SlideShare a Scribd company logo
1 of 43
Comparison of MAC protocols in wired systems and wireless systems Mridula Sharma 19.07.2010 Comparison of MAC protocols in wired systems and wireless systems
Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Comparison of MAC protocols in wired systems and wireless systems
Introduction ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Comparison of MAC protocols in wired systems and wireless systems ,[object Object],[object Object],[object Object],[object Object]
Introduction Comparison of MAC protocols in wired systems and wireless systems
Introduction Functions of MAC layer Comparison of MAC protocols in wired systems and wireless systems ,[object Object],[object Object],[object Object]
Multiple Access Protocols ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Comparison of MAC protocols in wired systems and wireless systems
ALOHA ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Comparison of MAC protocols in wired systems and wireless systems
Pure ALOHA ,[object Object],[object Object],[object Object],[object Object],Comparison of MAC protocols in wired systems and wireless systems Fig. : Frames transmitted at completely random intervals
Pure ALOHA- Efficiency ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Comparison of MAC protocols in wired systems and wireless systems
Slotted ALOHA Comparison of MAC protocols in wired systems and wireless systems ,[object Object],[object Object],Fig. : Throughput versus offered traffic for ALOHA systems
Carrier Sense Multiple Access (CSMA) Comparison of MAC protocols in wired systems and wireless systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Comparison of MAC protocols in wired systems and wireless systems Fig. : Comparison of channel utilization versus load for various random access protocols
CSMA with Collision Detection (CSMA/CD) Comparison of MAC protocols in wired systems and wireless systems ,[object Object],[object Object],[object Object],Fig. : CSMA/CD can be in one of the three states:  Contention, Transmission or Idle .
Collision Free Protocols Comparison of MAC protocols in wired systems and wireless systems ,[object Object],[object Object]
Limited Contention Protocols Comparison of MAC protocols in wired systems and wireless systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Limited-Contention Protocols The Adaptive Tree Walk Protocol Comparison of MAC protocols in wired systems and wireless systems
Wavelength Division Multiple Access Protocols Comparison of MAC protocols in wired systems and wireless systems ,[object Object],[object Object],Fig. : Wavelength Division Multiple Access
Ethernet Comparison of MAC protocols in wired systems and wireless systems ,[object Object],[object Object],[object Object],[object Object]
802.3 Frame Layout Comparison of MAC protocols in wired systems and wireless systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Wireless Networks Comparison of MAC protocols in wired systems and wireless systems ,[object Object],[object Object]
Wireless LAN Requirements Comparison of MAC protocols in wired systems and wireless systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Problems Comparison of MAC protocols in wired systems and wireless systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Multiple Access with Collision Avoidance (MACA) Comparison of MAC protocols in wired systems and wireless systems ,[object Object],[object Object],[object Object],[object Object],[object Object]
MACA for Wireless (MACAW) Comparison of MAC protocols in wired systems and wireless systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Wireless LANs MAC Sublayer Comparison of MAC protocols in wired systems and wireless systems ,[object Object],[object Object]
Wireless LANs MAC Sublayer Comparison of MAC protocols in wired systems and wireless systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CSMA/CA Ethernet-like Comparison of MAC protocols in wired systems and wireless systems ,[object Object],[object Object],[object Object],[object Object],[object Object]
Comparison of MAC protocols in wired systems and wireless systems Fig. : IEEE 802.11 Medium Access Control Logic
CSMA/CA- MACAW Comparison of MAC protocols in wired systems and wireless systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CSMA/CA- point Coordination Comparison of MAC protocols in wired systems and wireless systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Comparison of MAC protocols in wired systems and wireless systems Fig. : IEEE 802.11 Protocol Architecture
802.11 MAC Frame Layout Comparison of MAC protocols in wired systems and wireless systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
802.11 MAC Frame Layout Comparison of MAC protocols in wired systems and wireless systems ,[object Object],[object Object],[object Object],[object Object],Note : 802.11 supports encryption at MAC level, Ethernet does not !!!
Broadband Wireless Comparison of MAC protocols in wired systems and wireless systems Goal : Use wireless connection between buildings i.e.  avoiding the use of the local loop ,[object Object],[object Object],[object Object],[object Object],WiMAX  (World Interoperability for Microwave Access) is a family of IEEE 802.16 aiming at replacing ADSL and cable modems
Broadband Wireless Comparison of MAC protocols in wired systems and wireless systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Fig. : TDD frame contatinig time slots
Broadband Wireless- 802.16 Frame Structure Comparison of MAC protocols in wired systems and wireless systems Fig. : (a) a generic frame (b) a bandwidth request frame ,[object Object],[object Object],[object Object],[object Object]
Wireless Sensor Networks Zigbee  Comparison of MAC protocols in wired systems and wireless systems ,[object Object],[object Object],[object Object]
Conclusion Comparison of MAC protocols in wired systems and wireless systems
Comparison of MAC protocols in wired systems and wireless systems Fig: Channel allocation methods and systems for a common channel
Conclusion Comparison of MAC protocols in wired systems and wireless systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Conclusion Comparison of MAC protocols in wired systems and wireless systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
References ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Comparison of MAC protocols in wired systems and wireless systems
Thank You!!! Any Questions??? Comparison of MAC protocols in wired systems and wireless systems

More Related Content

What's hot

The mac layer
The mac layerThe mac layer
The mac layeraazamk
 
3.Medium Access Control
3.Medium Access Control3.Medium Access Control
3.Medium Access ControlSonali Chauhan
 
Medium Access PROTOCOL b yENGR. FAWAD KHAN UET BANNU KP PAKISTAN
Medium Access PROTOCOL b yENGR.  FAWAD KHAN UET BANNU KP PAKISTANMedium Access PROTOCOL b yENGR.  FAWAD KHAN UET BANNU KP PAKISTAN
Medium Access PROTOCOL b yENGR. FAWAD KHAN UET BANNU KP PAKISTANirfan sami
 
Carrier Sense Multiple Access (CSMA)
Carrier Sense Multiple Access (CSMA)Carrier Sense Multiple Access (CSMA)
Carrier Sense Multiple Access (CSMA)Mohammed Abuibaid
 
Mac protocols of adhoc network
Mac protocols of adhoc networkMac protocols of adhoc network
Mac protocols of adhoc networkshashi712
 
Csma protocols
Csma protocolsCsma protocols
Csma protocolsManal Shah
 
Mac adhoc (1)
Mac adhoc (1)Mac adhoc (1)
Mac adhoc (1)hinalala
 
Multiple Access in Computer Network
Multiple Access in Computer NetworkMultiple Access in Computer Network
Multiple Access in Computer NetworkHitesh Mohapatra
 
Wlan 802.11n - MAC Sublayer
Wlan 802.11n - MAC SublayerWlan 802.11n - MAC Sublayer
Wlan 802.11n - MAC SublayerMd Syed Ahamad
 

What's hot (20)

Mac layer
Mac  layerMac  layer
Mac layer
 
The mac layer
The mac layerThe mac layer
The mac layer
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
 
The medium access sublayer
 The medium  access sublayer The medium  access sublayer
The medium access sublayer
 
Unit 1 mac vsd
Unit 1 mac vsdUnit 1 mac vsd
Unit 1 mac vsd
 
clas 8
clas 8clas 8
clas 8
 
3.Medium Access Control
3.Medium Access Control3.Medium Access Control
3.Medium Access Control
 
Medium Access PROTOCOL b yENGR. FAWAD KHAN UET BANNU KP PAKISTAN
Medium Access PROTOCOL b yENGR.  FAWAD KHAN UET BANNU KP PAKISTANMedium Access PROTOCOL b yENGR.  FAWAD KHAN UET BANNU KP PAKISTAN
Medium Access PROTOCOL b yENGR. FAWAD KHAN UET BANNU KP PAKISTAN
 
Multiple access protocol
Multiple access protocolMultiple access protocol
Multiple access protocol
 
Aloha
AlohaAloha
Aloha
 
Carrier Sense Multiple Access (CSMA)
Carrier Sense Multiple Access (CSMA)Carrier Sense Multiple Access (CSMA)
Carrier Sense Multiple Access (CSMA)
 
Mac protocols of adhoc network
Mac protocols of adhoc networkMac protocols of adhoc network
Mac protocols of adhoc network
 
Mac sub layer
Mac sub layerMac sub layer
Mac sub layer
 
Mac
MacMac
Mac
 
Csma protocols
Csma protocolsCsma protocols
Csma protocols
 
Snooping TCP
Snooping TCPSnooping TCP
Snooping TCP
 
aloha
alohaaloha
aloha
 
Mac adhoc (1)
Mac adhoc (1)Mac adhoc (1)
Mac adhoc (1)
 
Multiple Access in Computer Network
Multiple Access in Computer NetworkMultiple Access in Computer Network
Multiple Access in Computer Network
 
Wlan 802.11n - MAC Sublayer
Wlan 802.11n - MAC SublayerWlan 802.11n - MAC Sublayer
Wlan 802.11n - MAC Sublayer
 

Viewers also liked

Wmc diversity
Wmc diversityWmc diversity
Wmc diversityAJAL A J
 
RADIATION & PROPAGATION - diversity
RADIATION & PROPAGATION - diversityRADIATION & PROPAGATION - diversity
RADIATION & PROPAGATION - diversityAJAL A J
 
Signal transmission and filtering section 3.1
Signal transmission and filtering section 3.1Signal transmission and filtering section 3.1
Signal transmission and filtering section 3.1nahrain university
 
Signal transmission and filtering section 3.2
Signal transmission and filtering section 3.2Signal transmission and filtering section 3.2
Signal transmission and filtering section 3.2nahrain university
 
Diversity techniques presentation material
Diversity techniques presentation materialDiversity techniques presentation material
Diversity techniques presentation materialNini Lashari
 
Equalization
EqualizationEqualization
Equalizationbhabendu
 
Bit interleaved coded modulation
Bit interleaved coded modulationBit interleaved coded modulation
Bit interleaved coded modulationMridula Sharma
 
Optoelectronics seminar: MESFET
Optoelectronics seminar: MESFETOptoelectronics seminar: MESFET
Optoelectronics seminar: MESFETMridula Sharma
 
Adaptive linear equalizer
Adaptive linear equalizerAdaptive linear equalizer
Adaptive linear equalizerSophia Jeanne
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocaltes31
 
Measurement and Metrology
Measurement and MetrologyMeasurement and Metrology
Measurement and MetrologyAvinash Navin
 
Performance analysis of CSMA/CA and TDMA MAC protocols in Wireless Mesh Netw...
Performance analysis of CSMA/CA and TDMA  MAC protocols in Wireless Mesh Netw...Performance analysis of CSMA/CA and TDMA  MAC protocols in Wireless Mesh Netw...
Performance analysis of CSMA/CA and TDMA MAC protocols in Wireless Mesh Netw...Pranjal Das
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11Shreejan Acharya
 
Diversity Techniques in mobile communications
Diversity Techniques in mobile communicationsDiversity Techniques in mobile communications
Diversity Techniques in mobile communicationsDiwaker Pant
 

Viewers also liked (19)

Wmc diversity
Wmc diversityWmc diversity
Wmc diversity
 
RADIATION & PROPAGATION - diversity
RADIATION & PROPAGATION - diversityRADIATION & PROPAGATION - diversity
RADIATION & PROPAGATION - diversity
 
Signal transmission and filtering section 3.1
Signal transmission and filtering section 3.1Signal transmission and filtering section 3.1
Signal transmission and filtering section 3.1
 
Signal transmission and filtering section 3.2
Signal transmission and filtering section 3.2Signal transmission and filtering section 3.2
Signal transmission and filtering section 3.2
 
Diversity techniques presentation material
Diversity techniques presentation materialDiversity techniques presentation material
Diversity techniques presentation material
 
Beam forming
Beam formingBeam forming
Beam forming
 
Equalization
EqualizationEqualization
Equalization
 
Bit interleaved coded modulation
Bit interleaved coded modulationBit interleaved coded modulation
Bit interleaved coded modulation
 
Optoelectronics seminar: MESFET
Optoelectronics seminar: MESFETOptoelectronics seminar: MESFET
Optoelectronics seminar: MESFET
 
Adaptive linear equalizer
Adaptive linear equalizerAdaptive linear equalizer
Adaptive linear equalizer
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
 
Measurement and Metrology
Measurement and MetrologyMeasurement and Metrology
Measurement and Metrology
 
Performance analysis of CSMA/CA and TDMA MAC protocols in Wireless Mesh Netw...
Performance analysis of CSMA/CA and TDMA  MAC protocols in Wireless Mesh Netw...Performance analysis of CSMA/CA and TDMA  MAC protocols in Wireless Mesh Netw...
Performance analysis of CSMA/CA and TDMA MAC protocols in Wireless Mesh Netw...
 
Lan architecture
Lan architectureLan architecture
Lan architecture
 
Metrology and Measuremenrt
Metrology and MeasuremenrtMetrology and Measuremenrt
Metrology and Measuremenrt
 
Diversity And Inclusion
Diversity And InclusionDiversity And Inclusion
Diversity And Inclusion
 
DIVERSITY POWERPOINT
DIVERSITY POWERPOINTDIVERSITY POWERPOINT
DIVERSITY POWERPOINT
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11
 
Diversity Techniques in mobile communications
Diversity Techniques in mobile communicationsDiversity Techniques in mobile communications
Diversity Techniques in mobile communications
 

Similar to MAC seminar

Media Access and Internetworking
Media Access and InternetworkingMedia Access and Internetworking
Media Access and InternetworkingN.Jagadish Kumar
 
W13-L1&2.pptx
W13-L1&2.pptxW13-L1&2.pptx
W13-L1&2.pptxHirazNor
 
Mac protocols
Mac protocolsMac protocols
Mac protocolsjuno susi
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationDsunte Wilson
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor networkA. Shamel
 
Ethernet and token ring
Ethernet and token ringEthernet and token ring
Ethernet and token ringAbhijeet Shah
 
Computer networks lan
Computer networks lanComputer networks lan
Computer networks lanDeepak John
 
Mobile Computing (Part-2)
Mobile Computing (Part-2)Mobile Computing (Part-2)
Mobile Computing (Part-2)Ankur Kumar
 
High speed Networking
High speed NetworkingHigh speed Networking
High speed Networkingsdb2002
 
Westermo webinar: Learning the Basics of Ethernet Networking
Westermo webinar: Learning the Basics of Ethernet NetworkingWestermo webinar: Learning the Basics of Ethernet Networking
Westermo webinar: Learning the Basics of Ethernet NetworkingWestermo Network Technologies
 
Mac protocol for wmn
Mac protocol for wmnMac protocol for wmn
Mac protocol for wmnmmjalbiaty
 

Similar to MAC seminar (20)

Media Access and Internetworking
Media Access and InternetworkingMedia Access and Internetworking
Media Access and Internetworking
 
CS6003 ADHOC & SENSOR NETWORKS
CS6003 ADHOC & SENSOR NETWORKSCS6003 ADHOC & SENSOR NETWORKS
CS6003 ADHOC & SENSOR NETWORKS
 
Mac
MacMac
Mac
 
Technical seminar
Technical seminarTechnical seminar
Technical seminar
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
W13-L1&2.pptx
W13-L1&2.pptxW13-L1&2.pptx
W13-L1&2.pptx
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
 
Ch5 data layer network
Ch5 data layer networkCh5 data layer network
Ch5 data layer network
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch Configuration
 
14653128.ppt
14653128.ppt14653128.ppt
14653128.ppt
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
Ethernet and token ring
Ethernet and token ringEthernet and token ring
Ethernet and token ring
 
Computer networks lan
Computer networks lanComputer networks lan
Computer networks lan
 
Mobile Computing (Part-2)
Mobile Computing (Part-2)Mobile Computing (Part-2)
Mobile Computing (Part-2)
 
Ethernet
EthernetEthernet
Ethernet
 
High speed Networking
High speed NetworkingHigh speed Networking
High speed Networking
 
Chapter 4ver2
Chapter 4ver2Chapter 4ver2
Chapter 4ver2
 
Westermo webinar: Learning the Basics of Ethernet Networking
Westermo webinar: Learning the Basics of Ethernet NetworkingWestermo webinar: Learning the Basics of Ethernet Networking
Westermo webinar: Learning the Basics of Ethernet Networking
 
Mac protocol for wmn
Mac protocol for wmnMac protocol for wmn
Mac protocol for wmn
 
IEEE 806.16
IEEE 806.16IEEE 806.16
IEEE 806.16
 

Recently uploaded

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

MAC seminar

  • 1. Comparison of MAC protocols in wired systems and wireless systems Mridula Sharma 19.07.2010 Comparison of MAC protocols in wired systems and wireless systems
  • 2.
  • 3.
  • 4. Introduction Comparison of MAC protocols in wired systems and wireless systems
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12. Comparison of MAC protocols in wired systems and wireless systems Fig. : Comparison of channel utilization versus load for various random access protocols
  • 13.
  • 14.
  • 15.
  • 16. Limited-Contention Protocols The Adaptive Tree Walk Protocol Comparison of MAC protocols in wired systems and wireless systems
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28. Comparison of MAC protocols in wired systems and wireless systems Fig. : IEEE 802.11 Medium Access Control Logic
  • 29.
  • 30.
  • 31. Comparison of MAC protocols in wired systems and wireless systems Fig. : IEEE 802.11 Protocol Architecture
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38. Conclusion Comparison of MAC protocols in wired systems and wireless systems
  • 39. Comparison of MAC protocols in wired systems and wireless systems Fig: Channel allocation methods and systems for a common channel
  • 40.
  • 41.
  • 42.
  • 43. Thank You!!! Any Questions??? Comparison of MAC protocols in wired systems and wireless systems