Part 2
Part 2
A typical frame format for synchronous transmission is, the frame starts with a
preamble called a flag, which is 8 bits long.
o The same flag is used as a postamble.
o The receiver looks for the occurrence of the flag pattern to signal the
start of a frame.
o This is followed by some number of control fields (containing data link
control protocol information then a data field variable length for most
protocols more control fields, and finally the flag is repeated.
If the sender wishes to send data in separate bursts, the gaps between bursts
must be filled with a special sequence of 0s and is that means idle.
The receiver counts the bits as they arrive and groups them in 8-bit units.
The advantage of synchronous transmission is speed.
With no extra bits or gaps to introduce at the sending end and remove at the
receiving end, synchronous transmission is faster than asynchronous
transmission.
7. Link Access Procedures
Network links can be divided into two categories those using point to-point
connections and those using broadcast channels.
In point-to-point connection there exist a dedicated link between an individual pair
of sender and receiver. The capacity of the entire channel is reserved only for the
transmission of the packet between the sender and receiver.
Point-to-point transmission with exactly one sender and one receiver is
sometimes called unicasting.
Broadcast links (sometimes referred to as multiaccess channels or multipoint
channels or random access channels).
The channel capacity is shared temporarily by every device connecting to the
link.
The packet transmitted by the sender is received and processed by every device
on the link. But, by the address field in the packet, the receiver determines
whether the packet belongs to it or not, if not, it discards the packet, otherwise it
accepts and responds accordingly.
It is the Media Access Control (MAC) sublayer of the Data Link layer that
determines who is allowed to access the media at any one time.
Random-access protocols, such as ALOHA, CSMA CSMA/CD, and CSMA/CA.
These protocols are mostly used in LANs and WANS
7.1. Random-Access Protocols
In random-access or contention methods no station is superior to another station
and none is assigned control over another.
At each instance, a station that has data to send uses a procedure defined by the
protocol to make a decision on whether or not to send. This decision depends on
the state of the medium (idle or busy).The 2 features of this protocol are:
7.1.1. ALOНА
1-persistent:
P-persistent:
O-persistent:
7.1.4. CSMA/CA
Contention Window.
Acknowledgment
In controlled access, the stations consult one another to find which station has
the right to send.
A station cannot send unless it has been authorized by other stations.
Controlled-access protocols include:
o Reservation
o Polling
7.2.2 Polling
o When the response is positive (a data frame), the primary reads the
frame and returns an acknowledgment (ACK frame), verifying its
receipt.
The drawback is that if the primary device fails, entire system fails.
In 1985, the Computer Society of the IEEE (Institute of Electrical and Electronics
Engineers) started a project, called Project 802, to set standards to enable
intercommunication among equipment from a variety of manufacturers.
The objectives of the Project 802 was to provide a way for specifying functions
of the physical layer and the data link layer of major LAN protocols.
This standards are restricted to networks carrying variable-size packets.
The IEEE 802 standard splits the OSI Data Link Layer into two sub layers named
Logical Link Control (LLC) and Media Acces Control (MAC).
The LLC provides a single link-layer control protocol for all IEEE LANs.
This means LLC protocol can provide interconnectivity between
different LANs because it makes the MAC sublayer transparent.
The LLC layer performs flow control, error control, and part of the
framing duties.
The Media Access Control that defines the specific access method for each
LAN.
The MAC layer varies for different network types and is defined by different
standards.
A part of the framing function is also handled by the MAC layer.
The better known specifications include 802.3 Ethernet, 802.11 Wi-Fi (wireless
LAN), 802.15 Bluetooth (wireless Personal Area Network), and 802.16 Wireless
Metropolitan Area Networks.