Preview

MAC Protocols in Satellite Communication

Powerful Essays
Open Document
Open Document
3639 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
MAC Protocols in Satellite Communication
MEDIUM ACCESS CONTROL PERFORMANCE IN SATELLITE COMMUNICATION

ABSTRACT

MAC protocols are designed to coordinate the transmission of packets, retransmission of damaged packets, and resolution of collisions among stations during a contention period . The MAC protocols include fixed assignment protocol, demand assignment protocol, random access protocol, reservation protocol, hybrid of reservation protocol and random access protocols and adaptive protocols. Satellite communication systems have traditionally been designed for voice traffic. Multiple access protocols for conflict resolution have typically been channel-oriented with either fixed or demand assignment. Data communications, however, have much more diverse traffic characteristics and transmission requirements than voice communications. An access protocol suitable for wideband pack satellite network serving a finite number of bursty buffered users is proposed. The performance of the proposed scheme is evaluated and is compared with other protocols. Different stratergies for making reservations are considered. The performance criteria include high channel throughput, low transmission delay, channel stability and low complexity.

INTRODUCTION

The MAC sublayer provides addressing and channel access control mechanisms that make it possible for several terminals or network nodes to communicate within a multiple access network that incorporates a shared medium, e.g. Ethernet. The hardware that implements the MAC is referred to as a medium access controller.
The MAC sublayer acts as an interface between the logical link control (LLC) sublayer and the network 's physical layer. The MAC layer emulates a full-duplex logical communication channel in a multi-point network. This channel may provide unicast, multicast or broadcast communication service.

FIXED-ASSIGNMENT MULTIPLE ACCESS PROTOCOLS

In fixed-assignment multiple access protocols, the allocation of channel bandwidth to a station is a



References:  Medium Access Control Protocol in Satellite Communication, Hassan Peyravi, Kent State University. (IEEE communications magazine march 1999)  Communication Networks (Basic Concepts And Key Architectures)- alberto leon- garcia & indra widja  Medium Access Control Protocols for Space and Satellite Communications: A Survey and Assessment,H. Peyravi  Satellite Packet Communication-Multiple Access Protocols and Performance.- Simon S.Lam, member, IEEE (IEEE transactions on communications, vol. com-27, no.10, october 1979).

You May Also Find These Documents Helpful

  • Powerful Essays

    2. When a switch receives an Ethernet frame to a destination MAC address which is not in the devices MAC address table the switch applies the following logic: ____________________?…

    • 901 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt1310 Unit 5 Paper

    • 323 Words
    • 2 Pages

    The Media Access Control (MAC) is one of the sublayers contained in the Data Link Layer (DLL) of the Open Systems Interconnection (OSI) model. The MAC layer provides addressing and channel access control mechanisms, and works to transmit data from one Network Interface Card (NIC) to another across a connected network.…

    • 323 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    In order to provide speed and reliability, large and enterprise-level networks today are typically constructed in multiple layers. They are the access layer, also called the network edge layer, the aggregation or distribution layer; and the network core layer. The access layer is usually a mesh of network switches, linked to other switches in the aggregation layer, which in turn is linked to the core.…

    • 681 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Solomon, M., & Kim, D. (2013). Fundamentals of Communications and Networking. Burlington: Jones & Bartlett Learning.…

    • 304 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 9

    • 1048 Words
    • 5 Pages

    What acronym is used to reference the data link sublayer that identifies the network layer protocol encapsulated in the…

    • 1048 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    The 7 layers can be split logically into two subgroups. Layers 7 thru 4 focus on the end to end communication of data source and destinations. Layers 3 thru 1 are provide consistent communication between the network devices. An easier way of looking at the OSI model is dividing the upper layers (7, 6, 5) from the lower layers (4, 3, 2, 1). The upper layers deal with application issues and are implemented only in software. The highest layer, the application layer, is the closest to the end user. The lower layers are responsible for the transportation of the data. The physical layer and the data link layer are implemented in hardware and software. The lowest layer, the physical layer, is closest to the physical network medium (the wires, for example) and is responsible for placing data on the medium.…

    • 1266 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Data Link: The protocol layer that transfers data between adjacent network nodes (The switches and MAC addresses)…

    • 648 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    This layer holds whatever IP will run above, e.g., Ethernet, token-ring, and Fiber Distributed Digital Interface (FDDI) systems. Distinct network protocols, e.g., Ethernet, exertion at this level.…

    • 1263 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt1310 Unit 2 Essay

    • 418 Words
    • 2 Pages

    The Network Layer is accountable for implementing a logical addressing scheme and for transporting the packets from one end to the other end. The network layer can be connectionless or it can be connection oriented. This layer is also responsible for breaking larger packets up for delivery depending on the media this is known as packet switching. These protocols include Apple talk DDP, IP, and IPX.…

    • 418 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    - access layer. It ensures that when you have all network devices have access to the network then you can work up.…

    • 688 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    IEEE802 standard series protocol, the data link layer includes a logical link control (LLC) sublayer and the media access control (MAC) sub-layer which is located between the MAC layer and the physical LLC, which allows adaptation to different LLC media access technology and physical media. MAC sublayer as a separate, they will not change the impact of the media access method and higher level protocols. MAC disassembly of data and media access management of two modules, the completion of the data frame encapsulation, re-opened send and receive functions. Ethernet frame encapsulation format as shown in Table 1, where the destination address, source address, length / type field and the data generated by the four layer protocol module when transmitting data frames, data encapsulation module automatically adding data to be transmitted in the first seven bytes of preamble and a delimiter byte and add at the end of the data transfer byte sent four cyclic redundancy check code, if the data length is less than 46 bytes , the data is automatically filled in order to achieve the minimum length required when receiving data frame, the data will be automatically discarded removable module preamble and delimiter two fields.…

    • 312 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Hsc300 Week 2 Assignment

    • 866 Words
    • 4 Pages

    This week we covered some additional information in regards to the data layer, more specifically the MAC layer, and went into the network layer of the OSI model. As part of that we discussed different routing protocols and systems.…

    • 866 Words
    • 4 Pages
    Good Essays
  • Good Essays

    It230 Wk1 Checkpoint

    • 576 Words
    • 3 Pages

    The first layer, physical, obtains a function that has the purpose of sending or receiving data by way of signals or voltages through physical aspects such as, cables or cards. With such data, signals, voltages, physical aspects of cables and cards, it is what is utilized in network connecting. The second layer, data-link, consists of encoded, decoded bits of data packets, which consists also of a management, knowledge transmission-protocol that works in connection with two additional internal layers, “media access control (MAC) layer and the logical link control (LLC) layer”, (2006. PP.S3). Both additional layers serve a function and purpose that determines how data is accessed from a network computer, gives it the data transmit permission, and controls in relation to checking for error(s), controls flow, and synchronization of the frame.…

    • 576 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    C-band is the oldest allocation and operates in the frequency range around 6 GHz for…

    • 379 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    LAN Proposal

    • 17037 Words
    • 69 Pages

    System administrators are in an increasing degree involved with the troubleshooting of solving network problems concerning the quality of service for the different…

    • 17037 Words
    • 69 Pages
    Good Essays

Related Topics