Notes Flashcards
Data link layer
The layer 2 is responsible for moving a message from one computer or network device to the next computer. It controls the way messages are sent on the physical media.
Data link protocol
A data link protocol determines who can transmit at what time, where a message begins and ends, and how a receiver recognizes and corrects a transmission error
The data link layer performs two main functions, and therefore is often divided into two sublayers …
Logical link control [LLC] sublayer &
Media access control [MAC] sublayer
Logical link control [LLC] sublayer
LLC is the data link layer’s connection to the network layer above it. At the sending computer, the LLC sublayer software is responsible for communicating with the network layer Protocol Data Unit (PDU) – usually an IP packet – and surrounding it with a data link layer PDU – often an ethernet frame. At the receiving computer, the LLC sublayer software removes the data link layer PDU and passes the message it contains to the network layer software.
Media access control [MAC] sublayer
MAC controls the physical hardware. The MAC sublayer software at the sending computer controls how and when the physical layer converts bits into the physical symbols that are sent down the circuit.
At the receiving computer, the MAC sublayer software takes the data link layer PDU from the LLC sublayer, converts it into a stream of bits, and controls when the physical layer actually transmits the bits over the circuit. At the receiving computer, the MAC sublayer receives a stream of bits from the physical layer and translates it into a coherent PDU, ensures that no errors have occurred in transmission, and passes the data link layer PDU to the LLC sublayer.
A data link protocol performs three functions:
- Controls when computers transmit (media access control)
- Detects and corrects transmission errors (error control)
- Identifies the start and end of a message by using a PDU (message delineation)
Media Access Control (MAC)
Refers to the need to control when computers transmit
Why is Media Access Control unnecessary with point-to-point full-duplex configurations?
Because there are only two computers on the circuit and full duplex permits either computer to transmit at any time.
When does Media Access Control becomes important?
It becomes important when several computers share the same communication circuit, such as point-to-point configuration with a half duplex configuration that requires computers to take turns, or a multipoint configuration in which several computers share the same circuit.
Fundamental approaches to Media Access Control …
- Contention
- Controlled Access
- Access Requests
- 2 Polling
2. 2.1. Roll-call polling
2. 2. Hub polling (also called token passing)
Contention (Media Access Control) approach
With contention, computers wait until the circuit is free and then transmit whenever they have data to send. Contention is commonly used in Ethernet LANs
Controlled Access (Media Access Control) approach
Most wireless LANs use controlled access. In this case, the wireless access point controls the circuit and determines which clients can transmit at what time.
Controlled Access techniques:
- Access Requests
- Polling
- Roll-call polling
- Hub polling (also called token passing)
Access Requests (Controlled Access technique)
steps:
- Client computers that want to transmit send a request to transmit to the device that is controlling the circuit (e.g., the wireless access point).
- The controlling device grants permission for one computer at a time to transmit.
- When one computer has permission to transmit all other computers wait until that computer has finished, and then, if they have something to transmit, they use a contention technique to send an access request.
Polling (Controlled Access technique)
Polling is the process of sending a signal to a client computer that gives it permission to transmit. With polling, the clients store all messages that need to be transmitted. Periodically the controlling device (e.g., a wireless access) polls the client to see if it has data to send. If the client has data to send, it does so. If the client has no data to send, it responds negatively, and the controller asks another client if it has data to send.