The Media Access Control (MAC) data communication Networks protocol sub-layer, also known as the Medium Access Control, is a sub-layer of the data link layer specified in the seven-layer OSI model. The medium access layer was made necessary by systems that share a common communications medium. Typically these are local area networks. The MAC layer is the “low” part of the second OSI layer, the layer of the “data link”. In fact, the IEEE divided this layer into two layers “above” is the control layer the logical connection (Logical Link Control, LLC) and “down” the control layer The medium access (MAC).
The LLC layer is standardized by the IEEE as the 802.2 since the beginning 1980 Its purpose is to allow level 3 network protocols (for eg IP) to be based on a single layer (the LLC layer) regardless underlying protocol used, including WiFi, Ethernet or Token Ring, for example. All WiFi data packets so carry a pack LLC, which contains itself packets from the upper network layers. The header of a packet LLC indicates the type of layer 3 protocol in it: most of the time, it is IP protocol, but it could be another protocol, such as IPX (Internet Packet Exchange) for example. Thanks to the LLC layer, it is possible to have at the same time, on the same network, multiple Layer 3 protocols.
In LAN nodes uses the same communication channel for transmission. The MAC sub-layer has two primary responsibilities:
Data encapsulation, including frame assembly before transmission, and frame parsing/error detection during and after reception. Media access control, including initiation of frame transmission and recovery from transmission failure.
FollowingProtocols are used by Medium Access Layer :
S-MAC is a medium-access control (MAC) protocol designed for wireless sensor networks. Wireless sensor networks use battery-operated computing and sensing devices. A network of these devices will collaborate for a common application such as environmental monitoring. Time-critical applications. The MAC protocol for ad-hoc networks should consider the constraint of ad-hoc networks. Synchronization can be achieved by exchange of control packets. The main issues need to be addressed while designing a MAC protocol for ad hoc wireless networks; Hidden and exposed terminal problems; Hidden nodes. There are media access control (MAC) protocols designed specifically for wireless sensor networks. INET has several such protocol implementations, alongside IEEE 802.15.4 models. This showcase consists of two parts. In Part 1, we demonstrate three wireless sensor network MAC protocols with three example simulations of a wireless sensor network.
ALOHA : ALOHA is a system for coordinating and arbitrating access to a shared communication channel. It was developed in the 1970s at the University of Hawaii. The original system used terrestrial radio broadcasting, but the system has been implemented in satellite communication systems. A shared communication system like ALOHA requires a method of handling collisions that occur when two or more systems attempt to transmit on the channel at the same time.
In the ALOHA system, a node transmits whenever data is available to send. If another node transmits at the same time, a collision occurs, and the frames that were transmitted are lost. However, a node can listen to broadcasts on the medium, even its own, and determine whether the frames were transmitted.
Carrier Sensed Multiple Access (CSMA) : CSMA is a network access method used on shared network topologies such as Ethernet to control access to the network. Devices attached to the network cable listen (carrier sense) before transmitting. If the channel is in use, devices wait before transmitting. MA (Multiple Access) indicates that many devices can connect to and share the same network. All devices have equal access to use the network when it is clear.
Even though devices attempt to sense whether the network is in use, there is a good chance that two stations will attempt to access it at the same time. On large networks, the transmission time between one end of the cable and another is enough that one station may access the cable even though another has already just accessed it. There are two methods for avoiding these so-called collisions, listed here :
CSMA/CD (Carrier Sense Multiple Access/Collision Detection) : CD (collision detection) defines what happens when two devices sense a clear channel, then attempt to transmit at the same time. A collision occurs, and both devices stop transmission, wait for a random amount of time, and then retransmit. This is the technique used to access the 802.3 Ethernet network channel.
This method handles collisions as they occur, but if the bus is constantly busy, collisions can occur so often that performance drops drastically. It is estimated that network traffic must be less than 40 percent of the bus capacity for the network to operate efficiently. If distances are long, time lags occur that may result in inappropriate carrier sensing, and hence collisions.
CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) : In CA collision avoidance), collisions are avoided because each node signals its intent to transmit before actually doing so. This method is not popular because it requires excessive overhead that reduces performance.
Ethernet : IEEE 802.3 Local Area Network (LAN) Protocols : Ethernet protocols refer to the family of local-area network (LAN)covered by the IEEE 802.3. In the Ethernet standard, there are two modes of operation: half-duplex and full-duplex modes. In the half duplex mode, data are transmitted using the popular Carrier-Sense Multiple Access/Collision Detection (CSMA/CD) protocol on a shared medium.
The main disadvantages of the half-duplex are the efficiency and distance limitation, in which the link distance is limited by the minimum MAC frame size. This restriction reduces the efficiency drastically for high-rate transmission. Therefore, the carrier extension technique is used to ensure the minimum frame-size of 512 bytes in Gigabit Ethernet to achieve a reasonable link distance.Four data rates are currently defined for operation over optical-fiber and twisted-pair cables :
10 Mbps – 10Base-T Ethernet (IEEE 802.3)
100 Mbps – Fast Ethernet (IEEE 802.3u)
1000 Mbps – Gigabit Ethernet (IEEE 802.3z)
10-Gigabit – 10 Gbps Ethernet (IEEE 802.3ae).
The Ethernet System consists of three basic elements :
(1) The physical medium used to carry Ethernet signals between computers,
(2) a set of medium access control rules embedded in each Ethernet interface that allow multiple computers to fairly arbitrate access to the shared Ethernet channel, and
Mac Layer Protocols For Wireless Networks
(3) an Ethernet frame that consists of a standardized set of bits used to carry data over the system.
As with all IEEE 802 protocols, the ISO data link layer is divided into two IEEE 802 sub-layers, the Media Access Control (MAC) sub-layer and the MAC-client sub-layer. The IEEE 802.3 physical layer corresponds to the ISO physical layer.
Each Ethernet-equipped computer operates independently of all other stations on the network: there is no central controller. All stations attached to an Ethernet are connected to a shared signaling system, also called the medium. To send data a station first listens to the channel, and when the channel is idle the station transmits its data in the form of an Ethernet frame, or packet.
After each frame transmission, all stations on the network must contend equally for the next frame transmission opportunity. Access to the shared channel is determined by the medium access control (MAC) mechanism embedded in the Ethernet interface located in each station. The medium access control mechanism is based on a system called Carrier Sense Multiple Access with Collision Detection (CSMA/CD).
As each Ethernet frame is sent onto the shared signal channel, all Ethernet interfaces look at the destination address. If the destination address of the frame matches with the interface address, the frame will be read entirely and be delivered to the networking software running on that computer. All other network interfaces will stop reading the frame when they discover that the destination address does not match their own address.
Mac Protocols For Wireless Networks
IEEE 802.4 Token Bus : In token bus network station must have possession of a token before it can transmit on the network. The IEEE 802.4 Committee has defined token bus standards as broadband networks, as opposed to Ethernet’s baseband transmission technique. The topology of the network can include groups of workstations connected by long trunk cables.
These workstations branch from hubs in a star configuration, so the network has both a bus and star topology. Token bus topology is well suited to groups of users that are separated by some distance. IEEE 802.4 token bus networks are constructed with 75-ohm coaxial cable using a bus topology. The broadband characteristics of the 802.4 standard support transmission over several different channels simultaneously.
The token and frames of data are passed from one station to another following the numeric sequence of the station addresses. Thus, the token follows a logical ring rather than a physical ring. The last station in numeric order passes the token back to the first station. The token does not follow the physical ordering of workstation attachment to the cable. Station 1 might be at one end of the cable and station 2 might be at the other, with station 3 in the middle.
While token bus is used in some manufacturing environments, Ethernet and token ring standards have become more prominent in the office environment.
Wireless Protocol 802
IEEE 802.5 Token Ring : Token ring is the IEEE 802.5 standard for a token-passing ring network with a star-configured physical topology. Internally, signals travel around the network from one station to the next in a ring. Physically, each station connects to a central hub called a MAU (multi-station access unit). The MAU contains a “collapsed ring,” but the physical configuration is a star topology. When a station is attached, the ring is extended out to the station and then back to the MAU .
If a station goes offline, the ring is reestablished with a bypass at the station connector. Token ring was popular for an extended period in the late 1980s and 1990s, especially in IBM legacy system environments. IBM developed the technology and provided extensive support for connections to SNA systems. More recently, Ethernet, Fast Ethernet, and Gigabit Ethernet technologies have pushed token ring and other LAN technologies to the sidelines.
You’ll also like:
1. Contention-based: The Contention based protocols are used to avoid the hidden terminal problem. But the problems with these are idle listening, collision avoidance, and overhearing. IEEE 802.11, S-MAC are examples of this category
2. Reservation–based: TDMA protocols are based on reservation and scheduling. They have less energy-consumption compared to Contention based Protocols. Bluetooth is an example of TDMA based protocol
A. IEEE 802.11 Distributed Coordination Function
IEEE 802.11(DCF) is widely used contention-based protocol in wireless sensor networks. The DCF is a random channel-access scheme where every station begins its transmission based on…show more content…
Besides there is possibility of re-transmission of collided packets
The above three reasons are major sources for energy-wastage in conventional protocols They are avoided in Sensor MAC using two techniques: Periodic Sleeping and Adaptive Listening
Periodic Sleeping:-
Node must first listen to their neighboring nodes before starting their own listen and sleep schedules .There are two options for the Sensor Node
1. If the sensor node listens the schedule of any of the neighboring node ,then it becomes follower
2. If the sensor node doesn’t listen to any schedule from the neighboring nodes then it frames its own schedule and becomes Synchronizer. It broadcasts its own schedule
If the nodes don’t aware of each other, Periodic Neighboring node discovery solves the problem Advantages
Due to Periodic Sleeping there is Reduction in Energy Consumption
Disadvantages
Due to periodic sleeping increase in latency occurs
Adaptive Listening:-
Adaptive Listening reduces the delay caused by Periodic Sleeping. In this technique, if the node overhears its neighbor’s transmission, it wakes up at the end of transmission for a short period of time. if