Professional Documents
Culture Documents
Unit- 5
LAN & MAN Protocols
Topics to be discussed :
ALOHA
Carrier Sense Multiple Access
Carrier Sense Multiple Access with Collision Detection
Carrier Sense Multiple Access with Collision Avoidance
12.4
Frames in a pure ALOHA network
Vulnerable time for pure ALOHA protocol
Analysis of Throughput of Pure
ALOHA
• If G = 0.5,
and for that S = 1/2e = 0.18. So, the
maximum throughput is only 18% of capacity.
Slotted Aloha Protocol
Vulnerable Time for Slotted
Aloha Protocol
The throughput for slotted ALOHA is
S = G × e−G .
The maximum throughput
Smax = 0.368 when G = 1.
12.11
Space/time model of the collision in CSMA
Behavior of three persistence methods
Flow diagram for three persistence methods
Throughput
1.0 0.01-persistent CSMA
0.9 Nonpersistent CSMA
0.8
0.7
0.1-persistent CSMA
0.6
0.5-persistent CSMA
0.5
S
1-persistent CSMA
0.4
0.3
0.2
Slotted Aloha
Aloha
0.1
0
0 1 2 3 4 5 6 7 8 9
G
15
CSMA/CD
Flow diagram for the CSMA/CD
CSMA/CA
In CSMA/CA, if the station finds the channel
busy, it does not restart the timer of the
contention window;
it stops the timer and restarts it when the
channel becomes idle.
In controlled access, the stations consult one another to find which station has
the right to send. A station cannot send unless it has been authorized by other
stations. We discuss three popular controlled-access methods.
Reservation
Polling
Token Passing
Reservation access method
Select and poll functions in polling access method
Logical ring and physical topology in token-passing access method
CHANNELIZATION