Table of ContentsMultiple Access What is it all about? Some simple solutions Outline Contexts for the multiple access problem Contexts Contexts Solving the problem Outline Choices Constraints The parameter ‘a’ Outline Performance metrics Performance metrics Outline Base technologies FDMA TDMA CDMA CDMA FDD and TDD Outline Centralized access schemes Centralized access schemes Circuit mode Polling and probing Reservation-based schemes Outline Distributed schemes Decentralized polling Decentralized probing Carrier Sense Multiple Access (CSMA) Simplest CSMA scheme How to solve the collision problem Summary of CSMA schemes Ethernet More on Ethernet Recent developments Fast Ethernet variants Evaluating Ethernet CSMA/CA CSMA/CA algorithm Dealing with hidden terminals Dealing with hidden and exposed terminals Multiple Access Collision Avoidance Token passing Logical rings Ring operation Single and double rings Hub or star-ring Evaluating token ring Fiber Distributed Data Interface ALOHA and its variants Evaluating ALOHA Slotted ALOHA ALOHA schemes summarized Reservation ALOHA Evaluating R-ALOHA |
Author: S. Keshav
Email: skeshav@cs.cornell.edu Home Page: http://www.cs.cornell.edu/home/skeshav |