MEDIUM-ACCESS CONTROL SUB LAYER.ppt

MEDIUM-ACCESS CONTROL
SUB LAYER
• Networks can be divided into two categories:
• Those using point-to-point connections and those using
broadcast channels
• In a face-to-face meeting, chaos is avoided by external means,
for example, at a meeting, people raise their hands to request
permission to speak
• When only a single channel is available, determining who
should go next is much harder
• Many protocols for solving the problem are known and form
the contents of this chapter.
• In the literature, broadcast channels are sometimes referred
to as multiaccess channels or random access channels
• The protocols used to determine who goes next on a multiaccess channel
belong to a sublayer of the data link layer called the MAC (Medium Access
Control) sublayer.
• Many algorithms for allocating a multiple access channel are known
• ALOHA
– Pure ALOHA
– Slotted ALOHA
• Carrier Sense Multiple Access Protocols
– Persistent and Nonpersistent CSMA
– CSMA with Collision Detection
– Collision-Free Protocols
• A Bit-Map Protocol
• Binary Countdown
• Limited-Contention Protocols
• The Adaptive Tree Walk Protocol
• Wavelength Division Multiple Access Protocols
• Wireless LAN Protocols
• MACA and MACAW
–
ALOHA
• In the 1970s, Norman Abramson and his colleagues-
University of Hawaii - new and elegant method to solve the
channel allocation problem
• Although Abramson's work, called the ALOHA system, ground-
based radio broadcasting, the basic idea is applicable to any
system in which uncoordinated users are competing for the
use of a single shared channel.
• ALOHA - pure and slotted -They differ with respect to whether
time is divided into discrete slots into which all frames must
fit
• Pure ALOHA- Pure ALOHA does not require global time
synchronization
• Slotted ALOHA - slotted ALOHA does
• ALOHA system is simple: transmit data to be sent-collisions-
colliding frames will be damaged
• With a LAN, the feedback is immediate
• Systems in which multiple users share a common channel in a
way that can lead to conflicts are widely known as contention
systems
MEDIUM-ACCESS CONTROL SUB LAYER.ppt
MEDIUM-ACCESS CONTROL SUB LAYER.ppt
Slotted ALOHA
• In 1972, Roberts published a method for
doubling the capacity of an ALOHA system
• In contrast to Abramson's pure ALOHA, a
computer is not permitted to send whenever
a carriage return is typed
• Instead, it is required to wait for the beginning
of the next slot
Carrier Sense Multiple Access
Protocols
• With slotted ALOHA the best channel utilization that can be
achieved is 1/e
• (e stands for collisions)
• These networks can achieve a much better utilization than 1/e
• In this section we will discuss some protocols for improving
performance
• Protocols in which stations listen for a carrier (i.e., a
transmission) and act accordingly are called carrier sense
protocols
Persistent and Nonpersistent CSMA
• The first carrier sense protocol - 1-persistent CSMA
• When a station has data to send, listens to the channel, if
anyone else is transmitting at that moment
• If the channel is busy, the station waits until it becomes idle
• When the station detects an idle channel, it transmits a frame
• If a collision occurs, the station waits a random amount of
time and starts all over again
• The protocol is called 1-persistent because the station
transmits with a probability of 1 when it finds the channel idle
• A second carrier sense protocol is nonpersistent CSMA
Nonpersistent CSMA
• Before sending, a station senses the channel
• If no one else is sending, the station begins doing so itself
• However, if the channel is already in use, the station does not
continually sense it for the purpose of seizing it immediately
upon detecting the end of the previous transmission
• Instead, it waits a random period of time and then repeats the
algorithm
• Consequently, this algorithm leads to better channel
utilization but longer delays than 1-persistent CSMA
• The last protocol is p-persistent -When a station becomes
ready to send, it senses the channel
• If it is idle, it transmits with a probability p
• If that slot is also idle, it either transmits or defers again, with
probabilities p and q. This process is repeated until either the
Comparison of the channel utilization versus load for
various random access protocols
CSMA with Collision Detection
• Persistent and nonpersistent CSMA protocols are
clearly an improvement over ALOHA
• Quickly terminating damaged frames saves time and
bandwidth. This protocol, known as CSMA/CD (CSMA
with Collision Detection)
• CSMA/CD can be in one of three states: contention,
transmission, or idle
Collision-Free Protocols
• Although collisions do not occur with CSMA/CD once a station has
unambiguously captured the channel, they can still occur during the
contention period
• CSMA/CD is not universally applicable
• In this section, we will examine some protocols that resolve the
contention for the channel without any collisions at all, not even during
the contention period
A Bit-Map Protocol
• In our first collision-free protocol, the basic bit-map
method, each contention period consists of exactly N
slots
• If station 0 has a frame to send, it transmits a 1 bit
during the zeroth slot
• No other station is allowed to transmit during this
slot
• N slots have passed by, each station has complete knowledge of which
stations wish to transmit
• Protocols like this in which the desire to transmit is broadcast before the
actual transmission are called reservation protocols
Binary Countdown
• A problem with the basic bit-map protocol is that the
overhead is 1 bit per station, so it does not scale well
to networks with thousands of stations
• All addresses are assumed to be the same length
• The bits in each address position from different
stations are BOOLEAN ORed together
• We will call this protocol binary countdown
• Example: stations C, H, D, A, G, B, E, F have priorities 7, 6, 5, 4,
3, 2, 1, and 0, respectively, then a successful transmission by D
puts it at the end of the list, giving a priority order of C, H, A,
G, B, E, F, D
• Thus, C remains virtual station 7, but A moves up from 4 to 5
and D drops from 5 to 0
• Station D will now only be able to acquire the channel if no
other station wants it
• Binary countdown is an example of a simple, elegant, and
efficient protocol that is waiting to be rediscovered
Limited-Contention Protocols
• Two basic strategies for channel acquisition in a cable
network:
• contention, as in CSMA, and collision-free methods
• Each strategy can be rated as to how well it does with respect
to the two important performance measures
• delay at low load and channel efficiency at high load
• It would be nice if we could combine the best properties of the
contention and collision-free protocols
• Arriving at a new protocol that used contention at low load to
provide low delay, but used a collision-free technique at high
load to provide good channel efficiency
• Such protocols, which we will call limited-contention protocols
The Adaptive Tree Walk Protocol
• Simple way of performing the necessary assignment is to use the
algorithm devised by the U.S. Army for testing soldiers for syphilis during
World War II (Dorfman, 1943)
• the stations as the leaves of a binary tree, as illustrated in Fig
• In the first contention slot following a successful frame transmission, slot
0, all stations are permitted to try to acquire the channel
• If one of them does so, fine. If there is a collision, then during slot 1 only
those stations falling under node 2 in the tree may compete
• If one of them acquires the channel, the slot following the frame is
reserved for those stations under node 3
• If, on the other hand, two or more stations under node 2 want to transmit,
there will be a collision during slot 1, in which case it is node 4's turn
during slot 2
MEDIUM-ACCESS CONTROL SUB LAYER.ppt
• If a collision occurs during slot 0, the entire
tree is searched, depth first, to locate all ready
stations
• Each bit slot is associated with some particular
node in the tree
• If a collision occurs, the search continues
recursively with the node's left and right
children
• If a bit slot is idle or if only one station
transmits in it, the searching of its node can
stop because all ready stations have been
located
Wavelength Division Multiple
Access Protocols
• A different approach to channel allocation is
to divide the channel into subchannels using
FDM, TDM, or both, and dynamically allocate
them as needed
• Schemes like this are commonly used on fiber
optic LANs to permit different conversations
to use different wavelengths (i.e., frequencies)
at the same time.
• To allow multiple transmissions at the same
time, the spectrum is divided into channels
(wavelength bands)
• Each station is assigned two channels
• A narrow channel is provided as a control
channel to signal the station, and a wide
channel is provided so the station can output
data frames.
Wavelength division multiple
access.
Wireless LAN Protocols
• To achieve true mobility, notebook computers need to use
radio (or infrared) signals for communication
• A system of notebook computers that communicate by radio
can be regarded as a wireless LAN
• These LANs have somewhat different properties than
conventional LANs and require special MAC sublayer
protocols.
• A common configuration for a wireless LAN is an office
building with base stations (also called access points)
strategically placed around the building
• All the base stations are wired together using copper or fiber
• For our purposes, it does not matter which are base stations
and which are notebooks
• The radio range is such that A and B are within each other's
range and can potentially interfere with one another
• C can also potentially interfere with both B and D, but not
with A
• If C does start transmitting, it will interfere at B, wiping out
the frame from A
• The problem of a station not being able to detect a potential
competitor for the medium because the competitor is too far
away is called the hidden station problem.
MACA and MACAW
• An early protocol designed for wireless LANs is
MACA (Multiple Access with Collision
Avoidance) (Karn, 1990)
• The basic idea behind it is for the sender to
stimulate the receiver into outputting a short
frame, so stations nearby can detect this
transmission and avoid transmitting for the
duration of the upcoming (large) data frame
MEDIUM-ACCESS CONTROL SUB LAYER.ppt
• Let us now consider how A sends a frame to B. A starts by
sending an RTS (Request To Send) frame to B, as shown in Fig.
4-12(a).
• This short frame (30 bytes) contains the length of the data
frame that will eventually follow.
• Then B replies with a CTS (Clear to Send) frame, as shown in
Fig. 4-12(b).
• The CTS frame contains the data length (copied from the RTS
frame).
• Upon receipt of the CTS frame, A begins transmission.
• Bharghavan et al. (1994) fine tuned MACA to
improve its performance and renamed their
new protocol MACAW (MACA for Wireless)
• Lost frames were not retransmitted until the
transport layer noticed their absence, much
later
• They solved this problem by introducing an
ACK frame after each successful data frame
• This change improves the fairness of the
protocol
Ethernet
1 de 33

Recomendados

DATA-LINK LAYER.ppt por
DATA-LINK LAYER.pptDATA-LINK LAYER.ppt
DATA-LINK LAYER.pptDrTThendralCompSci
348 visualizações52 slides
NETWORK LAYER.ppt por
NETWORK LAYER.pptNETWORK LAYER.ppt
NETWORK LAYER.pptDrTThendralCompSci
189 visualizações35 slides
PHYSICAL LAYER.ppt por
PHYSICAL LAYER.pptPHYSICAL LAYER.ppt
PHYSICAL LAYER.pptDrTThendralCompSci
302 visualizações81 slides
COMPUTER NETWORK por
COMPUTER NETWORKCOMPUTER NETWORK
COMPUTER NETWORKDrTThendralCompSci
242 visualizações39 slides
UNIT I.ppt por
UNIT I.pptUNIT I.ppt
UNIT I.pptDrTThendralCompSci
356 visualizações115 slides
Mac por
MacMac
MacVrince Vimal
625 visualizações40 slides

Mais conteúdo relacionado

Mais procurados

GSM Cell planning and frequency reuse por
GSM Cell planning and frequency reuseGSM Cell planning and frequency reuse
GSM Cell planning and frequency reuseShashank Asthana
4.5K visualizações28 slides
FDMA & TDMA por
FDMA & TDMAFDMA & TDMA
FDMA & TDMAMD. ABU TALHA
12.4K visualizações18 slides
Introduction to Massive Mimo por
Introduction to Massive MimoIntroduction to Massive Mimo
Introduction to Massive MimoAhmed Nasser Agag
26.1K visualizações27 slides
Imt 2000 por
Imt 2000Imt 2000
Imt 2000bharanisamratelesela
10.3K visualizações21 slides
Multiple access techniques for wireless communications por
Multiple access techniques for wireless communicationsMultiple access techniques for wireless communications
Multiple access techniques for wireless communicationsMETHODIST COLLEGE OF ENGG & TECH
45.3K visualizações74 slides
Mac protocols of adhoc network por
Mac protocols of adhoc networkMac protocols of adhoc network
Mac protocols of adhoc networkshashi712
23.4K visualizações29 slides

Mais procurados(20)

GSM Cell planning and frequency reuse por Shashank Asthana
GSM Cell planning and frequency reuseGSM Cell planning and frequency reuse
GSM Cell planning and frequency reuse
Shashank Asthana4.5K visualizações
FDMA & TDMA por MD. ABU TALHA
FDMA & TDMAFDMA & TDMA
FDMA & TDMA
MD. ABU TALHA12.4K visualizações
Introduction to Massive Mimo por Ahmed Nasser Agag
Introduction to Massive MimoIntroduction to Massive Mimo
Introduction to Massive Mimo
Ahmed Nasser Agag26.1K visualizações
Mac protocols of adhoc network por shashi712
Mac protocols of adhoc networkMac protocols of adhoc network
Mac protocols of adhoc network
shashi71223.4K visualizações
Wireless Local Area Networks por Dilum Bandara
Wireless Local Area NetworksWireless Local Area Networks
Wireless Local Area Networks
Dilum Bandara4.5K visualizações
multiple access techniques for wireless communication por Sajid ali
multiple access techniques for wireless communicationmultiple access techniques for wireless communication
multiple access techniques for wireless communication
Sajid ali1K visualizações
Cdma presentation por bsnlpandian
Cdma presentationCdma presentation
Cdma presentation
bsnlpandian21.9K visualizações
3G Basic Overview por Tel sol
3G Basic Overview3G Basic Overview
3G Basic Overview
Tel sol3.4K visualizações
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ... por Arun Chokkalingam
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
Arun Chokkalingam6.1K visualizações
Mobile Computing (Part-2) por Ankur Kumar
Mobile Computing (Part-2)Mobile Computing (Part-2)
Mobile Computing (Part-2)
Ankur Kumar7.6K visualizações
1. introduction to wireless communication por JAIGANESH SEKAR
1. introduction to wireless communication1. introduction to wireless communication
1. introduction to wireless communication
JAIGANESH SEKAR1.3K visualizações
2.6 cellular concepts - frequency reusing, channel assignment por JAIGANESH SEKAR
2.6   cellular concepts - frequency reusing, channel assignment2.6   cellular concepts - frequency reusing, channel assignment
2.6 cellular concepts - frequency reusing, channel assignment
JAIGANESH SEKAR495 visualizações
Media Access Control (MAC Layer) por Meenakshi Paul
Media Access Control (MAC Layer)Media Access Control (MAC Layer)
Media Access Control (MAC Layer)
Meenakshi Paul949 visualizações
Computer network switching por Shivani Godha
Computer network switchingComputer network switching
Computer network switching
Shivani Godha30.4K visualizações
Point to point microwave por nandkishorsuman
Point to point microwavePoint to point microwave
Point to point microwave
nandkishorsuman102.4K visualizações
Optical multiplexers por Aizaz Ahmed Sahito
Optical multiplexersOptical multiplexers
Optical multiplexers
Aizaz Ahmed Sahito4K visualizações
Fdma tdma-cdma-151223125532 por kassayemamo
Fdma tdma-cdma-151223125532Fdma tdma-cdma-151223125532
Fdma tdma-cdma-151223125532
kassayemamo215 visualizações
fdocuments.net_1-cellular-system-design-fundamentals-chapter-3-wireless-commu... por GeoffreyAlleyne
fdocuments.net_1-cellular-system-design-fundamentals-chapter-3-wireless-commu...fdocuments.net_1-cellular-system-design-fundamentals-chapter-3-wireless-commu...
fdocuments.net_1-cellular-system-design-fundamentals-chapter-3-wireless-commu...
GeoffreyAlleyne151 visualizações

Similar a MEDIUM-ACCESS CONTROL SUB LAYER.ppt

Media Access Control por
Media Access ControlMedia Access Control
Media Access ControlHusnainHadi
231 visualizações24 slides
Mac sub layer por
Mac sub layerMac sub layer
Mac sub layerDIKSHA_LAHRANI
18.3K visualizações55 slides
Multiple Access Protocal por
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocaltes31
14.5K visualizações67 slides
Unit-2 Media Access Protocols.pdf por
Unit-2 Media Access Protocols.pdfUnit-2 Media Access Protocols.pdf
Unit-2 Media Access Protocols.pdfSmtPArunaKumari
4 visualizações67 slides
Switching Concepts presentation por
Switching Concepts presentationSwitching Concepts presentation
Switching Concepts presentationzameer Abbas
1.2K visualizações36 slides
The medium access sublayer por
 The medium  access sublayer The medium  access sublayer
The medium access sublayerLal Bahadur Gehlot
26.5K visualizações69 slides

Similar a MEDIUM-ACCESS CONTROL SUB LAYER.ppt(20)

Media Access Control por HusnainHadi
Media Access ControlMedia Access Control
Media Access Control
HusnainHadi231 visualizações
Mac sub layer por DIKSHA_LAHRANI
Mac sub layerMac sub layer
Mac sub layer
DIKSHA_LAHRANI18.3K visualizações
Multiple Access Protocal por tes31
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
tes3114.5K visualizações
Unit-2 Media Access Protocols.pdf por SmtPArunaKumari
Unit-2 Media Access Protocols.pdfUnit-2 Media Access Protocols.pdf
Unit-2 Media Access Protocols.pdf
SmtPArunaKumari4 visualizações
Switching Concepts presentation por zameer Abbas
Switching Concepts presentationSwitching Concepts presentation
Switching Concepts presentation
zameer Abbas1.2K visualizações
The medium access sublayer por Lal Bahadur Gehlot
 The medium  access sublayer The medium  access sublayer
The medium access sublayer
Lal Bahadur Gehlot26.5K visualizações
dcn.pptx por ssuserf170c4
dcn.pptxdcn.pptx
dcn.pptx
ssuserf170c43 visualizações
Multiple access protocol por Merlin Florrence
Multiple access protocolMultiple access protocol
Multiple access protocol
Merlin Florrence66K visualizações
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015) por Tutun Juhana
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)
Tutun Juhana2.7K visualizações
multipleaccessprotocol-140213082552-phpapp02.pdf por GauravWankar2
multipleaccessprotocol-140213082552-phpapp02.pdfmultipleaccessprotocol-140213082552-phpapp02.pdf
multipleaccessprotocol-140213082552-phpapp02.pdf
GauravWankar23 visualizações
Multipleaccessprotocol 140213082552-phpapp02 por arifur rahman
Multipleaccessprotocol 140213082552-phpapp02Multipleaccessprotocol 140213082552-phpapp02
Multipleaccessprotocol 140213082552-phpapp02
arifur rahman115 visualizações
Packet radio protocol por Priya Kaushal
Packet radio protocolPacket radio protocol
Packet radio protocol
Priya Kaushal10.8K visualizações
Ec 2401 wireless communication unit 5 por JAIGANESH SEKAR
Ec 2401 wireless communication   unit 5Ec 2401 wireless communication   unit 5
Ec 2401 wireless communication unit 5
JAIGANESH SEKAR1.3K visualizações
UNIT-3 (2).pptx por 065JEEVASREEMCSE
UNIT-3 (2).pptxUNIT-3 (2).pptx
UNIT-3 (2).pptx
065JEEVASREEMCSE8 visualizações
link-medium-access-control.pptx por patrickwang85
link-medium-access-control.pptxlink-medium-access-control.pptx
link-medium-access-control.pptx
patrickwang852 visualizações
1 networking devices 2014 por Zuhaib Zaroon
1 networking devices 20141 networking devices 2014
1 networking devices 2014
Zuhaib Zaroon3.3K visualizações
Computer networks unit ii por JAIGANESH SEKAR
Computer networks    unit iiComputer networks    unit ii
Computer networks unit ii
JAIGANESH SEKAR768 visualizações
LTE Key Technologies por Abdulrahman Fady
LTE Key TechnologiesLTE Key Technologies
LTE Key Technologies
Abdulrahman Fady5.7K visualizações
Multiple access protocols in data communication networks por Nt Arvind
Multiple access protocols in data communication networksMultiple access protocols in data communication networks
Multiple access protocols in data communication networks
Nt Arvind1.4K visualizações

Mais de DrTThendralCompSci

The Application Layer.ppt por
The Application Layer.pptThe Application Layer.ppt
The Application Layer.pptDrTThendralCompSci
99 visualizações35 slides
Transport Layer.pptx por
Transport Layer.pptxTransport Layer.pptx
Transport Layer.pptxDrTThendralCompSci
76 visualizações28 slides
SOFTWARE QUALITY ASSURANCE.ppt por
SOFTWARE QUALITY ASSURANCE.pptSOFTWARE QUALITY ASSURANCE.ppt
SOFTWARE QUALITY ASSURANCE.pptDrTThendralCompSci
250 visualizações30 slides
Software Configuration Management.ppt por
Software Configuration Management.pptSoftware Configuration Management.ppt
Software Configuration Management.pptDrTThendralCompSci
12 visualizações23 slides
UNIT TESTING.pptx por
UNIT TESTING.pptxUNIT TESTING.pptx
UNIT TESTING.pptxDrTThendralCompSci
114 visualizações21 slides
SOFTWARE TESTING.pptx por
SOFTWARE TESTING.pptxSOFTWARE TESTING.pptx
SOFTWARE TESTING.pptxDrTThendralCompSci
362 visualizações48 slides

Mais de DrTThendralCompSci(17)

The Application Layer.ppt por DrTThendralCompSci
The Application Layer.pptThe Application Layer.ppt
The Application Layer.ppt
DrTThendralCompSci99 visualizações
Transport Layer.pptx por DrTThendralCompSci
Transport Layer.pptxTransport Layer.pptx
Transport Layer.pptx
DrTThendralCompSci76 visualizações
SOFTWARE QUALITY ASSURANCE.ppt por DrTThendralCompSci
SOFTWARE QUALITY ASSURANCE.pptSOFTWARE QUALITY ASSURANCE.ppt
SOFTWARE QUALITY ASSURANCE.ppt
DrTThendralCompSci250 visualizações
Software Configuration Management.ppt por DrTThendralCompSci
Software Configuration Management.pptSoftware Configuration Management.ppt
Software Configuration Management.ppt
DrTThendralCompSci12 visualizações
UNIT TESTING.pptx por DrTThendralCompSci
UNIT TESTING.pptxUNIT TESTING.pptx
UNIT TESTING.pptx
DrTThendralCompSci114 visualizações
SOFTWARE TESTING.pptx por DrTThendralCompSci
SOFTWARE TESTING.pptxSOFTWARE TESTING.pptx
SOFTWARE TESTING.pptx
DrTThendralCompSci362 visualizações
Wireless LANs PPT.ppt por DrTThendralCompSci
Wireless LANs PPT.pptWireless LANs PPT.ppt
Wireless LANs PPT.ppt
DrTThendralCompSci102 visualizações
Software design and Software engineering.pptx por DrTThendralCompSci
Software design and Software engineering.pptxSoftware design and Software engineering.pptx
Software design and Software engineering.pptx
DrTThendralCompSci105 visualizações
Software design and Software engineering.pptx por DrTThendralCompSci
Software design and Software engineering.pptxSoftware design and Software engineering.pptx
Software design and Software engineering.pptx
DrTThendralCompSci253 visualizações
Software prototyping.pptx por DrTThendralCompSci
Software prototyping.pptxSoftware prototyping.pptx
Software prototyping.pptx
DrTThendralCompSci148 visualizações
Requirement Engineering.ppt por DrTThendralCompSci
Requirement Engineering.pptRequirement Engineering.ppt
Requirement Engineering.ppt
DrTThendralCompSci130 visualizações
Unit 1 - Introduction to Software Engineering.ppt por DrTThendralCompSci
Unit 1 - Introduction to Software Engineering.pptUnit 1 - Introduction to Software Engineering.ppt
Unit 1 - Introduction to Software Engineering.ppt
DrTThendralCompSci210 visualizações
EFFECTIVE MODULAR DESIGN.pptx por DrTThendralCompSci
EFFECTIVE MODULAR DESIGN.pptxEFFECTIVE MODULAR DESIGN.pptx
EFFECTIVE MODULAR DESIGN.pptx
DrTThendralCompSci309 visualizações
PROCESS MODELS.ppt por DrTThendralCompSci
PROCESS MODELS.pptPROCESS MODELS.ppt
PROCESS MODELS.ppt
DrTThendralCompSci393 visualizações
Unit 1 - Introduction to Software Engineering.ppt por DrTThendralCompSci
Unit 1 - Introduction to Software Engineering.pptUnit 1 - Introduction to Software Engineering.ppt
Unit 1 - Introduction to Software Engineering.ppt
DrTThendralCompSci246 visualizações

Último

Monthly Information Session for MV Asterix (November) por
Monthly Information Session for MV Asterix (November)Monthly Information Session for MV Asterix (November)
Monthly Information Session for MV Asterix (November)Esquimalt MFRC
72 visualizações26 slides
CONTENTS.pptx por
CONTENTS.pptxCONTENTS.pptx
CONTENTS.pptxiguerendiain
62 visualizações17 slides
Class 9 lesson plans por
Class 9 lesson plansClass 9 lesson plans
Class 9 lesson plansTARIQ KHAN
51 visualizações34 slides
11.28.23 Social Capital and Social Exclusion.pptx por
11.28.23 Social Capital and Social Exclusion.pptx11.28.23 Social Capital and Social Exclusion.pptx
11.28.23 Social Capital and Social Exclusion.pptxmary850239
312 visualizações25 slides
Google solution challenge..pptx por
Google solution challenge..pptxGoogle solution challenge..pptx
Google solution challenge..pptxChitreshGyanani1
148 visualizações18 slides
Create a Structure in VBNet.pptx por
Create a Structure in VBNet.pptxCreate a Structure in VBNet.pptx
Create a Structure in VBNet.pptxBreach_P
78 visualizações8 slides

Último(20)

Monthly Information Session for MV Asterix (November) por Esquimalt MFRC
Monthly Information Session for MV Asterix (November)Monthly Information Session for MV Asterix (November)
Monthly Information Session for MV Asterix (November)
Esquimalt MFRC72 visualizações
CONTENTS.pptx por iguerendiain
CONTENTS.pptxCONTENTS.pptx
CONTENTS.pptx
iguerendiain62 visualizações
Class 9 lesson plans por TARIQ KHAN
Class 9 lesson plansClass 9 lesson plans
Class 9 lesson plans
TARIQ KHAN51 visualizações
11.28.23 Social Capital and Social Exclusion.pptx por mary850239
11.28.23 Social Capital and Social Exclusion.pptx11.28.23 Social Capital and Social Exclusion.pptx
11.28.23 Social Capital and Social Exclusion.pptx
mary850239312 visualizações
Google solution challenge..pptx por ChitreshGyanani1
Google solution challenge..pptxGoogle solution challenge..pptx
Google solution challenge..pptx
ChitreshGyanani1148 visualizações
Create a Structure in VBNet.pptx por Breach_P
Create a Structure in VBNet.pptxCreate a Structure in VBNet.pptx
Create a Structure in VBNet.pptx
Breach_P78 visualizações
Narration lesson plan por TARIQ KHAN
Narration lesson planNarration lesson plan
Narration lesson plan
TARIQ KHAN61 visualizações
ICS3211_lecture 09_2023.pdf por Vanessa Camilleri
ICS3211_lecture 09_2023.pdfICS3211_lecture 09_2023.pdf
ICS3211_lecture 09_2023.pdf
Vanessa Camilleri115 visualizações
Solar System and Galaxies.pptx por DrHafizKosar
Solar System and Galaxies.pptxSolar System and Galaxies.pptx
Solar System and Galaxies.pptx
DrHafizKosar106 visualizações
MercerJesse2.1Doc.pdf por jessemercerail
MercerJesse2.1Doc.pdfMercerJesse2.1Doc.pdf
MercerJesse2.1Doc.pdf
jessemercerail273 visualizações
S1_SD_Resources Walkthrough.pptx por LAZAROAREVALO1
S1_SD_Resources Walkthrough.pptxS1_SD_Resources Walkthrough.pptx
S1_SD_Resources Walkthrough.pptx
LAZAROAREVALO164 visualizações
Psychology KS5 por WestHatch
Psychology KS5Psychology KS5
Psychology KS5
WestHatch119 visualizações
How to empty an One2many field in Odoo por Celine George
How to empty an One2many field in OdooHow to empty an One2many field in Odoo
How to empty an One2many field in Odoo
Celine George87 visualizações
Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant... por Ms. Pooja Bhandare
Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant...Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant...
Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant...
Ms. Pooja Bhandare133 visualizações
Women from Hackney’s History: Stoke Newington by Sue Doe por History of Stoke Newington
Women from Hackney’s History: Stoke Newington by Sue DoeWomen from Hackney’s History: Stoke Newington by Sue Doe
Women from Hackney’s History: Stoke Newington by Sue Doe
History of Stoke Newington163 visualizações
EIT-Digital_Spohrer_AI_Intro 20231128 v1.pptx por ISSIP
EIT-Digital_Spohrer_AI_Intro 20231128 v1.pptxEIT-Digital_Spohrer_AI_Intro 20231128 v1.pptx
EIT-Digital_Spohrer_AI_Intro 20231128 v1.pptx
ISSIP386 visualizações
REPRESENTATION - GAUNTLET.pptx por iammrhaywood
REPRESENTATION - GAUNTLET.pptxREPRESENTATION - GAUNTLET.pptx
REPRESENTATION - GAUNTLET.pptx
iammrhaywood138 visualizações
Drama KS5 Breakdown por WestHatch
Drama KS5 BreakdownDrama KS5 Breakdown
Drama KS5 Breakdown
WestHatch98 visualizações

MEDIUM-ACCESS CONTROL SUB LAYER.ppt

  • 2. • Networks can be divided into two categories: • Those using point-to-point connections and those using broadcast channels • In a face-to-face meeting, chaos is avoided by external means, for example, at a meeting, people raise their hands to request permission to speak • When only a single channel is available, determining who should go next is much harder • Many protocols for solving the problem are known and form the contents of this chapter. • In the literature, broadcast channels are sometimes referred to as multiaccess channels or random access channels
  • 3. • The protocols used to determine who goes next on a multiaccess channel belong to a sublayer of the data link layer called the MAC (Medium Access Control) sublayer. • Many algorithms for allocating a multiple access channel are known • ALOHA – Pure ALOHA – Slotted ALOHA • Carrier Sense Multiple Access Protocols – Persistent and Nonpersistent CSMA – CSMA with Collision Detection – Collision-Free Protocols • A Bit-Map Protocol • Binary Countdown • Limited-Contention Protocols • The Adaptive Tree Walk Protocol • Wavelength Division Multiple Access Protocols • Wireless LAN Protocols • MACA and MACAW –
  • 4. ALOHA • In the 1970s, Norman Abramson and his colleagues- University of Hawaii - new and elegant method to solve the channel allocation problem • Although Abramson's work, called the ALOHA system, ground- based radio broadcasting, the basic idea is applicable to any system in which uncoordinated users are competing for the use of a single shared channel. • ALOHA - pure and slotted -They differ with respect to whether time is divided into discrete slots into which all frames must fit • Pure ALOHA- Pure ALOHA does not require global time synchronization • Slotted ALOHA - slotted ALOHA does
  • 5. • ALOHA system is simple: transmit data to be sent-collisions- colliding frames will be damaged • With a LAN, the feedback is immediate • Systems in which multiple users share a common channel in a way that can lead to conflicts are widely known as contention systems
  • 8. Slotted ALOHA • In 1972, Roberts published a method for doubling the capacity of an ALOHA system • In contrast to Abramson's pure ALOHA, a computer is not permitted to send whenever a carriage return is typed • Instead, it is required to wait for the beginning of the next slot
  • 9. Carrier Sense Multiple Access Protocols • With slotted ALOHA the best channel utilization that can be achieved is 1/e • (e stands for collisions) • These networks can achieve a much better utilization than 1/e • In this section we will discuss some protocols for improving performance • Protocols in which stations listen for a carrier (i.e., a transmission) and act accordingly are called carrier sense protocols
  • 10. Persistent and Nonpersistent CSMA • The first carrier sense protocol - 1-persistent CSMA • When a station has data to send, listens to the channel, if anyone else is transmitting at that moment • If the channel is busy, the station waits until it becomes idle • When the station detects an idle channel, it transmits a frame • If a collision occurs, the station waits a random amount of time and starts all over again • The protocol is called 1-persistent because the station transmits with a probability of 1 when it finds the channel idle • A second carrier sense protocol is nonpersistent CSMA
  • 11. Nonpersistent CSMA • Before sending, a station senses the channel • If no one else is sending, the station begins doing so itself • However, if the channel is already in use, the station does not continually sense it for the purpose of seizing it immediately upon detecting the end of the previous transmission • Instead, it waits a random period of time and then repeats the algorithm • Consequently, this algorithm leads to better channel utilization but longer delays than 1-persistent CSMA • The last protocol is p-persistent -When a station becomes ready to send, it senses the channel • If it is idle, it transmits with a probability p • If that slot is also idle, it either transmits or defers again, with probabilities p and q. This process is repeated until either the
  • 12. Comparison of the channel utilization versus load for various random access protocols
  • 13. CSMA with Collision Detection • Persistent and nonpersistent CSMA protocols are clearly an improvement over ALOHA • Quickly terminating damaged frames saves time and bandwidth. This protocol, known as CSMA/CD (CSMA with Collision Detection) • CSMA/CD can be in one of three states: contention, transmission, or idle
  • 14. Collision-Free Protocols • Although collisions do not occur with CSMA/CD once a station has unambiguously captured the channel, they can still occur during the contention period • CSMA/CD is not universally applicable • In this section, we will examine some protocols that resolve the contention for the channel without any collisions at all, not even during the contention period
  • 15. A Bit-Map Protocol • In our first collision-free protocol, the basic bit-map method, each contention period consists of exactly N slots • If station 0 has a frame to send, it transmits a 1 bit during the zeroth slot • No other station is allowed to transmit during this slot
  • 16. • N slots have passed by, each station has complete knowledge of which stations wish to transmit • Protocols like this in which the desire to transmit is broadcast before the actual transmission are called reservation protocols
  • 17. Binary Countdown • A problem with the basic bit-map protocol is that the overhead is 1 bit per station, so it does not scale well to networks with thousands of stations • All addresses are assumed to be the same length • The bits in each address position from different stations are BOOLEAN ORed together • We will call this protocol binary countdown
  • 18. • Example: stations C, H, D, A, G, B, E, F have priorities 7, 6, 5, 4, 3, 2, 1, and 0, respectively, then a successful transmission by D puts it at the end of the list, giving a priority order of C, H, A, G, B, E, F, D • Thus, C remains virtual station 7, but A moves up from 4 to 5 and D drops from 5 to 0 • Station D will now only be able to acquire the channel if no other station wants it • Binary countdown is an example of a simple, elegant, and efficient protocol that is waiting to be rediscovered
  • 19. Limited-Contention Protocols • Two basic strategies for channel acquisition in a cable network: • contention, as in CSMA, and collision-free methods • Each strategy can be rated as to how well it does with respect to the two important performance measures • delay at low load and channel efficiency at high load • It would be nice if we could combine the best properties of the contention and collision-free protocols • Arriving at a new protocol that used contention at low load to provide low delay, but used a collision-free technique at high load to provide good channel efficiency • Such protocols, which we will call limited-contention protocols
  • 20. The Adaptive Tree Walk Protocol • Simple way of performing the necessary assignment is to use the algorithm devised by the U.S. Army for testing soldiers for syphilis during World War II (Dorfman, 1943) • the stations as the leaves of a binary tree, as illustrated in Fig • In the first contention slot following a successful frame transmission, slot 0, all stations are permitted to try to acquire the channel • If one of them does so, fine. If there is a collision, then during slot 1 only those stations falling under node 2 in the tree may compete • If one of them acquires the channel, the slot following the frame is reserved for those stations under node 3 • If, on the other hand, two or more stations under node 2 want to transmit, there will be a collision during slot 1, in which case it is node 4's turn during slot 2
  • 22. • If a collision occurs during slot 0, the entire tree is searched, depth first, to locate all ready stations • Each bit slot is associated with some particular node in the tree • If a collision occurs, the search continues recursively with the node's left and right children • If a bit slot is idle or if only one station transmits in it, the searching of its node can stop because all ready stations have been located
  • 23. Wavelength Division Multiple Access Protocols • A different approach to channel allocation is to divide the channel into subchannels using FDM, TDM, or both, and dynamically allocate them as needed • Schemes like this are commonly used on fiber optic LANs to permit different conversations to use different wavelengths (i.e., frequencies) at the same time.
  • 24. • To allow multiple transmissions at the same time, the spectrum is divided into channels (wavelength bands) • Each station is assigned two channels • A narrow channel is provided as a control channel to signal the station, and a wide channel is provided so the station can output data frames.
  • 26. Wireless LAN Protocols • To achieve true mobility, notebook computers need to use radio (or infrared) signals for communication • A system of notebook computers that communicate by radio can be regarded as a wireless LAN • These LANs have somewhat different properties than conventional LANs and require special MAC sublayer protocols. • A common configuration for a wireless LAN is an office building with base stations (also called access points) strategically placed around the building • All the base stations are wired together using copper or fiber
  • 27. • For our purposes, it does not matter which are base stations and which are notebooks • The radio range is such that A and B are within each other's range and can potentially interfere with one another • C can also potentially interfere with both B and D, but not with A
  • 28. • If C does start transmitting, it will interfere at B, wiping out the frame from A • The problem of a station not being able to detect a potential competitor for the medium because the competitor is too far away is called the hidden station problem.
  • 29. MACA and MACAW • An early protocol designed for wireless LANs is MACA (Multiple Access with Collision Avoidance) (Karn, 1990) • The basic idea behind it is for the sender to stimulate the receiver into outputting a short frame, so stations nearby can detect this transmission and avoid transmitting for the duration of the upcoming (large) data frame
  • 31. • Let us now consider how A sends a frame to B. A starts by sending an RTS (Request To Send) frame to B, as shown in Fig. 4-12(a). • This short frame (30 bytes) contains the length of the data frame that will eventually follow. • Then B replies with a CTS (Clear to Send) frame, as shown in Fig. 4-12(b). • The CTS frame contains the data length (copied from the RTS frame). • Upon receipt of the CTS frame, A begins transmission.
  • 32. • Bharghavan et al. (1994) fine tuned MACA to improve its performance and renamed their new protocol MACAW (MACA for Wireless) • Lost frames were not retransmitted until the transport layer noticed their absence, much later • They solved this problem by introducing an ACK frame after each successful data frame • This change improves the fairness of the protocol