Skip to Main Content
Fundamentals of Data Communication Networks
book

Fundamentals of Data Communication Networks

by Oliver C. Ibe
November 2017
Beginner content levelBeginner
320 pages
8h 38m
English
Wiley
Content preview from Fundamentals of Data Communication Networks

Chapter 4Multiple Access Schemes

4.1 Introduction

Multiple access schemes are used whenever there is a need for a number of independent users to share a resource that may be scarce or expensive. For example, in a communication environment, users may need to communicate with one another over a shared medium. The term “multiple access” means that many devices can connect to and share the same medium. One feature of such a shared medium is that when any user transmits their information, many of the users that are connected to the medium can receive the transmission. The role of a multiple access scheme is to coordinate the transmissions from the users to avoid a “collision” in the medium and define steps that can be taken to resolve collisions when they occur. A collision occurs when two or more users transmit their information in the medium in such a manner that at least one bit from one user overlaps with another bit from another user. In this case, the transmissions are unusable, and the information needs to be retransmitted.

A multiple access scheme must be able to handle several users without mutual interference. Also, it should be able to maximize the spectrum efficiency. In this chapter, we consider some of the popular multiple access schemes. These schemes can be divided into three categories:

  1. (a)  Orthogonal access schemes, in which transmissions are perfectly scheduled to avoid collision of two or more user packets on the channel.
  2. (b)  Controlled access schemes, in ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Zero Trust Networks, 2nd Edition

Zero Trust Networks, 2nd Edition

Razi Rais, Christina Morillo, Evan Gilman, Doug Barth
CCNP and CCIE Enterprise Core ENCOR 350-401 Official Cert Guide, 2nd Edition

CCNP and CCIE Enterprise Core ENCOR 350-401 Official Cert Guide, 2nd Edition

Brad Edgeworth, Ramiro Garza Rios, David Hucaby, Jason Gooley

Publisher Resources

ISBN: 9781119436256Purchase book