• Skip to main content
  • Skip to primary sidebar
  • Skip to secondary sidebar
  • Skip to footer

Computer Notes

Library
    • Computer Fundamental
    • Computer Memory
    • DBMS Tutorial
    • Operating System
    • Computer Networking
    • C Programming
    • C++ Programming
    • Java Programming
    • C# Programming
    • SQL Tutorial
    • Management Tutorial
    • Computer Graphics
    • Compiler Design
    • Style Sheet
    • JavaScript Tutorial
    • Html Tutorial
    • Wordpress Tutorial
    • Python Tutorial
    • PHP Tutorial
    • JSP Tutorial
    • AngularJS Tutorial
    • Data Structures
    • E Commerce Tutorial
    • Visual Basic
    • Structs2 Tutorial
    • Digital Electronics
    • Internet Terms
    • Servlet Tutorial
    • Software Engineering
    • Interviews Questions
    • Basic Terms
    • Troubleshooting
Menu

Header Right

Home » Networking » Communication » Media Access Control (MAC layer) – Definition
Next →
← Prev

Media Access Control (MAC layer) – Definition

By Dinesh Thakur

Definition: Media access control (MAC) and logical link control (LLC) are the sublayers of the data link layer (Layer 2) in OSI Reference Model. ‘MAC’ is also refer to as MAC layer. It use MAC protocols to provides unique addressing identification and channel access control mechanism for network nodes to communicate with other nodes across a shared channel.

MAC describes the process that is employed to control the basis on which devices can access the shared network. Some level of control is required to ensure the ability of all devices to access the network within a reasonable period of time, thereby resulting in acceptable access and response times.

It is also important that some method exists to either detect or avoid data collisions, which are caused by multiple transmissions being placed on the shared medium simultaneously. Media Access Control can be accomplished on either a centralized or decentralized basis, and can be characterized as either deterministic or non-deterministic in nature.

We’ll be covering the following topics in this tutorial:

  • Centralized Control
  • Deterministic Access
  • Non-deterministic Access

Centralized Control

A centralized controller polls devises to determine when access and transmission by each station is allowed to occur. Stations transmit when requested to do so, or when a station transmission request is acknowledged and granted. This process of polling requires the passing of control packets, adding overhead and reducing the amount of throughput relative to the raw bandwidth available. Additionally, the failure of the central controller will disrupt the entire network; in such an event, the controller is taken off-line and a backup controller assumes responsibility. Centrally, controlled networks generally employ deterministic access control; Token Ring and FDDl networks are centrally controlled.

Deterministic Access

Deterministic access is a media access control convention that allows both the centralized master station and each slaved station to determine the maximum length of time which will pass before access is provided to the network. In other words, each station can be guaranteed the right to communicate within a certain time frame. Additionally, the system administrator can assign access priorities. Deterministic access is also known as noncontentious, because the devices do not contend for access, rather access is controlled on a centralized basis.

Deterministic access employs token passing. The token, which consists of a specific bit pattern, indicates the status of the network whether it is available or unavailable. The token is generated by a centralized master control station and transmitted across the network. The station in possession of the token is in control of access to the network. It may transmit or may require other stations to respond. After transmitting, the station will pass the token to a successor station in a predetermined sequence while the process is complex and overhead intensive, it yields careful control over the network.

Deterministic access is especially effective in high-traffic environments where a lack of control would cause chaos in the form of frequent data collisions.

General characteristics of token-based networks include a high level of access control, which is centralized. Access delay is measured and assured, with priority access being supported. Throughput is very close to raw bandwidth, as data collisions are avoided; throughput also improves under load, although absolute overhead is higher than is the case with non-deterministic access techniques. Deterministic access standards include Token-Passing Ring, IBM Token Ring, and Token-Passing Bus.

Token-based LAN technologies are somewhat overhead intensive, due to the token passing and management processes. However, they can more than compensate for that fact by virtue of the avoidance of data collisions. Token Ring, for instance comes in 4, 16and 20 Mbps. In each case bandwidth utilization is virtually 100%.

Non-deterministic Access

Non-deterministic media access control, places access control responsibilities on the individual stations. This is popularly known as Carrier Sense Multiple Access (CSMA), and is most effective in low-traffic environments. There are two variations, CSMA/CD and CSMA/CA.

CSMA is a decentralized, contentious media access control method used in Ethernet and other bus oriented LANs. Each of multiple stations, or nodes, must sense the carrier to determine network availability before access to the medium to transmit data: further, each station must monitor the network to determine if a collision has occurred. Collisions render the transmission invalid and require retransmission. In the event of a busy condition, the station will back off the network for a calculated random time interval before attempting subsequent access.

CSMA is implemented in two standard means, CSMA/CD and CSMA/CA. In either case, latency and throughput degrade under heavy loads of traffic. For example, an Ethernet network running at a theoretical speed of 10Mbps typically provides about 4 to 6 Mbps throughput. While it is less costly than Token Ring networking, it also delivers less efficient use of bandwidth.

Carrier Sense Multiple Access with Collision Detection (CSMA/CD).This is the most common media access control method used in bus networks. At that point, all devices back off the network, calculating. a random time interval before attempting a retransmission .

Carrier Sense Multiple Access/Collision Avoid (CSMA/CA). This includes a priority scheme to guarantee the transmission privileges of high-priority stations. CSMA/CA requires a delay in network activity after each transmission is completed. That delay is proportionate to the priority level of each device, with high-priority nodes programmed for short delays and with low-priority nodes programmed for relatively long delays. As collisions may still occur, they are managed either through Collision Detect or through retransmission after receipt of a Negative Acknowledgment (NAK). CSMA/CA is more expensive to implement, as it requires that additional programmed logic be embedded in each device or NIC. CSMA/CA does, however, offer the advantage of improved access control, which serves to reduce collisions and, thereby, improve the overall performance of the network.

You’ll also like:

  1. What is MAC address (Media Access Control)? – Definition
  2. MAC Layer – What is MAC Layer Protocols?
  3. Functions of the MAC Layer
  4. What is the Network Layer? – Definition
  5. What is Data-Link layer? – Definition
Next →
← Prev
Like/Subscribe us for latest updates     

About Dinesh Thakur
Dinesh ThakurDinesh Thakur holds an B.C.A, MCDBA, MCSD certifications. Dinesh authors the hugely popular Computer Notes blog. Where he writes how-to guides around Computer fundamental , computer software, Computer programming, and web apps.

Dinesh Thakur is a Freelance Writer who helps different clients from all over the globe. Dinesh has written over 500+ blogs, 30+ eBooks, and 10000+ Posts for all types of clients.


For any type of query or something that you think is missing, please feel free to Contact us.


Primary Sidebar

Networking

Networking Tutorials

  • Network - Home
  • Network - Uses
  • Network - Advantages
  • Network - Classification
  • Network - Architecture Type
  • Nework - Networks Vs Comms

Networking Devices

  • Network - Modem
  • Network - Routers Types
  • Network - Bluetooth
  • Network - RS-232C
  • Network - Hub
  • Network - Devices
  • Network - Bridges
  • Network - Repeaters
  • Network - Routers
  • Network - Switching Hubs
  • Network - Transceiver
  • Network - Multiplexer
  • Network - Gateway
  • Network - BNC Connector
  • Network - Optical Connectors
  • Network - NICs
  • Networking Protocol

  • Protocol - Definition
  • Protocol - IP
  • Protocol - Aloha
  • Protocol - MAC Layer
  • Protocol - Sliding Window
  • Protocol - Stop & Wait
  • Protocol - Network Protocols
  • Protocol - Token Passing
  • Protocol - SIP
  • Protocol - Ad-Hoc Networks Routing
  • Protocol - Lap-f
  • Protocol - Point-to-Point
  • Protocol - PPP
  • Protocol - PPP Phases
  • Protocol - LDP
  • Protocol - MPLS
  • Protocol - MPOA
  • Protocol - HDLC
  • Protocol - Distance Vector routing
  • Protocol - IGMP
  • Protocol - ICMP
  • Protocol - SLIP
  • Protocol - DVMRP
  • Protocol - SDLC
  • Protocol - Routing
  • Protocol - UDP
  • Protocol - ARP and RARP
  • Protocol - Link-State
  • Protocol - ARP Table
  • Protocol - RTP
  • Protocol - NHRP
  • Network Addressing

  • Addressing - Home
  • Addressing - SubNetting
  • Addressing - Classless
  • Addressing - Classes or Classful
  • Addressing - IPV4 vs IPV6
  • Addressing - IPv6
  • Addressing - Subnet Mask
  • Addressing - MAC Address
  • Addressing - Supernetting
  • Addressing - Private IP
  • Addressing - IPv4
  • Addressing - Public IP
  • Addressing - Multihomed
  • Addressing - Indirect Addressing
  • Addressing - ASP
  • Addressing - VLSM
  • Addressing - Routing Algorithms
  • Addressing - Hierarchical Routing
  • Addressing - Routing
  • Addressing - Distributed Routing
  • Addressing - Data Routing
  • Addressing - Services
  • Addressing - IP forwarding
  • Addressing - Aging
  • Addressing - Algorithm CR
  • Networking Media

  • Transmission - Home
  • Transmission - Modes
  • Transmission - Media
  • Transmission - System
  • Transmission - Bound
  • Transmission - Unbound
  • Transmission - Baseband
  • Transmission - Wired
  • Transmission - Fiber Benfits
  • Transmission - Infrared
  • Transmission - UnGuided
  • Transmission - Microwave
  • Transmission - Infrared
  • Transmission - Radio Wave
  • Transmission - Network
  • Transmission - Digital Signal
  • Transmission - Data
  • Transmission - Asynchronous
  • Transmission - Sync Vs Async
  • Cable - Twisted-Pair
  • Cable - Coaxial
  • Cable - UTP and STP
  • Cable - Fiber Optics
  • Cable - Gigabit Ethernet
  • Cable - Fast Ethernet
  • Cable - Ethernet Cable
  • Cable - Fiber-Optic Using
  • Cable - CATV
  • Cable - 100Base T
  • Cable - 10BASE T
  • Cable - 10 Base 2
  • Cable - 10 Base 5
  • Networking Types

  • IEEE - 802.11
  • IEEE - 802.5
  • IEEE - 802.15
  • IEEE - 802.11e
  • IEEE - 802.11n
  • Network - Ethernet
  • Network - Arpanet
  • Network - Frame Relay
  • Network - X.25
  • Network - Telephone
  • Network - WSN
  • Network - Metro Ethernet
  • Network - WAN Ethernet
  • Network - Wireless Mesh
  • Network - SAN
  • Network - SNA
  • Network - Cisco Architecture
  • Network - Vlan
  • Network - FDDI
  • Network - 100VG-Any
  • Network - EPON
  • Network - ISDN
  • Network - ARCNet
  • Network - Passive Optical
  • Networking Reference Models

  • Models - TCP/IP
  • Models - OSI
  • Models - MAC Layer
  • Models - Network Layer
  • Models - MAC Layer Functions
  • Models - TCP/IP Vs OSI
  • Models - CSMA
  • Models - CSMA/CD
  • Models - CSMA/CA
  • Models - CDMA
  • Models - STDM
  • Models - FDMA
  • Models - TDMA
  • Models - SDH
  • Models - CDM
  • Models - Multiplexing
  • Models - Reference
  • Models - Random Access Methods
  • Models - TCP/IP Architecture
  • Models - FDM
  • Models - IP Header
  • Models - OTN
  • Models - Amplitude Levels
  • Models - MIMO
  • Models - Plesiochronous Media
  • Models - Half Duplex
  • Models - ISO Architecture
  • Models - Data-Link Layer
  • Models - WDM
  • Models - Duplex
  • Models - Ethernet FDSE
  • Networking Switching Techniques

  • Switching - Home
  • Switching - Techniques
  • Switching - Packet
  • Switching - Circuit
  • Switching - Message
  • Switching - Packet Vs virtual Circuit
  • Switching - Cell
  • Switching - ATM Cell Structure
  • Switching - Virtual Circuit Vs Datagram
  • Switching - Time Space
  • Switching - Modulation
  • Switching - Cell Relay
  • Switching - ATM Structure
  • Switching - VC Vs PVC
  • Switching - Packet and Circuit
  • Switching - VPC
  • Switching - IP
  • Switching - Logical Channels
  • Switching - TDM
  • Switching - FDM
  • Network Codes

  • Codes - CRC
  • Codes - Error Correction and Detection
  • Codes - Hamming
  • Codes - Piggybacking
  • Codes - Encoding Techniques
  • Codes - Error Control
  • Codes - Parity Check
  • Codes - Parity bit
  • Codes - Bit Error
  • Codes - CRC
  • Codes - Transmission Errors
  • Codes - Error Detection and Correction
  • Network Communication

  • Communication - Home
  • Communication - Satellite
  • Communication - Wireless
  • Communication - Data Type
  • Communication - Congestion Control
  • Communication - Network
  • Communication - Data
  • Communication - Software
  • Communication - Layering Process
  • Networking Signaling

  • Signal - Analog
  • Signal - Digital
  • Signal - Analog Vs Digital
  • Signal - Digitization
  • Network Security

  • Security - Home
  • Security - Requirements
  • Security - Threats
  • Security - Services

Other Links

  • Networking - PDF Version

Footer

Basic Course

  • Computer Fundamental
  • Computer Networking
  • Operating System
  • Database System
  • Computer Graphics
  • Management System
  • Software Engineering
  • Digital Electronics
  • Electronic Commerce
  • Compiler Design
  • Troubleshooting

Programming

  • Java Programming
  • Structured Query (SQL)
  • C Programming
  • C++ Programming
  • Visual Basic
  • Data Structures
  • Struts 2
  • Java Servlet
  • C# Programming
  • Basic Terms
  • Interviews

World Wide Web

  • Internet
  • Java Script
  • HTML Language
  • Cascading Style Sheet
  • Java Server Pages
  • Wordpress
  • PHP
  • Python Tutorial
  • AngularJS
  • Troubleshooting

 About Us |  Contact Us |  FAQ

Dinesh Thakur is a Technology Columinist and founder of Computer Notes.

Copyright © 2025. All Rights Reserved.

APPLY FOR ONLINE JOB IN BIGGEST CRYPTO COMPANIES
APPLY NOW