 Hello everyone. Myself Shope, I am Matigar. I am working as a assistant professor in computer science and engineering department at Walsh and Instruct Technology, SolarPore. I welcome you all to the session on IEEE Standards, Learning Outcomes. At the end of the session, the students will be able to identify different types of protocols and applications of each protocols. The first one is students will be able to identify different types of IEEE Standards and uses of each standards. These are the agenda, collision-free protocol, limited-contention protocol, IEEE Standards 802.3, that is Ethernet. First one is collision-free protocol. In the previous video, we have discussed about the CSMA protocol and then multiple access protocol and then MAC protocol and some other protocol. First collision-free protocol, while transmitting the frames from one station to another station, we have to check whether the collision can occurs or not. Based on that only, the collision-based protocols are ALOHA, CSMA and CD, are the good when the network load is high. The collision-free protocols are good when load is high, in that time bitmap protocol and then binary countdown protocol. These are the two protocols we have to use for collision-free protocol and then collision-based protocol. First one is collision-free protocol, bitmap protocol, the bitmap protocol we can also call it as a reservation protocol. Bitmap protocol, the stations take turns transmitting a single frame at a full rate in bits per second. Trace in order, access to shared medium so that every station has a chance to transfer a data. Each cycle begins when a reservation interval that consisting of mini slots. One mini slot for each of the N stations, for that we have to use three different steps or methods that are reservation, polling and token passing. What is reservation? After transmitting the data from one station to another station, the current station, how to reserve in the current next station, then after transmitting the data, the data directly will go to that particular reserve station, the data will be stored in that particular station. For example, here first five reservation frames are there, one, two, three, four, five, total five frames are there, the reservation frames and then this is the first data how stored your user want to store in the first place, it can be reserved. Then after transmitting the data from reservation frame, directly the data will store in the yellow colored place only. In the same manner, here at the end there are total five frames are there, frame one, two, three, four, five. These frames before transmitting they have reserved in the next station after transmitting the frames from current station to the next station, the data directly will goes to that particular reserved places then it will store. Then after storing, here the user won't face a problem for collision detection. Reserved as the name itself indicates bitmap protocol. Before transmitting, we have to reserve in the next station that whatever the map reservation place is there, the current data will goes to that particular places it will store. That is bitmap protocol, after mapping then the data will store in the next station. Binary countdown protocol, each station sends the data or address bits in some order from highest order bit to the lowest order bit. For example, if the user want to transfer some amount of data it means first we have to go to the higher order bit then we can go to the lower order bit. The bits in each position from different stations we have to perform the OR operation. Nodes, there are five nodes are there or four nodes are there A, B, C, D and then addresses there are five addresses are there, A address is 0 0 1 0, B is 0 1 0 1, C is 1 0 1 0, D is 1 double 0 1 and then next one is 1 0 1 0. In out of these addresses we have to check out which one is the highest priority then if it is highest priority then we have to give it up then we can go to the next one. For example, node C is the highest priority that is 1 0 1 0 having highest priority then gets transmits. Then after transmitting C then we can go to the next higher priority then after that we can go to the we have to follow the same procedure for transmitting the addresses. The problem with this protocol is that the nodes with highest address always wins. This is a reflection spot the reflection spot can contains one question that is a list the different applications of collision free protocol. Now pass the video and answer the question for answer for this one. Now let us see the answer for this one is application for bitmap protocol collision free protocol in the reservation places we have to use it is used in satellite communication. Next one is limited contents in protocol in the limited contents in protocol the collision based protocols that are ALUHA, CSMA, CD are good when the network load is low then collision free protocols that is bitmap protocol and binary count on protocol are good when network load is high about how about combining their advantages limited contents in protocol. If the station behaves like a ALUHA scheme under high load the station behaves like the bitmap scheme under heavy load these are the different protocols we have to use in the MAC protocol. Now let us see the IEEE standards IEEE standards is an Ethernet there are so many IEEE standards are there 802.3, 802.4, 802.5, 802.6 there are so many IEEE standards are there out of those IEEE standards in this video I am going to explain only first IEEE standard that is 802.3 is one of the most widely used standard for computer networking and general data communications okay IEEE 802.3 is a family of standards for LANs which defines and logical link control and several MAC sub layers. If the user how our current station how some frames they want to transfer that frame from one stations to another station then what they have to follow how they have to send the data in the form of frames okay and that first one is when a computer wants to transmit a frame from current station to the next station what we have to do and then when a computer wants to receive our data from next station or previous station then what steps we have to follow it is there in next slide that is carrier sense multiple access with collision detection that is CSMA slash CD the basic idea when a station when a station have a frame to transmit listen for transmission on cable that is carrier sense when a medium is quiet and another station transmitting the ferry or transmitting frame listening for collision if collision is here then stop transmitting wait random moment of time and then transmit again this is the frame format that is there are some fields are there preamble SFD source destination address source address type data and CRC preamble field it is a 7 bits SFD that is start of frame delimiter 1 byte destination address 6 bytes source address 6 bytes type 2 bytes data in this place the user actual data they can keep that is size is 46d1500 bytes okay CRC that is cyclic redundancy check it is a 4 bytes it can be used for finding the errors while transmitting the frame from one station to another station okay these are the different fields are there in a frame frame field that can contain the different part and then it can be used there is a preamble field is a starter field and the start of the frame delimiter it is a starting field here we have to use some mnemonics for fixing the starting end of the frame frame the destination address the destination address can contain the remote information or receiver information source address it is a current user information that is client information or current sender information the length of the data that it depends upon the user this is a x-hole data they can keep in a frame then that they can transfer the data that is the data what type of data they have to mention before transmitting the data in the form of frame check some check some field can be used by transmitting the data if the data is corrupted data is lost or somebody somebody have hacked the data then to find out that information we have to use the check some part okay these are the references I have used for referring this video thank you