03.11.2012 Views

Medium Access Control (MAC) and Physical Layer (PHY) - CISE

Medium Access Control (MAC) and Physical Layer (PHY) - CISE

Medium Access Control (MAC) and Physical Layer (PHY) - CISE

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

4-June-07 P1901_PRO_016_r0<br />

The channel access is done through the use of a special <strong>MAC</strong> element called a token. Master nodes decide the<br />

type of frame that their slave nodes are going to transmit next, based on the type of token included in the current<br />

frame, or the kind of channel access the slave nodes can perform. Tokens have several intended uses, depending<br />

on the type of token, <strong>and</strong> the actions to be undertaken upon its reception also depend on the type of token.<br />

The master node manages the type of channel access, contention free access to the channel with a<br />

predetermined decision about which of its slaves will be allowed to transmit data, in what order, <strong>and</strong> for how<br />

long, or a contention based access of the slaves to the channel.These decisions will be published by the use of<br />

different types of tokens. In both schemes the final result is a node holding a token. The holder of the token has<br />

the right to access the medium for a specific time <strong>and</strong> after that time it has to assign the token to the next<br />

destination node. By the control of the frequency of the token occupancy <strong>and</strong> the length of the time the node is<br />

allowed to hold the token, it is possible to guarantee the requested QoS.<br />

4.1.1 Contention free medium access examples<br />

One of the simplest ways of distribute the channel among several users is the use of Data Frames. Let’s the<br />

following scenario:<br />

CPE<br />

N3<br />

Submission page 83 UPA-OPERA<br />

HE<br />

N1<br />

TDRep<br />

N2<br />

CPE<br />

N4<br />

Figure 21 Simple <strong>Access</strong> Topology example<br />

The Data Token has a specific destination node, which, upon its reception, must enter transmission mode. This<br />

destination node might then return the token to its master, or transmit it to its own slaves, in the case of a Time<br />

Division Repeater. A tipical transmission using data tokens can be seen in the following figure:

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!