SlideShare a Scribd company logo
1
UNIT-II
(Wireless) Medium Access
Control
Dr R Jegadeesan Prof-CSE
Jyothishmathi Institute of Technology and
Science, karimnagar
2
Contents
1. Motivation for Specialized MAC
• Hidden and Exposed Terminals
• Far and Near Terminals
2. Access Methods
• SDMA
• FDMA
• TDMA
• CDMA
1. Motivation for Specialized MAC
3
4
5
6
MULTIPLEXING
• A fundamental mechanism in
communication system and networks
• Enables multiple users to share a medium
• For wireless communication, multiplexing
can be carried out in four dimensions:
space, time, frequency and code
Access Methods
7
8
2. Space Division Multiple Access (SDMA)
• Channels are assigned on the basis of
―space‖(but operate on same frequency)
• The assignment makes sure that the
transmission do not interfere with each
(with a guard band in between)
9
10
3. FDMA: Frequency Division Multiple Access
1. Frequency domain is subdivided into several non-
overlapping frequency bands
2. Each channel is assigned its own frequency band (with
guard spaces in between)
11
12
3. TDMA : Time Division Medium Access
• A channel is given the whole bandwidth for a
certain amount of time
– All senders use the same frequency, but at different
point of time
• Synchronization can be done by using
– Fixed Allocation Scheme or
– Dynamic Allocation Scheme
13
14
Reservation Algorithms
15
Packet Reservation Multiple Access (PRMA)
/ Implicit Reservation
16
17
• In this each terminal on the network is able to
monitor the status of the channel before
transmitting information
• Variations:
– 1-persistent CSMA
– non-persistent CSMA -
– p-persistent CSMA
– CSMA/CA
– Elimination yield – non-preemptive multiple access
(EY-NMPA)
Carrier Sense Multiple Access Protocols (CSMA)
Multiple Access with Collision Avoidance (MACA)
18
19
POLLING
20
Inhibit Sense Multiple Access (ISMA)
21
22
4. CDMA: Code Division Multiple Access
◼ separation of channels achieved by assigning each
channel its own code
◼ guard spaces are realized by having distance in
code space (e.g. orthogonal codes)
◼ transmitter can transmit in the same frequency
band at the same time, but have to use different
code
◼ Provides good protection against interference and
tapping
◼ but the receivers have relatively high complexity.
Spread Aloha Multiple Access(SAMA)
23
Comparisons of S/T/F/CDMA
24
Thank you
Ad

More Related Content

What's hot (20)

MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROL
junnubabu
 
Mobile Network Layer
Mobile Network LayerMobile Network Layer
Mobile Network Layer
Rahul Hada
 
Multiplexing in mobile computing
Multiplexing in mobile computingMultiplexing in mobile computing
Multiplexing in mobile computing
ZituSahu
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
VijayaLakshmi514
 
Hiperlan
HiperlanHiperlan
Hiperlan
Then Murugeshwari
 
UMTS, Introduction.
UMTS, Introduction.UMTS, Introduction.
UMTS, Introduction.
Mateen Shahid
 
Signals and Antennas in mobile computing
Signals and Antennas in mobile computingSignals and Antennas in mobile computing
Signals and Antennas in mobile computing
Madhuri Badgujar
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Pallepati Vasavi
 
Gsm architecture
Gsm architectureGsm architecture
Gsm architecture
Naveen Sihag
 
Computer networks - Channelization
Computer networks - ChannelizationComputer networks - Channelization
Computer networks - Channelization
Elambaruthi Elambaruthi
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
Kathirvel Ayyaswamy
 
Spread spectrum
Spread spectrumSpread spectrum
Spread spectrum
Manish Srivastava
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
Bushra M
 
Wlan architecture
Wlan architectureWlan architecture
Wlan architecture
Vishal Verma
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communication
panditadesh123
 
WIRELESS TRANSMISSION
WIRELESS TRANSMISSIONWIRELESS TRANSMISSION
WIRELESS TRANSMISSION
junnubabu
 
Lecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksLecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networks
Chandra Meena
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
Dhrumil Panchal
 
Handover in Mobile Computing
Handover in Mobile ComputingHandover in Mobile Computing
Handover in Mobile Computing
KABILESH RAMAR
 
Ad hoc networks
Ad hoc networksAd hoc networks
Ad hoc networks
Darpan Dekivadiya
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROL
junnubabu
 
Mobile Network Layer
Mobile Network LayerMobile Network Layer
Mobile Network Layer
Rahul Hada
 
Multiplexing in mobile computing
Multiplexing in mobile computingMultiplexing in mobile computing
Multiplexing in mobile computing
ZituSahu
 
Signals and Antennas in mobile computing
Signals and Antennas in mobile computingSignals and Antennas in mobile computing
Signals and Antennas in mobile computing
Madhuri Badgujar
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Pallepati Vasavi
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
Bushra M
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communication
panditadesh123
 
WIRELESS TRANSMISSION
WIRELESS TRANSMISSIONWIRELESS TRANSMISSION
WIRELESS TRANSMISSION
junnubabu
 
Lecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksLecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networks
Chandra Meena
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
Dhrumil Panchal
 
Handover in Mobile Computing
Handover in Mobile ComputingHandover in Mobile Computing
Handover in Mobile Computing
KABILESH RAMAR
 

Similar to Mobile computing (Wireless) Medium Access Control (MAC) (20)

Wireless medium Access Control-multiple terminals need to communicate at the ...
Wireless medium Access Control-multiple terminals need to communicate at the ...Wireless medium Access Control-multiple terminals need to communicate at the ...
Wireless medium Access Control-multiple terminals need to communicate at the ...
Papitha7
 
Mobile Communication-Medium Access Control
Mobile Communication-Medium Access ControlMobile Communication-Medium Access Control
Mobile Communication-Medium Access Control
ssuserea086d
 
Hybrid m-a-t
Hybrid m-a-tHybrid m-a-t
Hybrid m-a-t
BHUVIJAYAVELU
 
CHAPTER 6 - NETWORKING Multiple Access .ppt
CHAPTER 6 - NETWORKING Multiple Access .pptCHAPTER 6 - NETWORKING Multiple Access .ppt
CHAPTER 6 - NETWORKING Multiple Access .ppt
nuriman229651
 
04_20.pptx
04_20.pptx04_20.pptx
04_20.pptx
ArunangshuChetia1
 
Demand Assigned Multiple Access
Demand Assigned Multiple AccessDemand Assigned Multiple Access
Demand Assigned Multiple Access
anushkashastri
 
Multiplexing
Multiplexing Multiplexing
Multiplexing
RUpaliLohar
 
Common protocols
Common protocolsCommon protocols
Common protocols
Mr SMAK
 
Satellite Multiple Access Schemes
Satellite Multiple Access SchemesSatellite Multiple Access Schemes
Satellite Multiple Access Schemes
Dileep Kadavarath
 
scribd.vpdfs.com_multiple-access-fdma-cdma-tdma-sdma-dsss-fhss-aloha-packet-r...
scribd.vpdfs.com_multiple-access-fdma-cdma-tdma-sdma-dsss-fhss-aloha-packet-r...scribd.vpdfs.com_multiple-access-fdma-cdma-tdma-sdma-dsss-fhss-aloha-packet-r...
scribd.vpdfs.com_multiple-access-fdma-cdma-tdma-sdma-dsss-fhss-aloha-packet-r...
NadaAAmin
 
Multiple access procedures
Multiple access proceduresMultiple access procedures
Multiple access procedures
abishajesus
 
DATA COMMUNICTION AND NETWROKING.pptx
DATA COMMUNICTION AND NETWROKING.pptxDATA COMMUNICTION AND NETWROKING.pptx
DATA COMMUNICTION AND NETWROKING.pptx
Anishkumar343890
 
Unit-3_Multiple Access and VSAT Systems.pptx
Unit-3_Multiple Access and VSAT Systems.pptxUnit-3_Multiple Access and VSAT Systems.pptx
Unit-3_Multiple Access and VSAT Systems.pptx
222pavankoteswararao
 
v unit (1).pptx
v unit (1).pptxv unit (1).pptx
v unit (1).pptx
Sambasiva62
 
Medium access control unit 3-33
Medium access control  unit 3-33Medium access control  unit 3-33
Medium access control unit 3-33
Deepika,Assistant Professor,PES College of Engineering ,Mandya
 
COMMUNICATION TECHNIQUES.pptx
COMMUNICATION TECHNIQUES.pptxCOMMUNICATION TECHNIQUES.pptx
COMMUNICATION TECHNIQUES.pptx
NAVAMISURESH2
 
Time division multiple access
Time division multiple accessTime division multiple access
Time division multiple access
Gangadhar Meher University,Sambalpur,Odisha,India
 
Satellite ppt
Satellite pptSatellite ppt
Satellite ppt
Divya Shukla
 
TDMA, FDMA, CDMA
TDMA, FDMA, CDMATDMA, FDMA, CDMA
TDMA, FDMA, CDMA
Keerthana Nambiar
 
Bandwidth Utilization Multiplexing and Spectrum Spreading
Bandwidth Utilization Multiplexing and Spectrum SpreadingBandwidth Utilization Multiplexing and Spectrum Spreading
Bandwidth Utilization Multiplexing and Spectrum Spreading
Meenakshi Paul
 
Wireless medium Access Control-multiple terminals need to communicate at the ...
Wireless medium Access Control-multiple terminals need to communicate at the ...Wireless medium Access Control-multiple terminals need to communicate at the ...
Wireless medium Access Control-multiple terminals need to communicate at the ...
Papitha7
 
Mobile Communication-Medium Access Control
Mobile Communication-Medium Access ControlMobile Communication-Medium Access Control
Mobile Communication-Medium Access Control
ssuserea086d
 
CHAPTER 6 - NETWORKING Multiple Access .ppt
CHAPTER 6 - NETWORKING Multiple Access .pptCHAPTER 6 - NETWORKING Multiple Access .ppt
CHAPTER 6 - NETWORKING Multiple Access .ppt
nuriman229651
 
Demand Assigned Multiple Access
Demand Assigned Multiple AccessDemand Assigned Multiple Access
Demand Assigned Multiple Access
anushkashastri
 
Common protocols
Common protocolsCommon protocols
Common protocols
Mr SMAK
 
Satellite Multiple Access Schemes
Satellite Multiple Access SchemesSatellite Multiple Access Schemes
Satellite Multiple Access Schemes
Dileep Kadavarath
 
scribd.vpdfs.com_multiple-access-fdma-cdma-tdma-sdma-dsss-fhss-aloha-packet-r...
scribd.vpdfs.com_multiple-access-fdma-cdma-tdma-sdma-dsss-fhss-aloha-packet-r...scribd.vpdfs.com_multiple-access-fdma-cdma-tdma-sdma-dsss-fhss-aloha-packet-r...
scribd.vpdfs.com_multiple-access-fdma-cdma-tdma-sdma-dsss-fhss-aloha-packet-r...
NadaAAmin
 
Multiple access procedures
Multiple access proceduresMultiple access procedures
Multiple access procedures
abishajesus
 
DATA COMMUNICTION AND NETWROKING.pptx
DATA COMMUNICTION AND NETWROKING.pptxDATA COMMUNICTION AND NETWROKING.pptx
DATA COMMUNICTION AND NETWROKING.pptx
Anishkumar343890
 
Unit-3_Multiple Access and VSAT Systems.pptx
Unit-3_Multiple Access and VSAT Systems.pptxUnit-3_Multiple Access and VSAT Systems.pptx
Unit-3_Multiple Access and VSAT Systems.pptx
222pavankoteswararao
 
COMMUNICATION TECHNIQUES.pptx
COMMUNICATION TECHNIQUES.pptxCOMMUNICATION TECHNIQUES.pptx
COMMUNICATION TECHNIQUES.pptx
NAVAMISURESH2
 
Bandwidth Utilization Multiplexing and Spectrum Spreading
Bandwidth Utilization Multiplexing and Spectrum SpreadingBandwidth Utilization Multiplexing and Spectrum Spreading
Bandwidth Utilization Multiplexing and Spectrum Spreading
Meenakshi Paul
 
Ad

More from Jyothishmathi Institute of Technology and Science Karimnagar (20)

JAVA PROGRAMMING- GUI Programming with Swing - The Swing Buttons
JAVA PROGRAMMING- GUI Programming with Swing - The Swing ButtonsJAVA PROGRAMMING- GUI Programming with Swing - The Swing Buttons
JAVA PROGRAMMING- GUI Programming with Swing - The Swing Buttons
Jyothishmathi Institute of Technology and Science Karimnagar
 
JAVA PROGRAMMING - The Collections Framework
JAVA PROGRAMMING - The Collections Framework JAVA PROGRAMMING - The Collections Framework
JAVA PROGRAMMING - The Collections Framework
Jyothishmathi Institute of Technology and Science Karimnagar
 
JAVA PROGRAMMING- Exception handling - Multithreading
JAVA PROGRAMMING- Exception handling - MultithreadingJAVA PROGRAMMING- Exception handling - Multithreading
JAVA PROGRAMMING- Exception handling - Multithreading
Jyothishmathi Institute of Technology and Science Karimnagar
 
JAVA PROGRAMMING – Packages - Stream based I/O
JAVA PROGRAMMING – Packages - Stream based I/O JAVA PROGRAMMING – Packages - Stream based I/O
JAVA PROGRAMMING – Packages - Stream based I/O
Jyothishmathi Institute of Technology and Science Karimnagar
 
Java programming -Object-Oriented Thinking- Inheritance
Java programming -Object-Oriented Thinking- InheritanceJava programming -Object-Oriented Thinking- Inheritance
Java programming -Object-Oriented Thinking- Inheritance
Jyothishmathi Institute of Technology and Science Karimnagar
 
WEB TECHNOLOGIES JavaScript
WEB TECHNOLOGIES JavaScriptWEB TECHNOLOGIES JavaScript
WEB TECHNOLOGIES JavaScript
Jyothishmathi Institute of Technology and Science Karimnagar
 
WEB TECHNOLOGIES JSP
WEB TECHNOLOGIES  JSPWEB TECHNOLOGIES  JSP
WEB TECHNOLOGIES JSP
Jyothishmathi Institute of Technology and Science Karimnagar
 
WEB TECHNOLOGIES Servlet
WEB TECHNOLOGIES ServletWEB TECHNOLOGIES Servlet
WEB TECHNOLOGIES Servlet
Jyothishmathi Institute of Technology and Science Karimnagar
 
WEB TECHNOLOGIES XML
WEB TECHNOLOGIES XMLWEB TECHNOLOGIES XML
WEB TECHNOLOGIES XML
Jyothishmathi Institute of Technology and Science Karimnagar
 
WEB TECHNOLOGIES- PHP Programming
WEB TECHNOLOGIES-  PHP ProgrammingWEB TECHNOLOGIES-  PHP Programming
WEB TECHNOLOGIES- PHP Programming
Jyothishmathi Institute of Technology and Science Karimnagar
 
Compiler Design- Machine Independent Optimizations
Compiler Design- Machine Independent OptimizationsCompiler Design- Machine Independent Optimizations
Compiler Design- Machine Independent Optimizations
Jyothishmathi Institute of Technology and Science Karimnagar
 
COMPILER DESIGN Run-Time Environments
COMPILER DESIGN Run-Time EnvironmentsCOMPILER DESIGN Run-Time Environments
COMPILER DESIGN Run-Time Environments
Jyothishmathi Institute of Technology and Science Karimnagar
 
COMPILER DESIGN- Syntax Directed Translation
COMPILER DESIGN- Syntax Directed TranslationCOMPILER DESIGN- Syntax Directed Translation
COMPILER DESIGN- Syntax Directed Translation
Jyothishmathi Institute of Technology and Science Karimnagar
 
COMPILER DESIGN- Syntax Analysis
COMPILER DESIGN- Syntax AnalysisCOMPILER DESIGN- Syntax Analysis
COMPILER DESIGN- Syntax Analysis
Jyothishmathi Institute of Technology and Science Karimnagar
 
COMPILER DESIGN- Introduction & Lexical Analysis:
COMPILER DESIGN- Introduction & Lexical Analysis: COMPILER DESIGN- Introduction & Lexical Analysis:
COMPILER DESIGN- Introduction & Lexical Analysis:
Jyothishmathi Institute of Technology and Science Karimnagar
 
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail SecurityCRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
Jyothishmathi Institute of Technology and Science Karimnagar
 
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level SecurityCRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
Jyothishmathi Institute of Technology and Science Karimnagar
 
CRYPTOGRAPHY & NETWORK SECURITY- Cryptographic Hash Functions
CRYPTOGRAPHY & NETWORK SECURITY- Cryptographic Hash FunctionsCRYPTOGRAPHY & NETWORK SECURITY- Cryptographic Hash Functions
CRYPTOGRAPHY & NETWORK SECURITY- Cryptographic Hash Functions
Jyothishmathi Institute of Technology and Science Karimnagar
 
CRYPTOGRAPHY & NETWOK SECURITY- Symmetric key Ciphers
CRYPTOGRAPHY & NETWOK SECURITY- Symmetric key CiphersCRYPTOGRAPHY & NETWOK SECURITY- Symmetric key Ciphers
CRYPTOGRAPHY & NETWOK SECURITY- Symmetric key Ciphers
Jyothishmathi Institute of Technology and Science Karimnagar
 
CRYPTOGRAPHY & NETWORK SECURITY
CRYPTOGRAPHY & NETWORK SECURITYCRYPTOGRAPHY & NETWORK SECURITY
CRYPTOGRAPHY & NETWORK SECURITY
Jyothishmathi Institute of Technology and Science Karimnagar
 
Ad

Recently uploaded (20)

Semantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AISemantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AI
artmondano
 
How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?
Daniel Lehner
 
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfComplete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Software Company
 
AI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global TrendsAI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global Trends
InData Labs
 
Generative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in BusinessGenerative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in Business
Dr. Tathagat Varma
 
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
Alan Dix
 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
 
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptxDevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
Justin Reock
 
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxSpecial Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
shyamraj55
 
Mobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi ArabiaMobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi Arabia
Steve Jonas
 
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdfSAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
Precisely
 
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In FranceManifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
chb3
 
Drupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy ConsumptionDrupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy Consumption
Exove
 
Cyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of securityCyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of security
riccardosl1
 
Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.
hpbmnnxrvb
 
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxIncreasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Anoop Ashok
 
TrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business ConsultingTrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business Consulting
Trs Labs
 
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
BookNet Canada
 
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc
 
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
organizerofv
 
Semantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AISemantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AI
artmondano
 
How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?
Daniel Lehner
 
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfComplete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Software Company
 
AI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global TrendsAI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global Trends
InData Labs
 
Generative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in BusinessGenerative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in Business
Dr. Tathagat Varma
 
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
Alan Dix
 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
 
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptxDevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
Justin Reock
 
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxSpecial Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
shyamraj55
 
Mobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi ArabiaMobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi Arabia
Steve Jonas
 
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdfSAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
Precisely
 
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In FranceManifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
chb3
 
Drupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy ConsumptionDrupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy Consumption
Exove
 
Cyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of securityCyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of security
riccardosl1
 
Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.
hpbmnnxrvb
 
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxIncreasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Anoop Ashok
 
TrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business ConsultingTrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business Consulting
Trs Labs
 
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
BookNet Canada
 
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc
 
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
organizerofv
 

Mobile computing (Wireless) Medium Access Control (MAC)

  • 1. 1 UNIT-II (Wireless) Medium Access Control Dr R Jegadeesan Prof-CSE Jyothishmathi Institute of Technology and Science, karimnagar
  • 2. 2 Contents 1. Motivation for Specialized MAC • Hidden and Exposed Terminals • Far and Near Terminals 2. Access Methods • SDMA • FDMA • TDMA • CDMA
  • 3. 1. Motivation for Specialized MAC 3
  • 4. 4
  • 5. 5
  • 6. 6 MULTIPLEXING • A fundamental mechanism in communication system and networks • Enables multiple users to share a medium • For wireless communication, multiplexing can be carried out in four dimensions: space, time, frequency and code
  • 8. 8 2. Space Division Multiple Access (SDMA) • Channels are assigned on the basis of ―space‖(but operate on same frequency) • The assignment makes sure that the transmission do not interfere with each (with a guard band in between)
  • 9. 9
  • 10. 10 3. FDMA: Frequency Division Multiple Access 1. Frequency domain is subdivided into several non- overlapping frequency bands 2. Each channel is assigned its own frequency band (with guard spaces in between)
  • 11. 11
  • 12. 12 3. TDMA : Time Division Medium Access • A channel is given the whole bandwidth for a certain amount of time – All senders use the same frequency, but at different point of time • Synchronization can be done by using – Fixed Allocation Scheme or – Dynamic Allocation Scheme
  • 13. 13
  • 14. 14
  • 16. Packet Reservation Multiple Access (PRMA) / Implicit Reservation 16
  • 17. 17 • In this each terminal on the network is able to monitor the status of the channel before transmitting information • Variations: – 1-persistent CSMA – non-persistent CSMA - – p-persistent CSMA – CSMA/CA – Elimination yield – non-preemptive multiple access (EY-NMPA) Carrier Sense Multiple Access Protocols (CSMA)
  • 18. Multiple Access with Collision Avoidance (MACA) 18
  • 19. 19
  • 21. Inhibit Sense Multiple Access (ISMA) 21
  • 22. 22 4. CDMA: Code Division Multiple Access ◼ separation of channels achieved by assigning each channel its own code ◼ guard spaces are realized by having distance in code space (e.g. orthogonal codes) ◼ transmitter can transmit in the same frequency band at the same time, but have to use different code ◼ Provides good protection against interference and tapping ◼ but the receivers have relatively high complexity.
  • 23. Spread Aloha Multiple Access(SAMA) 23