Lecture Notes On Mac and LLC
Lecture Notes On Mac and LLC
Area Networks
ACOE322
Lecture 2
Medium Access Control
and
Logical Link Control
Dr. L. Christofi 1
Overview
• The architecture of a LAN is best described in terms of a
layering of protocols that organize the basic functions of a
LAN
• This section opens with a description of the standardized
protocol architecture for LANs, which includes
— Physical layer
— Medium Access Control (MAC) layer
— Logical Link Control (LLC) layer
• Physical layer includes topology and transmission medium
(covered in lecture 1)
• This section provides an overview of MAC and LLC layers
Dr. L. Christofi 2
Medium Access Sublayer (1)
Network Layer
Physical Layer
Dr. L. Christofi 3
Medium Access Sublayer (2)
• Medium access (MAC) sublayer is not important
on point-to-point links
Dr. L. Christofi 4
IEEE 802 Standard (1)
LLC
Sublayer IEEE 802.2
Data Link
Layer
Ethernet
FDDI
Physical Physical
Layer Layer
Dr. L. Christofi 6
IEEE 802 standard
802.2: Logical Link Control (LLC)
— explained in this section
Dr. L. Christofi 7
IEEE 802 vs OSI model
Dr. L. Christofi 8
802 Layers functions
• Physical
—Encoding/decoding
—Preamble generation/removal
—Bit transmission/reception
—Transmission medium and topology
• Logical Link Control
—Interface to higher levels
—Flow and error control
• Medium Access Control
—Data assembly and dismantle into frames
—Govern access to LAN transmission medium
Dr. L. Christofi 9
Scope of LAN protocols
Dr. L. Christofi 10
Logical Link Control (LLC)
• The LLC layer for LANs is concerned with the transmission
of a link-level protocol data unit (PDU) between two
stations, without the necessity of an intermediate switching
node
• It has two characteristics:
—It must support the multi-access, shared medium nature
of the link
—It is relieved from some details of link access by the MAC
layer
Dr. L. Christofi 11
LLC Services
• Unacknowledged connectionless service
—Datagram-style
—Does not involve any flow and error control mechanisms
—Data delivery is not guaranteed
• Connection mode service
—A logical connection is set up between two stations
—Flow and error control are provided
• Acknowledged connectionless service
—A cross between the previous services
—Datagrams are to be acknowledged
—No prior logical connection is set up
Dr. L. Christofi 12
Medium Access Control (1)
• Assembly of data into frame with address and
error detection fields
• Disassembly of frame and performing of
—Address recognition
—Error detection
• Govern access to transmission medium
—Not found in traditional layer 2 data link control
• For the same LLC, several MAC options may be
available
Dr. L. Christofi 13
Medium Access Control (2)
• All LANs and MANs consist of a collection of devices that
must share the network’s transmission capacity
• Some means of controlling access to the transmission
medium is needed for efficient use of that capacity. This is
the function of a Medium Access Control (MAC)
Protocol.
• The key parameters in any MAC technique are where and
how.
— Where, refers to whether control info is exercised in a
centralized or distributed fashion.
• Centralized: a controller has the authority to grant access to the
network
• Distributed: the stations collectively perform a MAC function to
determine dynamically the order in which stations transmit
— How, is contrained by the topology and is a trade-off among
competing factors, such as cost, performance and complexity
Dr. L. Christofi 14
LAN Protocols in Context
Dr. L. Christofi 15
Generic MAC frame format
• MAC control: contains control info for the functioning of the MAC
protocol, eg priority level
• Destination MAC address: the destination physical attachment point on
the LAN for this frame
• Source MAC address: the source physical attachment point on the LAN
for this frame
• LLC: The LLC data from the next higher layer
• CRC: Cyclic Redundancy Check field, used to check if a transmission error
has occurred
Dr. L. Christofi 16
MAC techniques
• Synchronous
—A specific capacity is dedicated to a connection
—Same approach as in circuit-switching FDM or TDM, so
not optimal for LANs/MANs because the needs of the
stations are unpredictable
• Asynchronous
—Capacity is allocated in a dynamic fashion, in response to
demand
—Subdivided into three categories
• Round Robin
• Reservation
• Contention
Dr. L. Christofi 17
Asynchronous MAC techniques
• Round Robin
— Each station in turn is granted the right to transmit
— After each station finishes transmitting, it passes the right to transmit
to the next station in logical sequence
— Efficient technique when many stations have data to transmit over an
extended period of time
• Reservation
— For stream traffic (voice, bulk file transfer etc)
— Time on the medium is divided into slots, like synchronous TDM
— A station whishing to transmit reserves slots for an extended period
• Contention
— For bursty traffic (short, sporadic transmissions such as interactive
terminal-host traffic)
— No control is exercised to determine whose turn it is
— Simple to implement and efficient for light loads
Dr. L. Christofi 18
Medium Access Control Methods
• The methods used for Medium Access Control
are:
—Carrier-sense multiple-access with
collision detection (CSMA/CD) for bus
topologies
Dr. L. Christofi 19
CSMA/CD
• CSMA/CD is used only in bus type networks,
where a number of nodes share a common
communication channel (wire) known as the bus.
Dr. L. Christofi 20
CSMA/CD
A B C D
Carrier
Sense
A B C D
Multiple
Access
A B C D
Collision
Collision
Collision A B C D
Detection
(Backoff
Algorithm)
JAM JAM JAM JAM JAM JAM
Dr. L. Christofi 23
Collision detection time
How long does it take to realize there has been a collision?
packet
Station Station
A tprop B
Dr. L. Christofi 24
Control Token or Token Passing
• Another way of controlling access to a shared transmission
medium is by a control token (Token Passing)
• The Control Token technique uses a control or permission
token to share the communication resource between a
number of nodes. The technique can be applied to both bus
and ring network topologies.
• This token is passed from one station to another according
to a defined set of rules
• A station may transmit a frame only when it has possession
of the token and after it has transmitted the frame, it
passes the token on, to allow another station to access the
transmission medium
Dr. L. Christofi 25
Control Token operation (1)
• Whether using a ring or bus topology, a logical ring is
established which links all the nodes using the physical
medium (see next two slides)
• A single control (permission) token is created at one of the
nodes
• The token is passed from node to node around the logical
ring until it arrives at a node waiting to send a frame
• The node captures the token and transmits the frame
• Upon completing transmission, the node releases the token
to the next node in the logical ring
Dr. L. Christofi 26
Control Token operation (2)
Assume DTE A wishes to send a frame to DTE C
D
token
Dr. L. Christofi 27
Control Token operation (3)
D
frame
D
Either: When last bit of frame has been
A C
received DTE A generates and passes on
the token: it then processes the
token
response bits at the tail of the frame
B
D
Or:
When last bit of frame has been
A C transmitted by DTE A it passes on the
token – early release
token
B
Dr. L. Christofi 28
Sending frames or Control
Token
• Sending frames
1. Source node monitors all frames in ring.
2. If it detects frames with its own source address it removes
them from the ring
3. If it detects a corrupted frame, it removes it from the ring and
retransmits a new one
• Sending Control Token
1. When source node finishes transmitting, it sends a token to its
designated successor and it is acknowledged
2. If the successor does not respond, it then sends a “who-
follows-then” message. If it receives a reply, it send a token
3. If it receives no reply, it sends “is anybody there?” message. If
it receives a reply, it sends a token
4. If it does not receive any reply, it then stops transmitting but
continues to listen.
Dr. L. Christofi 29
Token passing network
A token always circulates around a ring net.
A user grabs a token to transmit data
Dr. L. Christofi 30
Control Token procedure
Dr. L. Christofi 31
LAN addressing
• Communication involves three agents:
—Processes
—stations
—networks
• The transfer of data from one process to another
involves
—getting the data to the station in which the destination
process resides, and then
—getting it to the intended process within the computer
• The above suggest the need for two levels of
addressing
—MAC address
—LLC address
Dr. L. Christofi 32
User data and LAN/MAN
protocol control info
• LLC user data (IP datagram) are passed down to LLC which
appends a header, to make the LLC PDU
• The LLC PDU is passed to the MAC entity, which in turn appends a
header and a trailer, to make the MAC frame
Dr. L. Christofi 33
Levels of addressing
• MAC address
—Identifies a physical interface from the station to the LAN
—There is one to one relationship between stations and
physical addresses
• LLC address
—Identifies an LLC user
—The LLC address (LLC SAP) is associated with a particular
user within a station
—LLC SAP may refer to a process executing on a station or
to a hardware port
Dr. L. Christofi 34
Review Questions
• Explain the difference between MAC and LLC protocols with respect to their
functionality.
• Describe the techniques used in implementing MAC protocols.
• Which are the asynchronous MAC techniques and for which type if traffic
are they best suited?
• Which methods are used for Medium Access Control and for which type of
network topologies are they used?
• What is meant by CSMA/CD?
• Explain the operation of CSMA/CD.
• Explain the terms of collision detection and jam sequence.
• What is meant by Control Token?
• Explain by means of appropriate diagrams the operation of Control Token.
• In the context of Control Token MAC methods, which steps does the source
station take when sending frames or the control token on a ring network
topology?
Dr. L. Christofi 35
References
Dr. L. Christofi 36