MAC Layer – What is MAC Layer
Protocols?
The
Media Access Control (MAC) data communication Networks protocol sub-layer,
also known as the Medium Access Control, is a sub-layer of the data link layer
specified in the seven-layer OSI model. The medium access layer was made
necessary by systems that share a common communications medium. Typically these
are local area networks. The MAC layer is the “low” part of the second OSI
layer, the layer of the “data link”. In fact, the IEEE divided this layer into
two layers “above” is the control layer the logical connection (Logical Link
Control, LLC) and “down” the control layer The medium access (MAC).
The LLC layer is standardized by the IEEE as the 802.2
since the beginning 1980 Its purpose is to allow level 3 network protocols (for
eg IP) to be based on a single layer (the LLC layer) regardless underlying protocol used,
including WiFi, Ethernet or Token Ring, for example. All WiFi data packets so
carry a pack LLC, which contains itself packets from the upper network layers.
The header of a packet LLC indicates the type of layer 3 protocol in it: most
of the time, it is IP protocol, but it could be another protocol, such as IPX (Internet Packet
Exchange) for example. Thanks to the LLC layer, it is possible to have at the
same time, on the same network, multiple Layer 3 protocols.
In LAN nodes uses the same communication channel for
transmission. The MAC sub-layer has two primary responsibilities:
Data
encapsulation, including frame assembly before transmission, and frame
parsing/error detection during and after reception. Media access control, including initiation of frame transmission and
recovery from transmission failure.
Following Protocols are used by Medium Access Layer :
ALOHA
: ALOHA is
a system for coordinating and arbitrating access to a shared communication
channel. It was developed in the 1970s at the University of Hawaii. The
original system used terrestrial radio broadcasting, but the system has been
implemented in satellite communication systems. A shared communication system
like ALOHA requires a method of handling collisions that occur when two or more
systems attempt to transmit on the channel at the same time.
Carrier Sensed Multiple
Access (CSMA) : CSMA is a network access method used on shared network
topologies such as Ethernet to control access to the network. Devices attached
to the network cable listen (carrier sense) before transmitting. If the channel
is in use, devices wait before transmitting. MA (Multiple Access) indicates
that many devices can connect to and share the same network. All devices have
equal access to use the network when it is clear.
CSMA/CD (Carrier Sense
Multiple Access/Collision Detection) : CD (collision detection) defines what happens when
two devices sense a clear channel, then attempt to transmit at the same time. A
collision occurs, and both devices stop transmission, wait for a random amount
of time, and then retransmit. This is the technique used to access the 802.3
Ethernet network channel.
CSMA/CA
(Carrier Sense Multiple Access/Collision Avoidance) : In CA collision avoidance), collisions
are avoided because each node signals its intent to transmit before actually
doing so. This method is not popular because it requires excessive overhead
that reduces performance.
Ethernet
: IEEE
802.3 Local Area Network (LAN) Protocols : Ethernet protocols refer to the
family of local-area network (LAN)covered by the IEEE 802.3. In the Ethernet standard,
there are two modes of operation: half-duplex and full-duplex modes. In the
half duplex mode, data are transmitted using the popular Carrier-Sense Multiple
Access/Collision Detection (CSMA/CD) protocol on a shared medium.
Four
data rates are currently defined for operation over optical-fiber and
twisted-pair cables :
10 Mbps – 10Base-T Ethernet (IEEE 802.3)
100 Mbps – Fast Ethernet (IEEE 802.3u)
1000 Mbps – Gigabit Ethernet (IEEE 802.3z)
10-Gigabit – 10 Gbps Ethernet (IEEE
802.3ae).
The Ethernet System consists of three
basic elements :
(1) The physical medium used to carry Ethernet signals
between computers,
(2) a set of medium access control rules embedded in each
Ethernet interface that allow multiple computers to fairly arbitrate access to
the shared Ethernet channel, and
(3) an Ethernet frame that consists of a standardized set
of bits used to carry data over the system.
IEEE 802.4 Token Bus : In token bus network station must have possession
of a token before it can transmit on the network. The IEEE 802.4 Committee has
defined token bus standards as broadband networks, as opposed to Ethernet’s
baseband transmission technique. The topology of the network can include groups
of workstations connected by long trunk cables.
IEEE 802.5 Token Ring : Token ring is the IEEE 802.5 standard for a
token-passing ring network with a star-configured physical topology.
Internally, signals travel around the network from one station to the next in a
ring. Physically, each station connects to a central hub called a MAU
(multi-station access unit). The MAU contains a “collapsed ring,” but the
physical configuration is a star topology. When a station is attached, the ring
is extended out to the station and then back to the MAU .
0 Comments