Prerequisite – Basics of Wi-fi
MAC layer provides functionality for several tasks like control medium access, can also offer support for roaming, authentication, and power conservation. The basic services provided by MAC are the mandatory asynchronous data service and an optional time-bounded service.
IEEE 802.11 defines two MAC sub-layers :-
- Distributed Coordination Function (DCF) –
DCF uses CSMA/CD as access method as wireless LAN can’t implement CSMA/CD. It only offers asynchronous service.
- Point Coordination Function (PCF) –
PCP is implemented on top of DCF and mostly used for time-service transmission. It uses a centralized, contention-free polling access method. It offers both asynchronous and time-bounded service.
The MAC layer frame consist of 9 fields. The following figure shows the basic structure of an IEEE 802.11 MAC data frame along with the content of the frame control field.
- Frame Control(FC) –
It is 2 bytes long field which defines type of frame and some control information. Various fields present in FC are:
It is a 2 bit long field which indicates the current protocol version which is fixed to be 0 for now.
It is a 2 bit long field which determines the function of frame i.e management(00), control(01) or data(10). The value 11 is reserved.
It is a 4 bit long field which indicates sub-type of the frame like 0000 for association request, 1000 for beacon.
- To DS:
It is a 1 bit long field which when set indicates that destination frame is for DS(distribution system).
- From DS:
It is a 1 bit long field which when set indicates frame coming from DS.
- More frag (More fragments):
It is 1 bit long field which when set to 1 means frame is followed by other fragments.
It is 1 bit long field, if the current frame is a retransmission of an earlier frame, this bit is set to 1.
- Power Mgmt (Power management):
It is 1 bit long field which indicates the mode of a station after successful transmission of a frame. Set to 1 the field indicates that the station goes into power-save mode. If the field is set to 0, the station stays active.
- More data:
It is 1 bit long field which is used to indicates a receiver that a sender has more data to send than the current frame. This can be used by an access point to indicate to a station in power-save mode that more packets are buffered or it can be used by a station to indicate to an access point after being polled that more polling is necessary as the station has more data ready to transmit.
It is 1 bit long field which indicates that the standard security mechanism of 802.11 is applied.
It is 1 bit long field, if this bit is set to 1 the received frames must be processed in strict order.
- Duration/ID –
It is 4 bytes long field which contains the value indicating the period of time in which the medium is occupied(in µs).
- Address 1 to 4 –
These are 6 bytes long fields which contain standard IEEE 802 MAC addresses (48 bit each). The meaning of each address depends on the DS bits in the frame control field.
- SC (Sequence control) –
It is 16 bits long field which consists of 2 sub-fields, i.e., Sequence number (12 bits) and Fragment number (4 bits). Since acknowledgement mechanism frames may be duplicated hence, a sequence number is used to filter duplicate frames.
- Data –
It is a variable length field which contain information specific to individual frames which is transferred transparently from a sender to the receiver(s).
- CRC (Cyclic redundancy check) –
It is 4 bytes long field which contains a 32 bit CRC error detection sequence to ensure error free frame.
- Inter-Switch Link (ISL) and IEEE 802.1Q
- Computer Network | Token Bus (IEEE 802.4)
- Add a new column in Pandas Data Frame Using a Dictionary
- Computer Network | Ethernet Frame Format
- Computer Network | Token Ring frame format
- Cyber Law (IT Law) in India
- Information Security | Digital Forensics
- Scala | aggregate() Function
- Types of Virtual Private Network (VPN) and its Protocols
- Computer Network | Internet Service Provider (ISP) hierarchy
- Information Security | Intellectual Property Rights
- Easy Key Management in Cryptography
- Intrusion Prevention System (IPS)
- Scala | Variances
If you like GeeksforGeeks and would like to contribute, you can also write an article using contribute.geeksforgeeks.org or mail your article to email@example.com. See your article appearing on the GeeksforGeeks main page and help other Geeks.
Please Improve this article if you find anything incorrect by clicking on the "Improve Article" button below.