0% found this document useful (0 votes)
16 views13 pages

Unit 3

The MAC layer is a sublayer of the data link layer in the OSI model, responsible for controlling data transmission over shared channels and providing flow control and multiplexing. It includes functions such as frame encapsulation, addressing, collision resolution, and channel allocation, which can be static or dynamic. Multiple access protocols like ALOHA and its variants facilitate efficient data transmission while managing collisions in network communications.

Uploaded by

22b01a45a0
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views13 pages

Unit 3

The MAC layer is a sublayer of the data link layer in the OSI model, responsible for controlling data transmission over shared channels and providing flow control and multiplexing. It includes functions such as frame encapsulation, addressing, collision resolution, and channel allocation, which can be static or dynamic. Multiple access protocols like ALOHA and its variants facilitate efficient data transmission while managing collisions in network communications.

Uploaded by

22b01a45a0
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 13

MAC Layer in the OSI Model

 The medium access control (MAC) is a sublayer of the data link layer
of the open system interconnections (OSI) reference model for data
transmission.
 It is responsible for flow control and multiplexing for transmission
medium.
 It controls the transmission of data packets via remotely shared channels.
 It sends data over the network interface card.

It is divided into two sublayers −

 The logical link control (LLC) sublayer


 The medium access control (MAC) sublayer

Data Communication AI-DS


Functions of MAC Layer

 It provides an abstraction of the physical layer to the LLC and


upper layers of the OSI network.
 It is responsible for encapsulating frames so that they are
suitable for transmission via the physical medium.
 It resolves the addressing of source station as well as the
destination station, or groups of destination stations.
 It performs multiple access resolutions when more than one
data frame is to be transmitted. It determines the channel access
methods for transmission.
 It also performs collision resolution and initiating
retransmission in case of collisions.
 It generates the frame check sequences and thus contributes to
protection against transmission errors.

Data Communication AI-DS


Channel Allocation Problem
 In order to carry out user-specific duties, a single channel is
separated and assigned to many users. This procedure is known as
channel allocation.
 The number of users may change each time the operation runs.
 Each user is allotted a share of the channel if it has N equal-sized
subchannels and N users overall.
 Frequency Division Multiplexing is an easy and effective channel
bandwidth allocation technique that can be employed if the number
of users is minimal and doesn't fluctuate.

Data Communication AI-DS


Static channel allocation

The process of static channel allocation scheme:


 Let us start with mean time delay T,
 Send a frame onto a channel of capacity C bps.
 Let us assume frames arrive randomly at an average
arrival time λ frames/sec Example :1
 Average length of the frame is 1/µ bits. If C is 100Mbps, the mean frame length 1/µ is
 With the help of these parameters the service rate of 10,000 bits and the frame arrival time λ is 5000
channel is μC frame/sec frames/ sec then,
 Standard queueing theory result is , T=1/(µC- λ) =
T= 1/( µC- λ) 200 μsec.
 Now divide the single channel into N independent
subchannels, each with capacity C/N bps.
 The mean input rate on each subchannel is λ/N.
 Finally we get TN=1/(µ(C/N) – (λ/N))
= N/( µC- λ)
Data Communication = NT AI-DS
Dynamic Channel Allocation (DCA)

 In DCA schemes, all channels are kept in a central pool and are
assigned dynamically to new calls as they arrive in the system.
 After each call is completed, the channel is returned to the central
pool. It is fairly straightforward to select the most appropriate
channel for any call based simply on current allocation and current
traffic, with the aim of minimizing the interference.
 DCA scheme can overcome the problem of FCA (Fixed channel
allocation) scheme.
 However, variations in DCA schemes center around the different
cost functions used for selecting one of the candidate channels for
assignment.

Data Communication AI-DS


Dynamic Channel Allocation (DCA)

 DCA schemes can be Centralized or Distributed.


 The centralized DCA scheme involves a single controller
selecting a channel for each cell;
 The distributed DCA scheme involves a number of controllers
scattered across the network.
 Centralized DCA schemes can theoretically provide the best
performance.
 Nevertheless, centralized DCA schemes often provide a useful
benchmark to compare practical decentralized DCA schemes.

Data Communication AI-DS


Multiple Access protocols

 In Random-access or contention methods, no station is superior to another


station and none is assigned control over another.
 At each instance, a station that has data to send uses a procedure defined by the
protocol to make a decision on whether or not to send.
 This decision depends on the state of the medium (idle or busy).
 In other words, each station can transmit when it desires on the condition that
it follows the predefined procedure, including testing the state of the medium.
Data Communication AI-DS
What is ALOHA
 ALOHA is an early computer networking method created at the
University of Hawaii in the early 1970s.
 It’s a straightforward way to send data over a shared medium, like a
wireless or wired network.
 The main idea of ALOHA is how it handles collisions, which happen
when two devices try to send data at the same time, causing interference.

Data Communication AI-DS


Pure ALOHA
 Pure ALOHA refers to the original ALOHA protocol. The idea is that each
station sends a frame whenever one is available. Because there is only one channel
to share, there is a chance that frames from different stations will collide.
 The pure ALOHA protocol utilizes acknowledgments from the receiver to ensure
successful transmission. When a user sends a frame, it expects confirmation from
the receiver. If no acknowledgment is received within a designated time period,
the sender assumes that the frame was not received and retransmits the frame.
 When two frames attempt to occupy the channel simultaneously, a collision occurs
and both frames become garbled. If the first bit of a new frame overlaps with the
last bit of a frame that is almost finished, both frames will be completely destroyed
and will need to be retransmitted. If all users retransmit their frames at the same
time after a time-out, the frames will collide again.
 To prevent this, the pure ALOHA protocol dictates that each user waits a random
amount of time, known as the back-off time, before retransmitting the frame. This
randomness helps to avoid further collisions.

Data Communication AI-DS


PROCEDURE

Data Communication AI-DS


PROCEDURE

 The time-out period is equal to the maximum possible round-trip


propagation delay, which is twice the amount of time required to send a
frame between the two most widely separated stations (2 x Tp).
 Let all the packets have the same length. And each requires a one-time unit
for transmission (tp).
 Consider any user to send packet A at a time. If any other user B has
generated a packet between time (to), and (to + tp), the end of packet B will
collide with the beginning of packet A.
 Since in a pure ALOHA packet, a station does not listen to the channel
before transmitting, it has no way of knowing that the above frame was
already underway.
 Similarly, if another user wants to transmit between (to, +tp) and (to +2tp)
i.e. packet C, the beginning of packet C will collide with the end of packet
A.
 Thus if two packets overlap by even the smallest amount in the vulnerable
period both packets will be corrupted and need to be retransmitted.

Data Communication AI-DS


Slotted ALOHA
 Slotted ALOHA is an improved version of the pure ALOHA protocol that aims
to make communication networks more efficient.
 In this version, the channel is divided into small, fixed-length time slots and
users are only allowed to transmit data at the beginning of each time slot.
 This synchronization of transmissions reduces the chances of collisions
between devices, increasing the overall efficiency of the network.
 The channel time is separated into time slots in slotted ALOHA, and stations
are only authorized to transmit at particular times.
 These time slots correspond to the packet transmission time exactly.
 All users are then synchronized to these time slots so that whenever a user
sends a packet, it must precisely match the next available channel slot.
 As a result, wasted time due to collisions can be reduced to one packet time or
the susceptible period can be half.
Data Communication AI-DS
 Slotted ALOHA increases channel utilization by reducing the number of collisions. However, it also
increases the delay for users, as they have to wait for the next time slot to transmit their frames.
 It’s also worth noting that there is a variant of slotted ALOHA called “non-persistent slotted
ALOHA” which is a variation of slotted ALOHA, in this variant the station that wants to send data,
first listens to the channel before sending the data.
 If the channel is busy it waits for a certain time before trying again.

Data Communication AI-DS

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy