Skip to main content

CS402: Computer Communications and Networks

Page path
  • Home /
  • Courses /
  • Course Catalog /
  • Computer Science /
  • CS402: Computer Communications and Networks /
  • Unit 6: The Link Layer /
  • 6.2: Medium Access Control
Back to 'Unit 6: The Link Layer'
  • 6.2: Medium Access Control

    •  Université Catholique de Louvain: Olivier Bonaventure's "Computer Networking: Principles, Protocols, and Practice" URL

      Read the beginning of section 6.2, "Medium Access Control," on pages 214-215. Stop at section 6.2.1 "Static Allocation Methods," which you will read below.

      A computer network environment faces additional problems beyond the framing and error detection issues that are resolved in the datalink layer. What are these problems? How does the Medium Access Control algorithm(s) function in any of the computer network topologies?

    • 6.2.1: Static Allocation Methods

      •  Université Catholique de Louvain: Olivier Bonaventure's "Computer Networking: Principles, Protocols, and Practice" URL

        Read section 6.2.1, "Static Allocation Methods," on pages 215-216. As you read, consider the following questions: What is static allocation? What are some of the static allocation methods utilized in the datalink layer to share resources in a computer network? Describe each method and how each handles the available resources.

    • 6.2.2: ALOHA

      •  Wikipedia: "ALOHAnet" URL

        Read this article, which provides a more detailed examination of the ALOHAnet structure.

      •  Université Catholique de Louvain: Olivier Bonaventure's "Computer Networking: Principles, Protocols, and Practice" URL

        Read section 6.2.2, "ALOHA," on pages 216-217. The University of Hawaii addressed the problem of sharing resources with its network of remote island campuses in a unique way. This description of the ALOHAnet explores their solution.

    • 6.2.3: Carrier Sense Multiple Access (CSMA)

      •  Université Catholique de Louvain: Olivier Bonaventure's "Computer Networking: Principles, Protocols, and Practice" URL

        Read section 6.2.3, "Carrier Sense Multiple Access," on pages 217-218. The ALOHA solution has been enhanced by CSMA. As you read, be able to describe CSMA and how it works to share computer network resources.

    • 6.2.4: CSMA With Collision Detection

      •  Université Catholique de Louvain: Olivier Bonaventure's "Computer Networking: Principles, Protocols, and Practice" URL

        Read section 6.2.4, "Carrier Sense Multiple Access with Collision Detection," on pages 218-222. In a wired environment, both ALOHA and CSMA performance are better able to detect collision. Can you explain why that is?

    • 6.2.5: CSMA with Collision Avoidance (CSMA/CA)

      •  Université Catholique de Louvain: Olivier Bonaventure's "Computer Networking: Principles, Protocols, and Practice" URL

        Read section 6.2.5, "Carrier Sense Multiple Access with Collision Avoidance," on pages 222-225. CSMA/CA is found in the Wi-Fi environment. How are collisions avoided?

    • 6.2.6: Deterministic Medium Access Control Algorithms

      •  Université Catholique de Louvain: Olivier Bonaventure's "Computer Networking: Principles, Protocols, and Practice" URL

        Read section 6.2.6, "Deterministic Medium Access Control algorithms," on pages 226-228. Some applications are sensitive to the time delay of transmissions. Deterministic Medium Access Control algorithms have been used to resolve this problem. Explore this section to see some of the deterministic algorithms.

Navigation

Art History
Biology
Business Administration
Chemistry
Communication
Economics
English
History
Mathematics

Creative Commons License
© Saylor Academy 2010-2018 except as otherwise noted. Excluding course final exams, content authored by Saylor Academy is available under a Creative Commons Attribution 3.0 Unported license. Third-party materials are the copyright of their respective owners and shared under various licenses. See www.saylor.org/open/licensinginformation for detailed licensing information.

Saylor Academy and Saylor.org® are trade names of the Constitution Foundation, a 501(c)(3) organization through which our educational activities are conducted.

Terms of Use | Privacy Policy