SlideShare a Scribd company logo
1 of 12
Real-time operating
system
Medium Access Control
Protocols for Broadcast
Networks
by
Dr. Vikas Goel
Dept. of IT
Contents
 Medium Access Protocol in CAN
 Medium Access Protocol in IEEE 802.5 Token
Ring
 Prioritized Access in IEEE 802.5 Token Ring
 Polling
 Timed Token medium Access Control Protocol
Medium Access Control Protocols
for Broadcast Networks
• The transmission medium of a broadcast network is a processor.
• A MAC protocol is a discipline for scheduling this type of processor.
• Scheduling the transmission medium is done distributedly by
network interface of hosts in the network.
Medium Access Protocol in CAN
(Controller Area Network)
• CANs are very small network.
• CANs are used to connect components of embedded controllers.
• An example is an automotive control system whose components
control the engine, brake, and other parts of an automobile.
• The end to end length of CAN must not exceed 100 meters.
• This means that within the fraction of a bit time, after a station
transmits, all stations should hear the transmission on the network.
• The output of all stations are wire-ANDed together by the bus.
• On the network, the bit is a logical 0 if the output of any station is 0
and logical 1 when the output of all stations is 1 during bit time.
• CAN MAC protocol is similar to the CSMA/CD (carrier sense Multiple
Access/ Collision Detection)
• A station with a packet to send, waits until it hears that the network
is idle and then commences to transmit the ID number of the
packet.
• At the same time, the station listens.
• Whenever it hears a 0 on the network while it is transmitting 1, it
interrupts its own transmission.
• Network contention is resolved in favor of the packet with the
smallest ID among all contending packets.
MAC in IEEE 802.5 Token Ring
• In a token ring network, packets are transmitted in one direction
along a circular transmission medium.
• A station transmits a packet by placing its packet on the output link
to the network.
• As the packet circulates around the network, the stations identified
by the destination address in the header copies the packet.
• When the packet returns to the source station, the station removes
the packet.
Prioritized Access in IEEE 802.5
Token Ring
• Prioritized access is made possible by using the two groups of 3 bits
each in AC field.
• Their value represents the token priority and reservation priority.
• Specially the 3 token priority bits give the priority of the token.
• A station can seize the free token only when its outgoing packet has an
equal or higher priority than the token priority.
• When a station seizes the token, it leaves the token priority unchanged
but set the reservation priority to the lowest priority of the network.
» It then marks the token busy and put the token in the
header of the packet and transmit the packet.
Polling
• Network contention is resolved by a polling mechanism called token
passing.
• For the purpose of polling, each packet has an 8-bit Access Control (AC)
field in its header.
• One of the bit in an AC field is called the token bit.
• By examining this bit in the current packet on the network, a station can
determine whether the network is busy.
• If the network is free the packet is polling packet.
• As a polling packet circulates around the ring, the stations are polled in
a round robin manner in order of physical locations on the ring.
• The polling packet is called free token or simple token.
• When a free token reaches a station that has outgoing packets waiting,
it can seize packets if it has the highest priority at that time.
Timed Token medium Access
Control Protocol
• When the transmission medium is bus, stations can poll each other
by circulating a polling packet / token according to a token
circulating list.
• The list gives the polling order.
• Each station polls the next station downstream according to the
circulating list by broadcasting a token that has the address of the
next station in the header.
• A station may transmit its data packets only when polled.
– When it completes its transmission, it transmit the token
to the next station downstream.
• The prioritized MAC method in IEEE 802.4 and FDDI standards is called
the timed token MAC method.
• the timed token MAC protocol divides all messages on the network into
two major classes:
– Synchronous class
• These messages are periodic messages and have deadlines
– Asynchronous class
• These messages are aperiodic messages
• Each station sets aside some network bandwidth for the transmission
of synchronous messages and transmits asynchronous
messages on a time available basis.
Thank
You

More Related Content

Similar to Medium Access Control Protocols for Broadcast Networks.pptx

Similar to Medium Access Control Protocols for Broadcast Networks.pptx (20)

Switching Concepts presentation
Switching Concepts presentationSwitching Concepts presentation
Switching Concepts presentation
 
Frame relay
Frame relayFrame relay
Frame relay
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
ETHERNET IEEE802.pptx
ETHERNET IEEE802.pptxETHERNET IEEE802.pptx
ETHERNET IEEE802.pptx
 
A427 nic card
A427 nic cardA427 nic card
A427 nic card
 
Network architecture
Network architectureNetwork architecture
Network architecture
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
Internetworking devices(networking)
Internetworking devices(networking)Internetworking devices(networking)
Internetworking devices(networking)
 
TOKEN BUS & TOKEN RING.ppt
TOKEN BUS & TOKEN RING.pptTOKEN BUS & TOKEN RING.ppt
TOKEN BUS & TOKEN RING.ppt
 
Connecting devices
Connecting devicesConnecting devices
Connecting devices
 
Packet Switching Technique in Computer Network
Packet Switching Technique in Computer NetworkPacket Switching Technique in Computer Network
Packet Switching Technique in Computer Network
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
CN Unit 2 - cs8591.pptx
CN Unit 2 - cs8591.pptxCN Unit 2 - cs8591.pptx
CN Unit 2 - cs8591.pptx
 
UNIT-3 network security layers andits types
UNIT-3 network security layers andits typesUNIT-3 network security layers andits types
UNIT-3 network security layers andits types
 
CAN.ppt
CAN.pptCAN.ppt
CAN.ppt
 
Network hardware essentials Lec#3
Network hardware essentials Lec#3Network hardware essentials Lec#3
Network hardware essentials Lec#3
 
Networking concepts
Networking conceptsNetworking concepts
Networking concepts
 
Datagram Switching and Virtual Control Switching
Datagram Switching and Virtual Control SwitchingDatagram Switching and Virtual Control Switching
Datagram Switching and Virtual Control Switching
 
Chap 03
Chap 03Chap 03
Chap 03
 
Chap 03
Chap 03Chap 03
Chap 03
 

Recently uploaded

Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 

Recently uploaded (20)

Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 

Medium Access Control Protocols for Broadcast Networks.pptx

  • 1. Real-time operating system Medium Access Control Protocols for Broadcast Networks by Dr. Vikas Goel Dept. of IT
  • 2. Contents  Medium Access Protocol in CAN  Medium Access Protocol in IEEE 802.5 Token Ring  Prioritized Access in IEEE 802.5 Token Ring  Polling  Timed Token medium Access Control Protocol
  • 3. Medium Access Control Protocols for Broadcast Networks • The transmission medium of a broadcast network is a processor. • A MAC protocol is a discipline for scheduling this type of processor. • Scheduling the transmission medium is done distributedly by network interface of hosts in the network.
  • 4. Medium Access Protocol in CAN (Controller Area Network) • CANs are very small network. • CANs are used to connect components of embedded controllers. • An example is an automotive control system whose components control the engine, brake, and other parts of an automobile. • The end to end length of CAN must not exceed 100 meters. • This means that within the fraction of a bit time, after a station transmits, all stations should hear the transmission on the network. • The output of all stations are wire-ANDed together by the bus.
  • 5. • On the network, the bit is a logical 0 if the output of any station is 0 and logical 1 when the output of all stations is 1 during bit time. • CAN MAC protocol is similar to the CSMA/CD (carrier sense Multiple Access/ Collision Detection) • A station with a packet to send, waits until it hears that the network is idle and then commences to transmit the ID number of the packet. • At the same time, the station listens. • Whenever it hears a 0 on the network while it is transmitting 1, it interrupts its own transmission. • Network contention is resolved in favor of the packet with the smallest ID among all contending packets.
  • 6. MAC in IEEE 802.5 Token Ring • In a token ring network, packets are transmitted in one direction along a circular transmission medium. • A station transmits a packet by placing its packet on the output link to the network. • As the packet circulates around the network, the stations identified by the destination address in the header copies the packet. • When the packet returns to the source station, the station removes the packet.
  • 7. Prioritized Access in IEEE 802.5 Token Ring • Prioritized access is made possible by using the two groups of 3 bits each in AC field. • Their value represents the token priority and reservation priority. • Specially the 3 token priority bits give the priority of the token. • A station can seize the free token only when its outgoing packet has an equal or higher priority than the token priority. • When a station seizes the token, it leaves the token priority unchanged but set the reservation priority to the lowest priority of the network. » It then marks the token busy and put the token in the header of the packet and transmit the packet.
  • 8. Polling • Network contention is resolved by a polling mechanism called token passing. • For the purpose of polling, each packet has an 8-bit Access Control (AC) field in its header. • One of the bit in an AC field is called the token bit. • By examining this bit in the current packet on the network, a station can determine whether the network is busy. • If the network is free the packet is polling packet.
  • 9. • As a polling packet circulates around the ring, the stations are polled in a round robin manner in order of physical locations on the ring. • The polling packet is called free token or simple token. • When a free token reaches a station that has outgoing packets waiting, it can seize packets if it has the highest priority at that time.
  • 10. Timed Token medium Access Control Protocol • When the transmission medium is bus, stations can poll each other by circulating a polling packet / token according to a token circulating list. • The list gives the polling order. • Each station polls the next station downstream according to the circulating list by broadcasting a token that has the address of the next station in the header. • A station may transmit its data packets only when polled. – When it completes its transmission, it transmit the token to the next station downstream.
  • 11. • The prioritized MAC method in IEEE 802.4 and FDDI standards is called the timed token MAC method. • the timed token MAC protocol divides all messages on the network into two major classes: – Synchronous class • These messages are periodic messages and have deadlines – Asynchronous class • These messages are aperiodic messages • Each station sets aside some network bandwidth for the transmission of synchronous messages and transmits asynchronous messages on a time available basis.