Every PC is particularly recognized by its Media Access Control or MAC address. Each Network Interface card has a physical address known as Media Access Control or MAC. It is utilized to recognize various PCs on a network. These are connected to network connectors. These addresses are allocated by the hardware maker, and these IDs are scorched in firmware. Media Access Control or MAC protocol is the primary protocol layer over the ad hoc Physical Layer.
It is utilised at the data link layer. Media Access Control or MAC is the one logical link sub-layer, and another sub-layer is the data link layer. An illustration of a Media Access Control or MAC address is D4-BE-D9-8D-46-9A.
The essential errand of any Media Access Control or MAC protocol is to control the entrance of the nodes to a common medium.
The fundamental of MAC protocol is to direct the entry of a few nodes to a common medium so that specific application-subordinate execution necessities are satisfied.
In this article let us look at:
The classification of MAC protocols or types of MAC protocol or types of MAC are:
MAC layer protocols:
MAC Protocols for Ad-hoc | |||
Contention based | (i) Sender Initiated | (1) Single Channel | MACAW, FAMA |
(2) Multiple Channel | BTMA, ICSMA, DBTMA. | ||
(ii) Receiver Initiated | RI-BTMA, MARCH, MACA-BI | ||
Contention based with reservation | (i)Synchronous | D-PRMA, FPRP, CATA, SRMA or PA, HRMA | |
(ii)Asynchronous | MACA or PR, |
1. Contention based protocols without reservation:
2. Contention based protocols with reservation:
3. Contention based protocols with scheduling:
4. Other protocols:
1. Contention based protocols without reservation:
(i) Sender Initiated:
The packets transmission is started by the sender node.
(ii) Receiver Initiated:
The connection is started by the beneficiary node—for instance, MARCH, MACA-BI, RI-BTMA.
2. Contention based protocols with reservation:
(i) Synchronous protocols:
In synchronous protocols, all node is kept synchronized—for instance, FPRP, SRMA or PA, HRMA, CATA, D-PRMA.
(ii) Asynchronous protocols:
Relative time data is utilised to accomplish affecting restrictions—for instance, RTMAC, MACA or PR.
3. Contention based protocols with scheduling:
Every one of the nodes is dealt with similarly, and no node is getting denied of data transmission. For instance, DLPS, DWOP, DPS.
4. Other protocols:
These Media Access Control or MAC protocol don’t carefully fall into any above classification. For instance, RBAR, PCM, MCSMA, MMAC.
As indicated by the Institute of Electrical and Electronics Engineers or IEEE Std 802-2001 area 6.2.3 Media Access Control or MAC sublayer, the essential capacities performed by the MAC layer are:
The accompanying network innovations utilise the Extended Unique Identifier or EUI-48 identifier design:
The issue related to the design of Media Access Control or MAC protocols for wireless Ad hoc networks are QoS support, bandwidth efficiency, time synchronization, error-prone, broadcast and shared channel, and node mobility.
Jigsaw Academy’s Postgraduate Certificate Program In Cloud Computing brings Cloud aspirants closer to their dream jobs. The joint-certification course is 6 months long and is conducted online and will help you become a complete Cloud Professional.
Analytics is a vast field. At the one end, it overlaps with statistics and higher…
Do you love to explore and investigate information? Do you find spreadsheets to be a…
India has developed into the global hub for analytics. A large number of MNCs have…
International Business Machines Corp. Or IBM as it is popularly known recently announced its restructuring…
So you have got a job as an analyst in your dream company? Here are…
What's the sentiment on "sentiment analysis"? Is the field ready to take off?