This document summarizes the medium access control (MAC) sublayer. It discusses functions like carrier sensing, collision detection, and dynamic channel allocation protocols. It provides details on MAC protocols including ALOHA, CSMA, CSMA/CD (Ethernet), switched Ethernet, and wireless LANs. The key technologies and frame structures are explained for each protocol.
An e-market, or electronic market, is a virtual marketplace where buyers and sellers can engage in transactions through the use of digital platforms, such as websites, mobile apps, or social media. E-markets have become increasingly popular in recent years due to their convenience, accessibility, and global reach.
E-markets differ from traditional markets in several ways:
Global reach: E-markets have a global reach, allowing buyers and sellers to connect from anywhere in the world. This means that businesses can access new markets and reach customers that they may not have been able to reach through traditional channels.
Convenience: E-markets offer a high degree of convenience, allowing customers to shop from the comfort of their homes or on the go using mobile devices. This convenience factor can lead to higher customer satisfaction and loyalty.
Lower overhead costs: E-markets typically have lower overhead costs than traditional markets, as they do not require physical storefronts, inventory storage, or other infrastructure. This can result in lower prices for customers and higher profit margins for businesses.
24/7 availability: E-markets are available 24/7, allowing customers to shop at any time of the day or night. This can be particularly advantageous for businesses that operate in multiple time zones or that cater to customers with varying schedules.
Greater competition: E-markets can be highly competitive, with many businesses vying for the attention and loyalty of customers. This can result in lower prices, higher quality products, and better customer service as businesses compete for market share.
An e-market, or electronic market, is a virtual marketplace where buyers and sellers can engage in transactions through the use of digital platforms, such as websites, mobile apps, or social media. E-markets have become increasingly popular in recent years due to their convenience, accessibility, and global reach.
E-markets differ from traditional markets in several ways:
Global reach: E-markets have a global reach, allowing buyers and sellers to connect from anywhere in the world. This means that businesses can access new markets and reach customers that they may not have been able to reach through traditional channels.
Convenience: E-markets offer a high degree of convenience, allowing customers to shop from the comfort of their homes or on the go using mobile devices. This convenience factor can lead to higher customer satisfaction and loyalty.
Lower overhead costs: E-markets typically have lower overhead costs than traditional markets, as they do not require physical storefronts, inventory storage, or other infrastructure. This can result in lower prices for customers and higher profit margins for businesses.
24/7 availability: E-markets are available 24/7, allowing customers to shop at any time of the day or night. This can be particularly advantageous for businesses that operate in multiple time zones or that cater to customers with varying schedules.
Greater competition: E-markets can be highly competitive, with many businesses vying for the attention and loyalty of customers. This can result in lower prices, higher quality products, and better customer service as businesses compete for market share.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Safalta Digital marketing institute in Noida, provide complete applications that encompass a huge range of virtual advertising and marketing additives, which includes search engine optimization, virtual communication advertising, pay-per-click on marketing, content material advertising, internet analytics, and greater. These university courses are designed for students who possess a comprehensive understanding of virtual marketing strategies and attributes.Safalta Digital Marketing Institute in Noida is a first choice for young individuals or students who are looking to start their careers in the field of digital advertising. The institute gives specialized courses designed and certification.
for beginners, providing thorough training in areas such as SEO, digital communication marketing, and PPC training in Noida. After finishing the program, students receive the certifications recognised by top different universitie, setting a strong foundation for a successful career in digital marketing.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
2. CSC 450/550
Summary
Part A Functions
1) The problem
2) Where are we now?
3) The Channel Allocation Problem
Part B Dynamic Channel Allocation Technologies
1) ALOHA Protocols
2) CSMA
3) CSMA/CD (old ETHERNET)
4) Switching (Fast ETHERNET)
5) Wireless LANS
4. CSC 450/550
(1)The Problem
The problem: In a single channel broadcast network,
when multiple stations try to send messages
simultaneously, who has the right to use the channel?
A common sense:
When we take about MAC, we are faced with a broadcast
network.
1 2 3 4 5
computers
cable
5. CSC 450/550
(2) Where are we now?
OSI
Application
Presentation
Session
Transport
Network
Data Link
Physical
Framing
Error
control
Flow
control
Transmission/reception of frames
MEDIA ACCESS sublayer
LOGICAL LINK sublayer
6. CSC 450/550
(3) The Channel Allocation Problem
Static
• FDM /TDM (Frequency/Time Division Multiplexing)
– FDM : Radio/TV broadcasts
– TDM : POTS (Plain Old Telephone System)
– GSM uses both (Global System for Mobile Communications)
– Wasteful of bandwidth and not work well for bursty traffic
Dynamic
• Pure/ Slotted ALOHA
• Carrier Sense Multiple Access (CSMA) Protocols
• Collision free protocols (optional contents)
8. CSC 450/550
1) ALOHA Protocols
• Anyone may transmit whenever they want. (Continuous time model.)
• Detect if the transmission is successful. (So we need some way for
Collision Detection (CD)).
• After a collision, wait a random amount of time and transmit the same
frame again. This technique is known as backoff.
The core idea is extremely simple:
9. CSC 450/550
1.1) Pure ALOHA (1)
In pure ALOHA, frames are transmitted at completely arbitrary times.
11. CSC 450/550
1.2) Slotted ALOHA
•Time is divided into slots… can only transmit at the start of
slot
•Vulnerable period halved => max. eff is doubled
•Requires sync of clocks
•Still poor at hi-loads
13. CSC 450/550
2) CSMA (Carrier Sense Multiple Access) (1)
We can improve the performance of our simple network greatly if
we introduce carrier sensing (CS). With carrier sensing, each
host listens to the data being transmitted over the cable.
• A host will only transmit its own frames when it cannot hear
any data being transmitted by other hosts.
• When a frame finishes, an interframe gap is allowed to pass
before another host starts transmitting its frame.
Communication Link
14. CSC 450/550
2) CSMA (2)
Improves performance when higher medium utilisation
When a node has data to transmit, the node first listens to the
cable (using a transceiver) to see if a carrier (signal) is being
transmitted by another node.
15. CSC 450/550
2) CSMA (3): Persistent and Nonpersistent CSMA
Comparison of the channel utilization versus load for
various random access protocols.
16. CSC 450/550
3) CSMA with Collision Detection (CSMA/CD) (1)
CSMA/CD can be in one of three states: contention,
transmission, or idle.
17. CSC 450/550
3) CSMA/CD (2): IEEE 802.3 Bus LAN
The 802.3 standard describes the operation of the MAC sub-layer in a bus
LAN that uses carrier sense, multiple access with collision detection
(CSMA/CD).
•Beside carrier sensing, collision detection and the binary exponential
back-off algorithm, the standard also describes the format of the frames
and the type of encoding used for transmitting frames.
•The minimum length of frames can be varied from network to network.
This is important because, depending on the size of the network, the
frames must be of a suitable minimum length.
•The standard also makes some suggestions about the type of cabling that
should be used for CSMA/CD bus LANs.
The CSMA/CD Bus LAN is also widely called Ethernet.
19. CSC 450/550
3) CSMA/CD (4): Ethernet MAC Sublayer Protocol
Every network card in the world has a unique 46-bit serial number
called a MAC address. The IEEE allocates these numbers to
network card manufacturers who encode them into the
firmware of their cards.
• The destination and source address fields of the MAC frame
have 48 bits set aside (the standard also allows for 16-bit
addresses but these are rarely used).
• The most significant bit is set to 0 to indicate an ordinary
address and 1 to indicate a group address (this is for
multicasting, which means that frames are sent to several
hosts). If all 48 bits are set to 1 then frames are broadcast
to all the hosts.
• If the two most significant bits are both zero then the 46
least significant bits contain the MAC addresses of the
source and destination hosts.
20. CSC 450/550
3) CSMA/CD (5): Ethernet MAC Sublayer Protocol
(Minimum Frame Length)
• When a host transmits a frame, there is a small chance that a collision will occur.
The first host to detect a collision transmits a 48-bit jam sequence.
• To ensure that any hosts involved with the collision realise that the jam sequence is
associate with their frame, they must still be transmitting when the jam sequence
arrives. This means that the frame must be of a minimum length.
• The worse case scenario is if the two hosts are at far ends of the cable. If host A’s
frame is just reaching host B when it begins transmitting, host B will detect the
collision first and send a jam signal back to host A.
21. CSC 450/550
3) CSMA/CD (6): Ethernet MAC Sublayer Protocol
(Minimum Frame Length)
To ensure that no node may completely receive a frame
before the transmitting node has finished sending it, Ethernet
defines a minimum frame size (i.e. no frame may have less than
46 bytes of payload).
The minimum frame size is related to the distance which the
network spans, the type of media being used and the number of
repeaters which the signal may have to pass through to reach
the furthest part of the LAN.
Together these define a value known as the Ethernet Slot
Time, corresponding to 512 bit times at 10 Mbps.
22. CSC 450/550
3) CSMA/CD (7): Ethernet MAC Sublayer Protocol
(Minimum Frame Length)
The longest time between starting to transmit a frame and receiving the first bit
of a jam sequence is twice the propagation delay from one end of the cable
to the other.
• This means that a frame must have enough bits to last twice the
propagation delay.
• The 802.3 CSMA/CD Bus LAN transmits data at the standard rate of r
= 10Mbps.
• The speed of signal propagation is about v = 2108m/s.
A B
Packet starts at
time 0
A B
Packet at time tp-
A B
Collision occurs
at time tp
Jam sequence
A B
Jam sequence gets
back to A at 2tp
Jam sequence
(a)
(c)
(b)
(d)
23. CSC 450/550
3) CSMA/CD (8): Ethernet MAC Sublayer Protocol
(Minimum Frame Length)
Example #1: Cable = 400m, trans. speed = 10 Mbit/sec, propagation speed =
2*10^8 m/sec
sec
2
10
2
10
2
400 6
8
V
d
tprop
sec
4
2
prop
t
Mbps
R 10
sec
1
.
0
000
,
000
,
10
1
1
R
tb
bits
t
t
n
b
p
b 40
1
.
0
4
2
A margin of error is usually added to this (often to make it a power of
2) so we might use 64 bits (8 bytes).
24. CSC 450/550
3) CSMA/CD (9): Ethernet MAC Sublayer Protocol
(Minimum Frame Length)
Example 2: Speed transmission is 100 Mbits/sec; frame size is 1500 bytes; the propagation
speed is 3*10^8 m/sec.
Calculate the distance between the nodes such that the
time to transmit the frame = time to recognize that the collision have occurred.
4
6
10
2
.
1
10
100
8
1500
R
L
t frame
prop
frame
trip
round t
t
T
2
_
5
4
10
6
2
10
2
.
1
2
frame
prop
t
t
V
d
t prop
km
V
t
d prop 18
10
18
10
3
10
6 3
8
5
25. CSC 450/550
3) CSMA/CD (10): Ethernet MAC Sublayer Protocol
(Minimum Frame Length)
The standard frame length is at least 512 bits (64 bytes) long,
which is much longer than our minimum requirement of 64 bits
(8 bytes).
• We only have to start worrying when the LAN reaches
lengths of more than 2.5km.
802.3 CSMA/CD bus LANs longer than 500m are usually
composed of multiple segments joined by in-line passive
repeaters, which output on one cable the signals received on
another cable.
• When we work out the minimum frame length for these
longer LANs, we also have to take the delays caused by the
passive repeaters (about 2.5sec each) into account as well.
26. CSC 450/550
3) CSMA/CD (11): Ethernet MAC Sublayer Protocol
(Shortest Ethernet Frame)
64 bytes sent at 10Mbps 51.2sec
500m/segment, 4 repeaters between nodes 2500m
25 sec propagation delay
The frame should be longer enough for sender to detect
the collision(2x25 or about 50 sec )
Why specify a shortest frame of 64byte?
Node A Node B
R1 R2 R3 R4
500m 25 sec propagation delay
27. CSC 450/550
3) CSMA/CD (12): Ethernet MAC Sublayer Protocol
(Non-Deterministic)
The 802.3 CSMA/CD bus LAN is said to be a non-deterministic
network. This means that no host is guaranteed to be able to
send its frame within a reasonable time (just a good probability
of doing so).
• When the network is busy, the number of collisions rises
dramatically and it may become very difficult for any hosts to
transmit their frames.
A real-time computing application (such as an assembly line) will
demand that data is transmitted within a specified time period.
• Since the 802.3 bus LAN cannot guarantee this, its use for real-
time applications may not only be undesirable but potentially
dangerous in some situations.
29. CSC 450/550
5) Wireless LANs
5.1 RF allocation
5.2 The 802.11 Protocol Stack
5.3 The 802.11 MAC Sublayer Protocol
5.4 The 802.11 Frame Structure
30. CSC 450/550
5.1) Where Does Wireless RF Live?
902-928 MHz 2400-2483.5 MHz 5725-5850
MHz
802.11/802.11b 802.11a
Bluetooth
Cordless Phones
Home RF
Baby Monitors
Microwave Ovens
Old Wireless
ISM Band: Industrial, Scientific, Medical