Media Access Control
Media Access Control
will send the data whenever a frame is available for transmission. If we succeed and
the frame reaches its destination, then the next frame is lined-up for transmission.
But remember, if the data frame is not received by the receiver (maybe due to
collision) then the frame is sent again until it successfully reaches the receiver's end.
the ALOHA method works efficiently. But as the network becomes more and more
which share a common data path or channel, then the conflict occurs because data-
frames collide, and the information is lost. Following is the flow chart of Pure
ALOHA.
Figure 12.3 Frames in a pure ALOHA network
Figure 12.4 Procedure for pure ALOHA protocol
Figure 12.5 Vulnerable time for pure ALOHA protocol
Figure 12.6 Frames in a slotted ALOHA network
Figure 12.7 Vulnerable time for slotted ALOHA protocol
Difference between Pure aloha and Slotted aloha
4. Vulnerable time In pure aloha, the vulnerable Whereas, in slotted aloha, the
time is = 2 x Tt vulnerable time is = Tt
5. Successful In pure aloha, the probability of In slotted aloha, the probability of the
transmission the successful transmission of successful transmission of the frame is
the frame is – –
S = G * e-2G S = G * e-G
6. Throughput The maximum throughput in The maximum throughput in slotted
pure aloha is about 18%. aloha is about 37%.
Carrier Sense Multiple Access (CSMA)
This method was developed to decrease the chances of collisions when two or
more stations start sending their signals over the data link layer. Carrier Sense
multiple access requires that each station first check the state of the
medium before sending.
Carrier Sense Multiple Access with Collision Detection (CSMA/CD)
In this method, a station monitors the medium after it sends a frame to see if the
and since C sees the channel idle at t2, starts sending its frame
The basic idea behind CSMA/CA is that the station should be able to receive while transmitting to
detect a collision from different stations. In wired networks, if a collision has occurred then the
energy of the received signal almost doubles, and the station can sense the possibility of collision. In
the case of wireless networks, most of the energy is used for transmission, and the energy of the
received signal increases by only 5-10% if a collision occurs. It can’t be used by the station to sense
1. InterFrame Space (IFS): When a station finds the channel busy it senses the channel again,
when the station finds a channel to be idle it waits for a period of time called IFS time. IFS can also
be used to define the priority of a station or a frame. Higher the IFS lower is the priority.
2. Contention Window: It is the amount of time divided into slots. A station that is ready to send
frames chooses a random number of slots as wait time.
Figure 12.16 Timing in CSMA/CA
Note
There are 4 types of access modes available in CSMA. It is also referred as 4 different types of CSMA
protocols which decides time to start sending data across a shared media.
1.1-Persistent: It senses the shared channel first and delivers the data right away if the channel is
idle. If not, it must wait and continuously track for the channel to become idle and then broadcast the
continuously), and when it discovers the channel is empty, it sends the frames.
3.P-Persistent: It consists of the 1-Persistent and Non-Persistent modes combined. Each node
observes the channel in the P-Persistent mode, and if the channel is idle, it sends a frame with a P
probability. If the data is not transferred, the frame restarts with the following time slot after waiting
wish to transmit.
•The stations which have reserved their slots transfer their frames in that order.
Figure 12.18 Reservation access method
The following figure shows a situation with five stations and a five-slot reservation frame.
In the first interval, only stations 1, 3, and 4 have made reservations. In the second
•Polling process is similar to the roll-call performed in class. Just like the teacher,
a controller sends a message to each node in turn.
•In this, one acts as a primary station(controller) and the others are secondary
stations. All data exchanges must be made through the controller.
•The message sent by the controller contains the address of the node being
back.
•Problems include high overhead of the polling messages and high dependence on
the reliability of the controller.
Figure 12.19 Select and poll functions in polling access method
Token Passing
•In token passing scheme, the stations are connected logically to each other in form of ring
and access to stations is governed by tokens.
•A token is a special bit pattern or a small message, which circulate from one station to the
next in some predefined order.
•In Token ring, token is passed from one station to another adjacent station in the ring
whereas incase of Token bus, each station uses the bus to send the token to the next station in
the next station. If it has no queued frame, it passes the token simply.
•After sending a frame, each station must wait for all N stations (including itself) to send the
token to their neighbours and the other N – 1 stations to send a frame, if they have one.
Figure 12.20 Logical ring and physical topology in token-passing access method