Properties of MAC Protocols
Properties of MAC Protocols
1. It should implement some roles that helps to enforce discipline when multiple nodes
contend for a shared channel.
Sender, receiver, and observer roles are frequently used by MAC protocols to control traffic jams
for the shared channel. By developing guidelines for access, collision detection, and dispute
resolution, these roles aid in maintaining discipline. For instance, nodes in CSMA/CD (Carrier
Sense Multiple Access with Collision Detection) wait for a random backoff period before retrying
if a collision is detected. Before sending, nodes listen for a clear channel.
Optimization of Channel use. By effectively allocating and scheduling resources, MAC protocols
seek to optimize channel use. They accomplish this by utilizing strategies including traffic priority,
dynamic channel allocation, and effective collision avoidance methods. To ensure that every node
has dedicated access to the channel during its designated time slot, TDMA (Time Division
Multiple Access) divides the channel into time slots.
Fair Channel Allocation. To avoid any node being unjustly disadvantaged or suffering excessive
delays, MAC protocols work to allocate channels fairly. Techniques like distributed coordination
systems, weighted fair queuing, and round-robin scheduling can be used to achieve fairness. For
instance, in IEEE 802.11 networks, the congestion window size is dynamically changed to
guarantee equitable access for every node.
4. It should be capable of supporting several types of traffic having different maximum and
average bit rates
Support for Diverse Traffic Types. MAC protocols need to be able to handle a wide range of traffic
kinds, each with its own bit rate and quality of service specifications. They accomplish this by
putting in place systems for adaptive modulation and coding schemes, traffic prioritization, and
quality of service (QoS) provisioning. For example, the IEEE 802.11e amendment brought QoS
features to prioritize traffic based on service classes in Wi-Fi networks.
5. It should be robust in the face equipment failure and changing network condition