MAC Protocol
MAC Protocol
MAC Protocol
Lecture # 20
MAC Protocols
For wireless
Random Access
Random Access (or contention based ) Protocols:
12
Frames in a pure ALOHA
network
Pure ALOHA Protocols
If a station misses the beginning of a slot, it has to wait until the beginning of the next time
slot.
A central clock or station informs all stations about the start of a each slot
17
Vulnerable time for Slotted ALOHA protocol
18
Advantage of ALOHA protocols
A node that has frames to be transmitted can transmit continuously at the full rate of
channel (R bps) if it is the only node with frames
Simple to be implemented
No master station is needed to control the medium
Disadvantage
If (M) nodes want to transmit, many collisions can occur and the rate allocated for each
node will not be on average R/M bps
This causes low channel utilization 36.8% and 18.4%
Random Access – Carrier Sense Multiple Access
(CSMA)
Random Access – Carrier Sense Multiple Access
(CSMA)
Vulnerable time for CSMA is the maximum propagation time
The longer the propagation delay, the worse the performance of the protocol because of the
above case.
Types of CSMA Protocols
1. Non-Persistent CSMA
2. 1-Persistent CSMA
3. p-Persistent CSMA
Flow diagram for three persistence methods
Nonpersistent CSMA
Time is divided to slots where each Time unit (slot) typically equals maximum propagation delay
Station wishing to transmit listens to the medium:
1. If medium idle,
transmit with probability (p), OR
wait one time unit (slot) with probability (1 – p), then repeat 1.
2. If medium busy, continuously listen until idle and repeat step 1
3. Performance
Reduces the possibility of collisions like nonpersistent
Reduces channel idle time like 1-persistent
Persistent and Nonpersistent CSMA
CSMA/CD (Carrier Sense Multiple Access with Collision Detection) overcomes this
as follows:
While transmitting, the sender is listening to medium for collisions.
CSMA/CD is Widely used for bus topology LANs (IEEE 802.3, Ethernet).
CSMA/CD (Collision Detection)
Collision and abortion in CSMA/CD
31
Flow diagram for CSMA/CA
32
Flow diagram for the CSMA/CD
33
CSMA/CD (CSMA with Collision Detection)
CSMA/CD
Step 1: If the medium is idle, transmit
Step 4: Wait a random amount of time and repeats the same algorithm
References :
Text Book:
1. Behrouz A. Forouzan, Data Communication and
networking, 4th Ed., Tata McGraw Hills year of
publication 2006
Other Specific Book:
1. Andrew S. Tanenbaum,Computer Network 2nd
Edition, PHI, Third Edition 1997
2. Comer E. Doughlas,Computer Networks and
Internets, 2nd Ed., Pearson, 2000
3. W. Stallings,Data and Computer Communications, 7th
Ed., Pearson, 2002.
See you in next class