100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Computer Networks MDU $10.49   Add to cart

Class notes

Computer Networks MDU

 0 view  0 purchase
  • Course
  • Institution

These study notes cover essential concepts related to computer networks subject especially for students of Maharshi Dayanand University and its affiliated colleges. Topics include network architectures, protocols, routing algorithms, network security, and more. The material is organized in a concis...

[Show more]

Preview 4 out of 38  pages

  • June 28, 2024
  • 38
  • 2023/2024
  • Class notes
  • Deepak modi
  • All classes
avatar-seller
, NotesNeo


Unit 2 : Network Protocols and Devices
Syllabus :
Medium Access Control: MAC layer functions, Random access, Controlled Access
and channelization protocols.
Network Layer: Network layer functions and services, Logical addressing, IPv4
classful and classless addressing, subnetting, NAT, IPv4, ICMPv4, ARP, RARP and
BOOTP, IPv6, IPv6 addressing, DHCP.
Network Devices: Repeater, hub, switch, router and gateway.



Section 1 : Medium Access Control

1.1 Functions of the MAC Layer
The data link layer in a computer network is responsible for the transmission of data
between two devices or nodes. It is divided into two sublayers:
1. Data Link Control: Ensures reliable data transfer over a dedicated link using
techniques such as framing, error control, and flow control.
2. Medium Access Control (MAC): Manages the control of data frame access to
a shared channel, minimizing collisions and ensuring efficient data
transmission.

The Medium Access Control (MAC) layer is a sublayer of the Data Link Layer in the
OSI model. It is also known as Media Access Control. Its primary function is to
control how data packets are transmitted to and received from the physical layer
across a shared communication channel. It governs how networks transmit data
between two devices. Essentially, it prevents data collisions when multiple networks
transmit information simultaneously.

MAC Layer Functions

1. Frame Delimiting: Identifies the start and end of frames, ensuring data
integrity.
2. Addressing: Provides unique hardware addresses (MAC addresses) to
devices on the network.
3. Error Detection: Uses checksums or cyclic redundancy checks (CRC) to
detect errors in transmitted frames.
4. Access Control: Manages the access to the shared medium to avoid collisions
and ensure fair use of the channel.
5. Flow Control: Regulates the flow of data to prevent overwhelming the
receiver.

1.2 Multiple Access Protocols
Multiple Access Protocols (or Access Control Protocols) are mechanisms used by
the Medium Access Control (MAC) layer to manage how multiple devices share a


1

, NotesNeo


communication channel. They are essential in scenarios where multiple device share
the same communication channel and need to transmit data simultaneously. These
protocols manage the way devices access the shared medium to minimize collisions
and ensure efficient data transmission.

Example Scenario
Imagine a classroom where a teacher asks a question, and all students
(representing different stations) try to answer at the same time. Without a protocol
to manage this, their responses overlap, causing chaos. Here, the teacher acts as
the multiple access protocol, managing who speaks and when, ensuring clear and
orderly communication.
The primary categories of access control protocols are Random Access, Controlled
Access, and Channelization.




A. Random Access Protocols
Random Access Protocols are used in network communication to manage how
multiple devices access a shared communication medium. These protocols allow
devices to transmit data whenever they have information to send, potentially
leading to collisions. The primary types of Random Access Protocols are Aloha and
Carrier Sense Multiple Access (CSMA).

1. Aloha Protocol

The Aloha Protocol was one of the earliest random access protocols developed for
wireless networks. It has two main variations:

Pure Aloha:
● Operation: A simple protocol where devices transmit whenever they have
data to send. After sending, they wait for an acknowledgment. If no




2

, NotesNeo


acknowledgment is received (indicating a collision occurred), the device
waits a random period before retransmitting.
● Collision Management: Collisions are detected by the lack of an
acknowledgment. Devices use a random backoff period to minimize the
chance of repeated collisions.
● Efficiency: Pure Aloha is simple but has a low channel utilization efficiency,
approximately 18.4%, due to the high probability of collisions.

Slotted Aloha:
● Operation: An improved version of Aloha, where time is divided into equal-
sized slots. Devices can only begin transmission at the start of a time slot,
reducing the chance of collisions.
● Collision Management: Similar to Pure Aloha, devices wait for an
acknowledgment and retransmit after a random backoff if a collision is
detected.
● Efficiency: Slotted Aloha improves efficiency to around 36.8% because
synchronizing transmissions to time slots reduces the collision probability.

2. Carrier Sense Multiple Access (CSMA)
CSMA improves upon Aloha by sensing the channel before transmitting data to
avoid collisions. There are several variations of CSMA including CSMA/CD and
CSMA/CA.
Basic Principle: Nodes (devices) listen to the channel before transmitting to avoid
collisions.
Operation:
● Nodes check if the channel is idle.
● If idle, nodes transmit their data.
● If busy, nodes wait until the channel becomes free.
Advantages: Simple implementation, suitable for wired networks.
Disadvantages: Susceptible to collisions if multiple nodes transmit simultaneously
after sensing the channel is idle.

CSMA Access Modes
CSMA protocols operate in different access modes to manage channel access:
1-Persistent CSMA:
● Nodes continuously sense the channel.
● If the channel is idle, the node transmits immediately.
● If busy, the node keeps sensing until the channel is free.
● Increases the chance of collision due to immediate transmission upon idle
detection.
Non-Persistent CSMA:
● Nodes sense the channel.
● If idle, the node transmits immediately.
● If busy, the node waits for a random period before retrying.



3

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller deepakmodi. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $10.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

76669 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$10.49
  • (0)
  Add to cart