0% found this document useful (0 votes)
21 views7 pages

Unit 2 CN

The Medium Access Control (MAC) sublayer manages access to shared communication channels to prevent collisions, utilizing techniques like static, dynamic, and random access allocation. It also encompasses LAN protocols such as Ethernet and Wi-Fi, and early random access protocols like ALOHA, which laid the groundwork for modern MAC protocols. Additionally, the Data Link Layer ensures reliable data transmission through error detection, flow control, and framing, employing various protocols and methods for error handling.

Uploaded by

vsvaibhav980
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views7 pages

Unit 2 CN

The Medium Access Control (MAC) sublayer manages access to shared communication channels to prevent collisions, utilizing techniques like static, dynamic, and random access allocation. It also encompasses LAN protocols such as Ethernet and Wi-Fi, and early random access protocols like ALOHA, which laid the groundwork for modern MAC protocols. Additionally, the Data Link Layer ensures reliable data transmission through error detection, flow control, and framing, employing various protocols and methods for error handling.

Uploaded by

vsvaibhav980
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

Medium Access Sublayer – Detailed

Explanation
The Medium Access Control (MAC) sublayer is a sublayer of the Data Link Layer (Layer 2) in the
OSI Model. It is responsible for coordinating access to the shared communication medium and
ensures that multiple devices can communicate efficiently without interference.

1. Medium Access Sublayer and Channel


Allocation
1.1 Introduction to Channel Allocation
When multiple devices share the same communication channel, we need methods to allocate the
channel to prevent collisions and interference.

1.2 Channel Allocation Techniques

Static Channel Allocation


Each user gets a dedicated fixed channel.
Example: Frequency Division Multiple Access (FDMA) and Time Division Multiple Access
(TDMA).
Disadvantage: Wastes bandwidth if the channel is not actively used.

Dynamic Channel Allocation


Channels are assigned dynamically based on demand.
Example: Used in Wi-Fi networks, 4G/5G cellular networks.
Advantage: More efficient and flexible.

Random Access Techniques


No dedicated channels; devices compete for access.
Example: ALOHA, CSMA (Carrier Sense Multiple Access).

2. LAN Protocols and ALOHA Protocols


2.1 Overview of LAN Protocols
LAN (Local Area Network) protocols define how data is transmitted within a local network (e.g.,
Ethernet, Wi-Fi).

Common LAN Protocols


Protocol Description
Ethernet (IEEE 802.3) Uses CSMA/CD to handle collisions
Wi-Fi (IEEE 802.11) Wireless LAN communication
Token Ring (IEEE 802.5) Uses a token-passing method to avoid collisions
FDDI (Fiber Distributed Data Interface) High-speed fiber optic LAN technology

2.2 ALOHA Protocols


ALOHA is one of the earliest random access protocols for wireless communication.

Pure ALOHA
Devices transmit data whenever they want.
If collision occurs, retransmission happens after a random time.
Efficiency: 18% (due to high collision rates).

Slotted ALOHA
Time is divided into slots.
Devices can only transmit at the beginning of a time slot.
Reduces collisions compared to Pure ALOHA.
Efficiency: 37% (better than Pure ALOHA).

ALOHA is the foundation for modern MAC protocols like Wi-Fi (CSMA/CA).

3. Overview of IEEE Standards


IEEE (Institute of Electrical and Electronics Engineers) defines networking standards for LAN
and wireless communication.
3.1 Key IEEE Standards
Standard Description
IEEE 802.3 Ethernet (CSMA/CD for wired networks)
IEEE 802.11 Wi-Fi (Wireless LAN)
IEEE 802.15 Bluetooth (Personal Area Networks)
IEEE 802.16 WiMAX (Broadband Wireless)
IEEE 802.1Q VLAN (Virtual LAN)

These standards help ensure interoperability between different networking devices.

4. FDDI (Fiber Distributed Data Interface) –


Detailed Overview
FDDI is a high-speed LAN standard used for fiber-optic networks. It operates at 100 Mbps and is
used for large-scale networks like campus backbones.

4.1 Features of FDDI


Uses fiber optic cables for long-distance communication.
Dual-ring topology for fault tolerance.
Token-passing protocol (avoids collisions).
Supports up to 1000 users.

4.2 FDDI Architecture


FDDI uses a dual-ring structure:

Primary Ring: Normal data transmission.


Secondary Ring: Used for backup if the primary ring fails.

4.3 Advantages of FDDI


High-speed (100 Mbps, faster than Ethernet at the time).
Fault tolerance (automatic switch to backup ring).
Long distance communication (up to 200 km).
4.4 Disadvantages of FDDI
Expensive compared to Ethernet.
Complex installation and maintenance.

FDDI is now mostly replaced by Gigabit Ethernet and fiber-optic-based networking.

Data Link Layer – Detailed Explanation


The Data Link Layer (Layer 2 of the OSI model) is responsible for error detection, flow control,
and framing to ensure reliable data transmission between nodes.

1. Elementary Data Link Protocols


Data link protocols manage how data frames are sent, received, and acknowledged over a
communication channel.

1.1 Functions of Data Link Protocols


Framing – Divides data into frames.
Error Detection & Correction – Identifies and fixes errors.
Flow Control – Prevents fast senders from overwhelming slow receivers.

1.2 Types of Elementary Data Link Protocols


A. Unrestricted Simplex Protocol

One-way transmission only (e.g., keyboard to computer).


No error handling or flow control.

B. Stop-and-Wait Protocol
Sender transmits a frame & waits for acknowledgment (ACK).
Receiver processes the frame and sends an ACK.
Disadvantage: Slow, as sender waits after every frame.

C. Stop-and-Wait with ARQ (Automatic Repeat reQuest)

Uses ACK (Acknowledgment) and NAK (Negative Acknowledgment).


If an ACK is not received, the sender retransmits the frame.
Works well for error-prone networks but reduces efficiency.

2. Sliding Window Protocols


Sliding Window Protocols improve efficiency by allowing multiple frames to be sent before
waiting for an acknowledgment.

2.1 Concept of Sliding Window


Sender maintains a window of frames that can be transmitted.
Receiver acknowledges received frames and adjusts the window.

2.2 Types of Sliding Window Protocols


A. Go-Back-N (GBN) Protocol

Sender can send multiple frames (window size N).


If an error occurs, the receiver discards all subsequent frames.
Advantage: Simple to implement.
Disadvantage: Wastes bandwidth when retransmitting multiple frames.

B. Selective Repeat (SR) Protocol

Receiver only requests retransmission of corrupted frames.


Advantage: More efficient than Go-Back-N.
Disadvantage: Requires more buffer space.

Comparison:
Protocol How It Works Efficiency Complexity
Stop-and-Wait Sends one frame, waits for ACK Low Simple
Go-Back-N Sends N frames, retransmits all after error Medium Moderate
Selective Repeat Sends N frames, retransmits only errors High Complex

3. Error Handling in the Data Link Layer


Errors can occur due to noise, interference, or transmission issues. The Data Link Layer provides
error detection and correction mechanisms.

3.1 Error Detection Methods


Parity Check
Adds an extra parity bit to detect single-bit errors.
Even parity: Total 1s should be even.
Odd parity: Total 1s should be odd.

Checksum
Sender adds a checksum value to the data.
Receiver recalculates the checksum to verify correctness.
Used in TCP/IP networks.

Cyclic Redundancy Check (CRC)


Uses polynomial division to detect errors.
Highly accurate for detecting burst errors.
Used in Ethernet & Wi-Fi (IEEE 802.3, 802.11).

3.2 Error Correction Methods


Automatic Repeat reQuest (ARQ)
If an error is detected, the sender retransmits the frame.
Used in Stop-and-Wait ARQ, Go-Back-N ARQ, Selective Repeat ARQ.

Forward Error Correction (FEC)


Redundant bits are added to allow the receiver to correct errors without retransmission.
Used in satellite & deep-space communication.

Hamming Code (7,4) Detects & corrects single-bit errors.


Used in RAM (memory error correction).

You might also like