Professional Documents
Culture Documents
To Implement and Compare MAC Layer Protocol.: Student Roll No. & Name: 278/rahul Gupta
To Implement and Compare MAC Layer Protocol.: Student Roll No. & Name: 278/rahul Gupta
Experiment No.: 05
Experiment Title: To implement and compare MAC layer protocol.
Assessment
Sr. Parameters for Assessment Marks Rubrics
No.
Practical Performance / Above Average Average Below Average
1 Active Participation (03) (02) (01)
(03 Marks)
2 Report Presentation Above Average Average Below Average
(02 Marks) (02) (01) (00)
Understanding Above Average Average Below Average
3 (03 Marks) (03) (02) (01)
Regularity in submission Above Average Average Below Average
4 (02 Marks) (02) (01) (00)
Theory: The fundamental task of any MAC protocol is to regulate the access of a number of
nodes to a shared medium in such a way that certain application-dependent performance
requirements are satisfied. Medium Access Control (MAC) protocols is the first protocol layer
above the Physical Layer (PHY). The Media Access Control (MAC) data communication
Networks protocol sub-layer, also known as the Medium Access Control, is a sub-layer of the data
link layer specified in the seven-layer OSI model. The medium access layer was made necessary
by systems that share a common communications medium. Typically these are local area networks.
The MAC layer is the "low" part of the second OSI layer, the layer of the "data link". In fact, the
IEEE divided this layer into two layers "above" is the control layer the logical connection (Logical
Link Control, LLC) and "down" the control layer The medium access (MAC).
● Hidden-terminal problem
The hidden-terminal problem occurs specifically for the class of Carrier Sense Multiple Access
(CSMA) protocols, where a node senses the medium before starting to transmit a packet.
● Exposed-terminal scenario
In wireless networks, when a node is prevented from sending packets to other nodes because of a
neighboring transmitter is known as the exposed node problem.
The exposed terminal analogy is described as follows: B sends to A, C wants to send to another
terminal D not A or B C senses the carrier and detects that the carrier is busy. C postpones its
transmission until it detects the medium as being idle again But A is outside radio range of C,
waiting is not necessary C is “exposed” to B Tip: Hidden terminals cause collisions, where as
Exposed terminals causes unnecessary delay.
Demand assignment protocols : Demand Assigned Multiple Access (DAMA) is a protocol used
in satellite communications, particularly Very Small Aperture Terminal (VSAT) systems.
Random access protocols : In random access or contention methods, no station is superior to
another station and none is assigned the control over another. Transmission is random among the
stations. That is why these methods are called random access.
Balance of requirements
The balance of requirements is different from traditional (wireless) networks. Additional
requirements come up, first and foremost, the need to conserve energy. Important requirements for
MAC protocols scalability. The need for scalability is evident when considering very dense sensor
networks with dozens or hundreds of nodes in mutual range.
Output:
Implementation of MAC layer protocol
Conclusion: Thus, we have implemented and compare the parameters of MAC layer protocols.