What is MAC ?

Table of Contents


Media Access Control (MAC) is an essential element in computer networking that enables devices on a network to communicate with each other. It establishes rules and protocols for the efficient and organized transfer of data between computers, routers and switches.

What is Media Access Control?

Media Access Control refers to a set of policies governing how data is transmitted between two computer terminals using a network cable. These policies exist within the sub layers of the OSI reference model’s Data Link Layer 2.
The primary purpose of MAC protocols is to prevent collisions and facilitate the transfer of data packets between two computer terminals. Collisions occur when multiple terminals transmit information simultaneously, leading to communication breakdowns that can be costly for organizations heavily reliant on effective data transmission.

History of MAC

Over time, advancements in networking technology and the increasing complexity of network infrastructures have led to continuous development and refinement of Media Access Control protocols. Today, MAC protocols remain a fundamental component of computer networking by ensuring efficient and secure data transmission across wired and wireless networks as well as in data centers and local area networks (LANs).The origin of Media Access Control (MAC) can be traced back to the 1970s when Ethernet emerged, introducing protocols like CSMA/CD for managing data transmission in Local Area Networks (LANs). As network technology advanced, MAC protocols evolved to regulate wireless mediums, resulting in the creation of Wi Fi. Currently, the focus is on ensuring effective and secure data transfer across various network environments.

Method of Media Access Control

Different methods exist for controlling media access in a network, which is the channel through which data is transmitted between terminal nodes to prevent collisions. These methods include;
  1. Carrier sense multiple access with collision avoidance (CSMA/CA)
  2. Carrier sense multiple access with collision detection (CSMA/CD)
  3. Demand priority
  4. Token passing
These approaches are employed to ensure smooth and efficient data transmission without conflicts or disruptions among the connected devices in a network.

Feature of Media Access Control

The main components of Media Access Control (MAC) in computer networking are as follows;
  1. Addressing; MAC assigns unique addresses to network devices, which allows them to be recognized and communicate with each other effectively.
  1. Access Control; It manages how devices access the network medium, preventing data collisions and ensuring efficient data transmission.
  1. Frame Format; MAC determines the structure of data frames, specifying the necessary information for successful transmission and reception of data packets.
  1. Error Detection; It includes mechanisms to check for errors in order to ensure the integrity of transmitted data, thereby minimizing the risk of data corruption.
  1. Data Flow Control; MAC regulates the flow of data to prevent network congestion and facilitate seamless transfer between devices.

Application of Media Access Control

Media Access Control (MAC) plays a crucial role in computer networking, serving various purposes to ensure smooth data transmission and efficient network management. Here are some practical applications;
  1. Ethernet Networks; MAC is used in Ethernet networks to regulate access to the network medium, enabling seamless data transfer between connected devices.
  1. Wireless Networks; In wireless networks, MAC protocols govern access to the shared wireless medium, managing data transmission between devices and minimizing interference for effective communication.
  1. Data Centers; MAC protocols are employed in data centers to control the flow of data among servers, switches and other networked devices, guaranteeing reliable and smooth data transfer within the data center environment.
  1. Local Area Networks (LANs); MAC protocols are essential for managing data transmission between connected devices in LANs, facilitating efficient communication within a specific geographic area like an office building or campus.

Formate of  Media Access Control

The typical structure of Media Access Control (MAC) in computer networking is as follows;
  1. Preamble; It’s a sequence of bits used to signal the beginning of a frame and synchronize the transmitting and receiving devices.
  1. Destination MAC Address; This is the unique MAC address of the intended recipient of the data frame.
  1. Source MAC Address; The MAC address of the device that sent the data frame.
  1. Type; It indicates the type of protocol data being carried in the data field.
  1. Data; This refers to the actual payload or data being transmitted.
  1. Frame Check Sequence (FCS); A sequence of bits used for error detection, ensuring data integrity during transmission.
By following this format, Media Access Control ensures efficient and reliable exchange of data between networked devices, enabling seamless communication within computer networks.

What is MAC Address?

A MAC address is a physical address that uniquely identifies each device on a given network. In order for two networked devices to communicate with each other, they require two addresses; an IP address and a MAC address. The NIC (Network Interface Card) on each device is assigned a specific MAC address, allowing it to connect to the internet.
Mac Address
Mac Address
MAC stands for Media Access Control and it is also referred to as the Physical address, hardware address or BIA (Burned In Address). Each device has a unique MAC address, meaning no two devices can have the same one. The MAC address is represented in a hexadecimal format on every device, like this; 00;0a;95;9d;67;16. It consists of 12 digits and is 48 bits long. The first 24 bits are used for OUI (Organization Unique Identifier), while the remaining 24 bits are dedicated to NIC/vendor specific information.


To sum up, Media Access Control (MAC) plays a crucial role in regulating the transmission and reception of data, ensuring smooth communication within computer networks. By enforcing protocols and guidelines for data exchange, MAC facilitates the seamless operation of networked devices, contributing to the efficient and secure transfer of information across various digital platforms.

Additional FAQ

1.Where can I find the media access control?
To locate the media access control on your device, go to Settings, then select About Device and finally click on Status.
You will see a WiFi Address or WiFi MAC Address displayed, which represents your device’s unique MAC address. Please note that the field names may vary depending on the manufacturer of your phone.
2.Can you provide an example of media access control?
Media Access Control (MAC) encompasses various methods used in different networks. For instance, in wireless cellular networks, we have time division multiple access (TDMA), frequency division multiple access (FDMA) and code division multiple access (CDMA). In Ethernet and wireless local area networks (WLAN), carrier sense multiple access (CSMA) is another common method.
3.What are the two primary types of media access control?
In local area networks (LANs), there are two main approaches to media access control; contention and token passing. Contention operates on a first come, first serve basis. The most widely used contention based MAC protocol is carrier sense multiple access/collision detection (CSMA/CD), which is employed in Ethernet networks.
Avatar Of Soni


RELATED Articles

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.