You are on page 1of 62

Data Communication & Computer Networks

(Course Code: 3143201), Sem.- IV

Unit- 5
LAN & MAN Protocols

Dr. Mani Shekhar Gupta,


Department of Information & Communication Technology
Adani University
Gujarat, India

April 18, 2023


Channel Allocation
⚫ Static Channel Allocation
⚫ FDMA
⚫ N users
• Bandwidth is divided into N equal size portions Each user
is allocated one portion
• For few numbers of users, FDM is a simple & efficient
static allocation mechanism. However, when the number
of senders is large & continuously varying (or bursty)
traffic, FDMA presents some problem
⚫ 1. number of users << N (bad bandwidth utilization)
⚫ 2. number of users > N then Collision
⚫ Static allocation is inefficient
Multiple-access protocols
RANDOM ACCESS

In random access or contention methods, no station is superior to another


station and none is assigned the control over another. No station permits, or
does not permit, another station to send. At each instance, a station that has
data to send uses a procedure defined by the protocol to make a decision on
whether or not to send.

Topics to be discussed :

ALOHA
Carrier Sense Multiple Access
Carrier Sense Multiple Access with Collision Detection
Carrier Sense Multiple Access with Collision Avoidance
12.4
Frames in a pure ALOHA network
Vulnerable time for pure ALOHA protocol
Analysis of Throughput of Pure
ALOHA

⚫ Let G represents the total number of attempted


transmissions per frame time, the throughput is-
S = G  (Probability of good transmission)
⚫ The vulnerable time for a successful
transmission is 2Tf
Using: G k e−G
P(k ) =
k!

And setting t = 2Tf and k = 0, we get


P (0) = e −2 G
Thus, S = G  e −2 G

• If G = 0.5,
and for that S = 1/2e = 0.18. So, the
maximum throughput is only 18% of capacity.
Slotted Aloha Protocol
Vulnerable Time for Slotted
Aloha Protocol
The throughput for slotted ALOHA is
S = G × e−G .
The maximum throughput
Smax = 0.368 when G = 1.

12.11
Space/time model of the collision in CSMA
Behavior of three persistence methods
Flow diagram for three persistence methods
Throughput
1.0 0.01-persistent CSMA
0.9 Nonpersistent CSMA
0.8
0.7
0.1-persistent CSMA
0.6
0.5-persistent CSMA
0.5
S

1-persistent CSMA
0.4
0.3
0.2
Slotted Aloha
Aloha
0.1
0
0 1 2 3 4 5 6 7 8 9
G
15
CSMA/CD
Flow diagram for the CSMA/CD
CSMA/CA
In CSMA/CA, if the station finds the channel
busy, it does not restart the timer of the
contention window;
it stops the timer and restarts it when the
channel becomes idle.

In CSMA/CA, the IFS can also be used to


define the priority of a station or a frame.
Flow diagram for CSMA/CA
CONTROLLED ACCESS PROTOCOL

In controlled access, the stations consult one another to find which station has
the right to send. A station cannot send unless it has been authorized by other
stations. We discuss three popular controlled-access methods.

Reservation
Polling
Token Passing
Reservation access method
Select and poll functions in polling access method
Logical ring and physical topology in token-passing access method
CHANNELIZATION

Channelization is a multiple-access method in which the available bandwidth of


a link is shared in time, frequency, or through code, between different stations.
In this section, we discuss three channelization protocols.

Frequency-Division Multiple Access (FDMA)


Time-Division Multiple Access (TDMA)
Code-Division Multiple Access (CDMA)
Frequency-division multiple access (FDMA)

In FDMA, the available bandwidth


of the common channel is divided into bands
that are separated by guard bands.
Time-division multiple access (TDMA)

In TDMA, the bandwidth is just one channel that


is timeshared between different stations.
CDMA

In CDMA, one channel carries all transmissions


simultaneously.
LAN protocols - Ethernet
Project 802
Ethernet Frame

PDU- Protocol data unit


SSAP- Source service access point
DSAP- Destination service access point
Types of Ethernet
Categories of standard Ethernet

•<data rate><Signaling method><Max segment length or cable type>


Table
Name Cable Max. Max Cable Nodes
Topology
Segment /segment
Length
10Base5 thick coax 500 meters 100
Bus

10Base2 thin coax 185 meters 30


Bus

10BaseT twisted pair 100 meters 1024 Star

10BaseF Fiber Optic 2Km 1024


Star
Fast Ethernet
Gigabit Ethernet
10 Gigabit Ethernet

Only 10G Base- EX


Extended fiber is added in place of 10G Base- T in Gigabit
Ethernet
Token Ring
Token Passing
Token Passing
Token Ring Frame
FDDI Rings
FDDI Ring Failure
FDDI Frames
MAN Protocols
Distributed Queue Dual Bus
DQDB Buses and Nodes
DQDB Data Transmission
Distributed Queues
Queues
Reservation Token
DQDB Rings
Connecting LANs using T-Lines
Switched Multi-megabit Data Services
Use of DQDB, Single LAN
Use of DQDB, Multiple LANs
Frame Relay
Frame Relay Network

DTE- Data Terminal Equipment


DCE- Data Circuit Terminating EQUIPMENT
Frame X.25 Traffic
Architecture of an ATM Network
ATM Multiplexing
ATM Header

You might also like