SlideShare a Scribd company logo
Ch-12
Media Access Control
- ASST. PROF. MEENAKSHI PAUL
G. N. KHALSA COLLEGE
Outline
12.1 RANDOM ACCESS
12.1.1 ALOHA
12.1.2 CSMA
12.1.3 CSMA/CD
12.1.4 CSMA/CA
12.2 CONTROLLED ACCESS
12.2.1 Reservation
12.2.2 Polling
12.2.3 Token Passing
12.3 CHANNELIZATION
12.3.1 FDMA
12.3.2 TDMA
12.3.3 CDMA
2
Introduction
 The medium access control (MAC) is a sublayer of the data link layer.
 The MAC sublayer emulates a full-duplex logical communication channel in a
multipoint network.
 This channel may provide unicast, multicast, or broadcast communication service.
 The MAC sublayer uses MAC protocols to ensure that signals sent from different
stations across the same channel don't collide. Eg: two people speak
 A multiple-access protocol to coordinate access to the link (multipoint or broadcast
link).
 Many protocols have been devised to handle access to a shared link.
3
Taxonomy of Multiple-access protocols 4
Random
Access
12.1Random Access
 Also called contention-based access
 No station is superior to another station and No station is assigned to control
another.
 A station that has data to send uses a procedure defined by the protocol to
make a decision on whether or not to send.
 Decision depends on the state of the medium (idle or busy).
 Two features of RA:
 No scheduled time for a station to transmit
 No rules specify which station should send next
 Stations compete with one another to access the medium
6
12.1.1 ALOHA
 Aloha is the type of Random access protocol
 ALOHA, was developed at the University of Hawaii in early 1970.
 It was designed for a radio (wireless) LAN, but it can be used on any
shared medium.
 It have two types one is Pure Aloha and another is Slotted Aloha.
 There is a potential of collisions
 The medium is shared between the stations.
 When a station sends data, another station may attempt to do so at the
same time.
 The data from the two stations collide and become garbled.
7
12.1.1Pure ALOHA
 The original ALOHA protocol is called pure ALOHA.
 This is a simple but elegant protocol.
 The idea is that each station sends a frame whenever it has a
frame to send (multiple access).
 However, since there is only one channel to share, there is
the possibility of collision between frames from different
stations.
8
Frames in Pure ALOHA
9
12.1.1Pure ALOHA Contd…
 If collision occurs then retransmission frames.
 The pure ALOHA protocol relies on acknowledgments from the receiver.
 If the acknowledgment does not arrive after a time-out period, then
retransmission take place.
 If all these stations try to resend their frames after the time-out, the frames will
collide again.
 After time-out, each station waits a random amount of time (backoff time TB)
before resending its frame.
 This help avoid more collisions.
10
11
Procedure for pure ALOHA protocol
12.1.1.2 Slotted ALOHA
 Slotted Aloha divides the time of shared channel into discrete intervals called
as time slots.
 Any station can transmit its data in any time slot.
 The only condition is that station must start its transmission from the
beginning of the time slot.
 If the beginning of the slot is missed, then station has to wait until the
beginning of the next time slot.
 A collision may occur if two or more stations try to transmit data at the
beginning of the same time slot.
 Slotted ALOHA was invented to improve the efficiency of pure ALOHA.
12
12.1.1.2 Slotted ALOHA
13
CSMA
14
12.1.2 CSMA
 To minimize the chance of collision and to increase the
performance
 Principle of CSMA: “sense before transmit” or “listen
before talk”
 Carrier busy= Transmission is taking place
 Carrier idle= No transmission currently taking place
 CSMA can reduce the possibility of collision, but it
cannot eliminate it.
15
12.1.2 Collision in CSMA
 At time t1, station B senses the
medium and finds it idle, so it
sends a frame.
 At time t2 (t2 > t1), station C
senses the medium and finds it
idle because, at this time, the
first bits from station B have not
reached station C.
 Station C also sends a frame.
 The two signals collide and
both frames are destroyed.
16
B
C
Persistence Methods
 What should a station do if the channel is busy?
 What should a station do if the channel is idle?
 Three methods have been devised to answer these
questions:
 1-persistent method
 nonpersistent method
 p-persistent method
17
1-Persistent
 The 1-persistent method is simple and straightforward.
 In this method, after the station finds the line idle, it sends its frame
immediately (with probability 1).
 This method has the highest chance of collision because two or more
stations may find the line idle and send their frames immediately.
18
Non-persistent
 In the non-persistent method, a station that has a frame to send senses the
line
 If the line is idle, it sends immediately.
 If the line is not idle, it waits a random amount of time and then senses the
line again.
 The nonpersistent approach reduces the chance of collision
19
p-Persistent
 If the channel has time slots with a slot duration equal to or greater than the
maximum propagation time.
 The p-persistent approach combines the advantages of the other two strategies.
 It reduces the chance of collision and improves efficiency.
20
CSMA/CD
21
12.1.3 CSMA/CD
 Carrier Sense Multiple Access with Collision Detection
 Station monitors channel while sending a frame
 If, however, there is a collision, the frame is sent again.
 Eg. Collision of the first bit in CSMA/CD,stations A and C are
involved in the collision.
22
23
 At time t1, station A has executed its persistence procedure and starts sending the
bits of its frame.
 At time t2, station C has not yet sensed the first bit sent by A.
 Station C executes its persistence procedure and starts sending the bits in its frame,
which propagate both to the left and to the right.
 The collision occurs sometime after time t2.
 Station C detects a collision at time t3 when it receives the first bit of A’s frame.
 Station C immediately aborts transmission.
 Station A detects collision at time t4 when it receives the first bit of C’s frame; it
also immediately aborts transmission.
 Looking at the figure, we see that A transmits for the duration t4 − t1; C transmits for
the duration t3 − t2.
Collision and abortion in
CSMA/CD
24
CSMA/CD: Flow Diagram
25
CSMA/CA
26
12.1.3 CSMA/CA
 Carrier Sense Multiple Access with Collision Avoidance was invented for
wireless networks
 Used in a network where collision cannot be detected
 Collisions are avoided through the use of CSMA/CA’s three strategies:
 Interframe space (IFS)
 Contention window
 Acknowledgments
27
12.1.3 CSMA/CA Contd…
 Interframe space (IFS)
 When an idle channel is found, the station does not send immediately.
 It waits for a period of time called the interframe space or IFS.
 Contention Window
 The contention window is an amount of time divided into slots.
 if station determine that the channel is free, they wait a random amount of time
before they start sending.
 This time window doubles with each collision and corresponds to the binary
exponential backoff (BEB) that is familiar from CSMA/CD.
 Acknowledgment:
 The positive acknowledgment and the time-out timer can help guarantee that the
receiver has received the frame.
28
29
CSMA/ CA and NAV
 DIFS: DCF interframe space
 RTS: Request to Send
 SIFS: Short interframe space
(SIFS)
 NAV: Network Allocation Vector
30
Controlled
Access
12.2 CONTROLLED ACCESS
 In controlled access, the stations consult one another to find which station
has the right to send.
 A station cannot send unless it has been authorized by other stations.
 Three common methods:
 Reservation
 Polling
 Token passing
32
12.2.1 Reservation
 A station needs to make a reservation before sending data.
 Time is divided into intervals.
 In each interval, a reservation frame precedes the data frames sent in that
interval.
 If there are N stations in the system, there are exactly N reservation minislots in
the reservation frame.
33
12.2.2 Polling
 Polling works with topologies in which one device is
designated as a primary station and the other devices are
secondary stations.
 Primary device is the initiator of a session.
 All data exchanges must be made through the primary
device.
 Primary device controls the link; the secondary devices
follow its instructions.
34
Select and poll functions in polling-
access method
 Select
 The select function is used whenever the primary device has something to send.
 Poll
 The poll function is used by the primary device to solicit transmissions from the
secondary devices.
35
12.2.3 Token Passing
 The stations in a network are organized in a logical ring.
 For each station, there is a predecessor and a successor.
 The right to this access has been passed from the predecessor to the current station.
 The right will be passed to the successor when the current station has no more data to send.
 The RIGHT passed from by means of special packet called “TOKEN”.
36
Channelization
12.3 Channelization
 Channelization is a multiple-access method in which the available bandwidth
of a link is shared in time, frequency, or through code, among different
stations.
 Similar to multiplexing
 Three schemes
 Frequency-Division Multiple Access (FDMA)
 Time-Division Multiple Access (TDMA)
 Code-Division Multiple Access (CDMA)
38
12.3.1 Frequency-Division Multiple
Access (FDMA)
• Available bandwidth is divided into frequency bands.
• Each band is reserved for a specific station.
• Each station also uses a bandpass filter to confine the transmitter frequencies.
39
12.3.2 TDMA
• Stations share the bandwidth of the channel in time.
• Each station is allocated a time slot during which it can send data.
40
12.3.3 CDMA
 One channel carries all transmissions at the same time
 https://www.youtube.com/watch?v=5plZGFd-cWc
 Each channel is separated by code
41
CDMA: Chip Sequences
 Each station is assigned a unique chip sequence
 Chip sequences are orthogonal vectors
 Inner product of any pair must be zero
 With N stations, sequences must have the following
properties:
 They are of length N
 Their self inner product is always N
42
CDMA: Bit Representation
43
Transmission in CDMA
44
Ad

More Related Content

What's hot (20)

Mac layer
Mac  layerMac  layer
Mac layer
Shubham Kansal
 
Flow & Error Control
Flow & Error ControlFlow & Error Control
Flow & Error Control
tameemyousaf
 
Csma
CsmaCsma
Csma
myrajendra
 
Bandwidth utilization
Bandwidth utilizationBandwidth utilization
Bandwidth utilization
Pallab Kumar Nandi
 
CSMA /CD PPT ON SLIDESHARE
CSMA /CD PPT ON SLIDESHARECSMA /CD PPT ON SLIDESHARE
CSMA /CD PPT ON SLIDESHARE
Khushboo Pal
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
Bushra M
 
data-link layer protocols
data-link layer protocols  data-link layer protocols
data-link layer protocols
BE Smârt
 
Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocol
asimnawaz54
 
Csma protocols
Csma protocolsCsma protocols
Csma protocols
Manal Shah
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Dr. SELVAGANESAN S
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROL
junnubabu
 
Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer
Dr. SELVAGANESAN S
 
Computer network switching
Computer network switchingComputer network switching
Computer network switching
Shivani Godha
 
Introduction to switching & circuit switching
Introduction to switching & circuit switchingIntroduction to switching & circuit switching
Introduction to switching & circuit switching
Dr Rajiv Srivastava
 
IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11
Keshav Maheshwari
 
Unit 3 Network Layer PPT
Unit 3 Network Layer PPTUnit 3 Network Layer PPT
Unit 3 Network Layer PPT
KalpanaC14
 
Circuit and packet_switching
Circuit and packet_switchingCircuit and packet_switching
Circuit and packet_switching
hoanv
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
k33a
 
TCP and UDP
TCP and UDP TCP and UDP
TCP and UDP
Ramesh Giri
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
Naiyan Noor
 
Flow & Error Control
Flow & Error ControlFlow & Error Control
Flow & Error Control
tameemyousaf
 
CSMA /CD PPT ON SLIDESHARE
CSMA /CD PPT ON SLIDESHARECSMA /CD PPT ON SLIDESHARE
CSMA /CD PPT ON SLIDESHARE
Khushboo Pal
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
Bushra M
 
data-link layer protocols
data-link layer protocols  data-link layer protocols
data-link layer protocols
BE Smârt
 
Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocol
asimnawaz54
 
Csma protocols
Csma protocolsCsma protocols
Csma protocols
Manal Shah
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Dr. SELVAGANESAN S
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROL
junnubabu
 
Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer
Dr. SELVAGANESAN S
 
Computer network switching
Computer network switchingComputer network switching
Computer network switching
Shivani Godha
 
Introduction to switching & circuit switching
Introduction to switching & circuit switchingIntroduction to switching & circuit switching
Introduction to switching & circuit switching
Dr Rajiv Srivastava
 
IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11
Keshav Maheshwari
 
Unit 3 Network Layer PPT
Unit 3 Network Layer PPTUnit 3 Network Layer PPT
Unit 3 Network Layer PPT
KalpanaC14
 
Circuit and packet_switching
Circuit and packet_switchingCircuit and packet_switching
Circuit and packet_switching
hoanv
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
k33a
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
Naiyan Noor
 

Similar to Media Access Control (MAC Layer) (20)

multiple access techniquesch12-multiple-access.ppt
multiple access techniquesch12-multiple-access.pptmultiple access techniquesch12-multiple-access.ppt
multiple access techniquesch12-multiple-access.ppt
bandiprathyu
 
Multiple Access ppt in Object Oriented Programming
Multiple Access ppt in Object Oriented ProgrammingMultiple Access ppt in Object Oriented Programming
Multiple Access ppt in Object Oriented Programming
arnavytstudio2814
 
computer__networks .pptx
computer__networks                   .pptxcomputer__networks                   .pptx
computer__networks .pptx
chmanvitha2
 
Computer network
Computer networkComputer network
Computer network
sweetysweety8
 
medium access tcpip network layer data link layer
medium access tcpip network layer data link layermedium access tcpip network layer data link layer
medium access tcpip network layer data link layer
AhamedTuani
 
ch12.ppt computer network specifically from data link layer
ch12.ppt computer network specifically from data link layerch12.ppt computer network specifically from data link layer
ch12.ppt computer network specifically from data link layer
relief4u2004
 
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptxComputer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptx
Pravinbhargav
 
unit 3 Multiple Access.ppt
unit 3 Multiple Access.pptunit 3 Multiple Access.ppt
unit 3 Multiple Access.ppt
zmulani8
 
WHAT IS MAC-1 presentation for information .pptx
WHAT IS MAC-1 presentation for information  .pptxWHAT IS MAC-1 presentation for information  .pptx
WHAT IS MAC-1 presentation for information .pptx
SaqlainKhan39
 
Unit 3 - Data Link Layer - Part B
Unit 3 - Data Link Layer - Part BUnit 3 - Data Link Layer - Part B
Unit 3 - Data Link Layer - Part B
Chandan Gupta Bhagat
 
Forouzan _ Multiple access protocols.ppt
Forouzan _ Multiple access protocols.pptForouzan _ Multiple access protocols.ppt
Forouzan _ Multiple access protocols.ppt
drmerinskariah
 
Unit 1 mac vsd
Unit 1 mac vsdUnit 1 mac vsd
Unit 1 mac vsd
SHUBHAM MORGAONKAR
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Pallepati Vasavi
 
Unit_3_WSN.pptx
Unit_3_WSN.pptxUnit_3_WSN.pptx
Unit_3_WSN.pptx
nooralleema
 
Lecture 10
Lecture 10Lecture 10
Lecture 10
Anwal Mirza
 
Medium access control. MAC Protocol.Data link layer
Medium access control. MAC Protocol.Data link layerMedium access control. MAC Protocol.Data link layer
Medium access control. MAC Protocol.Data link layer
KameshM20
 
Jaimin chp-4 - media access sub-layer- 2011 batch
Jaimin   chp-4 - media access sub-layer- 2011 batchJaimin   chp-4 - media access sub-layer- 2011 batch
Jaimin chp-4 - media access sub-layer- 2011 batch
Jaimin Jani
 
my documents.pptx of medium access control
my documents.pptx of medium access controlmy documents.pptx of medium access control
my documents.pptx of medium access control
sadiariasat10
 
CN R16 -UNIT-4.pdf
CN R16 -UNIT-4.pdfCN R16 -UNIT-4.pdf
CN R16 -UNIT-4.pdf
Joshuaeeda1
 
multiple access techniquesch12-multiple-access.ppt
multiple access techniquesch12-multiple-access.pptmultiple access techniquesch12-multiple-access.ppt
multiple access techniquesch12-multiple-access.ppt
bandiprathyu
 
Multiple Access ppt in Object Oriented Programming
Multiple Access ppt in Object Oriented ProgrammingMultiple Access ppt in Object Oriented Programming
Multiple Access ppt in Object Oriented Programming
arnavytstudio2814
 
computer__networks .pptx
computer__networks                   .pptxcomputer__networks                   .pptx
computer__networks .pptx
chmanvitha2
 
medium access tcpip network layer data link layer
medium access tcpip network layer data link layermedium access tcpip network layer data link layer
medium access tcpip network layer data link layer
AhamedTuani
 
ch12.ppt computer network specifically from data link layer
ch12.ppt computer network specifically from data link layerch12.ppt computer network specifically from data link layer
ch12.ppt computer network specifically from data link layer
relief4u2004
 
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptxComputer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptx
Pravinbhargav
 
unit 3 Multiple Access.ppt
unit 3 Multiple Access.pptunit 3 Multiple Access.ppt
unit 3 Multiple Access.ppt
zmulani8
 
WHAT IS MAC-1 presentation for information .pptx
WHAT IS MAC-1 presentation for information  .pptxWHAT IS MAC-1 presentation for information  .pptx
WHAT IS MAC-1 presentation for information .pptx
SaqlainKhan39
 
Forouzan _ Multiple access protocols.ppt
Forouzan _ Multiple access protocols.pptForouzan _ Multiple access protocols.ppt
Forouzan _ Multiple access protocols.ppt
drmerinskariah
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Pallepati Vasavi
 
Medium access control. MAC Protocol.Data link layer
Medium access control. MAC Protocol.Data link layerMedium access control. MAC Protocol.Data link layer
Medium access control. MAC Protocol.Data link layer
KameshM20
 
Jaimin chp-4 - media access sub-layer- 2011 batch
Jaimin   chp-4 - media access sub-layer- 2011 batchJaimin   chp-4 - media access sub-layer- 2011 batch
Jaimin chp-4 - media access sub-layer- 2011 batch
Jaimin Jani
 
my documents.pptx of medium access control
my documents.pptx of medium access controlmy documents.pptx of medium access control
my documents.pptx of medium access control
sadiariasat10
 
CN R16 -UNIT-4.pdf
CN R16 -UNIT-4.pdfCN R16 -UNIT-4.pdf
CN R16 -UNIT-4.pdf
Joshuaeeda1
 
Ad

More from Meenakshi Paul (20)

Introduction to Artificial Intelligences
Introduction to Artificial IntelligencesIntroduction to Artificial Intelligences
Introduction to Artificial Intelligences
Meenakshi Paul
 
Binary Arithmetic
Binary ArithmeticBinary Arithmetic
Binary Arithmetic
Meenakshi Paul
 
19 Network Layer Protocols
19 Network Layer Protocols19 Network Layer Protocols
19 Network Layer Protocols
Meenakshi Paul
 
Other Wireless Networks
Other Wireless NetworksOther Wireless Networks
Other Wireless Networks
Meenakshi Paul
 
Wireless LANs
Wireless LANsWireless LANs
Wireless LANs
Meenakshi Paul
 
Wired LANs
Wired LANsWired LANs
Wired LANs
Meenakshi Paul
 
Codes
CodesCodes
Codes
Meenakshi Paul
 
Number System
Number SystemNumber System
Number System
Meenakshi Paul
 
Introduction to the Data Link Layer
Introduction to the Data Link LayerIntroduction to the Data Link Layer
Introduction to the Data Link Layer
Meenakshi Paul
 
Switching
SwitchingSwitching
Switching
Meenakshi Paul
 
Transmission Media
Transmission MediaTransmission Media
Transmission Media
Meenakshi Paul
 
Bandwidth Utilization Multiplexing and Spectrum Spreading
Bandwidth Utilization Multiplexing and Spectrum SpreadingBandwidth Utilization Multiplexing and Spectrum Spreading
Bandwidth Utilization Multiplexing and Spectrum Spreading
Meenakshi Paul
 
IP classes
IP classesIP classes
IP classes
Meenakshi Paul
 
Theory building
Theory buildingTheory building
Theory building
Meenakshi Paul
 
Information Systems and Knowledge Management
 Information Systems and Knowledge Management Information Systems and Knowledge Management
Information Systems and Knowledge Management
Meenakshi Paul
 
Ch01 The Role of Business Research
Ch01 The Role of Business ResearchCh01 The Role of Business Research
Ch01 The Role of Business Research
Meenakshi Paul
 
05 analog transmission
05 analog transmission05 analog transmission
05 analog transmission
Meenakshi Paul
 
04 digital transmission
04 digital transmission04 digital transmission
04 digital transmission
Meenakshi Paul
 
03 Introduction to Physical layer
03  Introduction to Physical layer03  Introduction to Physical layer
03 Introduction to Physical layer
Meenakshi Paul
 
02 network models
02  network models02  network models
02 network models
Meenakshi Paul
 
Introduction to Artificial Intelligences
Introduction to Artificial IntelligencesIntroduction to Artificial Intelligences
Introduction to Artificial Intelligences
Meenakshi Paul
 
19 Network Layer Protocols
19 Network Layer Protocols19 Network Layer Protocols
19 Network Layer Protocols
Meenakshi Paul
 
Other Wireless Networks
Other Wireless NetworksOther Wireless Networks
Other Wireless Networks
Meenakshi Paul
 
Introduction to the Data Link Layer
Introduction to the Data Link LayerIntroduction to the Data Link Layer
Introduction to the Data Link Layer
Meenakshi Paul
 
Bandwidth Utilization Multiplexing and Spectrum Spreading
Bandwidth Utilization Multiplexing and Spectrum SpreadingBandwidth Utilization Multiplexing and Spectrum Spreading
Bandwidth Utilization Multiplexing and Spectrum Spreading
Meenakshi Paul
 
Information Systems and Knowledge Management
 Information Systems and Knowledge Management Information Systems and Knowledge Management
Information Systems and Knowledge Management
Meenakshi Paul
 
Ch01 The Role of Business Research
Ch01 The Role of Business ResearchCh01 The Role of Business Research
Ch01 The Role of Business Research
Meenakshi Paul
 
05 analog transmission
05 analog transmission05 analog transmission
05 analog transmission
Meenakshi Paul
 
04 digital transmission
04 digital transmission04 digital transmission
04 digital transmission
Meenakshi Paul
 
03 Introduction to Physical layer
03  Introduction to Physical layer03  Introduction to Physical layer
03 Introduction to Physical layer
Meenakshi Paul
 
Ad

Recently uploaded (20)

IntroSlides-April-BuildWithAI-VertexAI.pdf
IntroSlides-April-BuildWithAI-VertexAI.pdfIntroSlides-April-BuildWithAI-VertexAI.pdf
IntroSlides-April-BuildWithAI-VertexAI.pdf
Luiz Carneiro
 
Avnet Silica's PCIM 2025 Highlights Flyer
Avnet Silica's PCIM 2025 Highlights FlyerAvnet Silica's PCIM 2025 Highlights Flyer
Avnet Silica's PCIM 2025 Highlights Flyer
WillDavies22
 
railway wheels, descaling after reheating and before forging
railway wheels, descaling after reheating and before forgingrailway wheels, descaling after reheating and before forging
railway wheels, descaling after reheating and before forging
Javad Kadkhodapour
 
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G..."Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
Infopitaara
 
Smart_Storage_Systems_Production_Engineering.pptx
Smart_Storage_Systems_Production_Engineering.pptxSmart_Storage_Systems_Production_Engineering.pptx
Smart_Storage_Systems_Production_Engineering.pptx
rushikeshnavghare94
 
Level 1-Safety.pptx Presentation of Electrical Safety
Level 1-Safety.pptx Presentation of Electrical SafetyLevel 1-Safety.pptx Presentation of Electrical Safety
Level 1-Safety.pptx Presentation of Electrical Safety
JoseAlbertoCariasDel
 
MAQUINARIA MINAS CEMA 6th Edition (1).pdf
MAQUINARIA MINAS CEMA 6th Edition (1).pdfMAQUINARIA MINAS CEMA 6th Edition (1).pdf
MAQUINARIA MINAS CEMA 6th Edition (1).pdf
ssuser562df4
 
15th International Conference on Computer Science, Engineering and Applicatio...
15th International Conference on Computer Science, Engineering and Applicatio...15th International Conference on Computer Science, Engineering and Applicatio...
15th International Conference on Computer Science, Engineering and Applicatio...
IJCSES Journal
 
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptxLidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
RishavKumar530754
 
theory-slides-for react for beginners.pptx
theory-slides-for react for beginners.pptxtheory-slides-for react for beginners.pptx
theory-slides-for react for beginners.pptx
sanchezvanessa7896
 
Introduction to Zoomlion Earthmoving.pptx
Introduction to Zoomlion Earthmoving.pptxIntroduction to Zoomlion Earthmoving.pptx
Introduction to Zoomlion Earthmoving.pptx
AS1920
 
Process Parameter Optimization for Minimizing Springback in Cold Drawing Proc...
Process Parameter Optimization for Minimizing Springback in Cold Drawing Proc...Process Parameter Optimization for Minimizing Springback in Cold Drawing Proc...
Process Parameter Optimization for Minimizing Springback in Cold Drawing Proc...
Journal of Soft Computing in Civil Engineering
 
Data Structures_Searching and Sorting.pptx
Data Structures_Searching and Sorting.pptxData Structures_Searching and Sorting.pptx
Data Structures_Searching and Sorting.pptx
RushaliDeshmukh2
 
five-year-soluhhhhhhhhhhhhhhhhhtions.pdf
five-year-soluhhhhhhhhhhhhhhhhhtions.pdffive-year-soluhhhhhhhhhhhhhhhhhtions.pdf
five-year-soluhhhhhhhhhhhhhhhhhtions.pdf
AdityaSharma944496
 
Artificial Intelligence (AI) basics.pptx
Artificial Intelligence (AI) basics.pptxArtificial Intelligence (AI) basics.pptx
Artificial Intelligence (AI) basics.pptx
aditichinar
 
DSP and MV the Color image processing.ppt
DSP and MV the  Color image processing.pptDSP and MV the  Color image processing.ppt
DSP and MV the Color image processing.ppt
HafizAhamed8
 
211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf
211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf
211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf
inmishra17121973
 
Degree_of_Automation.pdf for Instrumentation and industrial specialist
Degree_of_Automation.pdf for  Instrumentation  and industrial specialistDegree_of_Automation.pdf for  Instrumentation  and industrial specialist
Degree_of_Automation.pdf for Instrumentation and industrial specialist
shreyabhosale19
 
Compiler Design Unit1 PPT Phases of Compiler.pptx
Compiler Design Unit1 PPT Phases of Compiler.pptxCompiler Design Unit1 PPT Phases of Compiler.pptx
Compiler Design Unit1 PPT Phases of Compiler.pptx
RushaliDeshmukh2
 
Data Structures_Introduction to algorithms.pptx
Data Structures_Introduction to algorithms.pptxData Structures_Introduction to algorithms.pptx
Data Structures_Introduction to algorithms.pptx
RushaliDeshmukh2
 
IntroSlides-April-BuildWithAI-VertexAI.pdf
IntroSlides-April-BuildWithAI-VertexAI.pdfIntroSlides-April-BuildWithAI-VertexAI.pdf
IntroSlides-April-BuildWithAI-VertexAI.pdf
Luiz Carneiro
 
Avnet Silica's PCIM 2025 Highlights Flyer
Avnet Silica's PCIM 2025 Highlights FlyerAvnet Silica's PCIM 2025 Highlights Flyer
Avnet Silica's PCIM 2025 Highlights Flyer
WillDavies22
 
railway wheels, descaling after reheating and before forging
railway wheels, descaling after reheating and before forgingrailway wheels, descaling after reheating and before forging
railway wheels, descaling after reheating and before forging
Javad Kadkhodapour
 
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G..."Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
Infopitaara
 
Smart_Storage_Systems_Production_Engineering.pptx
Smart_Storage_Systems_Production_Engineering.pptxSmart_Storage_Systems_Production_Engineering.pptx
Smart_Storage_Systems_Production_Engineering.pptx
rushikeshnavghare94
 
Level 1-Safety.pptx Presentation of Electrical Safety
Level 1-Safety.pptx Presentation of Electrical SafetyLevel 1-Safety.pptx Presentation of Electrical Safety
Level 1-Safety.pptx Presentation of Electrical Safety
JoseAlbertoCariasDel
 
MAQUINARIA MINAS CEMA 6th Edition (1).pdf
MAQUINARIA MINAS CEMA 6th Edition (1).pdfMAQUINARIA MINAS CEMA 6th Edition (1).pdf
MAQUINARIA MINAS CEMA 6th Edition (1).pdf
ssuser562df4
 
15th International Conference on Computer Science, Engineering and Applicatio...
15th International Conference on Computer Science, Engineering and Applicatio...15th International Conference on Computer Science, Engineering and Applicatio...
15th International Conference on Computer Science, Engineering and Applicatio...
IJCSES Journal
 
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptxLidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
RishavKumar530754
 
theory-slides-for react for beginners.pptx
theory-slides-for react for beginners.pptxtheory-slides-for react for beginners.pptx
theory-slides-for react for beginners.pptx
sanchezvanessa7896
 
Introduction to Zoomlion Earthmoving.pptx
Introduction to Zoomlion Earthmoving.pptxIntroduction to Zoomlion Earthmoving.pptx
Introduction to Zoomlion Earthmoving.pptx
AS1920
 
Data Structures_Searching and Sorting.pptx
Data Structures_Searching and Sorting.pptxData Structures_Searching and Sorting.pptx
Data Structures_Searching and Sorting.pptx
RushaliDeshmukh2
 
five-year-soluhhhhhhhhhhhhhhhhhtions.pdf
five-year-soluhhhhhhhhhhhhhhhhhtions.pdffive-year-soluhhhhhhhhhhhhhhhhhtions.pdf
five-year-soluhhhhhhhhhhhhhhhhhtions.pdf
AdityaSharma944496
 
Artificial Intelligence (AI) basics.pptx
Artificial Intelligence (AI) basics.pptxArtificial Intelligence (AI) basics.pptx
Artificial Intelligence (AI) basics.pptx
aditichinar
 
DSP and MV the Color image processing.ppt
DSP and MV the  Color image processing.pptDSP and MV the  Color image processing.ppt
DSP and MV the Color image processing.ppt
HafizAhamed8
 
211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf
211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf
211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf
inmishra17121973
 
Degree_of_Automation.pdf for Instrumentation and industrial specialist
Degree_of_Automation.pdf for  Instrumentation  and industrial specialistDegree_of_Automation.pdf for  Instrumentation  and industrial specialist
Degree_of_Automation.pdf for Instrumentation and industrial specialist
shreyabhosale19
 
Compiler Design Unit1 PPT Phases of Compiler.pptx
Compiler Design Unit1 PPT Phases of Compiler.pptxCompiler Design Unit1 PPT Phases of Compiler.pptx
Compiler Design Unit1 PPT Phases of Compiler.pptx
RushaliDeshmukh2
 
Data Structures_Introduction to algorithms.pptx
Data Structures_Introduction to algorithms.pptxData Structures_Introduction to algorithms.pptx
Data Structures_Introduction to algorithms.pptx
RushaliDeshmukh2
 

Media Access Control (MAC Layer)

  • 1. Ch-12 Media Access Control - ASST. PROF. MEENAKSHI PAUL G. N. KHALSA COLLEGE
  • 2. Outline 12.1 RANDOM ACCESS 12.1.1 ALOHA 12.1.2 CSMA 12.1.3 CSMA/CD 12.1.4 CSMA/CA 12.2 CONTROLLED ACCESS 12.2.1 Reservation 12.2.2 Polling 12.2.3 Token Passing 12.3 CHANNELIZATION 12.3.1 FDMA 12.3.2 TDMA 12.3.3 CDMA 2
  • 3. Introduction  The medium access control (MAC) is a sublayer of the data link layer.  The MAC sublayer emulates a full-duplex logical communication channel in a multipoint network.  This channel may provide unicast, multicast, or broadcast communication service.  The MAC sublayer uses MAC protocols to ensure that signals sent from different stations across the same channel don't collide. Eg: two people speak  A multiple-access protocol to coordinate access to the link (multipoint or broadcast link).  Many protocols have been devised to handle access to a shared link. 3
  • 6. 12.1Random Access  Also called contention-based access  No station is superior to another station and No station is assigned to control another.  A station that has data to send uses a procedure defined by the protocol to make a decision on whether or not to send.  Decision depends on the state of the medium (idle or busy).  Two features of RA:  No scheduled time for a station to transmit  No rules specify which station should send next  Stations compete with one another to access the medium 6
  • 7. 12.1.1 ALOHA  Aloha is the type of Random access protocol  ALOHA, was developed at the University of Hawaii in early 1970.  It was designed for a radio (wireless) LAN, but it can be used on any shared medium.  It have two types one is Pure Aloha and another is Slotted Aloha.  There is a potential of collisions  The medium is shared between the stations.  When a station sends data, another station may attempt to do so at the same time.  The data from the two stations collide and become garbled. 7
  • 8. 12.1.1Pure ALOHA  The original ALOHA protocol is called pure ALOHA.  This is a simple but elegant protocol.  The idea is that each station sends a frame whenever it has a frame to send (multiple access).  However, since there is only one channel to share, there is the possibility of collision between frames from different stations. 8
  • 9. Frames in Pure ALOHA 9
  • 10. 12.1.1Pure ALOHA Contd…  If collision occurs then retransmission frames.  The pure ALOHA protocol relies on acknowledgments from the receiver.  If the acknowledgment does not arrive after a time-out period, then retransmission take place.  If all these stations try to resend their frames after the time-out, the frames will collide again.  After time-out, each station waits a random amount of time (backoff time TB) before resending its frame.  This help avoid more collisions. 10
  • 11. 11 Procedure for pure ALOHA protocol
  • 12. 12.1.1.2 Slotted ALOHA  Slotted Aloha divides the time of shared channel into discrete intervals called as time slots.  Any station can transmit its data in any time slot.  The only condition is that station must start its transmission from the beginning of the time slot.  If the beginning of the slot is missed, then station has to wait until the beginning of the next time slot.  A collision may occur if two or more stations try to transmit data at the beginning of the same time slot.  Slotted ALOHA was invented to improve the efficiency of pure ALOHA. 12
  • 15. 12.1.2 CSMA  To minimize the chance of collision and to increase the performance  Principle of CSMA: “sense before transmit” or “listen before talk”  Carrier busy= Transmission is taking place  Carrier idle= No transmission currently taking place  CSMA can reduce the possibility of collision, but it cannot eliminate it. 15
  • 16. 12.1.2 Collision in CSMA  At time t1, station B senses the medium and finds it idle, so it sends a frame.  At time t2 (t2 > t1), station C senses the medium and finds it idle because, at this time, the first bits from station B have not reached station C.  Station C also sends a frame.  The two signals collide and both frames are destroyed. 16 B C
  • 17. Persistence Methods  What should a station do if the channel is busy?  What should a station do if the channel is idle?  Three methods have been devised to answer these questions:  1-persistent method  nonpersistent method  p-persistent method 17
  • 18. 1-Persistent  The 1-persistent method is simple and straightforward.  In this method, after the station finds the line idle, it sends its frame immediately (with probability 1).  This method has the highest chance of collision because two or more stations may find the line idle and send their frames immediately. 18
  • 19. Non-persistent  In the non-persistent method, a station that has a frame to send senses the line  If the line is idle, it sends immediately.  If the line is not idle, it waits a random amount of time and then senses the line again.  The nonpersistent approach reduces the chance of collision 19
  • 20. p-Persistent  If the channel has time slots with a slot duration equal to or greater than the maximum propagation time.  The p-persistent approach combines the advantages of the other two strategies.  It reduces the chance of collision and improves efficiency. 20
  • 22. 12.1.3 CSMA/CD  Carrier Sense Multiple Access with Collision Detection  Station monitors channel while sending a frame  If, however, there is a collision, the frame is sent again.  Eg. Collision of the first bit in CSMA/CD,stations A and C are involved in the collision. 22
  • 23. 23  At time t1, station A has executed its persistence procedure and starts sending the bits of its frame.  At time t2, station C has not yet sensed the first bit sent by A.  Station C executes its persistence procedure and starts sending the bits in its frame, which propagate both to the left and to the right.  The collision occurs sometime after time t2.  Station C detects a collision at time t3 when it receives the first bit of A’s frame.  Station C immediately aborts transmission.  Station A detects collision at time t4 when it receives the first bit of C’s frame; it also immediately aborts transmission.  Looking at the figure, we see that A transmits for the duration t4 − t1; C transmits for the duration t3 − t2.
  • 24. Collision and abortion in CSMA/CD 24
  • 27. 12.1.3 CSMA/CA  Carrier Sense Multiple Access with Collision Avoidance was invented for wireless networks  Used in a network where collision cannot be detected  Collisions are avoided through the use of CSMA/CA’s three strategies:  Interframe space (IFS)  Contention window  Acknowledgments 27
  • 28. 12.1.3 CSMA/CA Contd…  Interframe space (IFS)  When an idle channel is found, the station does not send immediately.  It waits for a period of time called the interframe space or IFS.  Contention Window  The contention window is an amount of time divided into slots.  if station determine that the channel is free, they wait a random amount of time before they start sending.  This time window doubles with each collision and corresponds to the binary exponential backoff (BEB) that is familiar from CSMA/CD.  Acknowledgment:  The positive acknowledgment and the time-out timer can help guarantee that the receiver has received the frame. 28
  • 29. 29
  • 30. CSMA/ CA and NAV  DIFS: DCF interframe space  RTS: Request to Send  SIFS: Short interframe space (SIFS)  NAV: Network Allocation Vector 30
  • 32. 12.2 CONTROLLED ACCESS  In controlled access, the stations consult one another to find which station has the right to send.  A station cannot send unless it has been authorized by other stations.  Three common methods:  Reservation  Polling  Token passing 32
  • 33. 12.2.1 Reservation  A station needs to make a reservation before sending data.  Time is divided into intervals.  In each interval, a reservation frame precedes the data frames sent in that interval.  If there are N stations in the system, there are exactly N reservation minislots in the reservation frame. 33
  • 34. 12.2.2 Polling  Polling works with topologies in which one device is designated as a primary station and the other devices are secondary stations.  Primary device is the initiator of a session.  All data exchanges must be made through the primary device.  Primary device controls the link; the secondary devices follow its instructions. 34
  • 35. Select and poll functions in polling- access method  Select  The select function is used whenever the primary device has something to send.  Poll  The poll function is used by the primary device to solicit transmissions from the secondary devices. 35
  • 36. 12.2.3 Token Passing  The stations in a network are organized in a logical ring.  For each station, there is a predecessor and a successor.  The right to this access has been passed from the predecessor to the current station.  The right will be passed to the successor when the current station has no more data to send.  The RIGHT passed from by means of special packet called “TOKEN”. 36
  • 38. 12.3 Channelization  Channelization is a multiple-access method in which the available bandwidth of a link is shared in time, frequency, or through code, among different stations.  Similar to multiplexing  Three schemes  Frequency-Division Multiple Access (FDMA)  Time-Division Multiple Access (TDMA)  Code-Division Multiple Access (CDMA) 38
  • 39. 12.3.1 Frequency-Division Multiple Access (FDMA) • Available bandwidth is divided into frequency bands. • Each band is reserved for a specific station. • Each station also uses a bandpass filter to confine the transmitter frequencies. 39
  • 40. 12.3.2 TDMA • Stations share the bandwidth of the channel in time. • Each station is allocated a time slot during which it can send data. 40
  • 41. 12.3.3 CDMA  One channel carries all transmissions at the same time  https://www.youtube.com/watch?v=5plZGFd-cWc  Each channel is separated by code 41
  • 42. CDMA: Chip Sequences  Each station is assigned a unique chip sequence  Chip sequences are orthogonal vectors  Inner product of any pair must be zero  With N stations, sequences must have the following properties:  They are of length N  Their self inner product is always N 42