answersLogoWhite

0


Best Answer
Logical Link Control sublayerThe uppermost sublayer is Logical Link Control (LLC). This sublayer multiplexes protocols running atop the Data Link Layer, and optionally provides flow control, acknowledgment, and error notification. The LLC provides addressing and control of the data link. It specifies which mechanisms are to be used for addressing stations over the transmission medium and for controlling the data exchanged between the originator and recipient machines. Media Access Control sublayer

The sublayer below it is Media Access Control (MAC). Sometimes this refers to the sublayer that determines who is allowed to access the media at any one time (usually CSMA/CD). Other times it refers to a frame structure with MAC addresses inside.

There are generally two forms of media access control: distributed and centralized. Both of these may be compared to communication between people. In a network made up of people speaking, i.e. a conversation, we look for clues from our fellow talkers to see if any of them appear to be about to speak. If two people speak at the same time, they will back off and begin a long and elaborate game of saying "no, you first".

The Media Access Control sublayer also determines where one frame of data ends and the next one starts -- frame synchronization. There are four means of frame synchronization: time based, character counting, byte stuffing and bit stuffing.

  • The time based approach simply puts a specified amount of time between frames. The major drawback of this is that new gaps can be introduced or old gaps can be lost due to external influences.
  • Character counting simply notes the count of remaining characters in the frame's header. This method, however, is easily disturbed if this field gets faulty in some way, thus making it hard to keep up synchronization.
  • Byte stuffing precedes the frame with a special byte sequence such as DLE STX and succeeds it with DLE ETX. Appearances of DLE (byte value 0x10) has to be escaped with another DLE. The start and stop marks are detected at the receiver and removed as well as the inserted DLE characters.
  • Similarly, bit stuffing replaces these start and end marks with flag consisting of a special bit pattern (e.g. a 0, six 1 bits and a 0). Occurrences of this bit pattern in the data to be transmitted is avoided by inserting a bit. To use the example where the flag is 01111110, a 0 is inserted after 5 consecutive 1's in the data stream. The flags and the inserted 0's are removed at the receiving end. This makes for arbitrary long frames and easy synchronization for the recipient. Note that this stuffed bit is added even if the following data bit is 0, which could not be mistaken for a sync sequence, so that the receiver can unambiguously distinguish stuffed bits from normal bits.
User Avatar

Wiki User

13y ago
This answer is:
User Avatar
More answers
User Avatar

Wiki User

13y ago

Media Access Control (MAC) and Logical Link Control (LLC)

This answer is:
User Avatar

User Avatar

Wiki User

15y ago

Logical link control sublayer and media access control sublayer

This answer is:
User Avatar

User Avatar

Wiki User

12y ago

The Data Link Layer of the OSI reference model can be divided into the following 2 layers:

Logical Link Control

Media Access Control

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What are the sublayers of the data link layer as defined in the IEEE 802 standards?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What are the sublayers of the Data Link layer are as defined in the IEEE 802 standards?

Logical link control sublayer and media access control sublayer


IEEE has divided the Transport layer into two sublayers?

No. It is the Data Link layer that IEEE has divided into two sublayers. The Data Link layers are Logical Link Control and Media Access Control.


Three newest standards defined by iso itut and ieee?

three standards define by ISO


Difference between IEEE 802.3 AND 802.4?

IEEE 802.3 is the standard for Ethernet LAN. It is a collection of IEEE standards for physical layer and Data link layer's MAC sublayer. According to these standards, the Ethernet LAN card works. IEEE 802.4 is a Token Bus standard which was standardised by IEEE. It grants the Bus physical topology to use token messages to access physical layer.


What are the IEEE sublayers?

Logical Link Control (LLC) Media Access Control (MAC)


8 what ieee standards describe Ethernet what ieee standards describe wireless lan?

It's IEEE 802.3 for Ethernet and IEEE 802.11 for Wireless LANs.


Who develops standards in networking?

IEEE - Institute of electrical and electronics engineers the standard for WLAN is IEEE 802.11 all of the standards in networking are devolved by IEEE


What is the highest range and speed standards used for IEEE 802.11n and 802.15?

...the wireless standards used for IEEE 802.11n and 803.15. What is the highest range and speed for these standards?


What IEEE standards describe Ethernet?

802.3 is the IEEE standard for Ethernet devices and data managment


What ieee standard describe ethernet. what ieee standards describe wireless lan?

It's IEEE 802.3 for Ethernet and IEEE 802.11 for Wireless LANs.


What IEEE standards describe wireless LANs?

IEEE 802.11a,b, and g


Which of the IEEE 802 network standards defines wireless ethernet Standards?

802.11