Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 12

Real-time operating system

Medium Access Control Protocols for


Broadcast Networks

By
Ila Kaushik
Dept. of IT
KIET Group of Institutions
Contents
 Medium Access Protocol in CAN
 Medium Access Protocol in IEEE 802.5 Token
Ring
 Prioritized Access in IEEE 802.5 Token Ring
 Polling
 Timed Token medium Access Control Protocol
Medium Access Control Protocols for
Broadcast Networks
• The transmission medium of a broadcast network is a processor.

• A MAC protocol is a discipline for scheduling this type of processor.

• Scheduling the transmission medium is done distributedly by network


interface of hosts in the network.
Medium Access Protocol in CAN
(Controller Area Network)
• CANs are very small network.
• CANs are used to connect components of embedded controllers.
• An example is an automotive control system whose components
control the engine, brake, and other parts of an automobile.
• The end to end length of CAN must not exceed 100 meters.
• This means that within the fraction of a bit time, after a station
transmits, all stations should hear the transmission on the network.
• The output of all stations are wire-ANDed together by the bus.
• On the network, the bit is a logical 0 if the output of any station is 0 and
logical 1 when the output of all stations is 1 during bit time.
• CAN MAC protocol is similar to the CSMA/CD (carrier sense Multiple
Access/ Collision Detection)
• A station with a packet to send, waits until it hears that the network is idle
and then commences to transmit the ID number of the packet.
• At the same time, the station listens.
• Whenever it hears a 0 on the network while it is transmitting 1, it interrupts
its own transmission.
• Network contention is resolved in favor of the packet with the smallest ID
among all contending packets.
MAC in IEEE 802.5 Token Ring
• In a token ring network, packets are transmitted in one direction along a
circular transmission medium.
• A station transmits a packet by placing its packet on the output link to the
network.
• As the packet circulates around the network, the stations identified by the
destination address in the header copies the packet.
• When the packet returns to the source station, the station removes the
packet.
Prioritized Access in IEEE 802.5
Token Ring
• Prioritized access is made possible by using the two groups of 3 bits each
in AC field.
• Their value represents the token priority and reservation priority.
• Specially the 3 token priority bits give the priority of the token.
• A station can seize the free token only when its outgoing packet has an
equal or higher priority than the token priority.
• When a station seizes the token, it leaves the token priority unchanged but
set the reservation priority to the lowest priority of the network.
» It then marks the token busy and put the token in the
header of the packet and transmit the packet.
Polling
• Network contention is resolved by a polling mechanism called token passing.
• For the purpose of polling, each packet has an 8-bit Access Control (AC) field
in its header.
• One of the bit in an AC field is called the token bit.
• By examining this bit in the current packet on the network, a station can
determine whether the network is busy.
• If the network is free the packet is polling packet.
• As a polling packet circulates around the ring, the stations are polled in a round
robin manner in order of physical locations on the ring.
• The polling packet is called free token or simple token.
• When a free token reaches a station that has outgoing packets waiting, it can
seize packets if it has the highest priority at that time.
Timed Token medium Access Control
Protocol
• When the transmission medium is bus, stations can poll each other by
circulating a polling packet / token according to a token circulating list.
• The list gives the polling order.
• Each station polls the next station downstream according to the circulating
list by broadcasting a token that has the address of the next station in the
header.
• A station may transmit its data packets only when polled.
– When it completes its transmission, it transmit the token to the
next station downstream.
• The prioritized MAC method in IEEE 802.4 and FDDI standards is called the
timed token MAC method.
• the timed token MAC protocol divides all messages on the network into two
major classes:
– Synchronous class
• These messages are periodic messages and have deadlines
– Asynchronous class
• These messages are aperiodic messages
• Each station sets aside some network bandwidth for the transmission
of synchronous messages and transmits asynchronous messages
on a time available basis.
Thank
You

You might also like