?
What is CDMA and how does it work?
Signup and view all the answers
What is the purpose of channelization?
What is the purpose of channelization?
Signup and view all the answers
What is the advantage of FDMA?
What is the advantage of FDMA?
Signup and view all the answers
What is the advantage of TDMA?
What is the advantage of TDMA?
Signup and view all the answers
What is the advantage of CDMA?
What is the advantage of CDMA?
Signup and view all the answers
Study Notes
Multiple Access Control (MAC) Layer
- Multiple Access:
- Problem: Collision of frames when multiple nodes transmit at the same time
- Solution: Medium or Multiple Access Control (MAC) Protocols
- MAC Protocols belong to the data link layer
- Main task: Minimize collisions to utilize bandwidth
- Key functions: Determine when a station can use the link, what to do when the link is busy, and what to do when involved in a collision
- Terms:
- Throughput: Amount of data moved successfully from one place to another in a given time period
- Propagation delay: Time it takes for the head of the signal to travel from the sender to the receiver
Random Access Protocols
- ALOHA:
- Developed at the University of Hawaii in the early 1970s
- Computers transmit on the same radio channel whenever they have a packet to transmit
- Collisions are treated as transmission errors, and recovery is done by retransmission
- ALOHA scheme requires stations to use a random retransmission time
- Pure ALOHA:
- All frames are of fixed length (L bits)
- Stations transmit at equal transmission time
- A station can transmit at any time
- Time out = 2 * tprop
- Channel utilization or efficiency is the percentage of transmitted frames that arrive successfully
- Maximum propagation delay (tprop): Time it takes for a bit of a frame to travel between the two most widely separated stations
- Critical time for pure ALOHA protocol: Tfr = Frame Transmission time
- Vulnerable time: 2 Tfr
- Slotted ALOHA:
- Time is divided into slots equal to a frame transmission time (Tfr)
- A station can transmit at the beginning of a slot only
- A central clock or station informs all stations about the start of each slot
- In danger time for slotted ALOHA protocol: Tfr
Comparison of Pure ALOHA and Slotted ALOHA
- Frame Transmission: Pure ALOHA: continuous, Slotted ALOHA: discrete
- Time: Pure ALOHA: continuous, Slotted ALOHA: discrete
- Throughput: Pure ALOHA: 18%, Slotted ALOHA: 37%
- Danger Time: Pure ALOHA: 2 Tfr, Slotted ALOHA: Tfr
Carrier Sense Multiple Access (CSMA)
- A user wishing to transmit first listens to the medium to see if another transmission is in progress (carrier sense)
- Based on the fact that in LAN propagation time is very small
- If a frame was sent by a station, all stations know immediately so they can wait before start sending
- A station with frames to be sent should sense the medium for the presence of another transmission (carrier) before it starts its own transmission
- Vulnerable time for CSMA: Maximum propagation time
- The longer the propagation delay, the worse the performance of the protocol
Controlled Access or Scheduling
- Provides in-order access to the shared medium
- Eliminates collision completely
- Three methods: Reservation, Polling, and Token Passing
- Reservation:
- Stations take turns transmitting a single frame at a full rate (R) bps
- Transmissions are organized into variable-length cycles
- Each cycle begins with a reservation interval that consists of (N) minislots
- Polling:
- Stations take turns accessing the medium
- Two models: Centralized and distributed polling
- Centralized polling:
- One device is assigned as primary station, and the others as secondary stations
- All data exchanges are done through the primary
- Distributed polling:
- No primary and secondary stations
- Stations have a known polling order list
- Token Passing:
- Station Interface is in two states: Listen and Transmit
- Listen state: Listen to the arriving bits and check the destination address
- Transmit state: Station captures a special frame called free token and transmits its frames
Channelization
- Multiple-access method in which the available bandwidth of a link is shared in time, frequency, or through code, between different stations
- Three channelization protocols: FDMA, TDMA, and CDMA
- FDMA (Frequency Division Multiple Access):
- Assigns a frequency to a transmission channel
- Permanent, slow hopping, or fast hopping
- TDMA (Time Division Multiple Access):
- Assigns the fixed sending frequency to a transmission channel between a sender and a receiver for a certain amount of time
- CDMA (Code Division Multiple Access):
- Codes its data signal by a specific code before transmission
- Receivers use these codes to recover the data for the desired station### Types of CSMA Protocols
- Non-Persistent CSMA:
- A station with frames to be sent senses the medium.
- If the medium is idle, it transmits; otherwise, it waits a random amount of time and repeats.
- Performance: Random delays reduce the probability of collisions, but bandwidth is wasted if the waiting time is large.
- 1-Persistent CSMA:
- A station wishing to transmit listens to the medium.
- If the medium is idle, it transmits immediately; if the medium is busy, it continuously listens until it becomes idle, then transmits immediately with probability 1.
- Performance: 1-persistent stations are selfish, and if two or more stations become ready at the same time, collision is guaranteed.
- P-Persistent CSMA:
- Time is divided into slots, where each time unit (slot) typically equals the maximum propagation delay.
- A station wishing to transmit listens to the medium.
- If the medium is idle, it transmits with probability (p), or waits one time unit (slot) with probability (1 – p), then repeats.
- Performance: Reduces the possibility of collisions like non-persistent and reduces channel idle time like 1-persistent.
CSMA/CD (Collision Detection)
- Inefficiency: If a collision has occurred, the channel is unstable until the colliding packets have been fully transmitted.
- Solution: CSMA/CD (Carrier Sense Multiple Access with Collision Detection)
- How it works: While transmitting, the sender is listening to the medium for collisions. If a collision is detected, the sender stops transmission, transmits a jam signal, and backs off for a random amount of time before retransmitting.
- Widely used for bus topology LANs (IEEE 802.3, Ethernet).
Controlled Access or Scheduling
- Provides in-order access to the shared medium, ensuring every station has a chance to transfer (fair protocol).
- Eliminates collision completely.
- Three methods: Reservation, Polling, and Token Passing.
Reservation Access Method
- Stations take turns transmitting a single frame at a full rate (R) bps.
- Transmissions are organized into variable length cycles.
- Each cycle begins with a reservation interval that consists of (N) minislots, one for each of the N stations.
- A station makes a reservation in its own minislot, and all stations know which stations will transfer frames and in which order.
Polling
- Stations take turns accessing the medium.
- Two models: Centralized and Distributed Polling.
- Centralized Polling:
- One device is assigned as the primary station, and the others are secondary stations.
- All data exchanges are done through the primary.
- When the primary has a frame to send, it sends a select frame with the intended secondary's address.
- When the primary is ready to receive data, it sends a poll frame to each device to ask if it has data to send.
- Distributed Polling:
- No primary and secondary stations.
- Stations have a known polling order list based on a protocol.
Token-Passing Network
- A station interface is in two states: Listen and Transmit.
- Listen state: The station listens to the arriving bits and checks the destination address.
- Transmit state: The station captures a special frame called the free token and transmits its frames.
- The sending station is responsible for reinserting the free token into the ring medium and removing the transmitted frame from the medium.
Channelization
- A multiple-access method where the available bandwidth of a link is shared in time, frequency, or through code, between different stations.
- Three channelization protocols: FDMA, TDMA, and CDMA.### Multiple Access Protocols
- Multiple Access Control (MAC) Layer: responsible for error and flow control, framing, and multiple access control
FDMA (Frequency Division Multiple Access)
- Assigns a frequency to a transmission channel
- Permanent (e.g. radio broadcast), slow hopping (e.g. GSM), or fast hopping (FHSS, Frequency Hopping Spread Spectrum)
- Each station transmits continuously on the assigned band
- A node is limited to an average rate even when it is the only node with frames to be sent
TDMA (Time Division Multiple Access)
- Assigns the fixed sending frequency to a transmission channel between a sender and a receiver for a certain amount of time
- The entire bandwidth capacity is a single channel with its capacity shared in time between M stations
- A node must always wait for its turn until its slot time arrives even when it is the only node with frames to be sent
CDMA (Code Division Multiple Access)
- One channel carries all transmissions simultaneously
- Each station codes its data signal by a specific code before transmission
- The stations' receivers use these codes to recover the data for the desired station
Random Access Protocols
-
ALOHA
- Developed at the University of Hawaii in the early 1970s
- Stations transmit on the same radio channel whenever they have a packet to transmit
- Collisions can occur, but can be treated as transmission errors and recovered by retransmission
-
Pure ALOHA
- Frames from any station are of fixed length (L bits)
- Stations transmit at equal transmission time (all stations produce frames with equal frame lengths)
- A station can transmit at any time
-
Slotted ALOHA
- Time is divided into slots equal to a frame transmission time (Tfr)
- A station can transmit at the beginning of a slot only
-
Advantages and Disadvantages of ALOHA Protocols
- Advantages: nodes can transmit continuously at the full rate of the channel, simple to implement, no master station is needed to control the medium
- Disadvantages: low channel utilization, collisions can occur, and rate allocated for each node will be low
Carrier Sense Multiple Access (CSMA)
- A station wishing to transmit first listens to the medium to see if another transmission is in progress (carrier sense)
- If a frame was sent by a station, all stations know immediately and wait before start sending
- Collision can only happen when more than one station begins transmitting within a short time (the propagation time period)
Types of CSMA Protocols
- Non-Persistent CSMA: station with frames to be sent should sense the medium, if medium is idle, transmit; otherwise, go to 2. If medium is busy, backoff, wait a random amount of time and repeat 1
- 1-Persistent CSMA: station wishing to transmit listens to the medium, if medium idle, transmit immediately; if medium busy, continuously listen until medium becomes idle, then transmit immediately with probability 1
- P-Persistent CSMA: time is divided into slots, station wishing to transmit listens to the medium, if medium idle, transmit with probability (p), or wait one time unit (slot) with probability (1 – p), then repeat 1
CSMA/CD (Collision Detection)
- CSMA/CD overcomes the inefficiency of CSMA by stopping transmission if a collision has occurred
- Sender stops transmission if collision is detected and transmits a jam signal to notify other stations of collision
- After sending the jam signal, backoff, wait a random amount of time, then transmit the frame again
Controlled Access or Scheduling
- Reservation Access Method: stations take turns transmitting a single frame at a full rate (R) bps, transmissions are organized into variable length cycles
- Polling: stations take turns accessing the medium, two models: centralized and distributed polling
- Token-Passing Network: station interface is in two states: listen state and transmit state, station captures a special frame called free token and transmits its frames
Channelization
- FDMA (Frequency Division Multiple Access): transmission medium is divided into M separate frequency bands, each station transmits continuously on the assigned band
- TDMA (Time Division Multiple Access): entire bandwidth capacity is a single channel with its capacity shared in time between M stations
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Test your knowledge on CSMA protocols and collision avoidance techniques with this quiz. Learn about the vulnerable time for CSMA, the impact of propagation delay on protocol performance, and various types of CSMA protocols.