The document discusses the MAC (Media Access Control) sublayer of the data link layer. It describes MAC addresses as unique 48-bit identifiers for network interfaces. MAC addresses are used by the MAC sublayer for addressing at the data link layer. The document also covers the different types of MAC addresses like unicast, multicast, and broadcast and provides examples. It classifies MAC protocols and discusses responsibilities of MAC protocols. Specific MAC protocols like ALOHA and slotted ALOHA are explained along with examples.
The document discusses the MAC (Media Access Control) sublayer of the data link layer. It describes MAC addresses as unique 48-bit identifiers for network interfaces. MAC addresses are used by the MAC sublayer for addressing at the data link layer. The document also covers the different types of MAC addresses like unicast, multicast, and broadcast and provides examples. It classifies MAC protocols and discusses responsibilities of MAC protocols. Specific MAC protocols like ALOHA and slotted ALOHA are explained along with examples.
The document discusses the MAC (Media Access Control) sublayer of the data link layer. It describes MAC addresses as unique 48-bit identifiers for network interfaces. MAC addresses are used by the MAC sublayer for addressing at the data link layer. The document also covers the different types of MAC addresses like unicast, multicast, and broadcast and provides examples. It classifies MAC protocols and discusses responsibilities of MAC protocols. Specific MAC protocols like ALOHA and slotted ALOHA are explained along with examples.
Dept. of Computer Science Engg. National Institute of Technology Rourkela-769008 Email: suchismita@nitrkl.ac.in 19-12-2020 Advance Computer Networks 1 MAC –Sub Layer • In IEEE 802 standard, Data Link Layer is divided into two sublayers – 1.Logical Link Control(LLC) Sublayer 2.Media Access Control(MAC) Sublayer • MAC layer responsibility – Channel allocation • Static (TDMA / FDMA) • Dynamic ( Carrier sensing , slotted time, Collision Detection)
19-12-2020 Advance Computer Networks 2
MAC Address • MAC Addresses are unique 48-bits hardware number of a computer, which is embedded into network card (known as Network Interface Card) during the time of manufacturing. • MAC Address is also known as Physical Address of a network device • MAC address is used by Media Access Control (MAC) sublayer of Data-Link Layer. • MAC Address is word wide unique, since millions of network devices exists and we need to uniquely identify each.
19-12-2020 Advance Computer Networks 3
Format of MAC address
19-12-2020 Advance Computer Networks 4
• MAC Address is a 12-digit hexadecimal number (6-Byte binary number), which is mostly represented by Colon-Hexadecimal notation. • First 6-digits (say 00:40:96) of MAC Address identifies the manufacturer, called as OUI (Organizational Unique Identifier). • IEEE Registration Authority Committee assign these MAC prefixes to its registered vendors. For ex:
19-12-2020 Advance Computer Networks 5
MAC Address contd.. • The rightmost six digits represents Network Interface Controller, which is assigned by manufacturer. • How to find MAC address:
19-12-2020 Advance Computer Networks 6
Types of MAC Addresses:: Unicast • A Unicast addressed frame is only sent out to the interface leading to specific NIC. • If the LSB (least significant bit) of first octet of an address is set to zero, the frame is meant to reach only one receiving NIC. • MAC Address of source machine is always Unicast.
19-12-2020 Advance Computer Networks 7
Example Unicast (HDLC)
19-12-2020 Advance Computer Networks 8
Multicast • Multicast address allow the source to send a frame to group of devices. • In Layer-2 (Ethernet) Multicast address, LSB (least significant bit) of first octet of an address is set to one. • IEEE has allocated the address block 01-80-C2-xx-xx-xx (01-80-C2-00- 00-00 to 01-80-C2-FF-FF-FF) for group addresses for use by standard protocols.
19-12-2020 Advance Computer Networks 9
Example Multicast
19-12-2020 Advance Computer Networks 10
Broadcast • Similar to Network Layer, Broadcast is also possible on underlying layer( Data Link Layer). • Ethernet frames with ones in all bits of the destination address (FF- FF-FF-FF-FF-FF) are referred as broadcast address. • Frames which are destined with MAC address FF-FF-FF-FF-FF-FF will reach to every computer belong to that LAN segment.
19-12-2020 Advance Computer Networks 11
Example: broadcast
19-12-2020 Advance Computer Networks 12
MAC Protocols Classifications • Types w.r.t. contention • Contention Free Protocols • Contention based • Binary count down • Contention free • Bitmap • Contention Based Protocols • Time • PURE ALOHA • SLOTTED ALOHA (Time) • Carrier sensing • Persistence • 1-persistence • P-persistence • Non-persistence • Collision • CSMA /CD
19-12-2020 Advance Computer Networks 13
Responsibilities of MAC Protocol • Network overhead should be low. • Efficiently allocate the bandwidth. • Distributed MAC operation. • Power control mechanism should be present. • Maximum utilization of channel. • Nodes should be sync with time.
19-12-2020 Advance Computer Networks 14
ALOHA protocol • Aloha is the type of Random access protocol. • It has two types one is Pure Aloha and another is Slotted Aloha. • In Pure Aloha, Stations transmit whenever data is available at arbitrary times and Colliding frames are destroyed. (18.4% effcn) • In Slotted aloha, A station is required to wait for the beginning of the next slot to transmit. (36.8% effcn) • vulnerable period of slotted ALOHA is halved as opposed to pure Aloha. • In Pure Aloha, The time is continuous and not globally synchronized. • In slotted ALOHA, the time is discrete and globally synchronized.