logo

Media Access Control and Australian Academic and Research Network

Answering questions related to access to wireless network (e.g, WiFi) and media access control.

12 Pages1217 Words178 Views
   

Added on  2023-03-30

About This Document

This document discusses the concept of Media Access Control (MAC) and its role in transmitting data packets in wireless networks. It also explains the functions of MAC, different access methods, and the advantages and disadvantages of controlled and contention media access. Additionally, the document provides an overview of the Australian Academic and Research Network (AARNet) and its high-speed network services in Australia.

Media Access Control and Australian Academic and Research Network

Answering questions related to access to wireless network (e.g, WiFi) and media access control.

   Added on 2023-03-30

ShareRelated Documents
1
Student’s name
Instructor’ name
Course Title
1 st June 2019
Media Access Control and Australian Academic and Research Network_1
2
Q.1
a. Media access control is a sub-layer of the DLL(data link layer ) in the OSI model that transmits
data packets to and from the wireless network card to the hardware like wires and other remote
channels. (Mark Dye, 2007)
The main function of the MAC is the provision of addresses and enhance channel accessibility so
that nodes available on a given network can communicate with nodes in other networks. The MAC
is important as the IP address they work to identify adapter on a given network that’s why they are
regarded as the physical address. (Kaveh Pahlavan, 2009)
b. A control access method, stations seek authorization to send , no station can send data without
authorization with other stations after consultation from each to know which station has the right to
send data at a particular moment. example is a token ring and Fibre distributed data interface(FDDI).
Contention media methods access methods here any computer has the right to transmit data and it
uses a medium to broadcast data at any particular time using the policy of first come first to be
served. Examples are Carrier Sense Multiple Access (CSMA).
c . Because it can control the flow of data packets, it has control codes that control the transmission
of data and data can be accessed using different methods and keys. and can do data recovery in case
of error during input or output of data. (Rashid Abdelhaleem Saeed, 2016)
d. The contention media outshines the controlled media access under high traffic, The controlled
access tend to work with traffic is high hence more collisions happen during this times making it
slow and more errors arise.
Q 2.
Media Access Control and Australian Academic and Research Network_2
3
a.
The calculation of the composite signal in progress.
Media Access Control and Australian Academic and Research Network_3
4
The calculation of the composite signal in progress
Media Access Control and Australian Academic and Research Network_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Mobile network and wireless communication.1
|5
|890
|16

Data Link Layer, Transport Layer and Cloud Computing
|5
|1493
|336

BN106 Networking Fundamentals Each Virtual Private Network
|7
|1112
|154

Mobile and Wireless Network Investigation
|13
|2361
|210

Computer Networks: Encapsulation, Switched Network, PPP, Modulation
|16
|2497
|343

Data Link Layer and Transport Layer: Functions and Importance in Networking and Cloud Computing
|15
|3115
|65