Found 1301 Articles for MCA

Classic Ethernet

George John
Updated on 30-Jul-2019 22:30:26

3K+ Views

Ethernet is a set of technologies and protocols that are used primarily in LANs. It was first standardized in 1980s as IEEE 802.3 standard. Ethernet is classified into two categories: classic Ethernet and switched Ethernet.Classic Ethernet is the original form of Ethernet that provides data rates between 3 to 10 Mbps. The varieties are commonly referred as 10BASE-X. Here, 10 is the maximum throughput, i.e. 10 Mbps, BASE denoted use of baseband transmission, and X is the type of medium used. Most varieties of classic Ethernet have become obsolete in present communication scenario.Varieties of Classic EthernetThe common varieties of classic ... Read More

Clear To Send (RTS)

Ankith Reddy
Updated on 30-Jul-2019 22:30:26

3K+ Views

Clear to Send (CTS) is a control frame employed in the medium access control (MAC) layer protocol IEEE 802.11 RTS/CTS. The protocol uses the concept of Multiple Access with Collision Avoidance (MACA) in wireless networks. The RTS/CTS (Request to Send / Clear to Send) mechanism aims to reduce frame collisions introduced by the hidden terminal problem. CTS frame is sent by the receiver after it gets the RTS frame prior to receiving of the actual data frame.Working Principle of MACA implementing CTSThe MACA protocol works with the condition that the communicating stations are synchronized and frame sizes and data speed ... Read More

Request To Send (RTS)

George John
Updated on 30-Jul-2019 22:30:26

3K+ Views

Request to Send (RTS) is a control frame employed in the medium access control (MAC) layer protocol IEEE 802.11 RTS/CTS. The protocol uses the concept of Multiple Access with Collision Avoidance (MACA) in wireless networks. The RTS/CTS (Request to Send / Clear to Send) mechanism aims to reduce frame collisions introduced by the hidden terminal problem. RTS frame is sent by the transmitter prior to transmission of the actual data frame.Working Principle of MACA implementing RTSThe MACA protocol works with the condition that the communicating stations are synchronized and frame sizes and data speed are the same.Let us consider that ... Read More

Multiple Access with Collision Avoidance (MACA)

Chandu yadav
Updated on 30-Jul-2019 22:30:26

4K+ Views

Multiple Access with Collision Avoidance (MACA) is a medium access control (MAC) layer protocol used in wireless networks, with a view to solve the hidden terminal problem. It also provides solution to the exposed terminal problem. The MAC layer protocol IEEE 802.11 RTS/CTS has been adopted from MACA.Working PrincipleThe MACA protocol works with the condition that the stations are synchronized and frame sizes and data speed are the same. It involves transmission of two frames called RTS and CTS prior to data transmission. RTS stands for Request to Send and CTS stands for Clear to Send.Let us consider that a ... Read More

The Hidden Terminal Problem

Nishtha Thakur
Updated on 30-Jul-2019 22:30:26

20K+ Views

In wireless LANs ( wireless local area networks), the hidden terminal problem is a transmission problem that arises when two or more stations who are out of range of each other transmit simultaneously to a common recipient. This is prevalent in decentralised systems where there aren’t any entity for controlling transmissions. This occurs when a station is visible from a wireless access point (AP), but is hidden from other stations that communicate with the AP.Problem IllustrationSuppose that there are three stations labelled STA, STB, and STC, where STA and STC are transmitting while STB is receiving. The stations are in ... Read More

The Exposed Terminal Problem

Smita Kapse
Updated on 30-Jul-2019 22:30:26

11K+ Views

In wireless LANs (wireless local area networks), the exposed terminal problem is a transmission problem that arises when a transmitting station is prevented from sending frames due to interference with another transmitting station. This is prevalent in decentralised systems where there aren’t any entity for controlling transmissions. This occurs when a station is visible from a wireless access point (AP), but not from other stations that communicate with the AP.Problem IllustrationSuppose that there are four stations labelled STA, STB, STC, and STD, where STB and STC are transmitters while STA and STD are receivers at some slot of time. The ... Read More

Wireless LAN Protocols

Anvi Jain
Updated on 30-Jul-2019 22:30:26

12K+ Views

Wireless LANs refer to LANs (Local Area Networks) that use high frequency radio waves instead of cables for connecting the devices. It can be conceived as a set of laptops and other wireless devices communicating by radio signals. Users connected by WLANs can move around within the area of network coverage. Most WLANs are based upon the standard IEEE 802.11 or WiFi.Configuration of Wireless LANsEach station in a Wireless LAN has a wireless network interface controller. A station can be of two categories −Wireless Access Point (WAP) − WAPs or simply access points (AP) are generally wireless routers that form ... Read More

The Adaptive Tree Walk Protocol

Nishtha Thakur
Updated on 30-Jul-2019 22:30:26

6K+ Views

Adaptive Tree Walk Protocol is a technique for transmitting data over shared channels that combines the advantages of collision based protocols and collision free protocols.In computer networks, when more than one station tries to transmit simultaneously via a shared channel, the transmitted data is garbled, an event called collision. In collision based protocols like ALOHA, all stations are permitted to transmit a frame without trying to detect whether the transmission channel is idle or busy. This works very good under light loads. Under heavy loads, collision free protocols are suitable, since channel access is resolved in the contention period that ... Read More

Limited-Contention Protocols

Smita Kapse
Updated on 30-Jul-2019 22:30:26

5K+ Views

Limited Contention Protocols are the media access control (MAC) protocols that combines the advantages of collision based protocols and collision free protocols. They behave like slotted ALOHA under light loads and bitmap protocols under heavy loads.ConceptIn computer networks, when more than one station tries to transmit simultaneously via a shared channel, the transmitted data is garbled, an event called collision. In collision based protocols like ALOHA, all stations are permitted to transmit a frame without trying to detect whether the transmission channel is idle or busy. In slotted ALOHA, the shared channel is divided into a number of discrete time ... Read More

Binary Countdown Protocol

Moumita
Updated on 30-Jul-2019 22:30:26

6K+ Views

Binary Countdown Protocol is a collision-free protocol that operates in the Medium Access Control (MAC) layer of the OSI model. In computer networks, when more than one station tries to transmit simultaneously via a shared channel, the transmitted data is garbled, an event called collision. Collision-free protocols resolves channel access while the stations are contending for the shared channel, thus eliminating any possibilities of collisions.Working Principle of Binary CountdownIn a binary countdown protocol, each station is assigned a binary address. The binary addresses are bit strings of equal lengths. When a station wants to transmit, it broadcasts its address to ... Read More

Advertisements