CSMA Protocols and Collision Avoidance short answer

AffirmativeJasper2611 avatar
AffirmativeJasper2611
·
·
Download

Start Quiz

Study Flashcards

125 Questions

What is the purpose of the MAC layer in a broadcast link?

The purpose of the MAC layer in a broadcast link is to coordinate the access of multiple sending/receiving nodes to the shared link.

What is the role of Medium Access Control (MAC) protocols?

The role of Medium Access Control (MAC) protocols is to minimize collisions in order to utilize the bandwidth.

What is the definition of throughput?

Throughput is the amount of data moved successfully from one place to another in a given time period.

What is the definition of propagation delay?

Propagation delay is the amount of time it takes for the head of the signal to travel from the sender to the receiver.

What are the main tasks of Multiple Access Protocols?

The main tasks of Multiple Access Protocols are determining when a station can use the link, what a station should do when the link is busy, and what the station should do when it is involved in a collision.

What are Random Access (or contention) Protocols?

Random Access (or contention) Protocols are protocols where no station is superior to another station and none is assigned control over another.

Why are collisions a problem in multiple access networks?

Collisions are a problem in multiple access networks because when two or more nodes transmit at the same time, their frames will collide and the link bandwidth is wasted during collision.

What is the purpose of the ALOHA scheme?

The purpose of the ALOHA scheme is to allow stations to transmit packets on the same radio channel.

What is the advantage of ALOHA protocols?

The advantage of ALOHA protocols is that a node with frames to be transmitted can transmit continuously at the full rate of the channel if it is the only node with frames.

What is the disadvantage of ALOHA protocols?

The disadvantage of ALOHA protocols is that if multiple nodes want to transmit, collisions can occur and the rate allocated for each node will not be on average R/M bps.

What is the formula for calculating the maximum propagation delay?

The formula for calculating the maximum propagation delay is tprop = tprop = time it takes for a bit of a frame to travel between the two most widely separated stations.

What is the formula for calculating the timeout in the ALOHA scheme?

The formula for calculating the timeout in the ALOHA scheme is Time out = 2 * tprop.

What is the vulnerable time in the pure ALOHA protocol?

The vulnerable time in the pure ALOHA protocol is 2 * Tfr, where Tfr is the frame transmission time.

What is the maximum throughput in slotted ALOHA?

The maximum throughput in slotted ALOHA occurs at G = 1, which is 37%.

What is the vulnerable time for CSMA?

The vulnerable time for CSMA is the maximum propagation time.

How does the performance of the protocol change with longer propagation delay?

The performance of the protocol worsens with longer propagation delay.

What are the three types of CSMA protocols?

The three types of CSMA protocols are Non-Persistent CSMA, 1-Persistent CSMA, and p-Persistent CSMA.

What does a station do in Non-Persistent CSMA if the medium is idle?

If the medium is idle, a station transmits.

What does a station do in Non-Persistent CSMA if the medium is busy?

If the medium is busy, a station waits a random amount of time (backoff) and then repeats the process.

What is the purpose of 1-Persistent CSMA?

The purpose of 1-Persistent CSMA is to avoid idle channel time.

What is the performance of 1-Persistent CSMA when two or more stations become ready at the same time?

When two or more stations become ready at the same time, collision is guaranteed.

What is the purpose of p-Persistent CSMA?

The purpose of p-Persistent CSMA is to reduce the possibility of collisions and reduce channel idle time.

What is the condition for stability in p-Persistent CSMA?

(n x p) must be < 1 for stability, where n is the maximum number of stations.

What is the inefficiency of CSMA?

The inefficiency of CSMA is that if a collision occurs, the channel is unstable until colliding packets have been fully transmitted.

What is the advantage of CSMA/CD over CSMA?

The advantage of CSMA/CD over CSMA is that it reduces channel wastage by stopping transmission if a collision has occurred.

How does CSMA/CD detect collisions?

CSMA/CD detects collisions by listening to the medium for collisions while transmitting.

What does a station do if a collision is detected in CSMA/CD?

If a collision is detected, the station aborts transmission, transmits a jam signal to notify other stations of the collision, and then backs off for a random amount of time before retransmitting the frame.

What are the restrictions of CSMA/CD?

Packet transmission time should be at least as long as the time needed to detect a collision (2 * maximum propagation delay + jam sequence transmission time)

What are the three methods for controlled access?

Reservation, Polling, Token Passing

Explain the Reservation access method.

Stations take turns transmitting a single frame at a full rate (R) bps. Transmissions are organized into variable length cycles. Each cycle begins with a reservation interval that consists of (N) minislots. One minislot for each of the N stations. When a station needs to send a data frame, it makes a reservation in its own minislot. By listening to the reservation interval, every station knows which stations will transfer frames, and in which order. The stations that made reservations can send their data frames after the reservation frame.

What are the two models of Polling?

Centralized and distributed polling

Explain Centralized polling.

One device is assigned as primary station and the others as secondary stations. All data exchanges are done through the primary. When the primary has a frame to send, it sends a select frame that includes the address of the intended secondary. When the primary is ready to receive data, it sends a Poll frame for each device to ask if it has data to send or not. If yes, data will be transmitted; otherwise, NAK is sent. Polling can be done in order (Round-Robin) or based on predetermined order.

Explain Distributed polling.

No primary and secondary. Stations have a known polling order list which is made based on some protocol. The station with the highest priority will have the access right first, then it passes the access right to the next station.

What are the two states of the Token-Passing network?

Listen state and Transmit state

Explain the Listen state in the Token-Passing network.

Listen to the arriving bits and check the destination address to see if it is its own address. If yes, the frame is copied to the station; otherwise, it is passed through the output port to the next station.

Explain the Transmit state in the Token-Passing network.

The station captures a special frame called free token and transmits its frames. The sending station is responsible for reinserting the free token into the ring medium and for removing the transmitted frame from the medium.

What is the purpose of the MAC layer in a broadcast link?

The MAC layer in a broadcast link is responsible for framing, MAC address, and multiple access control.

Why are collisions a problem in multiple access networks?

Collisions in multiple access networks waste link bandwidth and reduce the efficiency of data transmission.

What is the main task of Multiple Access Protocols?

The main task of Multiple Access Protocols is to minimize collisions and maximize bandwidth utilization.

What is the definition of throughput?

Throughput is the amount of data moved successfully from one place to another in a given time period.

What is the formula for calculating the maximum propagation delay?

$\text{Maximum Propagation Delay} = \frac{\text{Link Length}}{\text{Propagation Speed}}$

What does a station do in Non-Persistent CSMA if the medium is busy?

In Non-Persistent CSMA, if the medium is busy, a station waits for a random amount of time and then listens again.

What are the three types of CSMA protocols?

The three types of CSMA protocols are 1-Persistent CSMA, Non-Persistent CSMA, and p-Persistent CSMA.

What is the difference between Pure ALOHA and Slotted ALOHA?

Pure ALOHA allows stations to transmit frames at completely random times, while Slotted ALOHA divides time into slots equal to a frame transmission time and stations can only transmit at the beginning of a slot.

What is the formula for calculating the time out in the Pure ALOHA protocol?

Time out = 2 * t_{prop}

What is the maximum propagation delay in the Pure ALOHA protocol?

Maximum propagation delay (t_{prop}) is the time it takes for a bit of a frame to travel between the two most widely separated stations.

What is the purpose of the random retransmission time in the ALOHA scheme?

The random retransmission time is intended to spread out retransmissions and reduce the likelihood of additional collisions between stations.

What is the maximum throughput in the Pure ALOHA protocol?

The maximum throughput occurs at G = 1/2, which is 18%.

What is the maximum throughput in the Slotted ALOHA protocol?

The maximum throughput occurs at G = 1, which is 37%.

What is the purpose of Carrier Sense in Carrier Sense Multiple Access (CSMA)?

Carrier Sense allows a user to listen to the medium to see if another transmission is in progress before starting its own transmission.

What is the purpose of CSMA/CD?

CSMA/CD (Carrier Sense Multiple Access with Collision Detection) overcomes the inefficiency of CSMA by listening for collisions while transmitting and stopping transmission if a collision occurs.

What are the three types of CSMA protocols?

The three types of CSMA protocols are Non-Persistent CSMA, 1-Persistent CSMA, and p-Persistent CSMA.

Explain the operation of Non-Persistent CSMA.

In Non-Persistent CSMA, a station senses the medium and transmits if it is idle. If the medium is busy, the station waits for a random amount of time (backoff) and repeats the process.

Explain the operation of 1-Persistent CSMA.

In 1-Persistent CSMA, a station continuously listens to the medium. If the medium is idle, the station transmits immediately. If the medium is busy, the station continues to listen until the medium becomes idle, and then transmits immediately with probability 1.

Explain the operation of p-Persistent CSMA.

In p-Persistent CSMA, time is divided into slots, where each slot typically equals the maximum propagation delay. A station listens to the medium and transmits with probability (p) if the medium is idle. If the medium is busy, the station waits one time unit (slot) with probability (1 - p) and repeats the process.

What is the condition for stability in p-Persistent CSMA?

The condition for stability in p-Persistent CSMA is that (n x p) must be less than 1, where n is the maximum number of stations.

How does CSMA/CD detect collisions?

CSMA/CD detects collisions by listening to the medium while transmitting. If a collision is detected (the sender hears its own signal), the sender stops transmission to avoid channel wastage.

What are the two methods of Controlled Access?

The two methods of Controlled Access are Reservation and Polling.

Explain Reservation Access Method.

In Reservation Access Method, stations take turns transmitting a single frame at a full rate. Transmissions are organized into variable length cycles. Each cycle begins with a reservation interval that consists of minislots, one for each station. When a station needs to send a data frame, it makes a reservation in its own minislot. By listening to the reservation interval, every station knows which stations will transfer frames, and in which order. The stations that made reservations can send their data frames after the reservation frame.

Explain Polling.

In Polling, stations take turns accessing the medium. There are two models of Polling: Centralized and Distributed. In Centralized polling, one device is assigned as the primary station and the others as secondary stations. All data exchanges are done through the primary. When the primary has a frame to send, it sends a select frame that includes the address of the intended secondary. When the primary is ready to receive data, it sends a Poll frame for each device to ask if it has data to send or not. If yes, the data will be transmitted; otherwise, a NAK is sent. Polling can be done in order (Round-Robin) or based on a predetermined order. In Distributed polling, there is no primary and secondary. Stations have a known polling order list which is made based on some protocol. The station with the highest priority will have the access right first, then it passes the access right to the next station.

Explain Token-Passing network.

In a Token-Passing network, the station interface is in two states: Listen state and Transmit state. In the Listen state, the station listens to the arriving bits and checks the destination address to see if it is its own address. If yes, the frame is copied to the station; otherwise, it is passed through the output port to the next station. In the Transmit state, the station captures a special frame called free token and transmits its frames. The sending station is responsible for reinserting the free token into the ring medium and for removing the transmitted frame from the medium.

What are the three channelization protocols?

The three channelization protocols are FDMA (Frequency Division Multiple Access), TDMA (Time Division Multiple Access), and CDMA (Code Division Multiple Access).

Explain FDMA.

FDMA (Frequency Division Multiple Access) assigns a frequency to a transmission channel. It divides the transmission medium into separate frequency bands, and each station transmits continuously on the assigned band. A node is limited to an average rate even when it is the only node with a frame to be sent.

Explain TDMA.

TDMA (Time Division Multiple Access) assigns a fixed sending frequency to a transmission channel between a sender and a receiver for a certain amount of time. The entire bandwidth capacity is a single channel with its capacity shared in time between M stations. A node must always wait for its turn until its slot time arrives, even when it is the only node with frames to send.

Explain CDMA.

CDMA (Code Division Multiple Access) is a channelization protocol where one channel carries all transmissions simultaneously. Each station codes its data signal by specific codes before transmission. The stations' receivers use these codes to recover the data for the desired station.

What is the purpose of Medium Access Control (MAC) protocols?

The purpose of MAC protocols is to coordinate the access of multiple sending/receiving nodes to a shared link.

What is the main task of MAC protocols?

The main task of MAC protocols is to minimize collisions in order to utilize the bandwidth.

What is the definition of throughput?

Throughput is the amount of data moved successfully from one place to another in a given time period.

What is the problem with collisions in multiple access networks?

Collisions waste link bandwidth and decrease network efficiency.

What is the propagation delay?

Propagation delay is the amount of time it takes for the head of the signal to travel from the sender to the receiver.

What are the two types of Random Access protocols?

The two types of Random Access protocols are contention protocols and reservation protocols.

What is the advantage of contention protocols?

In contention protocols, no station is superior to another station and none is assigned control over another.

What is the vulnerable time for CSMA?

The vulnerable time for CSMA is the maximum propagation time.

What is the performance of Non-Persistent CSMA?

Random delays reduce the probability of collisions because two stations with data to be transmitted will wait for different amounts of time. Bandwidth is wasted if the waiting time (backoff) is large because the medium will remain idle following the end of transmission even if one or more stations have frames to send.

What is the performance of 1-Persistent CSMA?

1-persistent stations are selfish. If two or more stations become ready at the same time, a collision is guaranteed.

What is the performance of p-Persistent CSMA?

It reduces the possibility of collisions like non-persistent CSMA and reduces channel idle time like 1-persistent CSMA.

What is the condition for stability in p-Persistent CSMA?

The condition for stability in p-persistent CSMA is that (n x p) must be less than 1, where n is the maximum number of stations.

What is the inefficiency of CSMA?

If a collision has occurred, the channel is unstable until the colliding packets have been fully transmitted.

How long does it take to detect a collision?

The time it takes to detect a collision is equal to twice the maximum propagation delay.

Explain the concept of Controlled Access and provide three methods for implementing it.

Controlled Access is a multiple access method that provides in-order access to a shared medium, allowing each station a chance to transmit. Three methods for implementing Controlled Access are Reservation, Polling, and Token Passing.

Explain the Reservation Access Method for Controlled Access.

In the Reservation Access Method, stations take turns transmitting a single frame at a fixed rate. Transmissions are organized into variable length cycles, with each cycle starting with a reservation interval. During the reservation interval, stations make reservations for their own minislots. The stations that made reservations can then send their data frames after the reservation frame.

Explain the Polling method for Controlled Access, including both the centralized and distributed polling models.

In the Polling method for Controlled Access, stations take turns accessing the medium. There are two models: centralized and distributed polling. In the centralized polling model, one device is assigned as the primary station, and all data exchanges are done through the primary. The primary sends select frames to the intended secondary stations and polls each device to check if it has data to send. In the distributed polling model, there is no primary or secondary. Stations have a known polling order list, and the station with the highest priority has the access right first.

Explain the Token-Passing network method for Controlled Access.

In the Token-Passing network method, stations have two states: Listen state and Transmit state. In the Listen state, stations listen to arriving bits and check the destination address. If the frame is for their own address, they copy it; otherwise, they pass it to the next station. In the Transmit state, stations capture a special frame called a free token and transmit their frames. The sending station is responsible for reinserting the free token into the ring medium and removing the transmitted frame.

What is the difference between FDMA and TDMA in channelization protocols?

FDMA (Frequency Division Multiple Access) assigns a frequency to a transmission channel, while TDMA (Time Division Multiple Access) assigns a fixed sending frequency to a transmission channel for a certain amount of time. In FDMA, the transmission medium is divided into separate frequency bands, and each station transmits continuously on its assigned band. In TDMA, the entire bandwidth capacity is a single channel, and its capacity is shared in time between multiple stations.

Explain the concept of CDMA in channelization protocols.

CDMA (Code Division Multiple Access) is a channelization protocol where one channel carries all transmissions simultaneously. Each station codes its data signal with specific codes before transmission, and the stations' receivers use these codes to recover the desired data.

What are the three types of channelization protocols discussed in the text?

The three types of channelization protocols discussed in the text are FDMA (Frequency Division Multiple Access), TDMA (Time Division Multiple Access), and CDMA (Code Division Multiple Access).

What are the main tasks of Multiple Access Protocols?

The main tasks of Multiple Access Protocols are to coordinate access to a shared medium, avoid collisions between stations, and provide fair and efficient access to all stations.

What is the purpose of Carrier Sense in Carrier Sense Multiple Access (CSMA)?

The purpose of Carrier Sense in CSMA is for stations to listen to the medium before transmitting to detect if it is currently being used by another station. If the medium is sensed as busy, the station defers its transmission until the medium becomes idle.

What is the purpose of the ALOHA protocol?

The purpose of the ALOHA protocol is to allow stations to transmit packets on the same radio channel whenever they have data to transmit.

What is the maximum propagation delay in the Pure ALOHA protocol?

The maximum propagation delay, denoted as $t_{prop}$, is the time it takes for a bit of a frame to travel between the two most widely separated stations.

What is the formula for calculating the vulnerable time in the Pure ALOHA protocol?

The vulnerable time in the Pure ALOHA protocol is given by $2T_{fr}$, where $T_{fr}$ is the frame transmission time.

What is the advantage of Slotted ALOHA over Pure ALOHA?

The advantage of Slotted ALOHA over Pure ALOHA is that time is divided into slots equal to a frame transmission time, and stations can only transmit at the beginning of a slot. This reduces the likelihood of collisions.

What is the maximum throughput in the Pure ALOHA protocol?

The maximum throughput in the Pure ALOHA protocol occurs at a value of $G = \frac{1}{2}$, which is 18%.

What is the difference between Pure ALOHA and Slotted ALOHA?

The main difference between Pure ALOHA and Slotted ALOHA is that in Pure ALOHA, frames are transmitted at completely random times, while in Slotted ALOHA, time is divided into slots equal to a frame transmission time and stations can only transmit at the beginning of a slot.

What is the purpose of Carrier Sense in Carrier Sense Multiple Access (CSMA)?

The purpose of Carrier Sense in Carrier Sense Multiple Access (CSMA) is for a station with frames to be sent to sense the medium for the presence of another transmission before it starts its own transmission. This helps reduce the possibility of collision.

What are the three types of CSMA protocols?

Non-Persistent CSMA, 1-Persistent CSMA, p-Persistent CSMA

What is the purpose of CSMA/CD?

To overcome the inefficiency of CSMA by reducing channel wastage in case of collisions

What does a station do in Non-Persistent CSMA if the medium is idle?

Transmit immediately

What does a station do in Non-Persistent CSMA if the medium is busy?

Wait a random amount of time and repeat the sensing process

What is the performance of 1-Persistent CSMA when two or more stations become ready at the same time?

Collision guaranteed

What is the formula for calculating the maximum number of stations in p-Persistent CSMA for stability?

$np < 1$, where $n$ is the maximum number of stations

How does CSMA/CD detect collisions?

While transmitting, the sender listens to the medium for collisions

What is the purpose of the MAC layer in a broadcast link?

The MAC layer is responsible for error and flow control, framing, and assigning MAC addresses.

What is the main task of Multiple Access Protocols?

The main task of Multiple Access Protocols is to minimize collisions in order to utilize the bandwidth.

What is the definition of throughput?

Throughput is the amount of data moved successfully from one place to another in a given time period.

What is the propagation delay?

Propagation delay is the amount of time it takes for the head of the signal to travel from the sender to the receiver.

What are Random Access Protocols?

Random Access Protocols are protocols where no station is superior to another station and none is assigned control over another.

What is the disadvantage of collisions in multiple access networks?

Collisions result in wasted link bandwidth and decreased efficiency.

What is the solution to coordinating the access of multiple sending/receiving nodes to a shared link?

The solution is to use Medium Access Control (MAC) Protocols to coordinate the transmission of active nodes.

What is the purpose of the ALOHA scheme?

The purpose of the ALOHA scheme is to connect computers situated on different Hawaiian islands.

What is the maximum propagation delay in the Pure ALOHA protocol?

The maximum propagation delay (t_{prop}) is the time it takes for a bit of a frame to travel between the two most widely separated stations.

What is the formula for calculating the vulnerable time in the Pure ALOHA protocol?

The formula for calculating the vulnerable time in the Pure ALOHA protocol is T_{fr} = 2 * t_{prop}, where T_{fr} is the frame transmission time.

What is the advantage of the ALOHA protocols?

The advantage of the ALOHA protocols is that a node that has frames to be transmitted can transmit continuously at the full rate of the channel if it is the only node with frames.

What is the difference between Pure ALOHA and Slotted ALOHA?

In Pure ALOHA, frames are transmitted at completely random times, while in Slotted ALOHA, time is divided into slots equal to a frame transmission time and a station can only transmit at the beginning of a slot.

What is the purpose of carrier sense in Carrier Sense Multiple Access (CSMA)?

The purpose of carrier sense in CSMA is to listen to the medium to see if another transmission is in progress before starting its own transmission.

What is the maximum throughput in the Slotted ALOHA protocol?

The maximum throughput occurs at G = 1, which is 37%.

Explain the concept of Channelization.

Channelization is a multiple-access method in which the available bandwidth of a link is shared in time, frequency, or through code, between different stations.

What are the two channelization protocols discussed in the text?

The two channelization protocols discussed in the text are FDMA (Frequency Division Multiple Access) and TDMA (Time Division Multiple Access).

What is FDMA and how does it work?

FDMA stands for Frequency Division Multiple Access. In FDMA, the transmission medium is divided into M separate frequency bands. Each station transmits continuously on the assigned band.

What is TDMA and how does it work?

TDMA stands for Time Division Multiple Access. In TDMA, the entire bandwidth capacity is a single channel with its capacity shared in time between M stations. A node must always wait for its turn until its slot time arrives, even when it is the only node with frames to send.

What is CDMA and how does it work?

CDMA stands for Code Division Multiple Access. In CDMA, one channel carries all transmissions simultaneously. Each station codes its data signal by a specific code before transmission. The station's receivers use these codes to recover the data for the desired station.

What is the purpose of channelization?

The purpose of channelization is to share the available bandwidth of a link between different stations using methods such as time division, frequency division, or code division.

What is the advantage of FDMA?

The advantage of FDMA is that it allows each station to transmit continuously on its assigned frequency band, providing dedicated bandwidth for each station.

What is the advantage of TDMA?

The advantage of TDMA is that it allows multiple stations to share a single channel by dividing it into time slots, ensuring fair access to the channel and efficient use of bandwidth.

What is the advantage of CDMA?

The advantage of CDMA is that it allows multiple stations to transmit simultaneously on the same channel, using different codes to distinguish their signals. This allows for increased capacity and improved security.

Study Notes

Multiple Access Control (MAC) Layer

  • Multiple Access:
    • Problem: Collision of frames when multiple nodes transmit at the same time
    • Solution: Medium or Multiple Access Control (MAC) Protocols
    • MAC Protocols belong to the data link layer
    • Main task: Minimize collisions to utilize bandwidth
    • Key functions: Determine when a station can use the link, what to do when the link is busy, and what to do when involved in a collision
  • Terms:
    • Throughput: Amount of data moved successfully from one place to another in a given time period
    • Propagation delay: Time it takes for the head of the signal to travel from the sender to the receiver

Random Access Protocols

  • ALOHA:
    • Developed at the University of Hawaii in the early 1970s
    • Computers transmit on the same radio channel whenever they have a packet to transmit
    • Collisions are treated as transmission errors, and recovery is done by retransmission
    • ALOHA scheme requires stations to use a random retransmission time
  • Pure ALOHA:
    • All frames are of fixed length (L bits)
    • Stations transmit at equal transmission time
    • A station can transmit at any time
    • Time out = 2 * tprop
    • Channel utilization or efficiency is the percentage of transmitted frames that arrive successfully
    • Maximum propagation delay (tprop): Time it takes for a bit of a frame to travel between the two most widely separated stations
    • Critical time for pure ALOHA protocol: Tfr = Frame Transmission time
    • Vulnerable time: 2 Tfr
  • Slotted ALOHA:
    • Time is divided into slots equal to a frame transmission time (Tfr)
    • A station can transmit at the beginning of a slot only
    • A central clock or station informs all stations about the start of each slot
    • In danger time for slotted ALOHA protocol: Tfr

Comparison of Pure ALOHA and Slotted ALOHA

  • Frame Transmission: Pure ALOHA: continuous, Slotted ALOHA: discrete
  • Time: Pure ALOHA: continuous, Slotted ALOHA: discrete
  • Throughput: Pure ALOHA: 18%, Slotted ALOHA: 37%
  • Danger Time: Pure ALOHA: 2 Tfr, Slotted ALOHA: Tfr

Carrier Sense Multiple Access (CSMA)

  • A user wishing to transmit first listens to the medium to see if another transmission is in progress (carrier sense)
  • Based on the fact that in LAN propagation time is very small
  • If a frame was sent by a station, all stations know immediately so they can wait before start sending
  • A station with frames to be sent should sense the medium for the presence of another transmission (carrier) before it starts its own transmission
  • Vulnerable time for CSMA: Maximum propagation time
  • The longer the propagation delay, the worse the performance of the protocol

Controlled Access or Scheduling

  • Provides in-order access to the shared medium
  • Eliminates collision completely
  • Three methods: Reservation, Polling, and Token Passing
  • Reservation:
    • Stations take turns transmitting a single frame at a full rate (R) bps
    • Transmissions are organized into variable-length cycles
    • Each cycle begins with a reservation interval that consists of (N) minislots
  • Polling:
    • Stations take turns accessing the medium
    • Two models: Centralized and distributed polling
    • Centralized polling:
      • One device is assigned as primary station, and the others as secondary stations
      • All data exchanges are done through the primary
    • Distributed polling:
      • No primary and secondary stations
      • Stations have a known polling order list
  • Token Passing:
    • Station Interface is in two states: Listen and Transmit
    • Listen state: Listen to the arriving bits and check the destination address
    • Transmit state: Station captures a special frame called free token and transmits its frames

Channelization

  • Multiple-access method in which the available bandwidth of a link is shared in time, frequency, or through code, between different stations
  • Three channelization protocols: FDMA, TDMA, and CDMA
  • FDMA (Frequency Division Multiple Access):
    • Assigns a frequency to a transmission channel
    • Permanent, slow hopping, or fast hopping
  • TDMA (Time Division Multiple Access):
    • Assigns the fixed sending frequency to a transmission channel between a sender and a receiver for a certain amount of time
  • CDMA (Code Division Multiple Access):
    • Codes its data signal by a specific code before transmission
    • Receivers use these codes to recover the data for the desired station### Types of CSMA Protocols
  • Non-Persistent CSMA:
    • A station with frames to be sent senses the medium.
    • If the medium is idle, it transmits; otherwise, it waits a random amount of time and repeats.
    • Performance: Random delays reduce the probability of collisions, but bandwidth is wasted if the waiting time is large.
  • 1-Persistent CSMA:
    • A station wishing to transmit listens to the medium.
    • If the medium is idle, it transmits immediately; if the medium is busy, it continuously listens until it becomes idle, then transmits immediately with probability 1.
    • Performance: 1-persistent stations are selfish, and if two or more stations become ready at the same time, collision is guaranteed.
  • P-Persistent CSMA:
    • Time is divided into slots, where each time unit (slot) typically equals the maximum propagation delay.
    • A station wishing to transmit listens to the medium.
    • If the medium is idle, it transmits with probability (p), or waits one time unit (slot) with probability (1 – p), then repeats.
    • Performance: Reduces the possibility of collisions like non-persistent and reduces channel idle time like 1-persistent.

CSMA/CD (Collision Detection)

  • Inefficiency: If a collision has occurred, the channel is unstable until the colliding packets have been fully transmitted.
  • Solution: CSMA/CD (Carrier Sense Multiple Access with Collision Detection)
  • How it works: While transmitting, the sender is listening to the medium for collisions. If a collision is detected, the sender stops transmission, transmits a jam signal, and backs off for a random amount of time before retransmitting.
  • Widely used for bus topology LANs (IEEE 802.3, Ethernet).

Controlled Access or Scheduling

  • Provides in-order access to the shared medium, ensuring every station has a chance to transfer (fair protocol).
  • Eliminates collision completely.
  • Three methods: Reservation, Polling, and Token Passing.

Reservation Access Method

  • Stations take turns transmitting a single frame at a full rate (R) bps.
  • Transmissions are organized into variable length cycles.
  • Each cycle begins with a reservation interval that consists of (N) minislots, one for each of the N stations.
  • A station makes a reservation in its own minislot, and all stations know which stations will transfer frames and in which order.

Polling

  • Stations take turns accessing the medium.
  • Two models: Centralized and Distributed Polling.
  • Centralized Polling:
    • One device is assigned as the primary station, and the others are secondary stations.
    • All data exchanges are done through the primary.
    • When the primary has a frame to send, it sends a select frame with the intended secondary's address.
    • When the primary is ready to receive data, it sends a poll frame to each device to ask if it has data to send.
  • Distributed Polling:
    • No primary and secondary stations.
    • Stations have a known polling order list based on a protocol.

Token-Passing Network

  • A station interface is in two states: Listen and Transmit.
  • Listen state: The station listens to the arriving bits and checks the destination address.
  • Transmit state: The station captures a special frame called the free token and transmits its frames.
  • The sending station is responsible for reinserting the free token into the ring medium and removing the transmitted frame from the medium.

Channelization

  • A multiple-access method where the available bandwidth of a link is shared in time, frequency, or through code, between different stations.
  • Three channelization protocols: FDMA, TDMA, and CDMA.### Multiple Access Protocols
  • Multiple Access Control (MAC) Layer: responsible for error and flow control, framing, and multiple access control

FDMA (Frequency Division Multiple Access)

  • Assigns a frequency to a transmission channel
  • Permanent (e.g. radio broadcast), slow hopping (e.g. GSM), or fast hopping (FHSS, Frequency Hopping Spread Spectrum)
  • Each station transmits continuously on the assigned band
  • A node is limited to an average rate even when it is the only node with frames to be sent

TDMA (Time Division Multiple Access)

  • Assigns the fixed sending frequency to a transmission channel between a sender and a receiver for a certain amount of time
  • The entire bandwidth capacity is a single channel with its capacity shared in time between M stations
  • A node must always wait for its turn until its slot time arrives even when it is the only node with frames to be sent

CDMA (Code Division Multiple Access)

  • One channel carries all transmissions simultaneously
  • Each station codes its data signal by a specific code before transmission
  • The stations' receivers use these codes to recover the data for the desired station

Random Access Protocols

  • ALOHA
    • Developed at the University of Hawaii in the early 1970s
    • Stations transmit on the same radio channel whenever they have a packet to transmit
    • Collisions can occur, but can be treated as transmission errors and recovered by retransmission
  • Pure ALOHA
    • Frames from any station are of fixed length (L bits)
    • Stations transmit at equal transmission time (all stations produce frames with equal frame lengths)
    • A station can transmit at any time
  • Slotted ALOHA
    • Time is divided into slots equal to a frame transmission time (Tfr)
    • A station can transmit at the beginning of a slot only
  • Advantages and Disadvantages of ALOHA Protocols
    • Advantages: nodes can transmit continuously at the full rate of the channel, simple to implement, no master station is needed to control the medium
    • Disadvantages: low channel utilization, collisions can occur, and rate allocated for each node will be low

Carrier Sense Multiple Access (CSMA)

  • A station wishing to transmit first listens to the medium to see if another transmission is in progress (carrier sense)
  • If a frame was sent by a station, all stations know immediately and wait before start sending
  • Collision can only happen when more than one station begins transmitting within a short time (the propagation time period)

Types of CSMA Protocols

  • Non-Persistent CSMA: station with frames to be sent should sense the medium, if medium is idle, transmit; otherwise, go to 2. If medium is busy, backoff, wait a random amount of time and repeat 1
  • 1-Persistent CSMA: station wishing to transmit listens to the medium, if medium idle, transmit immediately; if medium busy, continuously listen until medium becomes idle, then transmit immediately with probability 1
  • P-Persistent CSMA: time is divided into slots, station wishing to transmit listens to the medium, if medium idle, transmit with probability (p), or wait one time unit (slot) with probability (1 – p), then repeat 1

CSMA/CD (Collision Detection)

  • CSMA/CD overcomes the inefficiency of CSMA by stopping transmission if a collision has occurred
  • Sender stops transmission if collision is detected and transmits a jam signal to notify other stations of collision
  • After sending the jam signal, backoff, wait a random amount of time, then transmit the frame again

Controlled Access or Scheduling

  • Reservation Access Method: stations take turns transmitting a single frame at a full rate (R) bps, transmissions are organized into variable length cycles
  • Polling: stations take turns accessing the medium, two models: centralized and distributed polling
  • Token-Passing Network: station interface is in two states: listen state and transmit state, station captures a special frame called free token and transmits its frames

Channelization

  • FDMA (Frequency Division Multiple Access): transmission medium is divided into M separate frequency bands, each station transmits continuously on the assigned band
  • TDMA (Time Division Multiple Access): entire bandwidth capacity is a single channel with its capacity shared in time between M stations

Test your knowledge on CSMA protocols and collision avoidance techniques with this quiz. Learn about the vulnerable time for CSMA, the impact of propagation delay on protocol performance, and various types of CSMA protocols.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Use Quizgecko on...
Browser
Browser