SlideShare a Scribd company logo
1 of 43
Comparison of MAC protocols in wired systems and wireless systems Mridula Sharma 19.07.2010 Comparison of MAC protocols in wired systems and wireless systems
Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Comparison of MAC protocols in wired systems and wireless systems
Introduction ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Comparison of MAC protocols in wired systems and wireless systems ,[object Object],[object Object],[object Object],[object Object]
Introduction Comparison of MAC protocols in wired systems and wireless systems
Introduction Functions of MAC layer Comparison of MAC protocols in wired systems and wireless systems ,[object Object],[object Object],[object Object]
Multiple Access Protocols ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Comparison of MAC protocols in wired systems and wireless systems
ALOHA ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Comparison of MAC protocols in wired systems and wireless systems
Pure ALOHA ,[object Object],[object Object],[object Object],[object Object],Comparison of MAC protocols in wired systems and wireless systems Fig. : Frames transmitted at completely random intervals
Pure ALOHA- Efficiency ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Comparison of MAC protocols in wired systems and wireless systems
Slotted ALOHA Comparison of MAC protocols in wired systems and wireless systems ,[object Object],[object Object],Fig. : Throughput versus offered traffic for ALOHA systems
Carrier Sense Multiple Access (CSMA) Comparison of MAC protocols in wired systems and wireless systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Comparison of MAC protocols in wired systems and wireless systems Fig. : Comparison of channel utilization versus load for various random access protocols
CSMA with Collision Detection (CSMA/CD) Comparison of MAC protocols in wired systems and wireless systems ,[object Object],[object Object],[object Object],Fig. : CSMA/CD can be in one of the three states:  Contention, Transmission or Idle .
Collision Free Protocols Comparison of MAC protocols in wired systems and wireless systems ,[object Object],[object Object]
Limited Contention Protocols Comparison of MAC protocols in wired systems and wireless systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Limited-Contention Protocols The Adaptive Tree Walk Protocol Comparison of MAC protocols in wired systems and wireless systems
Wavelength Division Multiple Access Protocols Comparison of MAC protocols in wired systems and wireless systems ,[object Object],[object Object],Fig. : Wavelength Division Multiple Access
Ethernet Comparison of MAC protocols in wired systems and wireless systems ,[object Object],[object Object],[object Object],[object Object]
802.3 Frame Layout Comparison of MAC protocols in wired systems and wireless systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Wireless Networks Comparison of MAC protocols in wired systems and wireless systems ,[object Object],[object Object]
Wireless LAN Requirements Comparison of MAC protocols in wired systems and wireless systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Problems Comparison of MAC protocols in wired systems and wireless systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Multiple Access with Collision Avoidance (MACA) Comparison of MAC protocols in wired systems and wireless systems ,[object Object],[object Object],[object Object],[object Object],[object Object]
MACA for Wireless (MACAW) Comparison of MAC protocols in wired systems and wireless systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Wireless LANs MAC Sublayer Comparison of MAC protocols in wired systems and wireless systems ,[object Object],[object Object]
Wireless LANs MAC Sublayer Comparison of MAC protocols in wired systems and wireless systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CSMA/CA Ethernet-like Comparison of MAC protocols in wired systems and wireless systems ,[object Object],[object Object],[object Object],[object Object],[object Object]
Comparison of MAC protocols in wired systems and wireless systems Fig. : IEEE 802.11 Medium Access Control Logic
CSMA/CA- MACAW Comparison of MAC protocols in wired systems and wireless systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CSMA/CA- point Coordination Comparison of MAC protocols in wired systems and wireless systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Comparison of MAC protocols in wired systems and wireless systems Fig. : IEEE 802.11 Protocol Architecture
802.11 MAC Frame Layout Comparison of MAC protocols in wired systems and wireless systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
802.11 MAC Frame Layout Comparison of MAC protocols in wired systems and wireless systems ,[object Object],[object Object],[object Object],[object Object],Note : 802.11 supports encryption at MAC level, Ethernet does not !!!
Broadband Wireless Comparison of MAC protocols in wired systems and wireless systems Goal : Use wireless connection between buildings i.e.  avoiding the use of the local loop ,[object Object],[object Object],[object Object],[object Object],WiMAX  (World Interoperability for Microwave Access) is a family of IEEE 802.16 aiming at replacing ADSL and cable modems
Broadband Wireless Comparison of MAC protocols in wired systems and wireless systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Fig. : TDD frame contatinig time slots
Broadband Wireless- 802.16 Frame Structure Comparison of MAC protocols in wired systems and wireless systems Fig. : (a) a generic frame (b) a bandwidth request frame ,[object Object],[object Object],[object Object],[object Object]
Wireless Sensor Networks Zigbee  Comparison of MAC protocols in wired systems and wireless systems ,[object Object],[object Object],[object Object]
Conclusion Comparison of MAC protocols in wired systems and wireless systems
Comparison of MAC protocols in wired systems and wireless systems Fig: Channel allocation methods and systems for a common channel
Conclusion Comparison of MAC protocols in wired systems and wireless systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Conclusion Comparison of MAC protocols in wired systems and wireless systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
References ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Comparison of MAC protocols in wired systems and wireless systems
Thank You!!! Any Questions??? Comparison of MAC protocols in wired systems and wireless systems

More Related Content

What's hot

The mac layer
The mac layerThe mac layer
The mac layer
aazamk
 
3.Medium Access Control
3.Medium Access Control3.Medium Access Control
3.Medium Access Control
Sonali Chauhan
 
Mac adhoc (1)
Mac adhoc (1)Mac adhoc (1)
Mac adhoc (1)
hinalala
 

What's hot (20)

Mac layer
Mac  layerMac  layer
Mac layer
 
The mac layer
The mac layerThe mac layer
The mac layer
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
 
The medium access sublayer
 The medium  access sublayer The medium  access sublayer
The medium access sublayer
 
Unit 1 mac vsd
Unit 1 mac vsdUnit 1 mac vsd
Unit 1 mac vsd
 
clas 8
clas 8clas 8
clas 8
 
3.Medium Access Control
3.Medium Access Control3.Medium Access Control
3.Medium Access Control
 
Medium Access PROTOCOL b yENGR. FAWAD KHAN UET BANNU KP PAKISTAN
Medium Access PROTOCOL b yENGR.  FAWAD KHAN UET BANNU KP PAKISTANMedium Access PROTOCOL b yENGR.  FAWAD KHAN UET BANNU KP PAKISTAN
Medium Access PROTOCOL b yENGR. FAWAD KHAN UET BANNU KP PAKISTAN
 
Multiple access protocol
Multiple access protocolMultiple access protocol
Multiple access protocol
 
Aloha
AlohaAloha
Aloha
 
Carrier Sense Multiple Access (CSMA)
Carrier Sense Multiple Access (CSMA)Carrier Sense Multiple Access (CSMA)
Carrier Sense Multiple Access (CSMA)
 
Mac protocols of adhoc network
Mac protocols of adhoc networkMac protocols of adhoc network
Mac protocols of adhoc network
 
Mac sub layer
Mac sub layerMac sub layer
Mac sub layer
 
Mac
MacMac
Mac
 
Csma protocols
Csma protocolsCsma protocols
Csma protocols
 
Snooping TCP
Snooping TCPSnooping TCP
Snooping TCP
 
aloha
alohaaloha
aloha
 
Mac adhoc (1)
Mac adhoc (1)Mac adhoc (1)
Mac adhoc (1)
 
Multiple Access in Computer Network
Multiple Access in Computer NetworkMultiple Access in Computer Network
Multiple Access in Computer Network
 
Wlan 802.11n - MAC Sublayer
Wlan 802.11n - MAC SublayerWlan 802.11n - MAC Sublayer
Wlan 802.11n - MAC Sublayer
 

Viewers also liked

Signal transmission and filtering section 3.1
Signal transmission and filtering section 3.1Signal transmission and filtering section 3.1
Signal transmission and filtering section 3.1
nahrain university
 
Signal transmission and filtering section 3.2
Signal transmission and filtering section 3.2Signal transmission and filtering section 3.2
Signal transmission and filtering section 3.2
nahrain university
 
Diversity Techniques in mobile communications
Diversity Techniques in mobile communicationsDiversity Techniques in mobile communications
Diversity Techniques in mobile communications
Diwaker Pant
 

Viewers also liked (19)

Wmc diversity
Wmc diversityWmc diversity
Wmc diversity
 
RADIATION & PROPAGATION - diversity
RADIATION & PROPAGATION - diversityRADIATION & PROPAGATION - diversity
RADIATION & PROPAGATION - diversity
 
Signal transmission and filtering section 3.1
Signal transmission and filtering section 3.1Signal transmission and filtering section 3.1
Signal transmission and filtering section 3.1
 
Signal transmission and filtering section 3.2
Signal transmission and filtering section 3.2Signal transmission and filtering section 3.2
Signal transmission and filtering section 3.2
 
Diversity techniques presentation material
Diversity techniques presentation materialDiversity techniques presentation material
Diversity techniques presentation material
 
Beam forming
Beam formingBeam forming
Beam forming
 
Equalization
EqualizationEqualization
Equalization
 
Bit interleaved coded modulation
Bit interleaved coded modulationBit interleaved coded modulation
Bit interleaved coded modulation
 
Optoelectronics seminar: MESFET
Optoelectronics seminar: MESFETOptoelectronics seminar: MESFET
Optoelectronics seminar: MESFET
 
Adaptive linear equalizer
Adaptive linear equalizerAdaptive linear equalizer
Adaptive linear equalizer
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
 
Measurement and Metrology
Measurement and MetrologyMeasurement and Metrology
Measurement and Metrology
 
Performance analysis of CSMA/CA and TDMA MAC protocols in Wireless Mesh Netw...
Performance analysis of CSMA/CA and TDMA  MAC protocols in Wireless Mesh Netw...Performance analysis of CSMA/CA and TDMA  MAC protocols in Wireless Mesh Netw...
Performance analysis of CSMA/CA and TDMA MAC protocols in Wireless Mesh Netw...
 
Lan architecture
Lan architectureLan architecture
Lan architecture
 
Metrology and Measuremenrt
Metrology and MeasuremenrtMetrology and Measuremenrt
Metrology and Measuremenrt
 
Diversity And Inclusion
Diversity And InclusionDiversity And Inclusion
Diversity And Inclusion
 
DIVERSITY POWERPOINT
DIVERSITY POWERPOINTDIVERSITY POWERPOINT
DIVERSITY POWERPOINT
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11
 
Diversity Techniques in mobile communications
Diversity Techniques in mobile communicationsDiversity Techniques in mobile communications
Diversity Techniques in mobile communications
 

Similar to MAC seminar

CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch Configuration
Dsunte Wilson
 
Ethernet and token ring
Ethernet and token ringEthernet and token ring
Ethernet and token ring
Abhijeet Shah
 

Similar to MAC seminar (20)

Media Access and Internetworking
Media Access and InternetworkingMedia Access and Internetworking
Media Access and Internetworking
 
CS6003 ADHOC & SENSOR NETWORKS
CS6003 ADHOC & SENSOR NETWORKSCS6003 ADHOC & SENSOR NETWORKS
CS6003 ADHOC & SENSOR NETWORKS
 
Mac
MacMac
Mac
 
Technical seminar
Technical seminarTechnical seminar
Technical seminar
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
W13-L1&2.pptx
W13-L1&2.pptxW13-L1&2.pptx
W13-L1&2.pptx
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
 
Ch5 data layer network
Ch5 data layer networkCh5 data layer network
Ch5 data layer network
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch Configuration
 
14653128.ppt
14653128.ppt14653128.ppt
14653128.ppt
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
Ethernet and token ring
Ethernet and token ringEthernet and token ring
Ethernet and token ring
 
Computer networks lan
Computer networks lanComputer networks lan
Computer networks lan
 
Mobile Computing (Part-2)
Mobile Computing (Part-2)Mobile Computing (Part-2)
Mobile Computing (Part-2)
 
Ethernet
EthernetEthernet
Ethernet
 
High speed Networking
High speed NetworkingHigh speed Networking
High speed Networking
 
Chapter 4ver2
Chapter 4ver2Chapter 4ver2
Chapter 4ver2
 
Westermo webinar: Learning the Basics of Ethernet Networking
Westermo webinar: Learning the Basics of Ethernet NetworkingWestermo webinar: Learning the Basics of Ethernet Networking
Westermo webinar: Learning the Basics of Ethernet Networking
 
Mac protocol for wmn
Mac protocol for wmnMac protocol for wmn
Mac protocol for wmn
 
IEEE 806.16
IEEE 806.16IEEE 806.16
IEEE 806.16
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

MAC seminar

  • 1. Comparison of MAC protocols in wired systems and wireless systems Mridula Sharma 19.07.2010 Comparison of MAC protocols in wired systems and wireless systems
  • 2.
  • 3.
  • 4. Introduction Comparison of MAC protocols in wired systems and wireless systems
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12. Comparison of MAC protocols in wired systems and wireless systems Fig. : Comparison of channel utilization versus load for various random access protocols
  • 13.
  • 14.
  • 15.
  • 16. Limited-Contention Protocols The Adaptive Tree Walk Protocol Comparison of MAC protocols in wired systems and wireless systems
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28. Comparison of MAC protocols in wired systems and wireless systems Fig. : IEEE 802.11 Medium Access Control Logic
  • 29.
  • 30.
  • 31. Comparison of MAC protocols in wired systems and wireless systems Fig. : IEEE 802.11 Protocol Architecture
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38. Conclusion Comparison of MAC protocols in wired systems and wireless systems
  • 39. Comparison of MAC protocols in wired systems and wireless systems Fig: Channel allocation methods and systems for a common channel
  • 40.
  • 41.
  • 42.
  • 43. Thank You!!! Any Questions??? Comparison of MAC protocols in wired systems and wireless systems