Ch_12
Ch_12
Media
Access
Control
(MAC)
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 12: Outline
12.3 CHANNELIZATION
Chapter 12: Objective
12.4
12-1 RANDOM ACCESS
In random-access or contention
no station is superior to another
station and
none is assigned control over
another. At each instance, a
station that has data to send uses
a procedure defined by the
protocol to make a decision on
whether or not to send. This
decision depends on the state of
12.5
12.12.1 ALOHA
12.6
Figure 12.2: Frames in a pure ALOHA network
12.7
Figure 12.3: Procedure for pure ALOHA protocol
12.8
Figure 12.4: Vulnerable time for pure ALOHA protocol
12.9
Figure 12.5: Frames in a slotted ALOHA network
12.10
Figure 12.6: Vulnerable time for slotted ALOHA
protocol
12.11
12.12.2 CSMA
12.12
Figure 12.7: Space/time model of a collision in CSMA
12.13
Figure 12.8: Vulnerable time in CSMA
12.14
Figure 12.9: Behavior of three persistence methods
12.15
Figure 12.10: Flow diagram for three persistence
methods
12.16
12.12.3 CSMA/CD
12.17
Figure 12.11: Collision of the first bits in CSMA/CD
12.18
Figure 12.12: Collision and abortion in CSMA/CD
12.19
Example 12. 5
A network using CSMA/CD has a bandwidth of 10 Mbps. If
the maximum propagation time (including the delays in the
devices and ignoring the time needed to send a jamming
signal, as we see later) is 25.6 μs, what is the minimum size
of the frame?
Solution
The minimum frame transmission time is Tfr = 2 × Tp =
512.2 μs. This means, in the worst case, a station needs to
transmit for a period of 512.2 μs to detect the collision. The
minimum size of the frame is 10 Mbps × 512.2 μs = 512 bits
or 64 bytes. This is actually the minimum size of the frame
for Standard Ethernet, as we will see later in the chapter.
12.20
Figure 12.13: Flow diagram for the CSMA/CD
12.21
Figure 12.14: Energy level during transmission, idleness, or
collision
12.22
12.12.4 CSMA/CA
12.23
Figure 12.15: Flow diagram for CSMA/CA
12.24
Figure 12.16: Contention window
12.25
Figure 12.17: CSMA/CA and NAV
12.26
12-2 CONTROLLED ACCESS
12.27
12.2.1 Reservation
12.28
Figure 12.18: Reservation access method
12.29
12.2.2 Polling
12.30
Figure 12.19: Select and poll functions in polling-
access method
12.31
12.2.3 Token Passing
12.32
Figure 12.20: Logical ring and physical topology in token-
passing
access method
12.33
12-3 CHANNELIZATION
12.35
Figure 12.21: Frequency-division multiple access
(FDMA)
12.36
12.3.2 TDMA
12.37
Figure 12.22: Time-division multiple access (TDMA)
12.38
12.3.3 CDMA
12.39
Figure 12.23: Simple idea of communication with code
12.40
Figure 12.24: Chip sequences
12.41
Figure 12.25: Data representation in CDMA
12.42
Figure 12.26: Sharing channel in CDMA
12.43
Figure 12.27: Digital signal created by four stations in
CDMA
12.44
Figure 12.28: Decoding of the composite signal for
one in CDMA
12.45
Figure 12.29: General rules and examples of creating Walsh
tables
12.46
Example 12.6
Find the chips for a network with
a. Two stations
b. Four stations
12.47
Example 12. 7
What is the number of sequences if we have 90 stations in
our network?
12.48
Example 12.8
Prove that a receiving station can get the data sent by a
specific sender if it multiplies the entire data on the channel
by the sender’s chip code and then divides it by the number
of stations.
12.49