Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Samenvatting

Summary - AGCMSM123 networking

Beoordeling
-
Verkocht
-
Pagina's
12
Geüpload op
18-02-2026
Geschreven in
2025/2026

This document provides well-structured and easy-to-understand notes on the Medium Access Control (MAC) Sublayer, an important topic in Computer Networks and Data Link Layer studies. The notes explain how multiple devices share a communication channel efficiently in broadcast networks and LAN environments. The content is concept-focused and suitable for BSc Computer Science, BTech, Diploma, and university semester examinations. Key Features Exam-oriented explanations Simple language with conceptual clarity Important formulas and theoretical explanations included Ideal for quick revision and last-minute study Based on standard Computer Networks syllabus

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

The Medium Access Control Sublayer
We already know that, networks can be divided into two categories: those using point-to-point
connections and those using broadcast channels. This chapter deals with broadcast networks and
their protocols.

In any broadcast network, the key issue is how to determine who gets to use the channel when
there is competition for it. To make this point clearer, consider a conference call in which six
people, on six different telephones, are all connected so that each one can hear and talk to all the
others. It is very likely that when one of them stops speaking, two or more will start talking at
once, leading to chaos. In a face-to-face meeting, chaos is avoided by external means, for
example, at a meeting, people raise their hands to request permission to speak. When only a
single channel is available, determining who should go next is much harder. Many protocols for
solving the problem are known and form the contents of this chapter. In the literature, broadcast
channels are sometimes referred to as multiaccess channels or random access channels.

The protocols used to determine who goes next on a multiaccess channel belong to a sublayer of
the data link layer called the MAC (Medium Access Control) sublayer. The MAC sublayer is
especially important in LANs, many of which use a multiaccess channel as the basis for
communication. WANs, in contrast, use point-to-point links, except for satellite networks.
Because multiaccess channels and LANs are so closely related, in this chapter we will discuss
LANs in general, including a few issues that are not strictly part of the MAC sublayer. The MAC
sublayer is the bottom part of the data link layer.

The traditional way of allocating a single channel, such as a telephone trunk, among multiple
competing users is Frequency Division Multiplexing (FDM). If there are N users, the bandwidth
is divided into N equal-sized portions, each user being assigned one portion. Since each user has
a private frequency band, there is no interference between users. When there is only a small and
constant number of users, each of which has a heavy (buffered) load of traffic (e.g., carriers'
switching offices), FDM is a simple and efficient allocation mechanism.

However, when the number of senders is large and continuously varying or the traffic is bursty,
FDM presents some problems. If the spectrum is cut up into N regions and fewer than N users
are currently interested in communicating, a large piece of valuable spectrum will be wasted. If
more than N users want to communicate, some of them will be denied permission for lack of
bandwidth, even if some of the users who have been assigned a frequency band hardly ever
transmit or receive anything.

However, even assuming that the number of users could somehow be held constant at N,
dividing the single available channel into static subchannels is inherently inefficient. The basic
problem is that when some users are quiescent, their bandwidth is simply lost. They are not using
it, and no one else is allowed to use it either. Furthermore, in most computer systems, data traffic
is extremely bursty (peak traffic to mean traffic ratios of 1000:1 are common). Consequently,
most of the channels will be idle most of the time.

, The poor performance of static FDM can easily be seen from a simple queueing theory
calculation. Let us start with the mean time delay, T, for a channel of capacity C bps, with an
arrival rate of  frames/sec, each frame having a length drawn from an exponential probability
density function with mean 1/µ bits/frame. With these parameters the arrival rate is  frames/sec
and the service rate is µC frames/sec. From queueing theory it can be shown that for Poisson
arrival and service times,

T= 1(µC-λ)
For example, if C is 100 Mbps, the mean frame length, 1/µ, is 10,000 bits, and the frame arrival
rate, , is 5000 frames/sec, then T = 200 µsec. Note that if we ignored the queueing delay and
just asked how long it takes to send a 10,000 bit frame on a 100-Mbps network, we would get the
(incorrect) answer of 100 µsec. That result only holds when there is no contention for the
channel.

Now let us divide the single channel into N independent subchannels, each with capacity C/N
bps. The mean input rate on each of the subchannels will now be /N. Recomputing T we get

Equation 4

TFDM= 1/ [µ(C/N)-(λ/N)]
The mean delay using FDM is N times worse than if all the frames were somehow magically
arranged orderly in a big central queue.

Precisely the same arguments that apply to FDM also apply to time division multiplexing
(TDM). Each user is statically allocated every Nth time slot. If a user does not use the allocated
slot, it just lies fallow. The same holds if we split up the networks physically. Using our previous
example again, if we were to replace the 100-Mbps network with 10 networks of 10 Mbps each
and statically allocate each user to one of them, the mean delay would jump from 200 µsec to 2
msec.

Since none of the traditional static channel allocation methods work well with bursty traffic, we
will now explore dynamic methods.

Dynamic Channel Allocation in LANs and MANs

Before we get into the first of the many channel allocation methods to be discussed in this
chapter, it is worthwhile carefully formulating the allocation problem. Underlying all the work
done in this area are five key assumptions, described below.

Station Model. The model consists of N independent stations (e.g., computers, telephones, or
personal communicators), each with a program or user that generates frames for transmission.
Stations are sometimes called terminals. The probability of a frame being generated in an
interval of length t is t, where  is a constant (the arrival rate of new frames). Once a frame

Geschreven voor

Instelling
Vak

Documentinformatie

Geüpload op
18 februari 2026
Aantal pagina's
12
Geschreven in
2025/2026
Type
SAMENVATTING

Onderwerpen

$8.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper
Seller avatar
arpitaghosh1

Maak kennis met de verkoper

Seller avatar
arpitaghosh1 University of Calcutta
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
-
Lid sinds
2 maanden
Aantal volgers
0
Documenten
2
Laatst verkocht
-

0.0

0 beoordelingen

5
0
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen