0% found this document useful (0 votes)
81 views18 pages

Computer Networks UNIT-3 Media Access Control

The document covers various media access control methods, including random access protocols like ALOHA and CSMA, as well as controlled access techniques such as reservation, polling, and token passing. It also discusses channelization methods like FDMA, TDMA, and CDMA, along with details on Ethernet technologies and their evolution. Overall, the document provides a comprehensive overview of how multiple devices can effectively share communication channels in a network.

Uploaded by

parvezsharief38
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
81 views18 pages

Computer Networks UNIT-3 Media Access Control

The document covers various media access control methods, including random access protocols like ALOHA and CSMA, as well as controlled access techniques such as reservation, polling, and token passing. It also discusses channelization methods like FDMA, TDMA, and CDMA, along with details on Ethernet technologies and their evolution. Overall, the document provides a comprehensive overview of how multiple devices can effectively share communication channels in a network.

Uploaded by

parvezsharief38
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 18

UNIT – III:

Media Access Control: Random Access: ALOHA, Carrier sense multiple access (CSMA), CSMA with
Collision Detection, CSMA with Collision Avoidance, Controlled Access: Reservation, Polling, Token
Passing, Channelization: frequency division multiple Access (FDMA), time division multiple
access(TDMA), code division multiple access(CDMA).

Wired LANs: Ethernet, Ethernet Protocol, Standard Ethernet, Fast Ethernet(100 Mbps), Gigabit
Ethernet, 10 Gigabit Ethernet.

Multiple Access Control

 If there is a dedicated link between the sender and the receiver then data link control layer
is sufficient, however if there is no dedicated link present then multiple stations can access
the channel simultaneously.
 Hence multiple access protocols are required to decrease collision and avoid crosstalk.
 They help manage the network traffic so that all devices can share the communication
channel smoothly and effectively.
1. Data Link Control
2. Multiple Access Control

Data Link Control

 A data link control is a reliable channel for transmitting data over a dedicated link using
various techniques such as framing, error control and flow control of data packets in the
computer network.

Multiple Access Control

• When a sender and receiver have a dedicated link to transmit data packets, the data link
control is enough to handle the channel.

• Suppose there is no dedicated path to communicate or transfer the data between two
devices. In that case, multiple stations access the channel and simultaneously transmits the
data over the channel.

• It may create collision and cross talk. Hence, the multiple access protocol is required to
reduce the collision and avoid crosstalk between the channels.

Controlled Access

• Controlling access to a channel is known as controlled access. Multiple devices are


connected on a channel, and they all are trying to access the channel for communication.
But in controlled access, a device cannot send a frame unless another device authorizes it.

• In controlled access, devices communicate with each other, and devices consult each other
about which device has the right to send.

• By controlling channel access, network performance is increased, and frame collisions are
reduced.
1. Random Access Protocol:

 In this, all stations have same superiority that is no station has more priority than another
station. Any station can send data depending on medium’s state( idle or busy).
 It has two features
1. There is no fixed time for sending data.
2. There is no fixed sequence of stations sending data.
 The following are the types of Random access protocols
1.ALOHA
2.CSMA
3.CSMA/CD
4.CSMA/CA

1. ALOHA

o It is designed for wireless LAN (Local Area Network) but can also be used in a shared
medium to transmit data.
o In this, multiple stations can transmit data at the same time and can hence lead to
collision and data being garbled.
o It can be categorized into two types
1. Pure ALOHA
2. Slotted ALOHA
1. Pure ALOHA
 Pure ALOHA allows stations to transmit whenever they have data to be sent.
 When a station sends data it waits for an acknowledgement. If the
acknowledgement doesn’t come within the allotted time then the station
waits for a random amount of time called back-off time (Tb) and re-sends
the data.
 Since different stations wait for different amount of time, the probability of
further collision decreases.
 Whenever two frames try to occupy the channel at the same time ,there will
be a collision and both will be garbled.
 If the first bit of a new frame overlaps with just the last bit of a frame almost
finished ,both frames will be totally destroyed and both will have to be
retransmitted later.

 Vulnerable Time = 2* Frame transmission time

Throughput = G*e-2G

Where G is the number of stations wish to transmit in the same time

Maximum throughput = 0.184 for G=0.5

2. Slotted Aloha
 The slotted Aloha is designed to overcome the pure Aloha's efficiency
because pure Aloha has a very high possibility of frame hitting.
 In slotted Aloha, the shared channel is divided into a fixed time interval
called slots. So that, if a station wants to send a frame to a shared channel,
the frame can only be sent at the beginning of the slot, and only one frame
is allowed to be sent to each slot.
 And if the stations are unable to send data to the beginning of the slot, the
station will have to wait until the beginning of the slot for the next time.
However, the possibility of a collision remains when trying to send a frame
at the beginning of two or more station time slot.
 Vulnerable Time = Frame transmission time
 Throughput = G*e-G
Where G is the number of stations wish to transmit in the same time
 Maximum throughput = 0.368 for G=1

Differences between ALOHA and Pure ALOHA

2. Carrier Sense Multiple Access (CSMA)

 Carrier Sense Multiple Access ensures fewer collisions as the station is required to first sense
the medium (for idle or busy) before transmitting data.
 If it is idle then it sends data, otherwise it waits till the channel becomes idle.
 However there is still chance of collision in CSMA due to propagation delay.
 For example, if station A wants to send data, it will first sense the medium. If it finds the
channel idle, it will start sending data. However, by the time the first bit of data is
transmitted (delayed due to propagation delay) from station A, if station B requests to send
data and senses the medium it will also find it idle and will also send data. This will result in
collision of data from station A and B.
 CSMA access modes
1. 1-persistent: The node senses the channel, if idle it sends the data, otherwise it
continuously keeps on checking the medium for being idle and transmits
unconditionally(with 1 probability) as soon as the channel gets idle.
2. Non-Persistent: The node senses the channel, if idle it sends the data, otherwise it
checks the medium after a random amount of time (not continuously) and transmits
when found idle.
3. P-persistent: The node senses the medium, if idle it sends the data with p probability. If
the data is not transmitted ((1-p) probability) then it waits for some time and checks the
medium again, now if it is found idle then it send with p probability. This repeat
continues until the frame is sent. It is used in Wi-Fi and packet radio systems.
4. O-persistent: Superiority of nodes is decided beforehand and transmission occurs in that
order. If the medium is idle, node waits for its time slot to send data.

3. CSMA/CD

 CSMA/CD (Carrier Sense Multiple Access/ Collision Detection) is a media-access control


method that was widely used in Early Ethernet technology/LANs, when there used to be
shared.
 If two stations sense the channel to be idle and begin transmitting simultaneously,they will
both detect the collision almost immediately.
 Rather than finish transmitting their frames which are irretrievably garbled anyway, they
should abruptly stop transmitting as soon as the collision is detected.
 Quickly terminating damaged frames saves time and bandwidth.
 This protocol, known as CSMA/CD (CSMA with Collision Detection) is widely used on LANs in
the MAC sub layer.
 Collisions can be detected by looking at the power or pulse width of the received signal and
comparing it to the transmitted in the meantime.
 CSMA/CD, as well as many other LAN protocols, uses the conceptual model of figure. At the
point marked t0 , a station has finished transmitting its frame. Any other station having a
frame to send may now attempt to do so. If two or more stations decide to transmit
simultaneously, there will be a collision. Collisions can be detected by looking at the power
or pulse width of the received signal and comparing it to the transmitted signal.
 Suppose that two stations both begin transmitting at exactly time t0. How long will it take
them to realize that there has been a collision? The answer to this question is vital to
determining the length of the contention period and hence what the delay and throughput
will be. The minimum time to detect the collision is then just the time it takes the signal to
propagate from one station to the other

4. CSMA/CA

• Carrier sense multiple access with collision avoidance (CSMA/CA) is a network multiple
access method in which carrier transmission in wireless networks.

• Like wired networks, wireless networks also need to avoid collisions in network.

• It does its best to avoid collisions all together.

• In this method when a computer wants to send data it will first sense if there are any other
transmissions happening and if it detects any other transmission, it will wait for a short
amount of time before checking the channel again.

• When it checks the channel again and if it doesn’t sense any transmission it will wait a short
random amount of time and then it will go ahead and send its data

• Once the destination device receives the data, it will respond to the sending computer with
an acknowledgement informing the sender that is has received the data.

• But if the sending computer does not receive an acknowledgment from the destination ,

• It will assume that it did not get the data.


Controlled Access

• Controlling access to a channel is known as controlled access. Multiple devices are


connected on a channel, and they all are trying to access the channel for communication.
But in controlled access, a device cannot send a frame unless another device authorizes it.

• In controlled access, devices communicate with each other, and devices consult each other
about which device has the right to send.

• By controlling channel access, network performance is increased, and frame collisions are
reduced.

1. Reservation:

• In the reservation method, a station needs to make a reservation before sending data.

• Time is divided into intervals. In each interval, a reservation frame precedes the data frames
sent in that interval.

• If there are N stations in the system, there are exactly N reservation mini slots in the
reservation frame. Each mini slot belongs to a station. When a station needs to send a data
frame, it makes a reservation in its own mini slot. The stations that have made reservations
can send their data frames after the reservation frame.

• Figure shows a situation with five stations and a five-mini slot reservation frame. In the first
interval, only stations 1, 3, and 4 have made reservations. In the second interval, only station
1 has made a reservation.
2. Polling

• In the polling system, one primary station and several secondary stations are connected on a
single channel. So that, all the data exchange is done through the primary station by
controlling the channel.

• The primary station controls the channel, while the secondary stations follow its instructions
for communication. The primary station decides which station is allowed to access the
channel to communicate.

• The primary station allowed a secondary station to use the channel at a given time to
communicate.

• In simple words, we can say that the primary station is the originator of the communication.

• When the primary station wants to communicate and receive data, it asks secondary
stations if they have data to send, this method is known as polling.

• If a primary station wants to send data, it tells the secondary station that it sends data and
secondary have to be ready, this is known as the select function.

Working of Polling Method

• The diagram below explains the working of polling method and its functions.

• As shown in the figure, there is one primary station and two secondary stations connected
on a channel.

• The primary station wants to send data to secondary station B. It sends the SEL (SELECT)
function to the secondary station.

• When Secondary Station B receives the SEL, it will send an acknowledgment to the Primary
Station to inform that it is ready to receive data.

• Therefore, the primary station sends the data to the secondary station B, and the secondary
station sends a reply acknowledgment for the received data to the primary station.

• Figure on the right side, the primary station wants to receive data from secondary station-A.
Therefore, it will send the poll function to station-A.
• But, station-A sends a negative acknowledgment (NAK), so the primary station will
understand that it does not want to communicate. Therefore, the primary station sends the
poll function to secondary station B.

• As soon as station B receives the poll function, it accepts the primary station’s request for
data. So, in response, station B sends data to the primary station, and the primary station
sends an acknowledgment for the successful arrival of the data.

3. Token Passing

• In token passing, each station has a predecessor and a successor station, they are arranged
in a logical ring. The current station is using the channel for communication, as it gets access
to the channel from the predecessor. This right is passed to the successor station when the
current station does not have data to send on the channel.

• In token passing, a packet called a token passes through the ring, which gives the
station access to the channel.

• The token is transmitted over a channel, and whichever station has the token has
the right to access the channel for communication.

• When a station has data to send, it has to wait until it receives a token from its
predecessor station. Until the data is sent, one station retains the token, and after
completing the task of sending the data, it sends the token to its successor station.

• The station is not able to send data until the token is received again in the next
round.

• On a channel, it may be possible that the station receives the token but has no data
to send, so in this case, it only sends the token to the next station.
• However, in the token passing method, the tokens are monitored to ensure that it is
not lost or destroyed. For example, if a station is holding a token and it fails due to
unavoidable circumstances, the token will disappear from the network.

• Also, the token function assigns priority based on the type of data the station has. To
release the tokens from low-priority stations to high-priority stations, token
management is required.

Channelization

Channelization is a multi access method in which the available bandwidth of a link is shared in
time, frequency or through code to multiple stations to access channel simultaneously.

1. Frequency Division Multiple Access (FDMA)

• The available bandwidth is divided into equal bands so that each station can be allocated its
own band. Guard bands are also added so that no two bands overlap to avoid crosstalk and
noise.

• The available bandwidth is shared by all stations.

• The FDMA is a data link layer protocol that uses FDM at the physical layer
Time Division Multiple Access (FDMA)

• In TDMA ,the bandwidth is just one channel that is time shared between different stations.

• The entire bandwidth is just one channel.

• Stations share the capacity of the channel in time.

Code division multiple access(CDMA)

In CDMA, one channel carries all transmissions simultaneously

CDMA differs from FDMA because only one channel occupies the entire bandwidth of the link.

If differs from TDMA because all stations can send data simultaneously ;there is no time sharing.
Ethernet

 LOCAL AREA NETWORK (LAN) is a computer network that is designed for a limited
geographic area such as a building or a campus. Most LANs today are also linked to a wide
area network (WAN) or the Internet.
 The LAN market has seen several technologies such as Ethernet, Token Ring, Token Bus,
FDDI, and ATM LAN. Some of these technologies survived for a while, but Ethernet is by far
the dominant technology.
 The IEEE Standard Project 802, designed to regulate the manufacturing and interconnectivity
between different LANs. Ethernet has changed to meet the market needs and to make use
of the new technologies.
 It operates in the data link layer and the physical layer.
 Ethernet is a network protocol that controls how data is transmitted over a LAN. Technically
it is referred to as the IEEE 802.3 protocol.
 It is belongs to the family of networking technologies that are defined in the IEEE 802.11 and
IEEE 802.3 standards.
 It supports data bandwidth of 10,100,1000,10,000,40,000 and 100,1000 mbps(100 mbps).
 Ethernet is a set of technologies and protocols that are used primarily in LANs. It was first
standardized in 1980s as IEEE 802.3 standard. Ethernet is classified into two categories:
History of Ethernet

The original Ethernet was created in 1976 at Xerox's Palo Alto Research Center (PARC). Since then, it
has gone through four generations:

a. Standard Ethernet (10 Mbps)

b. Fast Ethernet (100 Mbps),

c. Gigabit Ethernet (1 Gbps)

d. Ten-Gigabit Ethernet (10 Gbps)

1. Standard Ethernet

The Standard Ethernet defines several physical layer implementations; four of the most
common
1. 10Base5: Thick Ethernet

The first implementation is called 10Base5, thick Ethernet, or Thicknet. The


nickname derives from the size of the cable, which is roughly the size of a garden
hose and too stiff to bend with your hands. 10Base5 was the first Ethernet
specification to use a bus topology with an external transceiver
(transmitter/receiver) connected via a tap to a thick coaxial cable.

2. 10Base2: Thin Ethernet

The second implementation is called 10Base2, thin Ethernet, or Cheaper net.


10Base2 also uses a bus topology, but the cable is much thinner and more flexible.
The cable can be bent to pass very close to the stations. In this case, the transceiver
is normally part of the network interface card (NIC), which is installed inside the
station.

Note that the collision here occurs in the thin coaxial cable. This implementation is
more cost effective than 10Base5 because thin coaxial cable is less expensive than
thick coaxial and the tee connections are much cheaper than taps. Installation is
simpler because the thin coaxial cable is very flexible. However, the length of each
segment cannot exceed 185 m (close to 200 m) due to the high level of attenuation in
thin coaxial cable.

3. 10Base-T: Twisted-Pair Ethernet

The third implementation is called 10Base-T or twisted-pair Ethernet. 10Base-T uses


a physical star topology. The stations are connected to a hub via two pairs of twisted
cable. Note that two pairs of twisted cable create two paths (one for sending and
one for receiving) between the station and the hub. Any collision here happens in
the hub. Compared to 10Base5 or 10Base2, we can see that the hub actually
replaces the coaxial cable as far as a collision is concerned. The maximum length of
the twisted cable here is defined as 100 m, to minimize the effect of attenuation in
the twisted cable.

4. 10Base-F: Fiber Ethernet

• Although there are several types of optical fiber 10-Mbps Ethernet, the most
common is called 10Base-F. 10Base-F uses a star topology to connect stations to a
hub. The stations are connected to the hub using two fiber-optic cables

2. Fast Ethernet (802.3u)


 In computer networks, Fast Ethernet is a variation of Ethernet standards that carry
data traffic at 100 Mbps (Mega bits per second) in local area networks (LAN). It was
launched as the IEEE 802.3u standard in 1995, and stayed the fastest network till the
introduction of Gigabit Ethernet.
 Fast Ethernet is popularly named as 100-BASE-X. Here, 100 is the maximum
throughput, i.e. 100 Mbps, BASE denoted use of baseband transmission, and X is the
type of medium used, which is TX or FX.

Varieties of Fast Ethernet

 The common varieties of fast Ethernet are 100-Base-TX, 100-BASE-FX and 100-Base-
T4.
1. 100-Base-T4
o This has four pairs of UTP of Category 3, two of which are bi-directional and
the other two are unidirectional.
o In each direction, three pairs can be used simultaneously for data
transmission.
o Each twisted pair is capable of transmitting a maximum of 25Mbaud data.
Thus the three pairs can handle a maximum of 75Mbaud data.
o It uses the encoding scheme 8B/6T (eight binary/six ternary).
2. 100-Base-TX
o This has either two pairs of unshielded twisted pairs (UTP) category 5 wires
or two shielded twisted pairs (STP) type 1 wires. One pair transmits frames
from hub to the device and the other from device to hub.
o Maximum distance between hub and station is 100m.
o It has a data rate of 125 Mbps.
o It uses MLT-3 encoding scheme along with 4B/5B block coding.
3. 100-BASE-FX
o This has two pairs of optical fibers. One pair transmits frames from hub to
the device and the other from device to hub.
o Maximum distance between hub and station is 2000m.
o It has a data rate of 125 Mbps.
o It uses NRZ-I encoding scheme along with 4B/5B block coding.

3. Gigabit Ethernet
 In computer networks, Gigabit Ethernet (GbE) is the family of Ethernet technologies that
achieve theoretical data rates of 1 gigabit per second (1 Gbps). It was introduced in 1999 and
was defined by the IEEE 802.3ab standard.

Varieties of Gigabit Ethernet

 The popular varieties of fast Ethernet are 1000Base-SX, 1000Base-LX, 1000BASE-T


and 1000Base-CX.
1. 1000BASE-CX
o Defined by IEEE 802.3z standard
o The initial standard for Gigabit Ethernet
o Uses shielded twisted pair cables with DE-9 or 8P8C connector
o Maximum segment length is 25 metres
o Uses NRZ line encoding and 8B/6B block encoding
2. 1000BASE-SX
o Defined by IEEE 802.3z standard
o Uses a pair of fibre optic cables of a shorter wavelength having 770 – 860
nm diameter
o The maximum segment length varies from 220 – 550 metres depending
upon the fiber properties.
o Uses NRZ line encoding and 8B/10B block encoding
3. 1000BASE-LX
o Defined by IEEE 802.3z standard
o Uses a pair of fibre optic cables of a longer wavelength having 1270 – 1355
nm diameter
o Maximum segment length is 500 metres
o Can cover distances up to 5 km
o Uses NRZ line encoding and 8B/10B block encoding
4. 1000BASE-T
o Defined by IEEE 802.3ab standard
o Uses a pair four lanes of twisted-pair cables (Cat-5, Cat-5e, Cat-6, Cat-7)
o Maximum segment length is 100 metres
o Uses trellis code modulation technique

4. 10-Gigabit Ethernet
 In computer networks, 10-Gigabit Ethernet is the family of Ethernet technologies
that achieve maximum rates up to 10 gigabits per second (10 Gbps). It is also known
as 10GE, 10GbE or 10 GigE. It is defined by the IEEE 802.3ae-2002 standard.
 10GE is a thousand times faster than standard Ethernet and supports only full-
duplex communication. Multimode fiber having 0.85μ frequency is used for medium
distances and single-mode fiber having 1.5μ frequency is used for long distances.

Varieties of Gigabit Ethernet

 The popular varieties of fast Ethernet are 1000Base-SX, 1000Base-LX, 1000BASE-T


and 1000Base-CX.
1.10GBase-SR

o Defined by IEEE 802.3ae standard


o Uses fiber optic cables
o Maximum segment length is 300 m
o Deployed using multimode fibers having 0.85μ frequency

2.10GBase-LR

o Defined by IEEE 802.3ae standard


o Uses fiber optic cables
o Maximum segment length is 10 km
o Deployed using single-mode fibers having 1.3μ frequency

3.10GBase-ER

o Defined by IEEE 802.3ae standard


o Uses fiber optic cable
o Maximum segment length is 40 km
o Deployed using single-mode fibers having 1.5μ frequency

4.10GBase-CX4

o Defined by IEEE 802.3ak standard


o Uses 4 pairs of twin-axial cables
o Maximum segment length is 15 m
o Uses 8B/10B coding

4.10GBase-T

 Defined by IEEE 802.3an standard


 Uses 4 pairs of unshielded twisted pair cables
 Maximum segment length is 100 m
 Uses low-density parity-check code (LPDC code)

You might also like