• Home
  • About
    • PI photo

      PI

      Beginner's Blog

    • Learn More
    • Github
  • Posts
    • All Posts
    • All Tags
    • All Categories
  • Projects

[NETWORK] MAC Protocol

๐Ÿ“† Created: 2025.04.30 Wed

๐Ÿ—“๏ธ Updated: 2025.05.21 Wed

Reading time ~5 minutes

๋ชฉ์ฐจ

๊ฒฝ์Ÿ ๋‹ค์ค‘ ์ ‘๊ทผ ๋ฐฉ์‹ (Random/Contention-Based Access Protocol)

๋ณต์ˆ˜์˜ ์‚ฌ์šฉ์ž๋“ค์ด ํ•˜๋‚˜์˜ ์ฑ„๋„(๊ณต์œ  ๋งค์ฒด)์„ ๋‘๊ณ  ์„œ๋กœ ๊ฒฝ์Ÿํ•˜๋ฉฐ ๋‚˜๋ˆ„์–ด์“ฐ๋Š” ๋ฐฉ์‹์ด๋‹ค.

  • ๋งค์ฒด ์ ‘๊ทผ ์‹œ์  ๊ฒฐ์ •: ๊ฐ ๋…ธ๋“œ๋Š” ์šฐ์„ ์ˆœ์œ„ ์—†์ด ์ „์†ก์„ ์ž์œ ๋กญ๊ฒŒ ์‹œ๋„ํ•œ๋‹ค
  • ๋งค์ฒด ์ƒํƒœ ๋Œ€์‘: ์‹ ๊ฒฝ ์“ฐ์ง€ ์•Š๋Š”๋‹ค.
    ์ƒ๋‚จ์ž ๋ฉ”ํƒ€
  • ์ „์†ก ์„ฑ๊ณต/์‹คํŒจ ํŒ๋‹จ: ํ‰์ƒ์‹œ๋ณด๋‹ค ์—๋„ˆ์ง€ ๋ ˆ๋ฒจ์ด 2๋ฐฐ๊ฐ€ ๋œ๋‹ค Detect a collision
  • ์ถฉ๋Œ ์ฒ˜๋ฆฌ: ๊ฐ ์žฅ์น˜๋Š” ์ถฉ๋Œ์„ ๊ฐ์ง€ํ•˜๊ณ  ๋žœ๋คํ•œ ์‹œ๊ฐ„์„ ๊ธฐ๋‹ค๋ฆฐ ํ›„ ์žฌ์ „์†ก์„ ์‹œ๋„ํ•œ๋‹ค

Random Access ํŠน์ง•

  • ๋ชจ๋“  ๋…ธ๋“œ๊ฐ€ ํ‰๋“ฑํ•˜๋‹ค: ์ค‘์•™๊ตญ์— ์˜ํ•œ ์ œ์–ด๊ฐ€ ์—†๋‹ค
  • ์†Œ์Œ์— ๊ฐ•ํ•จ
  • ๋น„๊ณ„ํš์  ์ „์†ก: ๋…ธ๋“œ๊ฐ€ ๋ฐ์ดํ„ฐ๋ฅผ ์ „์†กํ•  ์‹œ๊ฐ„์ด ๋ฏธ๋ฆฌ ์ •ํ•ด์ ธ ์žˆ์ง€ ์•Š๋‹ค.
  • ๊ทœ์น™ ๋ถ€์žฌ: ๋‹ค์Œ ์ „์†ก ๋…ธ๋“œ๋ฅผ ์ง€์ •ํ•˜๋Š” ๊ทœ์น™์ด ์—†๋‹ค.
  • ๊ฒฝ์Ÿ ๋ฐœ์ƒ: ์—ฌ๋Ÿฌ ๋…ธ๋“œ๋“ค์ด ๋™์‹œ์— ์ „์†ก์„ ์‹œ๋„ํ•  ๊ฒฝ์šฐ ์ถฉ๋Œ์ด ๋ฐœ์ƒํ•  ์ˆ˜ ์žˆ๋‹ค.

1. ALOHA

1970๋…„๋Œ€์ดˆ ํ•˜์™€์ด ๊ตฐ๋„์— ์žˆ๋Š” ์„ฌ๋“ค๊ฐ„์— ๋ฌด์„  ๋ฐ์ดํ„ฐ ํ†ต์‹ ๋ง(ํŒจํ‚ท ๋ผ๋””์˜ค๋ง)์„ ๊ตฌ์„ฑํ•˜๊ธฐ ์œ„ํ•œ ์—ฐ๊ตฌ์—์„œ ๋ฐœ์ „ํ–ˆ๋‹ค. ์—ฌ๋Ÿฌ ๋…ธ๋“œ๋“ค์ด ํ•˜๋‚˜์˜ ๋งํฌ๋ฅผ ๊ณต์œ ํ•œ๋‹ค.

1.1. Pure ALOHA (์ˆœ์ˆ˜ ALOHA):

๊ฐ๊ฐ์˜ ๋…ธ๋“œ๋Š” ๋ณด๋‚ผ ๋ฐ์ดํ„ฐ๊ฐ€ ์žˆ์„ ๊ฒฝ์šฐ, ์–ธ์ œ๋“ ์ง€ ์ „์†ก์„ ์‹œ๋„ํ•œ๋‹ค. ํ•˜๋‚˜์˜ ์ฑ„๋„์„ ๊ณต์œ ํ•˜๊ธฐ ๋•Œ๋ฌธ์—, ๋ฐ์ดํ„ฐ๊ฐ€ ์ถฉ๋Œ์ด ๋ฐœ์ƒํ•  ์ˆ˜ ์žˆ๋‹ค.

1.1.1. Main Idea

Pure_ALOHA_Algorithm

  1. ๊ฐ๊ฐ์˜ ๋…ธ๋“œ๋Š” ๋ณด๋‚ผ ๋ฐ์ดํ„ฐ๊ฐ€ ์žˆ์„ ๊ฒฝ์šฐ, ์–ธ์ œ๋“ ์ง€ ์ „์†ก์„ ์‹œ๋„ํ•œ๋‹ค. ๊ทธ๋ฆฌ๊ณ  ์ˆ˜์‹ ์ž๊ฐ€ ACK๋ฅผ ๋Œ๋ ค์ค„ ๊ฒƒ์„ ๊ธฐ๋‹ค๋ฆฐ๋‹ค.
  2. ์ˆ˜์‹ ์ž๋กœ๋ถ€ํ„ฐ ACK๋ฅผ ๋ฐ›์•˜๋‹ค๋ฉด ์„ฑ๊ณต์ ์œผ๋กœ ํ†ต์‹ ์„ ๋๋‚ธ๋‹ค.
  3. timeout ์‹œ๊ฐ„ ๋‚ด์— ACK๋ฅผ ๋ฐ›์ง€ ๋ชปํ•œ ๊ฒฝ์šฐ, ์†ก์‹ ์ž๋Š” frame์ด ํŒŒ๊ดด-์ถฉ๋Œ๋œ ๊ฒƒ์ด๋ผ๊ณ  ๋ณด๊ณ , ์žฌ์ „์†กํ•œ๋‹ค.
  • Tp: ์ตœ๋Œ€ ์ „์†ก ์ง€์—ฐ ์‹œ๊ฐ„(Maximum Propagation Delay)
  • Time-out period: \(2 \times {T_p}\), S -> R, R -> S ์ด 2๋ฒˆ์˜ ๋ฐ์ดํ„ฐ ์ „์†ก์„ ๊ณ ๋ ค
  • R: ๋žœ๋ค๊ฐ’, \(0 <= R <= 2^K-1\)
  • K: ์ „์†ก ์‹คํŒจ ํšŸ์ˆ˜
  • Kmax: ๋ณดํ†ต 15
  • Tfr: ํ‰๊ท  frame ์ „์†ก ์‹œ๊ฐ„
  • Backoff time - TB: ์žฌ์ „์†ก ๋Œ€๊ธฐ ์‹œ๊ฐ„
    • \[T_B = R \times {T_p}\]
    • \[T_B = R \times {T_{fr}}\]

-> Tp์ด๋ž‘ Tfr์€ ๊ฐ™์€ ๊ฐ’์ผ๊นŒ?
์ „ํŒŒ ์‹œ๊ฐ„ Tp: ๋„คํŠธ์›Œํฌ์—์„œ ์‹ ํ˜ธ๊ฐ€ ๋ฌผ๋ฆฌ์  ๋งค์ฒด๋ฅผ ํ†ตํ•ด ์ „ํŒŒ๋˜๋Š” ์‹œ๊ฐ„์ด๋‹ค. ๊ฑฐ๋ฆฌ์™€ ์ „ํŒŒ ์†๋„์— ๋”ฐ๋ผ ๋‹ฌ๋ผ์ง„๋‹ค.
ํ”„๋ ˆ์ž„ ์ „์†ก ์‹œ๊ฐ„ Tfr: ํ•˜๋‚˜์˜ ํ”„๋ ˆ์ž„์„ ์ „์†กํ•˜๋Š” ๋ฐ ๊ฑธ๋ฆฌ๋Š” ์‹œ๊ฐ„์ด๋‹ค. ํ”„๋ ˆ์ž„ ํฌ๊ธฐ์™€ ์ „์†ก ์†๋„์— ์˜ํ•ด ๊ฒฐ์ •๋œ๋‹ค.
๋”ฐ๋ผ์„œ, Tp โ‰  Tfr

1.1.2. ๋ฌธ์ œ์ 

Pure_ALOHA_Problem

2๊ฐœ ์ด์ƒ์˜ ๋…ธ๋“œ์—์„œ ๋ณด๋‚ธ ๋ฐ์ดํ„ฐ๊ฐ€ ์ถฉ๋Œํ–ˆ์„ ๋•Œ, ์ด ๋ชจ๋“  ๋…ธ๋“œ๋“ค์ด timeout ์‹œ๊ฐ„ ํ›„์— ์žฌ์ „์†ก์„ ํ•˜๊ฒŒ ๋˜๋ฉด ๋˜ ๋‹ค์‹œ frame์ด ์ถฉ๋Œํ•˜๊ฒŒ ๋œ๋‹ค.

1.1.3. ํ•ด๊ฒฐ๋ฐฉ๋ฒ•

  1. timeout ์‹œ๊ฐ„์ด ์ง€๋‚œ ํ›„์—, ๊ฐ ๋…ธ๋“œ๋“ค์€ ์žฌ์ „์†ก์„ ํ•˜๊ธฐ ์ „์— ๋žœ๋คํ•œ ์‹œ๊ฐ„(random backoff time, Tb)์„ ๊ธฐ๋‹ค๋ฆฐ๋‹ค.
  2. ์žฌ์ „์†ก์œผ๋กœ ์ธํ•œ ์ฑ„๋„์˜ congesting์„ ๋ง‰๊ธฐ ์œ„ํ•ด, ์žฌ์ „์†ก ์ตœ๋Œ€ ์‹œ๋„ ํšŸ์ˆ˜ Kmax์„ ์‹œ๋„ํ•œ ํ›„, ๋…ธ๋“œ๋“ค์€ ์ „์†ก์„ ํฌ๊ธฐํ•˜๊ณ  ๋‚˜์ค‘์— ๋‹ค์‹œ ์‹œ๋„ํ•œ๋‹ค.

1.1.4. Vulnerable time

Vulnerable_Time Vulnerable time: ์ถฉ๋Œ ๊ฐ€๋Šฅ์„ฑ์ด ํฐ ๊ธฐ๊ฐ„
Pure ALOHA์˜ vulnerable time: \(2 \times {T_{fr}}\)

1.1.5. Throughput

\[S = G \times {e^{-2G}} \\ S_{max} = 0.184 \; when \; G = 1/2\]
  • S: throughput, ์„ฑ๊ณต์ ์ธ ์ „์†ก๋ฅ 
  • G: average number of frames generated by the system during one frame transmission time, Tfr ์‹œ๊ฐ„๋™์•ˆ ๊ทธ ์‹œ์Šคํ…œ ์•ˆ์—์„œ ์ƒ์„ฑ๋˜๋Š” frame์˜ ๊ฐœ์ˆ˜ ํŠธ๋ž˜ํ”ฝ ๊ฐ•๋„(Traffic Intensity), ์ดˆ๋‹น ํ‰๊ท  ์ „์†ก ์‹œ๋„ ํšŸ์ˆ˜

1.2. Slotted ALOHA (์Šฌ๋กฏํ˜• ALOHA):

์ „์†ก์„ ์‹œ๊ฐ„ ์Šฌ๋กฏ์— ๋งž์ถฐ ์‹œ๋„ํ•œ๋‹ค. ๊ฐ ์žฅ์น˜๋Š” ์ •ํ•ด์ง„ ์Šฌ๋กฏ์— ์ „์†ก์„ ์‹œ๋„ํ•˜๊ณ , ์ถฉ๋Œ์ด ๋ฐœ์ƒํ•˜๋ฉด ๋žœ๋คํ•œ ์Šฌ๋กฏ ํ›„์— ์žฌ์ „์†ก์„ ์‹œ๋„ํ•œ๋‹ค.

1.2.1. Vulnerable time

Vulnerable_Time

Slotted ALOHA vulnerable time: \({T_{fr}}\)

1.2.2. Throughput

\[S = G \times {e^{-2G}} \\ S_{max} = 0.368 \; when \; G = 1\]

2. CSMA (Carrier Sense Multiple Access)

CSMA: ์ฑ„๋„ ๊ฐ์ง€ ๋‹ค์ค‘ ์ ‘์† ๋ฐฉ์‹์ด๋‹ค. ์†ก์‹  ์ „ ๋งค์ฒด๋ฅผ ๋จผ์ € ๊ฐ์ง€(carrier sense)ํ•˜๊ณ , ๋น„์–ด ์žˆ์œผ๋ฉด ์ „์†ก, ์‚ฌ์šฉ ์ค‘์ด๋ฉด ๊ธฐ๋‹ค๋ฆฌ๋Š” ๊ฒƒ์ด๋‹ค.

๋™์ž‘ ํ๋ฆ„

CSMA_Algorithm

  1. Station์€ ์ „์†กํ•˜๋ ค๋Š” ๋ฐ์ดํ„ฐ๊ฐ€ ์ƒ๊ธฐ๋ฉด,
  2. ๋งค์ฒด๊ฐ€ ์‚ฌ์šฉ ์ค‘์ธ์ง€ ๋จผ์ € ๊ฐ์ง€ํ•œ๋‹ค (Carrier Sense).
  3. ๋งค์ฒด๊ฐ€ idle(๋น„์–ด ์žˆ์œผ๋ฉด) ์ฆ‰์‹œ or ์ผ์ • ๊ทœ์น™์— ๋”ฐ๋ผ ์ „์†กํ•œ๋‹ค.
  4. ๋งค์ฒด๊ฐ€ busy(์‚ฌ์šฉ ์ค‘)์ด๋ฉด ๋Œ€๊ธฐํ•˜๊ฑฐ๋‚˜ ์žฌ์‹œ๋„ํ•œ๋‹ค.

CSMA_Vulnerable_Time Vulnerable time: propagation time \(T_p\)

Persistence Methods

์ฑ„๋„์ด busyํ•  ๋•Œ ์–ด๋–ป๊ฒŒ ํ•  ๊ฒƒ์ธ๊ฐ€?

  1. 1-Persistent
  2. Nonpersistent
  3. p-Persistent
์œ ํ˜• ๋™์ž‘ ๋ฐฉ์‹ ํŠน์ง• ์ถฉ๋Œ ๊ฐ€๋Šฅ์„ฑ
1-persistent CSMA ๋งค์ฒด๊ฐ€ ๋น„๋ฉด ์ฆ‰์‹œ ์ „์†ก ๊ฐ€์žฅ ๋‹จ์ˆœํ•˜์ง€๋งŒ ์ถฉ๋Œ ์œ„ํ—˜ โ†‘ ๋†’์Œ
non-persistent CSMA ๋งค์ฒด๊ฐ€ ์‚ฌ์šฉ ์ค‘์ด๋ฉด ๋žœ๋ค ์‹œ๊ฐ„ ๋Œ€๊ธฐ ํ›„ ์žฌ์‹œ๋„ ํ˜ผ์žก ํšŒํ”ผ ํšจ๊ณผ ์žˆ์Œ ์ค‘๊ฐ„
p-persistent CSMA (์Šฌ๋กฏ ๊ธฐ๋ฐ˜) ๋งค์ฒด๊ฐ€ ๋น„๋ฉด ํ™•๋ฅ  p๋กœ ์ „์†ก, (1-p)๋ฉด ๋Œ€๊ธฐ ์ฃผ๋กœ ์Šฌ๋กฏ ๊ธฐ๋ฐ˜ ๋„คํŠธ์›Œํฌ์—์„œ ์‚ฌ์šฉ ๋‚ฎ์Œ

1-Persistent

1-Persistent_Behavior 1-Persistent_Algorithm

  1. idleํ•  ๋•Œ, (ํ™•๋ฅ  1๋กœ) ๋ฐ”๋กœ ๋ณด๋‚ธ๋‹ค

Nonpersistent

Nonpersistent_Behavior Nonpersistent_Algorithm

  1. ์ „์†กํ•˜๋ ค๋Š” ์žฅ์น˜๊ฐ€ ๋จผ์ € ์ฑ„๋„์„ ๊ฐ์ง€ํ•œ๋‹ค.
  2. idleํ•˜๋ฉด, ์ฆ‰์‹œ ์ „์†กํ•œ๋‹ค.
  3. busyํ•˜๋ฉด, ๋žœ๋คํ•œ ์‹œ๊ฐ„๋งŒํผ ๊ธฐ๋‹ค๋ฆฐ ๋’ค ๋‹ค์‹œ ๊ฐ์ง€๋ฅผ ๋ฐ˜๋ณตํ•œ๋‹ค.
    • ์ฆ‰์‹œ ์žฌ์‹œ๋„ํ•˜์ง€ ์•Š๋Š”๋‹ค(non-persistent)
    • ํ˜ผ์žก์ด ์™„ํ™”๋  ๋•Œ๊นŒ์ง€ ๋ฌด์ž‘์œ„ ๋Œ€๊ธฐํ•œ๋‹ค

p-Persistent

p-Persistent_Behavior p-Persistent_Algorithm

  1. ์Šคํ…Œ์ด์…˜์ด ๋ฐ์ดํ„ฐ๋ฅผ ์ „์†กํ•˜๋ ค๊ณ  ํ•  ๋•Œ, ๋จผ์ € ๋งค์ฒด๊ฐ€ ๋น„์–ด ์žˆ๋Š”์ง€ ๊ฐ์ง€ํ•œ๋‹ค.
  2. idleํ•  ๋•Œ,
    • ํ™•๋ฅ  p๋กœ ์ „์†กํ•œ๋‹ค
    • ํ™•๋ฅ  (1 โˆ’ p)๋กœ ์ „์†ก์„ ์Šฌ๋กฏ ์‹œ๊ฐ„๋งŒํผ ์ง€์—ฐํ•˜๊ณ  ๋‹ค์‹œ 1๋ฒˆ ๋‹จ๊ณ„๋กœ ๋Œ์•„๊ฐ„๋‹ค
  3. busyํ•  ๋•Œ, ์ฑ„๋„์ด ๋น„์–ด์งˆ ๋•Œ๊นŒ์ง€ ๊ธฐ๋‹ค๋ฆฐ๋‹ค

p๊ฐ’์ด ์ž‘์„์ˆ˜๋ก ๋” ๊ธฐ๋‹ค๋ฆฌ๊ณ , ์ฆ๊ฐ€ํ• ์ˆ˜๋ก ์ฆ‰์‹œ ์ „์†กํ•˜๊ฒŒ ๋œ๋‹ค

Throughput

  1. 1-Persistent: G=1์ผ ๋•Œ, ์•ฝ 50%
  2. Nonpersistent: 3 < G < 8์ผ ๋•Œ, ์•ฝ 90% G: average number of frames generated by the system during one frame tranmission time

3. CSMA/CD (CSMA with Collision Detection)

CSMA/CD๋Š” ์œ ์„  ์ด๋”๋„ท(Ethernet)์—์„œ ์‚ฌ์šฉ๋˜๋Š” ์ถฉ๋Œ ๊ฐ์ง€ํ˜• ๋งค์ฒด ์ ‘๊ทผ ์ œ์–ด(MAC) ๋ฐฉ์‹์ด๋‹ค. CSMA + ์ถฉ๋Œ ๊ฐ์ง€(Collision Detection) ๋ฉ”์ปค๋‹ˆ์ฆ˜

๋™์ž‘ ์›๋ฆฌ (์ „์†ก ์ ˆ์ฐจ) CSMA/CD Algorithm

  1. ๋งค์ฒด ๊ฐ์ง€: ์ „์†ก ์ „ ์ฑ„๋„์ด ๋น„์–ด ์žˆ๋Š”์ง€ ํ™•์ธ (Carrier Sense)
  2. ์ „์†ก ์‹œ๋„: ์ฑ„๋„์ด idle์ด๋ฉด ๋ฐ์ดํ„ฐ ์ „์†ก ์‹œ์ž‘
  3. ์ „์†ก ์ค‘ ๊ฐ์ง€: ์ „์†ก ์ค‘ ์ถฉ๋Œ ๋ฐœ์ƒ ์—ฌ๋ถ€๋ฅผ ์‹ค์‹œ๊ฐ„์œผ๋กœ ๊ฐ์ง€ Detect a collision
  4. ์ถฉ๋Œ ๊ฐ์ง€: ์ „์•• ๋ณ€ํ™” ๋“ฑ์„ ํ†ตํ•ด ์ถฉ๋Œ์ด ๋ฐœ์ƒํ–ˆ์Œ์„ ํŒ๋‹จํ•œ๋‹ค. normal ์ƒํƒœ์˜ ์—๋„ˆ์ง€ ๋ ˆ๋ฒจ์˜ 2๋ฐฐ๊ฐ€ ๋œ๋‹ค.
  5. ์ถฉ๋Œ ํ›„ ์ฒ˜๋ฆฌ:
    • ์ฆ‰์‹œ ์ „์†ก ์ค‘๋‹จ
    • Jam Signal์„ ๋„คํŠธ์›Œํฌ์— ์ „์†กํ•˜์—ฌ ๋‹ค๋ฅธ ์žฅ์น˜๋“ค์— ์ถฉ๋Œ์„ ์•Œ๋ฆฐ๋‹ค
    • ์žฌ์ „์†ก์„ ์œ„ํ•œ backoff ์‹œ๊ฐ„์„ ๋žœ๋คํ•˜๊ฒŒ ์„ค์ • (Binary Exponential Backoff)

์ถฉ๋Œ ์กฐ๊ฑด ๋ฐ ์ตœ์†Œ ํ”„๋ ˆ์ž„ ํฌ๊ธฐ

  • ์ถฉ๋Œ์€ ์ „ํŒŒ ์ง€์—ฐ ์‹œ๊ฐ„ ๋‚ด์— ๋ฐœ์ƒ
  • ์ด๋ฅผ ๊ณ ๋ คํ•ด, ์ถฉ๋Œ์„ ๊ฐ์ง€ํ•  ์ˆ˜ ์žˆ๋„๋ก ์ตœ์†Œ ํ”„๋ ˆ์ž„ ํฌ๊ธฐ๊ฐ€ ์กด์žฌ
  • ์ตœ์†Œ ํ”„๋ ˆ์ž„ ํฌ๊ธฐ ์กฐ๊ฑด:
\[T_{fr} โ‰ฅ 2 \times T_{p}\]
  • Tfr: ์ตœ์†Œ ํ”„๋ ˆ์ž„ ์ „์†ก ์‹œ๊ฐ„
  • Tp: ์ „ํŒŒ ์ง€์—ฐ ์‹œ๊ฐ„

4. CSMA/CA(CSMA with Collision Avoidance)

CSMA/CA: ์ถฉ๋Œ ํšŒํ”ผ๋ฅผ ์œ„ํ•œ ํ”„๋กœํ† ์ฝœ๋กœ, ์ฃผ๋กœ ๋ฌด์„  LAN์—์„œ ์‚ฌ์šฉ๋œ๋‹ค. ์ถฉ๋Œ ๋ฐœ์ƒ ์ „ ์˜ˆ๋ฐฉ์„ ๋ชฉํ‘œ๋กœ ํ•œ๋‹ค.

์„ธ ๊ฐ€์ง€ ์ „๋žต

  • Interframe Space(IFS)
  • Contention Window
  • Acknowledgements

์ž‘๋™ ์›๋ฆฌ:

RTS/CTS (Request to Send / Clear to Send)๋ฅผ ์‚ฌ์šฉํ•˜์—ฌ ์ถฉ๋Œ์„ ๋ฏธ๋ฆฌ ๋ฐฉ์ง€ํ•ฉ๋‹ˆ๋‹ค.

IFS (Interframe Space)์™€ Contention Window ๋“ฑ์„ ์‚ฌ์šฉํ•˜์—ฌ ์ถฉ๋Œ ๊ฐ€๋Šฅ์„ฑ์„ ์ค„์ด๊ณ  ๋„คํŠธ์›Œํฌ์˜ ํ˜ผ์žก์„ ํ”ผํ•ฉ๋‹ˆ๋‹ค.

์žฅ์ :

  • ๋‹จ์ˆœ์„ฑ: ๊ตฌํ˜„์ด ๊ฐ„๋‹จํ•˜๊ณ , ๋ณ„๋„์˜ ๋™๊ธฐํ™”๋‚˜ ์‹œ๊ฐ„ ๋ถ„ํ•  ์—†์ด ์ž์œ ๋กญ๊ฒŒ ์ „์†กํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.
  • ์ž์› ํšจ์œจ์„ฑ: ์‚ฌ์šฉ ๊ฐ€๋Šฅํ•œ ๋Œ€์—ญํญ์„ ๋™์ ์œผ๋กœ ๊ณต์œ ํ•  ์ˆ˜ ์žˆ์–ด, ์‚ฌ์šฉ์ž ์ˆ˜๊ฐ€ ์ ์„ ๋•Œ ํšจ์œจ์ ์ž…๋‹ˆ๋‹ค.
  • ์œ ์—ฐ์„ฑ: ๋„คํŠธ์›Œํฌ์— ์ƒˆ๋กœ์šด ์žฅ์น˜๊ฐ€ ์ถ”๊ฐ€๋  ๋•Œ, ๋™์ ์œผ๋กœ ๋งค์ฒด๋ฅผ ์‚ฌ์šฉํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

๋‹จ์ :

  • ์ถฉ๋Œ ๋ฐœ์ƒ: ์ถฉ๋Œ์ด ์ž์ฃผ ๋ฐœ์ƒํ•  ์ˆ˜ ์žˆ์œผ๋ฉฐ, ์ถฉ๋Œ์ด ๋ฐœ์ƒํ•˜๋ฉด ์žฌ์ „์†ก์„ ํ•ด์•ผ ํ•˜๋ฏ€๋กœ ์ „์†ก ํšจ์œจ์ด ๋–จ์–ด์งˆ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.
  • ์Šค์ผ€์ผ ๋ฌธ์ œ: ์‚ฌ์šฉ์ž ์ˆ˜๊ฐ€ ๋งŽ์„์ˆ˜๋ก ์ถฉ๋Œ ํ™•๋ฅ ์ด ๋†’์•„์ ธ, ๋„คํŠธ์›Œํฌ๊ฐ€ ๋น„ํšจ์œจ์ ์œผ๋กœ ๋ณ€ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.
  • ์„ฑ๋Šฅ ์ €ํ•˜: ๋„คํŠธ์›Œํฌ ํŠธ๋ž˜ํ”ฝ์ด ๋งŽ์•„์ง€๋ฉด, Throughput์ด ๊ธ‰๊ฒฉํžˆ ๊ฐ์†Œํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

์ฐธ๊ณ 

  • Contention Method ๊ฒฝ์Ÿ ๋ฐฉ์‹ - ์ •๋ณดํ†ต์‹ ๊ธฐ์ˆ ์šฉ์–ดํ•ด์„ค
  • [๋ฐ์ดํ„ฐํ†ต์‹ ] ALOHA
  • ๊ธฐ์ดˆ์ปดํ“จํ„ฐ๋„คํŠธ์›Œํฌ 25 (Medium Access Control, Random Access Protocols, ALOHA, CSMA)
  • CSMA/CA
  • Data Communications and Networking with TCP/IP Protocol Suite, Sixth Edition - Behrouz A, Forouzan


COMPUTER NETWORKNETWORKTIL Share Tweet +1
/#disqus_thread