Media Access Control Protocol in Computer Network

Media Access Control Protocol in Computer Network

In computer networks, multiple access protocols are techniques used to regulate data transmission when several devices attempt to connect to the same network. These methods guarantee effective data packet transmission and reception free from interference or collisions. They aid in network traffic management, allowing all devices to efficiently and smoothly share the communication channel.

Multiple stations can access the channel at once if there isn't a dedicated link between the transmitter and the receiver, but if there is, the data link control layer is adequate.

MAC addresses are essential for communication in a network because they assist in guiding data packets to their appropriate locations. A particular device adds the recipient's MAC address to the packet while sending a message. In fact, when sending data to other devices connected to the same network, routers and switches also depend on this information.

For Example:

Imagine a group of people trying to talk on a walkie-talkie. If everyone presses the button and speaks at the same time, no one can hear anything clearly—the messages mix and get lost (just like data collision). So, they follow a rule: Only one person talks at a time, and the others wait for their turn. This rule is like a multiple access protocol, which helps manage who can "talk" (send data) and when, to avoid confusion or data loss.


Features of Media Access Control Protocol

  • The hardware's globally unique MAC address is thought to be its distinguishing number. This enables us to recognize any device in a network that is connected. 
  • Bridges, switches, and NIC cards are a few of the pieces of equipment on this second layer. Under LAN transmissions, this layer is also in charge of error-free data transfer across the physical layer. 
  • The data link layer is used by MAC addresses in the medium access control protocol sub-layer, according to our Open Systems Interconnection (OSI) network model.
  • The Organizationally Unique Identifier (OUI) number is the word used to describe the remaining 24 bits (3 bytes) of the address. The Internet Assigned Number Authority (IANA) is responsible for assigning this OUI number.
  • The MAC address has a total length of 6 bytes, or 48 bits. The IEEE 802 standards state that there are three standard formats for writing this address:

         1). Six two-digit hexadecimals, such as 45-67-89-AB-12-CD, are separated by hyphens (-). 

         2). Six two-digit hexadecimals, such as 45:67:89:AB:DE:23, are separated by colons. 

         3). ABCD.4567.1238 is an example of three four-digit hexadecimals that are separated by dots (.).


Advantages Of Media Access Control Protocol

  • Every device on the same network subnet has a unique MAC address. Therefore, the utility of MAC addresses makes it simple to diagnose network problems pertaining to IP addresses, etc. 
  • With the use of MAC addresses, a network administrator may reliably identify data senders and recipients on the network. The sole explanation for this is that, in contrast to dynamic IP addresses, MAC addresses are static.
  • There are no free attachment fees for the devices that join the network. There are policies set on the switch or router. 
  • Regardless of who is attaching it, it either has authorized or non-permitted equipment connected.


Disadvantages Of Media Access Control Protocol

  • By continuously changing his MAC address to one that is allowed, an intruder can typically gain access to the network. 
  • For MAC address filtering, we can state that spoofing is simple. Because Ethernet is broadcast, one can pretend to be someone else and simply listen to and from allowed MAC addresses. 
  • There can only be two to twenty-four distinct addresses per OUI by the same manufacturer since the first three bytes (OUI) of a MAC address are reserved for the manufacturer.
  • Because MAC filtering is only one layer of network security and can be circumvented by dedicated attackers, relying only on it can give the impression that the network is more secure than it actually is.

Post a Comment

0 Comments
* Please Don't Spam Here. All the Comments are Reviewed by Admin.

Top Post Ad

Below Post Ad