0% found this document useful (0 votes)
92 views2 pages

Properties of MAC Protocols

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
92 views2 pages

Properties of MAC Protocols

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Topic 3: Properties of MAC Protocols

1. It should implement some roles that helps to enforce discipline when multiple nodes
contend for a shared channel.

Sender, receiver, and observer roles are frequently used by MAC protocols to control traffic jams
for the shared channel. By developing guidelines for access, collision detection, and dispute
resolution, these roles aid in maintaining discipline. For instance, nodes in CSMA/CD (Carrier
Sense Multiple Access with Collision Detection) wait for a random backoff period before retrying
if a collision is detected. Before sending, nodes listen for a clear channel.

2. It should help maximize the utilization of the channel

Optimization of Channel use. By effectively allocating and scheduling resources, MAC protocols
seek to optimize channel use. They accomplish this by utilizing strategies including traffic priority,
dynamic channel allocation, and effective collision avoidance methods. To ensure that every node
has dedicated access to the channel during its designated time slot, TDMA (Time Division
Multiple Access) divides the channel into time slots.

3. Channel allocation need to be fair. No mode should be discriminated against at anytime


and made to Wait for an unduly long time for transmission

Fair Channel Allocation. To avoid any node being unjustly disadvantaged or suffering excessive
delays, MAC protocols work to allocate channels fairly. Techniques like distributed coordination
systems, weighted fair queuing, and round-robin scheduling can be used to achieve fairness. For
instance, in IEEE 802.11 networks, the congestion window size is dynamically changed to
guarantee equitable access for every node.

4. It should be capable of supporting several types of traffic having different maximum and
average bit rates

Support for Diverse Traffic Types. MAC protocols need to be able to handle a wide range of traffic
kinds, each with its own bit rate and quality of service specifications. They accomplish this by
putting in place systems for adaptive modulation and coding schemes, traffic prioritization, and
quality of service (QoS) provisioning. For example, the IEEE 802.11e amendment brought QoS
features to prioritize traffic based on service classes in Wi-Fi networks.

5. It should be robust in the face equipment failure and changing network condition

Robustness to Equipment Failure and Network Changes. To guarantee dependable


communication, MAC protocols must be robust to equipment failures and shifting network
conditions. Adaptive algorithms, redundancy, and fault tolerance techniques help them accomplish
this. For instance, in Ethernet networks, redundant links and spanning tree protocols are employed
to preserve network stability in the event of equipment failures, and in cellular networks, the MAC
layer may use handover methods to maintain connectivity while mobile devices move between
cells.

You might also like