answersLogoWhite

0


Best Answer

There are two types of MAC protocol.

1. Centralized

2. Distributed

User Avatar

Wiki User

11y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What are 2 types of Mac Protocols?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What is a deterministic Mac protocol?

A deterministic MAC protocol gives guarantees on message delay and channel throughput. Schedule based MAC protocols, based on time synchronization among nodes, are currently used to implement deterministic MAC protocols.


What are the types of networking protocols?

look up the tcp/ip set of protocols


What is Mac protocol?

mac protocols are medium access protocol. mac is sublayer of data link layer in osi model.it provides addressing and medium access mechanism


Does Mac OS support P2P networking?

Yes OS X supports P2P protocols and many other common protocols to windows, so there should not be a problem as long as you have compatible software.


Could you describe different types of medical office systems and protocols?

types of medical office


Types technology using determnistic MAC protocol and Non Deterministic MAC protocol?

types technology using determnistic MAC protocol and Non Deterministic MAC protocol?


What are protocols for long distance communication?

There are 5 types pf protocols used in the computer network.


List 2 types of computer?

A Mac and a PC More specific, a Macbook Pro, and a Toshiba.


What are the six types of operating systems?

Dos Unix Linux Windows Mac OS OS/2


What is PPPoE used to configure on a Mac?

On a Mac, as on everything else, PPPoE is used to configure Point to Point Protocols over Ethernet which allows communication between computers connected on an Ethernet network.


How do you xxplain the process of non-deterministic MAC?

MAC Protocols will define MAC and provide examples of deterministic and non-deterministic MAC protocols. MAC refers to protocols that determine which computer in a shared-media environment, or collision domain, is allowed to transmit data. MAC and LLC comprise the IEEE version of the OSI Layer 2. MAC and LLC are sublayers of Layer 2. The two broad categories of MAC are deterministic and non-deterministic. Examples of deterministic protocols include Token Ring and FDDI. In a Token Ring network, hosts are arranged in a ring and a special data token travels around the ring to each host in sequence. When a host wants to transmit, it seizes the token, transmits the data for a limited time, and then forwards the token to the next host in the ring. Token Ring is a collisionless environment since only one host can transmit at a time. Non-deterministic MAC protocols use a first-come, first-served approach. CSMA/CD is a simple system. The NIC listens for the absence of a signal on the media and begins to transmit. If two nodes transmit at the same time a collision occurs and none of the nodes are able to transmit. Three common Layer 2 technologies are Token Ring, FDDI, and Ethernet. All three specify Layer 2 issues, LLC, naming, framing, and MAC, as well as Layer 1 signaling components and media issues. The specific technologies for each are as follows: • Ethernet - uses a logical bus topology to control information flow on a linear bus and a physical star or extended star topology for the cables • Token Ring - uses a logical ring topology to control information flow and a physical star topology • FDDI - uses a logical ring topology to control information flow and a physical dual-ring topology


What two types of IP addresses are used on the Internet?

The two Internet Protocols are:IPv4IPv6