Medium access control: Difference between revisions
imported>Gareth Leng |
mNo edit summary |
||
(4 intermediate revisions by 2 users not shown) | |||
Line 1: | Line 1: | ||
{{subpages}} | {{subpages}} | ||
All practical communications devices share a medium, even a point-to-point connection, and '''medium access control (MAC)''' techniques are the means by which sharing is possible. Applications include | All practical communications devices share a medium, even a point-to-point connection, and '''medium access control (MAC)''' techniques are the means by which sharing is possible. Applications include local area networks both wired and wireless, longer-ranged wireless networks such as cellular telephony and military tactical radio communications, and long-haul resources such as satellites and optical networks. It is not limited to data networks. | ||
In the | In the Open Systems Interconnection Reference Model, medium access control is at the data link layer, but there are many communications systems in which the medium access has to be arbitrated at the physical layer. | ||
Medium access techniques for | Medium access techniques for local area networks have found it useful to have a standard way to define hardware-unique addresses; see IEEE 802 address. Some wireless networks also use hardware-unique addresses, but other networks use software-negotiated time slots or codes. Yet other free-space networks use unique frequencies; the term wavelength, or lambda, λ, is preferred for optical networks. | ||
Methods include reservation, contention, and token-based. Unique identifiers simplify the assignment of computers to resources (e.g., time slots). A reservation method reserves some resource, such as a time slot relative to the start of a cycle of communications, a frequency within a shared part of the | Methods include reservation, contention, and token-based. Unique identifiers simplify the assignment of computers to resources (e.g., time slots). A reservation method reserves some resource, such as a time slot relative to the start of a cycle of communications, a frequency within a shared part of the electromagnetic spectrum, or a physical connection within an interconnection fabric. | ||
Contention methods have the potential of multiple devices trying to use the medium at once, but have mechanisms of avoiding or resolving such '''collisions'''. This is the fundamental | Contention methods have the potential of multiple devices trying to use the medium at once, but have mechanisms of avoiding or resolving such '''collisions'''. This is the fundamental Ethernet or IEEE 802.3 technique, with a variant called carrier sense multiple access with collision detection (CSMA/CD). | ||
Token-based methods use the shared channel, or possibly a separate control channel, to send a message called the '''token'''; only the station with the token can have access to the medium. Control of the token may be from a central station, or it may be distributed. Central control is also called '''polling'''. Distributed token control is used in the obsolescent | Token-based methods use the shared channel, or possibly a separate control channel, to send a message called the '''token'''; only the station with the token can have access to the medium. Control of the token may be from a central station, or it may be distributed. Central control is also called '''polling'''. Distributed token control is used in the obsolescent IEEE 802.5 (Token Ring) and Fiber Distributed Data Interface (FDDI) methods. A somewhat more recent niche system, still due to be replaced, is the military Joint Tactical Information Distribution System#Link 11|JTIDS Link 11, typically with a mission controller acting as central controller to a group of aircraft. | ||
==Reservation methods== | ==Reservation methods== | ||
Reservation methods are more common in communications over a wider area, be it the area of coverage of a cell in | Reservation methods are more common in communications over a wider area, be it the area of coverage of a cell in cellular telephony or a shared electromagnetic spectrum for tactical or air traffic control communications. The resource reserved may be a frequency, a time slot within a cycle made up from a sequence of time slots, or a particular signal pattern that is recognized within a mixture of signals. Reservation may be preassigned (i.e., static) or dynamic. | ||
The | The Synchronous Optical Network (SONET) and Synchronous Digital Hierarchy (SDH) use statically reserved slots, either manually defined or defined with the assistance of a non-real-time provisioning tool. Self-organizing networks, such as the Automatic identification system|Automated Identification System (AIS) used in maritime safety, negotiate for time slots. | ||
==Contention methods== | ==Contention methods== | ||
The most common contention method is carrier sense multiple access with collision detection, which is the basic method of the original | The most common contention method is carrier sense multiple access with collision detection, which is the basic method of the original Ethernet, and the subsequent IEEE 802.3 standardized version of CSMA/CD. | ||
==References== | ==References== | ||
<references/> | <references/>[[Category:Suggestion Bot Tag]] |
Latest revision as of 11:01, 17 September 2024
All practical communications devices share a medium, even a point-to-point connection, and medium access control (MAC) techniques are the means by which sharing is possible. Applications include local area networks both wired and wireless, longer-ranged wireless networks such as cellular telephony and military tactical radio communications, and long-haul resources such as satellites and optical networks. It is not limited to data networks.
In the Open Systems Interconnection Reference Model, medium access control is at the data link layer, but there are many communications systems in which the medium access has to be arbitrated at the physical layer.
Medium access techniques for local area networks have found it useful to have a standard way to define hardware-unique addresses; see IEEE 802 address. Some wireless networks also use hardware-unique addresses, but other networks use software-negotiated time slots or codes. Yet other free-space networks use unique frequencies; the term wavelength, or lambda, λ, is preferred for optical networks.
Methods include reservation, contention, and token-based. Unique identifiers simplify the assignment of computers to resources (e.g., time slots). A reservation method reserves some resource, such as a time slot relative to the start of a cycle of communications, a frequency within a shared part of the electromagnetic spectrum, or a physical connection within an interconnection fabric.
Contention methods have the potential of multiple devices trying to use the medium at once, but have mechanisms of avoiding or resolving such collisions. This is the fundamental Ethernet or IEEE 802.3 technique, with a variant called carrier sense multiple access with collision detection (CSMA/CD).
Token-based methods use the shared channel, or possibly a separate control channel, to send a message called the token; only the station with the token can have access to the medium. Control of the token may be from a central station, or it may be distributed. Central control is also called polling. Distributed token control is used in the obsolescent IEEE 802.5 (Token Ring) and Fiber Distributed Data Interface (FDDI) methods. A somewhat more recent niche system, still due to be replaced, is the military Joint Tactical Information Distribution System#Link 11|JTIDS Link 11, typically with a mission controller acting as central controller to a group of aircraft.
Reservation methods
Reservation methods are more common in communications over a wider area, be it the area of coverage of a cell in cellular telephony or a shared electromagnetic spectrum for tactical or air traffic control communications. The resource reserved may be a frequency, a time slot within a cycle made up from a sequence of time slots, or a particular signal pattern that is recognized within a mixture of signals. Reservation may be preassigned (i.e., static) or dynamic.
The Synchronous Optical Network (SONET) and Synchronous Digital Hierarchy (SDH) use statically reserved slots, either manually defined or defined with the assistance of a non-real-time provisioning tool. Self-organizing networks, such as the Automatic identification system|Automated Identification System (AIS) used in maritime safety, negotiate for time slots.
Contention methods
The most common contention method is carrier sense multiple access with collision detection, which is the basic method of the original Ethernet, and the subsequent IEEE 802.3 standardized version of CSMA/CD.