A
Seminar Report
On
"Media Channel Access Protocol"
Under the Guidance of Mrs. Poonam Bhatia
SUBMITTED TO: SUBMITTED BY:
Mrs. Gunjan Anand Anamika
Assistant Professor 2220087
Department of Computer Applications BCA 3rd Sem(S2)
TIMT, YNR
TILAK RAJ CHADHA INSTITUTE OF MANAGEMENT AND
TECHNOLOGY
YAMUNANAGAR-135001
Affiliated to Kurukshetra University, Kurukshetra
(Approved by AICTE, New Delhi)
Contents
1. Introduction
2. History
3. Types of Mac protocol
4. CSMA/CA protocol and It’s Working
5. Token passing protocol & It’s Working
6. Advantages
7. Disadvantages
8. Future Scope
9. Conclusion
10.References
Introduction
A Media Access Control (MAC) protocol is a set of rules and procedures that determine how
data packets are transmitted between devices over a shared communication medium. This
protocol operates at the data link layer (Layer 2) of the OSI (Open Systems Interconnection)
model and is crucial for managing access to the physical network medium, preventing data
collisions, and ensuring efficient and orderly data transmission.
This protocol is a critical component of network communication, responsible for managing
how data packets are transmitted between devices over a shared medium. Operating at the
data link layer (Layer 2) of the OSI model, MAC protocols ensure that data is transmitted
efficiently and without collisions, making them essential for reliable network performance.
MAC protocols control access to the network medium, determining which device can send
data at any given time to prevent simultaneous transmissions that could cause data collisions.
They also handle collision detection and resolution, ensuring that data packets reach their
intended destinations correctly.
Without MAC protocols, network communication would be chaotic and inefficient. They
make sure data gets where it needs to go smoothly and reliably. As our reliance on networks
grows, especially with the rise of IoT (Internet of Things) and high-speed internet, the role of
MAC protocols becomes even more crucial.
One of the most well-known MAC protocols is Ethernet’s CSMA/CD (Carrier Sense
Multiple Access with Collision Detection), used in wired networks. This protocol listens to
the network before transmitting and detects collisions to manage retransmissions.
In wireless networks, Wi-Fi utilizes CSMA/CA (Carrier Sense Multiple Access with
Collision Avoidance), which avoids collisions by using acknowledgments and time division.
Continued innovation in IoT, 5G, and beyond will drive further development of MAC
protocols.
Overall, MAC protocols are fundamental for the orderly and efficient operation of both wired
and wireless networks, enabling multiple devices to share the same communication medium
seamlessly and ensuring data integrity and network reliability.
History
3. Early Developments
The ALOHA protocol, developed at the University of Hawaii in 1970, was an early random
access protocol for wireless networks where nodes retransmit data after random delays if
collisions occur. In 1972, Slotted ALOHA improved upon this by dividing time into slots to
minimize collisions.
2. Ethernet and CSMA/CD
Ethernet, introduced in 1973 by Robert Metcalfe at Xerox PARC, became the foundation for
Local Area Networks (LANs). Its core protocol, CSMA/CD (Carrier Sense Multiple Access
with Collision Detection), requires nodes to listen before transmitting and to stop if a
collision is detected.
3. Evolution of Ethernet Standards
Ethernet evolved from 10 Mbps (1983, IEEE 802.3) to 100 Mbps (Fast Ethernet, 1995, IEEE
802.3u), and then to 1 Gbps (Gigabit Ethernet, 1998). In 2002, 10 Gigabit Ethernet (IEEE
802.3ae) extended Ethernet capabilities to Metropolitan and Wide Area Networks.
4. Wireless MAC Protocols
Wi-Fi, based on IEEE 802.11, uses CSMA/CA (Collision Avoidance) to manage wireless
data transmission. Key advancements include 802.11b (1999) at 11 Mbps, 802.11n (2009)
with speeds up to 600 Mbps, and 802.11ac (2013) reaching 1 Gbps.
5. Emerging Technologies
New protocols like IEEE 802.15.4 (Zigbee) for IoT, IEEE 802.16 (WiMAX) for broadband
access, and IEEE 802.3bt (Power over Ethernet) for powering devices over Ethernet cables
address evolving network needs.
6. Conclusion
MAC protocols have evolved to support faster, more reliable network communication, with
ongoing advancements driven by the demands of IoT and next-generation networks.
Types of MAC Protocol
MAC protocols are classified into three main types: Random Access Protocols, Controlled
Access Protocols, and Channelization Protocols. Here’s a brief overview of each:
3. Random Access Protocols
Random Access Protocols, or contention-based protocols, let devices access the network
medium without direct coordination. Devices transmit data whenever they need to, which can
lead to collisions if multiple devices send data at the same time. These protocols are
straightforward but can become inefficient under high traffic.
i. ALOHA: An early protocol where devices transmit data at random times and
retransmit after a random delay if a collision occurs. Slotted ALOHA improves this
by dividing time into slots, which reduces collision chances.
ii. Carrier Sense Multiple Access (CSMA): This includes CSMA/CD, used in
Ethernet, where devices listen to the channel before transmitting. If a collision is
detected during transmission, devices stop and retry after a random backoff.
CSMA/CA, used in Wi-Fi, avoids collisions by waiting for a clear channel and using
acknowledgments.
2. Controlled Access Protocols
Controlled Access Protocols use a central mechanism or protocol to manage network access,
reducing collisions by coordinating which device can transmit data.
i. Token Passing: In systems like Token Ring, a token circulates the network. Only the
device holding the token can transmit, preventing collisions by allowing only one
device to send data at a time.
ii. Polling: A central controller polls each device in turn, granting permission to
transmit. This ensures orderly access but can introduce delays.
3. Channelization Protocols
Channelization Protocols divide the communication medium into separate channels or time
slots, allowing multiple devices to transmit simultaneously without interference.
i. Time Division Multiple Access (TDMA): Allocates specific time slots to each
device, ensuring no overlap in transmissions.
ii. Frequency Division Multiple Access (FDMA): Divides the frequency spectrum into
bands, with each device using a different band.
iii. Code Division Multiple Access (CDMA): Uses unique codes to modulate signals,
enabling simultaneous transmission over the same frequency band with each signal
distinguished by its code.
CSMA/CA Protocol and It’s Working
Carrier Sense Multiple Access (CSMA/CA):
It is a network protocol for carrier transmission that operates in the Medium Access
Control (MAC) layer. In contrast to CSMA/CD (Carrier Sense Multiple Access/Collision
Detection) that deals with collisions after their occurrence, CSMA/CA prevents collisions
prior to their occurrence.
Algorithm:
The algorithm of CSMA/CA is:
When a frame is ready, the transmitting station checks whether the channel is idle or
busy.
If the channel is busy, the station waits until the channel becomes idle.
If the channel is idle, the station waits for an Inter-frame gap (IFG) amount of time
and then sends the frame.
After sending the frame, it sets a timer.
The station then waits for acknowledgement from the receiver. If it receives the
acknowledgement before expiry of timer, it marks a successful transmission.
Otherwise, it waits for a back-off time period and restarts the algorithm.
Fig 1. (CSMA/CA) Working
Token Passing Protocol & It’s Working
Token Passing:
A network access method where a token circulates around the network. Only the device
holding the token can transmit data. This protocol prevents collisions by ensuring only one
device transmits at a time, providing orderly and collision-free communication.
It was developed in the early 1980’s by IBM for a local area network or LAN.
It was in direct competition with Ethernet. During 80’s and the 90’s, there was a great
debate about which technology should be used for a LAN.
The token, an empty frame, is continuously circulated on the ring.
The empty token has three fields: Start delimiter, Access control and end delimiter.
The token is like a taxi, moving on a loop in a neighbourhood. If a workstation
doesn’t have anything to transmit, it passes the token along.
If it does have something to transmit, it catches the token and attaches data and sends
it back to the ring. In a token ring network, the media access method is called token
passing.
When a workstation wants to transmit data, it should hold the token until it is done. If
any other hosts want to send data, they should wait.
Fig 5: Token Passing
Advantages
Here are some advantages of Mac Protocols
1.Efficient Use of Network Resources:
MAC protocols coordinate data transmission, minimizing waste of bandwidth and ensuring
the channel is used effectively.
2.Collision Avoidance:
They prevent data collisions by managing when and how devices can transmit, reducing the
need for retransmissions.
3.Fair Access:
They provide a fair opportunity for all devices to access the network, preventing any single
device from monopolizing the medium.
4.Improved Network Performance:
By reducing collisions and optimizing access, MAC protocols enhance overall network
performance and reduce delays.
5.Scalability:
MAC protocols adapt to increasing numbers of devices, maintaining performance as the
network grows.
6.Increased Reliability:
They help maintain a stable connection by managing how devices access the network,
reducing the likelihood of errors and data loss.
7.Traffic Management:
MAC protocols can handle different types of network traffic, including bursty and continuous
data, ensuring smooth operation under various conditions.
8.Support for Multiple Devices:
They enable multiple devices to share the same network medium without interference,
allowing for simultaneous communication.
9.Adaptability:
MAC protocols adjust to varying network conditions and traffic loads, optimizing access and
performance dynamically.
10.Reduced Network Congestion:
By managing access and preventing collisions, MAC protocols help reduce network
congestion and improve the efficiency of data transmission.
Disadvantages
Here are some disadvantages of MAC (Media Access Control) protocols:
1.Overhead and Complexity:
Implementing MAC protocols can add overhead and complexity to the network, which might
impact performance and require additional processing power.
2.Collision Detection Delays:
In protocols like CSMA/CD, detecting and managing collisions can introduce delays,
especially in high-traffic environments.
3.Latency:
Some MAC protocols, such as polling-based ones, can introduce latency due to the time
required to poll each device or wait for a token.
4.Inefficiency Under High Load:
Random access protocols like ALOHA can become inefficient when many devices are
competing for the channel, leading to high collision rates and retransmissions.
5.Scalability Issues:
As the number of devices increases, managing access can become more challenging,
potentially degrading network performance.
6.Complexity in Wireless Networks:
For wireless networks, protocols like CSMA/CA can be complex and may not completely
eliminate collisions, especially in dense environments.
7.Fixed Time Slots or Channels:
In TDMA and FDMA, fixed time slots or frequency channels can lead to wasted bandwidth if
a device has no data to send during its allocated time or frequency.
8.Security Concerns:
Some MAC protocols may not have built-in security features, making them vulnerable to
unauthorized access and attacks.
9.Resource Allocation:
Protocols that allocate specific resources, like time slots or frequencies, may not be flexible
enough to handle dynamic network conditions effectively.
10.Increased Hardware Requirements:
Some MAC protocols may require specialized hardware or additional components, increasing
the cost and complexity of the network setup.
Future Scope
The future scope of MAC (Media Access Control) protocols is influenced by advancements
in technology and evolving network requirements. Here are several key areas where MAC
protocols are expected to develop:
1.Enhanced Wireless Communication:
As wireless technologies like 5G and beyond become more prevalent, MAC protocols will
need to adapt to manage higher data rates, lower latency, and increased device density.
2.Internet of Things (IoT):
With the growth of IoT devices, MAC protocols will evolve to handle the unique demands of
low-power, low-data-rate devices, and ensure efficient communication in highly congested
environments.
3.Integration with Machine Learning:
Machine learning and artificial intelligence are being explored to optimize MAC protocol
performance. Predictive algorithms could enhance collision avoidance and improve network
efficiency based on real-time traffic patterns.
4.Support for High-Throughput Applications:
Emerging applications requiring high throughput, such as virtual reality and augmented
reality, will drive the development of MAC protocols that can support large data transfers
with minimal latency.
5.Energy Efficiency:
As energy conservation becomes more critical, especially in battery-operated devices, MAC
protocols will focus on reducing energy consumption through advanced power-saving
techniques and adaptive strategies.
6.Security Enhancements:
With increasing cybersecurity threats, future MAC protocols will incorporate stronger
security features to protect data integrity and prevent unauthorized access and attacks.
7.Adaptive and Flexible Protocols:
Future MAC protocols will likely become more adaptive and flexible, capable of adjusting to
varying network conditions and diverse traffic patterns dynamically.
8.Network Slicing and Virtualization:
With the rise of network slicing and virtualization, MAC protocols will need to support
dynamic allocation of network resources across virtual networks, ensuring efficient operation
in virtualized environments.
Conclusion
Media Access Control (MAC) protocols are fundamental to managing how devices share and
access a communication medium in various network environments. Their evolution has been
driven by the need for efficient, reliable, and fair communication in increasingly complex and
high-demand networks.
The primary MAC protocols—Random Access, Controlled Access, and Channelization—
each offer distinct advantages suited to different network scenarios. Random Access
protocols, such as ALOHA and CSMA, are valued for their simplicity but face challenges
under heavy traffic. Controlled Access protocols, like Token Passing and Polling, provide
orderly access but can introduce latency. Channelization protocols, including TDMA,
FDMA, and CDMA, optimize bandwidth usage by dividing the medium into separate
channels or time slots, offering efficiency in high-traffic conditions.
As technology advances, the scope of MAC protocols continues to expand. Future
developments will focus on enhancing wireless communication, supporting the growing
Internet of Things (IoT), integrating with machine learning, and improving energy efficiency.
Additionally, advancements in security, interoperability, and adaptability will play crucial
roles in addressing the demands of modern and future networks.
In summary, MAC protocols are vital for maintaining network efficiency and reliability.
Their ongoing evolution reflects the dynamic nature of technology and the increasing
complexity of network environments. Understanding and developing these protocols are key
to meeting future communication challenges and achieving optimal network performance.
References
https://www.tutorialspoint.com/classifiaction-of-mac-protocols
https://www.geeksforgeeks.org/multiple-access-protocols-in-computer-network/
https://en.wikipedia.org/wiki/multiple-access-with-collision-avoidance-for-wireless