SlideShare a Scribd company logo
2
Most read
3
Most read
6
Most read
S.VIJAYALAKSHMI M.SC(CS)
NADAR SARASWATHI COLLEGE OF
ARTS AND SCIENCE
THENI
Media Access Control
Multiple access links
There is ‘collision if more than one node sends at the same ime only
one node can send successfully at a time.
 When a "collision" occurs, the signals will get distorted and the frame will be lose
the link bandwidth is wasted during collision
 Question: How to coordinate the access of multiple sending and receiving
nodes to the shared link ?
 Solution: We need a protocol to determine how nodes share channelMedium
Access control (MAC) protocol
 The main task of a MAC protocol is to minimize collisions in order to utilize
the bandwidth by:
Determining when a node can use the link (medium)
What a node should do when the link is busy
What the node should do when it is involved in collision
Channel partitioning MAC protocols:
 Share channel efficiently and fairly at high load
 Inefficient at low load: delay in channel access, 1/N bandwidth
allocated even if only 1 active node!
“Taking turns” protocols
 Eliminates empty slots without causing collisions
 Vulnerable to failures (e.g., failed node or lost token)
Random access MAC protocols
 Efficient at low load: single node can fully utilize channel
 High load: collision overhead
Multiple Access Protocols
Developed in the 1970s for a packet
radio network
Improvement: Start transmission only at
fixed times (slots)
CSMA = Carrier Sense Multiple Access
Improvement: Start transmission only if no
transmission is ongoing
CD = Collision Detection
Improvement: Stop ongoing transmission if
a collision is detected (e.g. Ethernet)
Evolution of Contention Protocols
Slotted
Aloha
CSMA
Aloha
CSMA/CD
ALOHA
Pure ALOHA
 Developed by Abramson in the 1970s for a packet radio network by
Hawaii University.
 Whenever a station has a data, it transmits immediately. Sender finds
out whether transmission was successful or experienced a collision by
listening to the broadcast from the destination station. Sender
retransmits after some random time if there is a collision.
Slotted ALOHA
 Improvement: Time is slotted and a packet can only be transmitted at
the beginning of one slot. Thus, it can reduce the collision duration.
ALOHA
 Mountainous islands – land network difficult to install
 Fully decentralized protocol
 The node waits for an ACK for time-out equals to the maximum
round-trip propagation delay = 2* tprop
Frame Transmission in pure ALOHA
 If the frame is collided (no ACK was received) the stations wait
for a random time and retransmit the frame again.
 ThroughputAnalysis
A frame (red frame) will be in a collision if and only if another
transmission begins in the vulnerable period of the frame
 Vulnerable period has the length of 2 frame times
Frame which collides
with start of red frame
Frame
t0 t0+F
Vulnerable
Period of red frame
Time
Frame which collides
with end of red frame
Vulnerable time- example
 A pure ALOHA network transmits 200-bit frames on a shared channel
of 200 kbps. What is the requirement to make this frame collision-free?
Solution
 Average frame transmission time Tfr is 200 bits/200 kbps or 1 ms. The
vulnerable time is 2 × 1 ms = 2 ms. This means no station should send
later than 1 ms before this station starts transmission and no station
should start sending during the one 1-ms period that this station is
sending.
 For small G: S ≈ G, there is nearly no collision, S is small
because the load is small
 For large G: G >> S, there are many backlogged users, S is
small because there are many collisions
ThroughputAnalysis
SlottedALOHA
 time divided into discrete intervals (1 interval = 1 frame)
 the sending station waits until the beginning of the next discrete
interval
Throughput for slottedALOHA
S=Ge-G
Pure and Slotted ALOHA Throughput
 Simple improvement but big impact
8
0.4
0.3
0.2
0.1
00
SlottedAloha
Aloha
0.368
0.184
G
S
CSMA (Carrier Sense MultipleAccess
 Collisions hurt the efficiency of ALOHA protocol
At best, channel is useful 37% of the time
 CSMA gives improved throughput compared to Aloha protocols.
 CSMA: listen before transmit
If channel sensed idle: transmit entire frame
If channel sensed busy, defer transmission
 Human analogy: don’t interrupt others!
 Collisions can still occur: propagation delay means two nodes may
not hear each other’s transmission
 Collision: entire packet
 transmission time wasted
Kinds of CSMA
Non-persistent
CSMA
CSMA
1-persistent CSMA
Persistent CSMA
p-persistent CSMA
 reduces chance of collisions
 reduces the efficiency
increases the chance for collisions
1-persistan
p-persistent
increase the chance for collisions
Improves efficiency
Nonpersistent vs. persistent
Media Access Control

More Related Content

PPT
Chapter 4 data link layer
PPTX
MEDIUM ACCESS CONTROL
PPTX
Mac protocols
PPTX
Usb universal serial bus
PPTX
Patient monitoring system and biotelemetry
PPT
Hamming codes
PPTX
Devices and gateways
PDF
Chat Application | RSD
Chapter 4 data link layer
MEDIUM ACCESS CONTROL
Mac protocols
Usb universal serial bus
Patient monitoring system and biotelemetry
Hamming codes
Devices and gateways
Chat Application | RSD

What's hot (20)

PPTX
The medium access sublayer
PPT
Unit 3 Network Layer PPT
PPTX
Multiple access protocol
PPT
PPTX
Unit 1 introduction to computer networks
PPTX
Media Access Control (MAC Layer)
PPTX
ALOHA Protocol (in detail)
PPT
Mac layer
PDF
IEEE 802.11 and Bluetooth
PDF
CSMA /CD PPT ON SLIDESHARE
PPTX
Computer network switching
PPT
data-link layer protocols
PDF
Transport layer services
PPT
Multiple access techniques for wireless communications
PPTX
Point to-point protocol (ppp)
PPTX
TCP protocol flow control
PPT
Distance vector routing
PDF
Multiple Access in Computer Network
PDF
Mobile Network Layer
The medium access sublayer
Unit 3 Network Layer PPT
Multiple access protocol
Unit 1 introduction to computer networks
Media Access Control (MAC Layer)
ALOHA Protocol (in detail)
Mac layer
IEEE 802.11 and Bluetooth
CSMA /CD PPT ON SLIDESHARE
Computer network switching
data-link layer protocols
Transport layer services
Multiple access techniques for wireless communications
Point to-point protocol (ppp)
TCP protocol flow control
Distance vector routing
Multiple Access in Computer Network
Mobile Network Layer
Ad

Similar to Media Access Control (20)

PPTX
computer__networks .pptx
PPT
aloha
PPT
Jaimin chp-4 - media access sub-layer- 2011 batch
PDF
CN R16 -UNIT-4.pdf
PPTX
Computer Networks ppt for the following data base and it's analysis
PDF
CN-unit-iii.pdf computer network presentaion
PPTX
Unit 3 - Data Link Layer - Part B
PPT
Unit 1 mac vsd
PDF
Computer Network : 02 - Medium Access Control
PPTX
module 2 ppt.pptx
PDF
PDF
multipleaccessprotocol-140213082552-phpapp02.pdf
PPTX
Multipleaccessprotocol 140213082552-phpapp02
PPT
16 high speedla-ns
PPT
16 high speedla-ns
PPT
10 high speedla-ns
PPT
Chapt-06.ppt
PPT
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
PPT
multiple access techniquesch12-multiple-access.ppt
PPT
Network Topologies
computer__networks .pptx
aloha
Jaimin chp-4 - media access sub-layer- 2011 batch
CN R16 -UNIT-4.pdf
Computer Networks ppt for the following data base and it's analysis
CN-unit-iii.pdf computer network presentaion
Unit 3 - Data Link Layer - Part B
Unit 1 mac vsd
Computer Network : 02 - Medium Access Control
module 2 ppt.pptx
multipleaccessprotocol-140213082552-phpapp02.pdf
Multipleaccessprotocol 140213082552-phpapp02
16 high speedla-ns
16 high speedla-ns
10 high speedla-ns
Chapt-06.ppt
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
multiple access techniquesch12-multiple-access.ppt
Network Topologies
Ad

Recently uploaded (20)

PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
Cell Types and Its function , kingdom of life
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
A systematic review of self-coping strategies used by university students to ...
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PDF
Updated Idioms and Phrasal Verbs in English subject
PPTX
Lesson notes of climatology university.
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PDF
Yogi Goddess Pres Conference Studio Updates
PPTX
History, Philosophy and sociology of education (1).pptx
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
Cell Structure & Organelles in detailed.
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PPTX
Final Presentation General Medicine 03-08-2024.pptx
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
STATICS OF THE RIGID BODIES Hibbelers.pdf
Paper A Mock Exam 9_ Attempt review.pdf.
2.FourierTransform-ShortQuestionswithAnswers.pdf
Cell Types and Its function , kingdom of life
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
A systematic review of self-coping strategies used by university students to ...
Chinmaya Tiranga quiz Grand Finale.pdf
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
Updated Idioms and Phrasal Verbs in English subject
Lesson notes of climatology university.
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
Yogi Goddess Pres Conference Studio Updates
History, Philosophy and sociology of education (1).pptx
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Microbial diseases, their pathogenesis and prophylaxis
Cell Structure & Organelles in detailed.
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
Final Presentation General Medicine 03-08-2024.pptx

Media Access Control

  • 1. S.VIJAYALAKSHMI M.SC(CS) NADAR SARASWATHI COLLEGE OF ARTS AND SCIENCE THENI
  • 2. Media Access Control Multiple access links There is ‘collision if more than one node sends at the same ime only one node can send successfully at a time.
  • 3.  When a "collision" occurs, the signals will get distorted and the frame will be lose the link bandwidth is wasted during collision  Question: How to coordinate the access of multiple sending and receiving nodes to the shared link ?  Solution: We need a protocol to determine how nodes share channelMedium Access control (MAC) protocol  The main task of a MAC protocol is to minimize collisions in order to utilize the bandwidth by: Determining when a node can use the link (medium) What a node should do when the link is busy What the node should do when it is involved in collision
  • 4. Channel partitioning MAC protocols:  Share channel efficiently and fairly at high load  Inefficient at low load: delay in channel access, 1/N bandwidth allocated even if only 1 active node! “Taking turns” protocols  Eliminates empty slots without causing collisions  Vulnerable to failures (e.g., failed node or lost token) Random access MAC protocols  Efficient at low load: single node can fully utilize channel  High load: collision overhead
  • 6. Developed in the 1970s for a packet radio network Improvement: Start transmission only at fixed times (slots) CSMA = Carrier Sense Multiple Access Improvement: Start transmission only if no transmission is ongoing CD = Collision Detection Improvement: Stop ongoing transmission if a collision is detected (e.g. Ethernet) Evolution of Contention Protocols Slotted Aloha CSMA Aloha CSMA/CD
  • 7. ALOHA Pure ALOHA  Developed by Abramson in the 1970s for a packet radio network by Hawaii University.  Whenever a station has a data, it transmits immediately. Sender finds out whether transmission was successful or experienced a collision by listening to the broadcast from the destination station. Sender retransmits after some random time if there is a collision. Slotted ALOHA  Improvement: Time is slotted and a packet can only be transmitted at the beginning of one slot. Thus, it can reduce the collision duration.
  • 8. ALOHA  Mountainous islands – land network difficult to install  Fully decentralized protocol  The node waits for an ACK for time-out equals to the maximum round-trip propagation delay = 2* tprop
  • 9. Frame Transmission in pure ALOHA  If the frame is collided (no ACK was received) the stations wait for a random time and retransmit the frame again.
  • 10.  ThroughputAnalysis A frame (red frame) will be in a collision if and only if another transmission begins in the vulnerable period of the frame  Vulnerable period has the length of 2 frame times Frame which collides with start of red frame Frame t0 t0+F Vulnerable Period of red frame Time Frame which collides with end of red frame
  • 11. Vulnerable time- example  A pure ALOHA network transmits 200-bit frames on a shared channel of 200 kbps. What is the requirement to make this frame collision-free? Solution  Average frame transmission time Tfr is 200 bits/200 kbps or 1 ms. The vulnerable time is 2 × 1 ms = 2 ms. This means no station should send later than 1 ms before this station starts transmission and no station should start sending during the one 1-ms period that this station is sending.
  • 12.  For small G: S ≈ G, there is nearly no collision, S is small because the load is small  For large G: G >> S, there are many backlogged users, S is small because there are many collisions ThroughputAnalysis
  • 13. SlottedALOHA  time divided into discrete intervals (1 interval = 1 frame)  the sending station waits until the beginning of the next discrete interval
  • 15. Pure and Slotted ALOHA Throughput  Simple improvement but big impact 8 0.4 0.3 0.2 0.1 00 SlottedAloha Aloha 0.368 0.184 G S
  • 16. CSMA (Carrier Sense MultipleAccess  Collisions hurt the efficiency of ALOHA protocol At best, channel is useful 37% of the time  CSMA gives improved throughput compared to Aloha protocols.  CSMA: listen before transmit If channel sensed idle: transmit entire frame If channel sensed busy, defer transmission  Human analogy: don’t interrupt others!
  • 17.  Collisions can still occur: propagation delay means two nodes may not hear each other’s transmission  Collision: entire packet  transmission time wasted
  • 18. Kinds of CSMA Non-persistent CSMA CSMA 1-persistent CSMA Persistent CSMA p-persistent CSMA
  • 19.  reduces chance of collisions  reduces the efficiency increases the chance for collisions 1-persistan p-persistent increase the chance for collisions Improves efficiency Nonpersistent vs. persistent