Preview

Sublayers of the Data Link Layer

Good Essays
Open Document
Open Document
484 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Sublayers of the Data Link Layer
Sublayers of the data link layer

The data link layer has two sublayers: logical link control (LLC) and media access control (MAC).

Logical link control sublayer

The uppermost sublayer, LLC, multiplexes protocols running atop the data link layer, and optionally provides flow control, acknowledgment, and error notification. The LLC provides addressing and control of the data link. It specifies which mechanisms are to be used for addressing stations over the transmission medium and for controlling the data exchanged between the originator and recipient machines.

Media access control sublayer

MAC may refer to the sublayer that determines who is allowed to access the media at any one time (usually CSMA/CD). Other times it refers to a frame structure with MAC addresses inside.
There are generally two forms of media access control: distributed and centralized. Both of these may be compared to communication between people. In a network made up of people speaking, i.e. a conversation, we look for clues from our fellow talkers to see if any of them appear to be about to speak. If two people speak at the same time, they will back off and begin a long and elaborate game of saying "no, you first".
The Media Access Control sublayer also determines where one frame of data ends and the next one starts – frame synchronization. There are four means of frame synchronization: time based, character counting, byte stuffing and bit stuffing.
The time based approach simply puts a specified amount of time between frames. The major drawback of this is that new gaps can be introduced or old gaps can be lost due to external influences.
Character counting simply notes the count of remaining characters in the frame's header. This method, however, is easily disturbed if this field gets faulty in some way, thus making it hard to keep up synchronization.
Byte stuffing precedes the frame with a special byte sequence such as DLE STX and succeeds it with DLE ETX.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Capture the HTTP frame. Answer all of the questions found below based on the details of your captured HTTP frame.…

    • 434 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Being made up of various parts each layer has a unique function in the network. Additionally, each layer incorporates things to the data which is transmitted from one point to the other. The protocols which work on this layer are HDLC, PPP as well as the frame relay protocol. HDLC protocol means High-Level Data Link Control protocol. An additional protocol which works on layers of the OSI model is the Point-to-Point protocol (PPP) that is just like HDLS protocol. The frame relay protocol works at the data links layer of the OSI model (Cisco, 2008).…

    • 254 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    14. When a bridge/switch receives a Ethernet frame into an interface, what does it do with the source MAC address?…

    • 901 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    Nt1310 Unit 1 Assignment

    • 987 Words
    • 4 Pages

    Layer 3: The network layer...This layer handles the routing of the data (sending it in the right direction to the right destination on outgoing transmissions and receiving incoming transmissions at the packet level). The network layer does routing and…

    • 987 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    IT220 Unit 5 assignment

    • 286 Words
    • 2 Pages

    MAC address: data link layer address, 48 bits in length, usually written as 12 hexadecimal digits and used to represent different devices connected to a LAN…

    • 286 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IEEE802 standard series protocol, the data link layer includes a logical link control (LLC) sublayer and the media access control (MAC) sub-layer which is located between the MAC layer and the physical LLC, which allows adaptation to different LLC media access technology and physical media. MAC sublayer as a separate, they will not change the impact of the media access method and higher level protocols. MAC disassembly of data and media access management of two modules, the completion of the data frame encapsulation, re-opened send and receive functions. Ethernet frame encapsulation format as shown in Table 1, where the destination address, source address, length / type field and the data generated by the four layer protocol module when transmitting data frames, data encapsulation module automatically adding data to be transmitted in the first seven bytes of preamble and a delimiter byte and add at the end of the data transfer byte sent four cyclic redundancy check code, if the data length is less than 46 bytes , the data is automatically filled in order to achieve the minimum length required when receiving data frame, the data will be automatically discarded removable module preamble and delimiter two fields.…

    • 312 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    4. The data link layer strips the data-link header and trailer, and then passes the remaining data up to the network layer.…

    • 648 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    nt1210 lab3

    • 324 Words
    • 2 Pages

    Sends frames to and from with flow control, error control and sync; also addresses topology and medias.…

    • 324 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    netw 240 week 7

    • 330 Words
    • 3 Pages

    Capture the HTTP frame. Answer all of the questions found below based on the details of your captured HTTP frame.…

    • 330 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab assign

    • 276 Words
    • 2 Pages

    What is the window size sent by the client to the server in the first GET frame?…

    • 276 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    nt1210 unit 1 lab1

    • 1325 Words
    • 5 Pages

    Answer: C. The physical layer sits just below the data link layer. D. The physical layer sits just below the data link layer.…

    • 1325 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    This layer holds whatever IP will run above, e.g., Ethernet, token-ring, and Fiber Distributed Digital Interface (FDDI) systems. Distinct network protocols, e.g., Ethernet, exertion at this level.…

    • 1263 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Chapter 4 Study Guide

    • 2291 Words
    • 10 Pages

    Identifies the segment of data and provides for identification of the Transport Layer Protocol to use…

    • 2291 Words
    • 10 Pages
    Satisfactory Essays
  • Good Essays

    Securing Windows Media

    • 481 Words
    • 2 Pages

    | Used for receiving packet loss information from clients and providing synchronization information to clients that are streaming by using MMSU.…

    • 481 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Topology Diagram Topology

    • 349 Words
    • 2 Pages

    Information is passed from one computer to another in either clock-wise direction or counter clock-wise direction and after receiving the information, the receiver must send the “acknowledgement” message (ACK message) back to the sender to complete the transmission.…

    • 349 Words
    • 2 Pages
    Satisfactory Essays