Media Access Control - Channel Access Control Mechanism

Channel Access Control Mechanism

The channel access control mechanisms provided by the MAC layer are also known as a multiple access protocol. This makes it possible for several stations connected to the same physical medium to share it. Examples of shared physical media are bus networks, ring networks, hub networks, wireless networks and half-duplex point-to-point links. The multiple access protocol may detect or avoid data packet collisions if a packet mode contention based channel access method is used, or reserve resources to establish a logical channel if a circuit switched or channelization based channel access method is used. The channel access control mechanism relies on a physical layer multiplex scheme.

The most widespread multiple access protocol is the contention based CSMA/CD protocol used in Ethernet networks. This mechanism is only utilized within a network collision domain, for example an Ethernet bus network or a hub-based star topology network. An Ethernet network may be divided into several collision domains, interconnected by bridges and switches.

A multiple access protocol is not required in a switched full-duplex network, such as today's switched Ethernet networks, but is often available in the equipment for compatibility reasons.

Read more about this topic:  Media Access Control

Famous quotes containing the words channel, access, control and/or mechanism:

    This is what the Church is said to want, not party men, but sensible, temperate, sober, well-judging persons, to guide it through the channel of no-meaning, between the Scylla and Charybdis of Aye and no.
    Cardinal John Henry Newman (1801–1890)

    The Hacker Ethic: Access to computers—and anything which might teach you something about the way the world works—should be unlimited and total.
    Always yield to the Hands-On Imperative!
    All information should be free.
    Mistrust authority—promote decentralization.
    Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race, or position.
    You can create art and beauty on a computer.
    Computers can change your life for the better.
    Steven Levy, U.S. writer. Hackers, ch. 2, “The Hacker Ethic,” pp. 27-33, Anchor Press, Doubleday (1984)

    “Have we any control over being born?,” my friend asked in despair. “No, the job is done for us while we’re sleeping, so to speak, and when we wake up everything is all set. We merely appear, like an ornate celebrity wheeled out in a wheelchair.” “I don’t remember,” my friend claimed. “No need to,” I said: “what need have us free-loaders for any special alertness? We’re done for.”
    Marvin Cohen, U.S. author and humorist. The Self-Devoted Friend, New Directions (1967)

    Life is an offensive, directed against the repetitious mechanism of the Universe.
    Alfred North Whitehead (1861–1947)