{"id":690792,"date":"2024-11-06T05:23:21","date_gmt":"2024-11-06T05:23:21","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/tia-1185-300-a2015\/"},"modified":"2024-11-06T05:23:21","modified_gmt":"2024-11-06T05:23:21","slug":"tia-1185-300-a2015","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/tia\/tia-1185-300-a2015\/","title":{"rendered":"TIA-1185.300-A:2015"},"content":{"rendered":"

General<\/strong> Overview<\/strong><\/p>\n

The MAC Layer contains the rules governing operation of the
\nControl Channel, the Access Channel, the Forward Traffic Channel,
\nand the Reverse Traffic Channel.<\/p>\n

This section presents the protocols for the MAC Layer. Each of
\nthese protocols can be independently negotiated at the beginning of
\nthe session.<\/p>\n

The MAC Layer contains the following protocols:<\/p>\n