6.2: Medium Access Control
Read the beginning of section 6.2, "Medium Access Control," on pages 214-215. Stop at section 6.2.1 "Static Allocation Methods," which you will read below.
A computer network environment faces additional problems beyond the framing and error detection issues that are resolved in the datalink layer. What are these problems? How does the Medium Access Control algorithm(s) function in any of the computer network topologies?
6.2.1: Static Allocation Methods
Read section 6.2.1, "Static Allocation Methods," on pages 215-216. As you read, consider the following questions: What is static allocation? What are some of the static allocation methods utilized in the datalink layer to share resources in a computer network? Describe each method and how each handles the available resources.
6.2.2: ALOHA
Read this article, which provides a more detailed examination of the ALOHAnet structure.
Read section 6.2.2, "ALOHA," on pages 216-217. The University of Hawaii addressed the problem of sharing resources with its network of remote island campuses in a unique way. This description of the ALOHAnet explores their solution.
6.2.3: Carrier Sense Multiple Access (CSMA)
Read section 6.2.3, "Carrier Sense Multiple Access," on pages 217-218. The ALOHA solution has been enhanced by CSMA. As you read, be able to describe CSMA and how it works to share computer network resources.
6.2.4: CSMA With Collision Detection
Read section 6.2.4, "Carrier Sense Multiple Access with Collision Detection," on pages 218-222. In a wired environment, both ALOHA and CSMA performance are better able to detect collision. Can you explain why that is?
6.2.5: CSMA with Collision Avoidance (CSMA/CA)
Read section 6.2.5, "Carrier Sense Multiple Access with Collision Avoidance," on pages 222-225. CSMA/CA is found in the Wi-Fi environment. How are collisions avoided?
6.2.6: Deterministic Medium Access Control Algorithms
Read section 6.2.6, "Deterministic Medium Access Control algorithms," on pages 226-228. Some applications are sensitive to the time delay of transmissions. Deterministic Medium Access Control algorithms have been used to resolve this problem. Explore this section to see some of the deterministic algorithms.