Chapter 12
Media
Access
Control
(MAC)
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 12: Outline
12.1
12.1 RANDOM ACCESS
RANDOM ACCESS
12.2
12.2 CONTROLLED ACCESS
CONTROLLED ACCESS
12.3
12.3 CHANNELIZATION
CHANNELIZATION
Chapter 12: Objective
 The first section discusses random-access protocols. Four
protocols, ALOHA, CSMA, CSMA/CD, and CSMA/CA, are
described in this section. These protocols are mostly used in
LANs and WANs, which we discuss in future chapters.
 The second section discusses controlled-access protocols. Three
protocols, reservation, polling, and token-passing, are described
in this section. Some of these protocol are used in LANs, but
others have some historical value.
 The third section discusses channelization protocols. Three
protocols, FDMA, TDMA, and CDMA are described in this
section. These protocols are used in cellular telephony, which we
discuss in Chapter 16.
12.4
Figure 12.1: Taxonomy of multiple-access protocols
12.5
12-1 RANDOM ACCESS
12-1 RANDOM ACCESS
In random-access or contention no
station is superior to another station
and
none is assigned control over another. At
each instance, a station that has data to
send uses a procedure defined by the
protocol to make a decision on whether
or not to send. This decision depends on
the state of the medium (idle or busy).
12.6
12.12.1 ALOHA
12.12.1 ALOHA
ALOHA, the earliest random access method, was
developed at the University of Hawaii in early 1970.
It was designed for a radio (wireless) LAN, but it
can be used on any shared medium. It is obvious
that there are potential collisions in this
arrangement. The medium is shared between the
stations. When a station sends data, another station
may attempt to do so at the same time. The data from
the two stations collide and become garbled.
12.7
Figure 12.2: Frames in a pure ALOHA network
12.8
Figure 12.3: Procedure for pure ALOHA protocol
12.9
Figure 12.4: Vulnerable time for pure ALOHA protocol
12.10
Figure 12.5: Frames in a slotted ALOHA network
12.11
Figure 12.6: Vulnerable time for slotted ALOHA protocol
12.12
12.12.2 CSMA
12.12.2 CSMA
To minimize the chance of collision and, therefore,
increase the performance, the CSMA method was
developed. The chance of collision can be reduced if
a station senses the medium before trying to use it.
Carrier sense multiple access (CSMA) requires that
each station first listen to the medium (or check the
state of the medium) before sending. In other words,
CSMA is based on the principle “sense before
transmit” or “listen before talk.”
12.13
Figure 12.7: Space/time model of a collision in CSMA
12.14
Figure 12.8: Vulnerable time in CSMA
12.15
Figure 12.9: Behavior of three persistence methods
12.16
Figure 12.10: Flow diagram for three persistence methods
12.17
12.12.3 CSMA/CD
12.12.3 CSMA/CD
The CSMA method does not specify the procedure
following a collision. Carrier sense multiple access
with collision detection (CSMA/CD) augments the
algorithm to handle the collision.
In this method, a station monitors the medium after
it sends a frame to see if the transmission was
successful. If so, the station is finished. If, however,
there is a collision, the frame is sent again.
12.18
Figure 12.11: Collision of the first bits in CSMA/CD
12.19
Figure 12.12: Collision and abortion in CSMA/CD
A network using CSMA/CD has a bandwidth of 10 Mbps. If
the maximum propagation time (including the delays in the
devices and ignoring the time needed to send a jamming
signal, as we see later) is 25.6 μs, what is the minimum size
of the frame?
Solution
The minimum frame transmission time is Tfr = 2 × Tp =
512.2 μs. This means, in the worst case, a station needs to
transmit for a period of 512.2 μs to detect the collision. The
minimum size of the frame is 10 Mbps × 512.2 μs = 512 bits
or 64 bytes. This is actually the minimum size of the frame
for Standard Ethernet, as we will see later in the chapter.
Example 12. 5
12.20
12.21
Figure 12.13: Flow diagram for the CSMA/CD
12.22
Figure 12.14: Energy level during transmission, idleness, or collision
12.23
12.12.4 CSMA/CA
12.12.4 CSMA/CA
Carrier sense multiple access with collision
avoidance (CSMA/CA) was invented for wireless
networks. Collisions are avoided through the use of
CSMA/CA’s three strategies: the interframe space,
the contention window, and acknowledgments, as
shown in Figure 12.15. We discuss RTS and CTS
frames later.
12.24
Figure 12.15: Flow diagram for CSMA/CA
12.25
Figure 12.16: Contention window
12.26
Figure 12.17: CSMA/CA and NAV
12.27
12-2 CONTROLLED ACCESS
12-2 CONTROLLED ACCESS
In controlled access, the stations consult
one another to find which station has
the right to send. A station cannot send
unless it has been authorized by other
stations. We discuss
three controlled-access methods.
12.28
12.2.1 Reservation
12.2.1 Reservation
In the reservation method, a station needs to make a
reservation before sending data. Time is divided into
intervals. In each interval, a reservation frame
precedes the data frames sent in that interval.
12.29
Figure 12.18: Reservation access method
12.30
12.2.2 Polling
12.2.2 Polling
Polling works with topologies in which one device is
designated as a primary station and the other devices
are secondary stations. All data exchanges must be
made through the primary device even when the
ultimate destination is a secondary device. The
primary device controls the link; the secondary
devices follow its instructions. It is up to the primary
device to determine which device is allowed to use
the channel at a given time.
12.31
Figure 12.19: Select and poll functions in polling-access method
12.32
12.2.3 Token Passing
12.2.3 Token Passing
In the token-passing method, the stations in a
network are organized in a logical ring. In other
words, for each station, there is a predecessor and a
successor. The predecessor is the station which is
logically before the station in the ring; the successor
is the station which is after the station in the ring.
12.33
Figure 12.20: Logical ring and physical topology in token-passing
access method
12.34
12-3 CHANNELIZATION
12-3 CHANNELIZATION
Channelization (or channel partition, as
it is sometimes called) is a multiple-
access
method in which the available
bandwidth of a link is shared in time,
frequency, or
through code, among different stations.
In this section, we discuss three
protocols: FDMA, TDMA, and CDMA.
12.35
12.3.1 FDMA
12.3.1 FDMA
In frequency-division multiple access (FDMA), the
available bandwidth is divided into frequency bands.
Each station is allocated a band to send its data. In
other words, each band is reserved for a specific
station, and it belongs to the station all the time.
Each station also uses a bandpass filter to confine
the transmitter frequencies. To prevent
12.36
Figure 12.21: Frequency-division multiple access (FDMA)
12.37
12.3.2 TDMA
12.3.2 TDMA
In time-division multiple access (TDMA), the
stations share the bandwidth of the channel in time.
Each station is allocated a time slot during which it
can send data. Each station transmits its data in its
assigned time slot. Figure 12.22 shows the idea
behind TDMA.
12.38
Figure 12.22: Time-division multiple access (TDMA)
12.39
12.3.3 CDMA
12.3.3 CDMA
Code-division multiple access (CDMA) was
conceived several decades ago. Recent advances in
electronic technology have finally made its
implementation possible. CDMA differs from FDMA
in that only one channel occupies the entire
bandwidth of the link. It differs from TDMA in that
all stations can send data simultaneously; there is
no timesharing.
12.40
Figure 12.23: Simple idea of communication with code
12.41
Figure 12.24: Chip sequences
12.42
Figure 12.25: Data representation in CDMA
12.43
Figure 12.26: Sharing channel in CDMA
12.44
Figure 12.27: Digital signal created by four stations in CDMA
12.45
Figure 12.28: Decoding of the composite signal for one in CDMA
12.46
Figure 12.29: General rules and examples of creating Walsh tables
Find the chips for a network with
a. Two stations
b. Four stations
Example 12.6
12.47
What is the number of sequences if we have 90 stations in
our network?
Example 12. 7
12.48
Prove that a receiving station can get the data sent by a
specific sender if it multiplies the entire data on the channel
by the sender’s chip code and then divides it by the number
of stations.
Example 12.8
12.49

More Related Content

PPT
Multiple Access mechanism in Computer Network.ppt
PPT
medium access tcpip network layer data link layer
PPT
mac-protocols
PPT
Multiple Access ppt in Object Oriented Programming
PPT
ch12.ppt computer network specifically from data link layer
PPTX
AIU_CN_2.pptx
PPTX
Media Access Control (MAC Layer)
Multiple Access mechanism in Computer Network.ppt
medium access tcpip network layer data link layer
mac-protocols
Multiple Access ppt in Object Oriented Programming
ch12.ppt computer network specifically from data link layer
AIU_CN_2.pptx
Media Access Control (MAC Layer)

Similar to Ch_12 of media acess protocol and other .ppt (20)

PPT
unit 3 Multiple Access.ppt
PPT
M5L2 Multiple Access.ppt communication network
PPT
HHDUHDUO UOOYYYOIOUG _MultipleAccess.ppt
PPT
PPT
PPT
multiple access prtocols and its types
PPT
DLL Multiple Access Protocol related topics
PPT
ch12.pptmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm
PPT
data communication multiple access topic
PPT
random access: Carrier sense multiple access
PPT
ch12 Multiple Access.ppt multpile access
PPT
Lesson 3.3 Multiple Access.pptLesson_3.2- Data-link-Control.ppt
PPTX
Multiple acessing
PPT
Multiple Access In Computer Network and Protocols
PPT
12 Multiple Access
PPT
csma cd.ppt
PPTX
MULTIPLE ACCESS
PPT
ch1hdjdjdjshsjjshshshshdhssbbdbxbbxbz2.ppt
PPT
PPT
ch12.ppt
unit 3 Multiple Access.ppt
M5L2 Multiple Access.ppt communication network
HHDUHDUO UOOYYYOIOUG _MultipleAccess.ppt
multiple access prtocols and its types
DLL Multiple Access Protocol related topics
ch12.pptmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm
data communication multiple access topic
random access: Carrier sense multiple access
ch12 Multiple Access.ppt multpile access
Lesson 3.3 Multiple Access.pptLesson_3.2- Data-link-Control.ppt
Multiple acessing
Multiple Access In Computer Network and Protocols
12 Multiple Access
csma cd.ppt
MULTIPLE ACCESS
ch1hdjdjdjshsjjshshshshdhssbbdbxbbxbz2.ppt
ch12.ppt
Ad

Recently uploaded (20)

DOC
T Pandian CV Madurai pandi kokkaf illaya
PDF
Exploratory_Data_Analysis_Fundamentals.pdf
PDF
August 2025 - Top 10 Read Articles in Network Security & Its Applications
PDF
Computer System Architecture 3rd Edition-M Morris Mano.pdf
PPTX
Software Engineering and software moduleing
PDF
20250617 - IR - Global Guide for HR - 51 pages.pdf
PDF
distributed database system" (DDBS) is often used to refer to both the distri...
PPTX
"Array and Linked List in Data Structures with Types, Operations, Implementat...
PDF
UEFA_Embodied_Carbon_Emissions_Football_Infrastructure.pdf
PPTX
tack Data Structure with Array and Linked List Implementation, Push and Pop O...
PDF
MLpara ingenieira CIVIL, meca Y AMBIENTAL
PDF
Applications of Equal_Area_Criterion.pdf
PPTX
Sorting and Hashing in Data Structures with Algorithms, Techniques, Implement...
PPTX
Feature types and data preprocessing steps
PPTX
AUTOMOTIVE ENGINE MANAGEMENT (MECHATRONICS).pptx
PDF
Soil Improvement Techniques Note - Rabbi
PPTX
Chapter 2 -Technology and Enginerring Materials + Composites.pptx
PDF
Design of Material Handling Equipment Lecture Note
PPTX
CONTRACTS IN CONSTRUCTION PROJECTS: TYPES
PDF
Computer organization and architecuture Digital Notes....pdf
T Pandian CV Madurai pandi kokkaf illaya
Exploratory_Data_Analysis_Fundamentals.pdf
August 2025 - Top 10 Read Articles in Network Security & Its Applications
Computer System Architecture 3rd Edition-M Morris Mano.pdf
Software Engineering and software moduleing
20250617 - IR - Global Guide for HR - 51 pages.pdf
distributed database system" (DDBS) is often used to refer to both the distri...
"Array and Linked List in Data Structures with Types, Operations, Implementat...
UEFA_Embodied_Carbon_Emissions_Football_Infrastructure.pdf
tack Data Structure with Array and Linked List Implementation, Push and Pop O...
MLpara ingenieira CIVIL, meca Y AMBIENTAL
Applications of Equal_Area_Criterion.pdf
Sorting and Hashing in Data Structures with Algorithms, Techniques, Implement...
Feature types and data preprocessing steps
AUTOMOTIVE ENGINE MANAGEMENT (MECHATRONICS).pptx
Soil Improvement Techniques Note - Rabbi
Chapter 2 -Technology and Enginerring Materials + Composites.pptx
Design of Material Handling Equipment Lecture Note
CONTRACTS IN CONSTRUCTION PROJECTS: TYPES
Computer organization and architecuture Digital Notes....pdf
Ad

Ch_12 of media acess protocol and other .ppt

  • 1. Chapter 12 Media Access Control (MAC) Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
  • 2. Chapter 12: Outline 12.1 12.1 RANDOM ACCESS RANDOM ACCESS 12.2 12.2 CONTROLLED ACCESS CONTROLLED ACCESS 12.3 12.3 CHANNELIZATION CHANNELIZATION
  • 3. Chapter 12: Objective  The first section discusses random-access protocols. Four protocols, ALOHA, CSMA, CSMA/CD, and CSMA/CA, are described in this section. These protocols are mostly used in LANs and WANs, which we discuss in future chapters.  The second section discusses controlled-access protocols. Three protocols, reservation, polling, and token-passing, are described in this section. Some of these protocol are used in LANs, but others have some historical value.  The third section discusses channelization protocols. Three protocols, FDMA, TDMA, and CDMA are described in this section. These protocols are used in cellular telephony, which we discuss in Chapter 16.
  • 4. 12.4 Figure 12.1: Taxonomy of multiple-access protocols
  • 5. 12.5 12-1 RANDOM ACCESS 12-1 RANDOM ACCESS In random-access or contention no station is superior to another station and none is assigned control over another. At each instance, a station that has data to send uses a procedure defined by the protocol to make a decision on whether or not to send. This decision depends on the state of the medium (idle or busy).
  • 6. 12.6 12.12.1 ALOHA 12.12.1 ALOHA ALOHA, the earliest random access method, was developed at the University of Hawaii in early 1970. It was designed for a radio (wireless) LAN, but it can be used on any shared medium. It is obvious that there are potential collisions in this arrangement. The medium is shared between the stations. When a station sends data, another station may attempt to do so at the same time. The data from the two stations collide and become garbled.
  • 7. 12.7 Figure 12.2: Frames in a pure ALOHA network
  • 8. 12.8 Figure 12.3: Procedure for pure ALOHA protocol
  • 9. 12.9 Figure 12.4: Vulnerable time for pure ALOHA protocol
  • 10. 12.10 Figure 12.5: Frames in a slotted ALOHA network
  • 11. 12.11 Figure 12.6: Vulnerable time for slotted ALOHA protocol
  • 12. 12.12 12.12.2 CSMA 12.12.2 CSMA To minimize the chance of collision and, therefore, increase the performance, the CSMA method was developed. The chance of collision can be reduced if a station senses the medium before trying to use it. Carrier sense multiple access (CSMA) requires that each station first listen to the medium (or check the state of the medium) before sending. In other words, CSMA is based on the principle “sense before transmit” or “listen before talk.”
  • 13. 12.13 Figure 12.7: Space/time model of a collision in CSMA
  • 15. 12.15 Figure 12.9: Behavior of three persistence methods
  • 16. 12.16 Figure 12.10: Flow diagram for three persistence methods
  • 17. 12.17 12.12.3 CSMA/CD 12.12.3 CSMA/CD The CSMA method does not specify the procedure following a collision. Carrier sense multiple access with collision detection (CSMA/CD) augments the algorithm to handle the collision. In this method, a station monitors the medium after it sends a frame to see if the transmission was successful. If so, the station is finished. If, however, there is a collision, the frame is sent again.
  • 18. 12.18 Figure 12.11: Collision of the first bits in CSMA/CD
  • 19. 12.19 Figure 12.12: Collision and abortion in CSMA/CD
  • 20. A network using CSMA/CD has a bandwidth of 10 Mbps. If the maximum propagation time (including the delays in the devices and ignoring the time needed to send a jamming signal, as we see later) is 25.6 μs, what is the minimum size of the frame? Solution The minimum frame transmission time is Tfr = 2 × Tp = 512.2 μs. This means, in the worst case, a station needs to transmit for a period of 512.2 μs to detect the collision. The minimum size of the frame is 10 Mbps × 512.2 μs = 512 bits or 64 bytes. This is actually the minimum size of the frame for Standard Ethernet, as we will see later in the chapter. Example 12. 5 12.20
  • 21. 12.21 Figure 12.13: Flow diagram for the CSMA/CD
  • 22. 12.22 Figure 12.14: Energy level during transmission, idleness, or collision
  • 23. 12.23 12.12.4 CSMA/CA 12.12.4 CSMA/CA Carrier sense multiple access with collision avoidance (CSMA/CA) was invented for wireless networks. Collisions are avoided through the use of CSMA/CA’s three strategies: the interframe space, the contention window, and acknowledgments, as shown in Figure 12.15. We discuss RTS and CTS frames later.
  • 24. 12.24 Figure 12.15: Flow diagram for CSMA/CA
  • 27. 12.27 12-2 CONTROLLED ACCESS 12-2 CONTROLLED ACCESS In controlled access, the stations consult one another to find which station has the right to send. A station cannot send unless it has been authorized by other stations. We discuss three controlled-access methods.
  • 28. 12.28 12.2.1 Reservation 12.2.1 Reservation In the reservation method, a station needs to make a reservation before sending data. Time is divided into intervals. In each interval, a reservation frame precedes the data frames sent in that interval.
  • 30. 12.30 12.2.2 Polling 12.2.2 Polling Polling works with topologies in which one device is designated as a primary station and the other devices are secondary stations. All data exchanges must be made through the primary device even when the ultimate destination is a secondary device. The primary device controls the link; the secondary devices follow its instructions. It is up to the primary device to determine which device is allowed to use the channel at a given time.
  • 31. 12.31 Figure 12.19: Select and poll functions in polling-access method
  • 32. 12.32 12.2.3 Token Passing 12.2.3 Token Passing In the token-passing method, the stations in a network are organized in a logical ring. In other words, for each station, there is a predecessor and a successor. The predecessor is the station which is logically before the station in the ring; the successor is the station which is after the station in the ring.
  • 33. 12.33 Figure 12.20: Logical ring and physical topology in token-passing access method
  • 34. 12.34 12-3 CHANNELIZATION 12-3 CHANNELIZATION Channelization (or channel partition, as it is sometimes called) is a multiple- access method in which the available bandwidth of a link is shared in time, frequency, or through code, among different stations. In this section, we discuss three protocols: FDMA, TDMA, and CDMA.
  • 35. 12.35 12.3.1 FDMA 12.3.1 FDMA In frequency-division multiple access (FDMA), the available bandwidth is divided into frequency bands. Each station is allocated a band to send its data. In other words, each band is reserved for a specific station, and it belongs to the station all the time. Each station also uses a bandpass filter to confine the transmitter frequencies. To prevent
  • 36. 12.36 Figure 12.21: Frequency-division multiple access (FDMA)
  • 37. 12.37 12.3.2 TDMA 12.3.2 TDMA In time-division multiple access (TDMA), the stations share the bandwidth of the channel in time. Each station is allocated a time slot during which it can send data. Each station transmits its data in its assigned time slot. Figure 12.22 shows the idea behind TDMA.
  • 38. 12.38 Figure 12.22: Time-division multiple access (TDMA)
  • 39. 12.39 12.3.3 CDMA 12.3.3 CDMA Code-division multiple access (CDMA) was conceived several decades ago. Recent advances in electronic technology have finally made its implementation possible. CDMA differs from FDMA in that only one channel occupies the entire bandwidth of the link. It differs from TDMA in that all stations can send data simultaneously; there is no timesharing.
  • 40. 12.40 Figure 12.23: Simple idea of communication with code
  • 42. 12.42 Figure 12.25: Data representation in CDMA
  • 43. 12.43 Figure 12.26: Sharing channel in CDMA
  • 44. 12.44 Figure 12.27: Digital signal created by four stations in CDMA
  • 45. 12.45 Figure 12.28: Decoding of the composite signal for one in CDMA
  • 46. 12.46 Figure 12.29: General rules and examples of creating Walsh tables
  • 47. Find the chips for a network with a. Two stations b. Four stations Example 12.6 12.47
  • 48. What is the number of sequences if we have 90 stations in our network? Example 12. 7 12.48
  • 49. Prove that a receiving station can get the data sent by a specific sender if it multiplies the entire data on the channel by the sender’s chip code and then divides it by the number of stations. Example 12.8 12.49