Lecture Notes On Medium Access Control
Lecture Notes On Medium Access Control
&
RAVI KUMAR Tele-communication
Systems
Topics Covered:
3
Motivation for a Specialized MAC
4
Motivation for a Specialized MAC
5
Hidden and Exposed Terminals
6
Hidden terminals
7
Exposed terminals
12
Disadvantages of FDMA
13
TDMA
14
TDMA
15
Fixed TDM
• The above figure shows how these fixed TDM patterns are
used to implement multiple access and a duplex channel
between a base station and mobile station. Assigning different
slots for uplink and downlink using the same frequency is
called time division duplex (TDD).
16
Fixed TDM Disadvantages
17
Classical Aloha
19
Slotted Aloha
21
The different versions of CSMA
23
CDMA
25
Advantages:
26
Comparison
27
GSM Architecture
• Physical Terminal
• Telephone
• Mobile
• Manage handoff
• Radio antenna
• Radio Transceiver
GSM Architecture
• Authentication Center
• contains the secret key also contained in the user's
SIM card.
•Equipment Identity Register
•International Mobile Equipment Identity.
DECT - Reference model
Digital Enhanced Cordless Telecommunication
Network layer
It offers services to request, check, reserve, control, and
release resources at the base station and mobile terminal
Manages Resources
• necessary for a wireless connection
• necessary for the connection of the DECT system to the fixed
network
Main tasks
Call control: Establishment and release of network connections,
negotiation of connection capabilities, release , setup
Call independent services (Supplementary services): call
forwarding, accounting, call redirecting
Mobility management: identity management, authentication
management of the location register
Short Message Service – support sms services
Link Control – Matches and coordinates various logical links
provided by the data link layer to network layer entities
Enhancements of the standard