L23. What are different approaches for Medium Access Control? Flashcards

1
Q

What is Medium Access Control?

A

Medium Access Control (MAC) is a sublayer of the Link Layer that manages the protocols for accessing the physical transmission medium.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the role of MAC?

A

To ensure efficient, fair, and collision-free communication between devices in a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the four approaches to MAC?

A
  1. Random access protocols - provide immediate, unscheduled access to the communication medium, which can lead to potential collisions.
  2. Controlled access protocols - offer scheduled, collision-free access by managing transmissions through methods like polling or token passing.
  3. Channelization protocols - prevent collisions by dividing transmission resources such as frequency, time, or codes
  4. Hybrid approaches - combine features from various methods to optimize performance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Name examples of random access protocols

A

Pure Aloha, Slotted Aloha, CSMA/CD, CSMA/CA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Name examples of controlled access methods

A

Reservation, Polling, and Token Passing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name examples of channelization protocols

A

FDMA, TDMA, CDMA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Name examples of hybrid approaches

A

OFDMA (a combination of FDMA and TDMA), CSMA/CA with RTS/CTS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What MAC protocol is typically used in Ethernet networks?

A

CSMA/CD (Carrier Sense Multiple Access with Collision Detection)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What MAC protocol is typically used in Wi-Fi networks?

A

CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) with optional RTS/CTS (Request to Send/Clear to Send) handshakes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What MAC protocol is typically used in Bluetooth networks?

A

Bluetooth networks utilize a frequency-hopping spread spectrum technique for MAC, where devices hop between different frequencies in a synchronized manner to avoid interference.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why are different MAC approaches needed?

A

Different MAC approaches cater to various network environments and requirements. Random access protocols like Aloha and CSMA handle dynamic, low-traffic networks but suffer from collisions. Controlled access protocols like polling and token passing offer collision-free communication at the cost of increased latency. Channelization protocols like FDMA, TDMA, and CDMA provide structured, efficient access for high-capacity networks. Hybrid approaches like OFDMA and enhanced CSMA/CA combine the strengths of multiple techniques to optimize performance in modern networks. Each approach balances trade-offs in efficiency, complexity, and suitability for specific applications and network conditions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is ALOHA, what are the different versions, and how do they differ?

A

ALOHA is a random access protocol, originally developed in the 1970s for radio networks. It can however be used in any situation where multiple devices share a common communication channel

Pure ALOHA is the original version of the protocol. Devices transmit whenever they have data to send. If a collision occurs, they wait a random time before retransmitting. Simple but inefficient due to high collision rates.

Slotted ALOHA is an improved version of the pure ALOHA protocol. In this version, the channel is divided into small, fixed-length time slots and users are only allowed to transmit data at the beginning of each time slot, reducing the chances of collisions between devices and increasing the overall efficiency of the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is CSMA/CD and how does it work?

A

CSMA/CD (Carrier Sense Multiple Access/Collision Detection) is a random access protocol used in Ethernet. Devices listen to the medium before transmitting. If a collision is detected during transmission, they stop, wait a random time, and retransmit. It reduces collisions but can’t eliminate them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is CSMA/CA and how does it work?

A

CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) is a random access protocol used in Wi-Fi networks. Devices listen before transmitting and use mechanisms like RTS/CTS (Request to Send/Clear to Send) to avoid collisions. This is more effective than CSMA/CD in wireless environments where collision detection is difficult.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Polling and how does it work?

A

Polling is a controlled access method. A central controller (master) polls each device (slave) to check if it has data to transmit. Only the polled device can send data, eliminating collisions. It is efficient in low-traffic scenarios but introduces delay due to the polling process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Token Passing and how does it work?

A

Token Passing is a controlled access method which circulates a token, a small data frame, in the network. Only the device holding the token can transmit data. This method ensures collision-free communication and is used in Token Ring and FDDI networks. However, token loss or failure can disrupt communication until the token is regenerated.

17
Q

What is Reservation and how does it work?

A

Reservation is a controlled access method that works by having devices communicate with a central controller or coordinator to reserve a specific time slot or frequency for transmission.

18
Q

What is FDMA and how does it work?

A

Frequency Division Multiple Access (FDMA) is a channelization protocol. The available bandwidth is divided into frequency bands, each assigned to a different device. Each device transmits simultaneously on its unique frequency band, avoiding collisions. Used in analog cellular systems and some satellite communications.

19
Q

What is TDMA and how does it work?

A

Time Division Multiple Access (TDMA) is a channelization protocol. Time is divided into slots, and each device is assigned a specific slot for transmission. Devices take turns transmitting in their assigned slots, preventing collisions. Used in digital cellular systems like GSM.

20
Q

What is CDMA?

A

Code Division Multiple Access (CDMA) is a channelization protocol. Devices use unique spreading codes to transmit simultaneously over the same frequency band. The receiver decodes the signal using the corresponding code, separating the signals. CDMA provides high capacity and robustness against interference, widely used in 3G cellular systems.

21
Q

What MAC protocol is typically used in 3G networks?

A

CDMA

22
Q

What MAC protocol was typically used in GSM networks?

A

TDMA

23
Q

What MAC protocol is used in analog cellular systems and some satellite communications?

A

FDMA

24
Q

What is OFDMA and how does it work?

A

Orthogonal Frequency Division Multiple Access (OFDMA) a hybrid approach to MAC. It is combination of FDMA and TDMA, where the frequency band is divided into sub-bands (subcarriers) and time is divided into slots. Devices are assigned specific subcarriers and time slots for transmission. OFDMA is highly efficient and used in modern wireless systems like LTE and Wi-Fi 6.

25
Q

What is CSMA/CA with RTS/CTS and how does it work?

A

Carrier Sense Multiple Access with Collision Avoidance and Request to Send/Clear to Send (CSMA/CA with RTS/CTS) enhances the random access protocol CSMA/CA by introducing a handshake mechanism (RTS/CTS) to reserve the channel before actual data transmission. This approach reduces the chance of collisions, especially in wireless networks with hidden node problems.