LOCAL AREA NETWORKS. MEDIUM ACCESS CONTROL All LANs and MANs consist of collections of devices that must share the network’s transmission capacity. Some.

Slides:



Advertisements
Similar presentations
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Advertisements

Chapter 9 Local Area Network Technology
LAN Protocol Architecture
Multiple Access Methods. When nodes or stations are connected and use a common link (cable or air), called a multipoint or broadcast link, we need a.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Communication Networks Lecture 5 NETW 501-L5: NETW 501-L5: Medium Access Control Dr.-Ing. Khaled Shawky Hassan Room: C3-222, ext: 1204,
Chapter 12 Multiple Access Figure 12.1 Data link layer divided into two functionality-oriented sublayers Figure 12.2 Taxonomy of multiple-access protocols.
Open System Interconnection (OSI) Model
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 13 Multiple Access.
CS335 Networking & Network Administration Tuesday, April 13, 2010.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
1 Chapter 5 The Medium Access Sublayer. 2 Chapter 5 The Medium Access Layer 5.1 The Channel Allocation problem - Static and dynamic channel allocation.
Medium Access Control Sublayer
THE OSI MODEL KUDIRAT FAWEHINMI COSC 541.
1 Data Link Layer Lecture 17 Imran Ahmed University of Management & Technology.
1 Computer Communication & Networks Lecture 12 Datalink Layer: Multiple Access Waleed Ejaz
Chapter 12 Multiple Access Figure 12.1 Data link layer divided into two functionality-oriented sublayers Figure 12.2 Taxonomy of multiple-access protocols.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation Dynamic Channel Allocation  Delay for the divided.
1 Semester 1 CHAPTER 6 REVIEW JEOPARDY Frames Data Link LayerMACAddressingHexadecimalsMiscellaneous
Version 4.0 Ethernet Network Fundamentals – Chapter 9 Sandra Coleman, CCNA, CCAI.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Unit-II Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Multiple Access.
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
1 Kyung Hee University Chapter 12 Multiple Access.
1 Kyung Hee University Chapter 12 Multiple Access.
Open System Interconnection Describe how information from a software application in one computer moves through a network medium to a software application.
Ethernet Overview it the IEEE standard for Ethernet.
Data Link Layer and Ethernet COM211 Communications and Networks CDA College Theodoros Christophides
Chapter 12 Multiple Access
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
Chapter 13 Multiple Access.
Chapter 12 Media Access Control (MAC)
Multiple Access. Figure 12.1 Data link layer divided into two functionality-oriented sublayers.
The OSI Model. History of OSI Model ISO began developing the OSI model in It is widely accepted as a model for understanding network communication.
Lecture Focus: Data Communications and Networking  Data Link Layer  Media Access Control (MAC) Lecture 23 CSCS 311.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
Part III. Data Link Layer
Multiple Access Methods
Data link layer divided into two functionality-oriented sublayers
Chapter 12 Multiple Access.
Lab 7 – CSMA/CD (Data Link Layer Layer)
Part III Datalink Layer.
Chapter 12 Multiple Access
Part III Datalink Layer 10.
Introduction to Data-Link Layer
Multiple Access Mahesh Jangid Assistant Professor JVW University.
Subject Name: Computer Communication Networks Subject Code: 10EC71
Chapter 12 Multiple Access
Ethernet and Token Ring LAN Networks
Chapter 12 Local Area Networks
Multiple Access Methods
Chapter 12 Multiple Access
Chapter 12 Multiple Access
Multiple Accesses When nodes or stations are connected and use a common link, called a multipoint or broadcast link, we need a multiple-access protocol.
Data Communication Networks
Part III Datalink Layer.
Lecture 5- Data Link Layer
Chapter 12 Local Area Networks
CSE 313 Data Communication
Figure 3.1 Internet model.
Chapter 12 Local Area Networks
Multiple Access Methods
Data-Link Layer The Internet is a combination of networks glued together by connecting devices (routers or switches) If a packet is to travel from a host.
Ethernet and Token Ring LAN Networks
Part III Datalink Layer 10.
Chapter 12 Media Access Control (MAC)
Chapter 13 Wired LANs: Ethernet
Chapter 12 Media Access Control (MAC)
Presentation transcript:

LOCAL AREA NETWORKS

MEDIUM ACCESS CONTROL All LANs and MANs consist of collections of devices that must share the network’s transmission capacity. Some means of controlling access to the transmission medium is needed to provide for an orderly and efficient use of that capacity. This is the function of a medium access control (MAC) protocol.

MEDIUM ACCESS CONTROL Multiple Access consider the data link layer as two sublayers. The upper sublayer is responsible for data link control, and the lower sublayer is responsible for resolving access to the shared media.

MEDIUM ACCESS CONTROL The upper sublayer that is responsible for flow and error control is called the logical link control (LLC) layer; the lower sublayer that is mostly responsible for multipleaccess resolution is called the media access control (MAC) layer.

MEDIUM ACCESS CONTROL In multipoint networks. Many formal protocols have been devised to handle access to a shared link

MEDIUM ACCESS CONTROL Random Access In random access or contention methods, no station is superior to another station and none is assigned the control over another. No station permits, or does not permit, another station to send. At each instance, a station that has data to send uses a procedure defined by the protocol to make a decision on whether or not to send. This decision depends on the state of the medium (idle or busy).

MEDIUM ACCESS CONTROL In other words, each station can transmit when it desires on the condition that it follows the predefined procedure, including the testing of the state of the medium. Two features give this method its name. First, there is no scheduled time for a station to transmit. Transmission is random among the stations. That is why these methods are called random access. Second, no rules specify which station should send next.

MEDIUM ACCESS CONTROL Stations compete with one another to access the medium. That is why these methods are also called contention methods. In a random access method, each station has the right to the medium without being controlled by any other station. if more than one station tries to send, there is an access conflict-collision-and the frames will be either destroyed or modified. To avoid access conflict or to resolve it when it happens, each station follows a procedure that answers the following questions:

MEDIUM ACCESS CONTROL When can the station access the medium? What can the station do if the medium is busy? How can the station determine the success or failure of the transmission? What can the station do if there is an access conflict?