According to IEEE Std 802-2001 section 6.2.3 "MAC sublayer", the primary functions performed by the MAC layer are:1
In the case of Ethernet, the functions required of a MAC are:2
The local network addresses used in IEEE 802 networks and FDDI networks are called MAC addresses; they are based on the addressing scheme that was used in early Ethernet implementations. A MAC address is intended as a unique serial number. MAC addresses are typically assigned to network interface hardware at the time of manufacture. The most significant part of the address identifies the manufacturer, who assigns the remainder of the address, thus providing a potentially unique address. This makes it possible for frames to be delivered on a network link that interconnects hosts by some combination of repeaters, hubs, bridges and switches, but not by network layer routers. Thus, for example, when an IP packet reaches its destination (sub)network, the destination IP address (a layer 3 or network layer concept) is resolved with the Address Resolution Protocol for IPv4, or by Neighbor Discovery Protocol (IPv6) into the MAC address (a layer 2 concept) of the destination host.
Examples of physical networks are Ethernet networks and Wi-Fi networks, both of which are IEEE 802 networks and use IEEE 802 48-bit MAC addresses.
A MAC layer is not required in full-duplex point-to-point communication, but address fields are included in some point-to-point protocols for compatibility reasons.
The channel access control mechanisms provided by the MAC layer are also known as a multiple access method. This makes it possible for several stations connected to the same physical medium to share it. Examples of shared physical media are bus networks, ring networks, hub networks, wireless networks and half-duplex point-to-point links. The multiple access method may detect or avoid data packet collisions if a packet mode contention based channel access method is used, or reserve resources to establish a logical channel if a circuit-switched or channelization-based channel access method is used. The channel access control mechanism relies on a physical layer multiplex scheme.
The most widespread multiple access method is the contention-based CSMA/CD used in Ethernet networks. This mechanism is only utilized within a network collision domain, for example, an Ethernet bus network or a hub-based star topology network. An Ethernet network may be divided into several collision domains, interconnected by bridges and switches.
A multiple access method is not required in a switched full-duplex network, such as today's switched Ethernet networks, but is often available in the equipment for compatibility reasons.
Use of directional antennas and millimeter-wave communication in a wireless personal area network increases the probability of concurrent scheduling of non‐interfering transmissions in a localized area, which results in an immense increase in network throughput. However, the optimum scheduling of concurrent transmission is an NP-hard problem.3
Cellular networks, such as GSM, UMTS or LTE networks, also use a MAC layer. The MAC protocol in cellular networks is designed to maximize the utilization of the expensive licensed spectrum.4 The air interface of a cellular network is at layers 1 and 2 of the OSI model; at layer 2, it is divided into multiple protocol layers. In UMTS and LTE, those protocols are the Packet Data Convergence Protocol (PDCP), the Radio Link Control (RLC) protocol, and the MAC protocol. The base station has absolute control over the air interface and schedules the downlink access as well as the uplink access of all devices. The MAC protocol is specified by 3GPP in TS 25.3215 for UMTS, TS 36.3216 for LTE and TS 38.3217 for 5G.
"IEEE 802-2001 (R2007) IEEE Standard for Local and Metropolitan Area Networks: Overview and Architecture" (PDF). IEEE. Archived from the original (PDF) on April 29, 2003. https://web.archive.org/web/20030429223052/http://standards.ieee.org/getieee802/download/802-2001.pdf ↩
"4.1.4", IEEE 802.3-2002, IEEE, archived from the original on June 16, 2019 https://standards.ieee.org/ieee/802.3/3259/ ↩
Bilal, Muhammad; et al. (2014). "Time-Slotted Scheduling Schemes for Multi-hop Concurrent Transmission in WPANs with Directional Antenna". ETRI Journal. 36 (3): 374–384. arXiv:1801.06018. doi:10.4218/etrij.14.0113.0703. /wiki/ArXiv_(identifier) ↩
Guowang Miao; Jens Zander; Ki Won Sung; Ben Slimane (2016). Fundamentals of Mobile Data Networks. Cambridge University Press. ISBN 978-1107143210. 978-1107143210 ↩
3GPP TS 25.321 Medium Access Control (MAC) protocol specification http://www.3gpp.org/ftp/Specs/html-info/25321.htm ↩
3GPP TS 36.321 Evolved Universal Terrestrial Radio Access (E-UTRA); Medium Access Control (MAC) protocol specification http://www.3gpp.org/ftp/Specs/html-info/36321.htm ↩
3GPP TS 38.321 NR; Medium Access Control (MAC) protocol specification http://www.3gpp.org/ftp/Specs/html-info/38321.htm ↩