Multiple Access

8/17/97


Click here to start


Table of Contents

Multiple Access

What is it all about?

Some simple solutions

Outline

Contexts for the multiple access problem

Contexts

Contexts

Solving the problem

Outline

Choices

Constraints

The parameter a

Outline

Performance metrics

Performance metrics

Outline

Base technologies

FDMA

TDMA

CDMA

CDMA

FDD and TDD

Outline

Centralized access schemes

Centralized access schemes

Circuit mode

Polling and probing

Reservation-based schemes

Outline

Distributed schemes

Decentralized polling

Decentralized probing

Carrier Sense Multiple Access (CSMA)

Simplest CSMA scheme

How to solve the collision problem

Summary of CSMA schemes

Ethernet

More on Ethernet

Recent developments

Fast Ethernet variants

Evaluating Ethernet

CSMA/CA

CSMA/CA algorithm

Dealing with hidden terminals

Dealing with hidden and exposed terminals

Multiple Access Collision Avoidance

Token passing

Logical rings

Ring operation

Single and double rings

Hub or star-ring

Evaluating token ring

Fiber Distributed Data Interface

ALOHA and its variants

Evaluating ALOHA

Slotted ALOHA

ALOHA schemes summarized

Reservation ALOHA

Evaluating R-ALOHA

Author: S. Keshav

Email: skeshav@cs.cornell.edu

Home Page: http://www.cs.cornell.edu/home/skeshav

Download presentation source