0% found this document useful (0 votes)
260 views13 pages

MAC Protocols

MAC protocols define standard methods for exchanging data over computer networks. They establish rules for accessing shared mediums and maximizing utilization while maintaining fairness. In wireless networks, MAC protocols face additional challenges like the hidden and exposed terminal problems due to difficulties detecting collisions. MAC protocols are designed at the data link layer to directly control the physical layer and enforce discipline when multiple nodes contend for the same wireless channel.

Uploaded by

Revathimuthusamy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
260 views13 pages

MAC Protocols

MAC protocols define standard methods for exchanging data over computer networks. They establish rules for accessing shared mediums and maximizing utilization while maintaining fairness. In wireless networks, MAC protocols face additional challenges like the hidden and exposed terminal problems due to difficulties detecting collisions. MAC protocols are designed at the data link layer to directly control the physical layer and enforce discipline when multiple nodes contend for the same wireless channel.

Uploaded by

Revathimuthusamy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 13

MAC Protocols

MAC
Protocols in Networking

Protocol: Sometimes referred to as an access method, a protocol is a


standard used to define a method of exchanging data over a computer
network such as local area network, Internet, Intranet, etc. Each protocol
has its own method of how data is formatted when sent and what to do
with it once received, how that data is compressed or how to check for
errors in data.
Why we need in wireless ?

• More than one node is sharing the same medium at a time.


• We need disciplined behaviour to use the shared resources
(channel) for effective access.
MAC = Medium Access Control

• Medium Access Control is protocol designed by the engineers at data link


level.
• It has the rules and regulations for accessing the shared medium at sub level.
• It directly invokes the physical layers.
• Primary responsibility of the MAC protocol maintains the discipline in
accessing shared medium.
Is that all MAC Protocols are the same … ?

NO
Properties Required of MAC Protocols

• It should implement some rules that helps to enforce discipline


when the multiple nodes contend for a same channel.
• It should help maximize the utilization of the channel.
• Channel allocation needs to be fair. No node should be
discriminated against at any time and made to wait for an
unduly(extremely) long time for transmission.
Properties Required of MAC Protocols

• It should be capable of supporting several types of traffic


having different maximum and average bit rates.
• It should be robust in the face of equipment failures and
changing network conditions.
Wireless
MAC Protocol
Issues
MAC Protocol in Wireless vs Wired

• In wireless medium implementing MAC protocol is difficult.


• Collision detection is very hard in a wireless medium.
• So implementing a collision detection system in wireless is hard.
• There are two common problems are found in wireless network,
➢ Hidden Terminal Problem
➢ Exposed Terminal Problem
Hidden Terminal Problem
Radio Range of A Radio Range of C

A B C
Hidden Terminal Problem

❖ A, B, C are the nodes are terminals for data transmission.


❖ Bigger circle is transmission range.
❖ Individual Transmission between A to B and C to B has no problem at all.
❖ But if A and C are want to transmit to B at same time the problem arises,
❖ Because,
➢ B is present in transmission range of both A and C.
➢ But A and C does not know each other.
➢ A is hidden form C.
➢ A cannot sense C is present and vice versa.
➢ This create an problem that need to be solved by MAC protocol.
Exposed Terminal Problem

A B C
D
Exposed Terminal Problem

• A, B, C, are the nodes are terminals for data transmission.


• Bigger circle is transmission range.
• D wants to Transmit A.
• Normal conditions there is no problems.
• If B already transmitting to C means all the transmission are blocked for A
because A is exposed to B.
• Even simultaneous transmission from D to A and B to C is not affecting
each other.
• This is known as exposed terminal problem.
• It should be solved by MAC protocol.

You might also like