Media Access Control MAC

Defines token-passing protocol for FDDI networks, as are Packet formation, addressing and recovery mechanisms.

MAC controls the flow of Data on the ring.
Acting like a switch, MAC normally sources IDLE(IDL) control symbols for Transmission on the ring. When a start delimiter arrives on the ring, MAC will Monitor each packet. IF the packet is destined for another station, MAC will simply repeat the packet on the ring, only noting if a transmission error has occurred. If the packet is addressed to MAC’s station, the packet will be copied into its buffers while simultaneously repeated on the ring. If the packet was sourced by MAC, the packet will be absorbed and not retransmitted. A fragment of the packet (about 6 bytes) is repeated by MAC. When MAC receives a token and has data to transmit, the token is absorbed. SWITCHING into a sourcing mode, MAC encapsulates its data into proper control symbols for an FDDI packet, and inserts the packet into the ring. MAC continues to Insert packets into the ring until it has completed its data transmission or token holding time has expired. At the completion of the transmission, MAC will issue a token that allows multiple packets from different stations to be on the ring concurrently, which increases the effective Bandwidth utilization.

Sign up for the Timbercon newsletter:




By submitting this form, you are consenting to receive marketing emails from: Timbercon, 20245 SW 95th Avenue Tualatin, OR 97062 United States, https://www.timbercon.com/. You can revoke your consent to receive emails at any time by using the SafeUnsubscribe® link, found at the bottom of every email.


This site uses cookies to enhance the user experience, and by browsing this site, you are accepting the receipt of cookies on your browser from this site. To manage use of cookies, please refer to your browser settings. Click here to learn more.