answersLogoWhite

0


Best Answer

Logical link control manages traffic in the Open Systems Interconnection and identifies line protocols including NetBIOS or NetWare. Medium Access Control is responsible for sharing physical connection to the network amongst numerous computers via Ethernet.

User Avatar

Wiki User

9y ago
This answer is:
User Avatar
More answers
User Avatar

Wiki User

12y ago

the logical link control is the sub layer of the data link layer in osi model

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What is logical link control and medium access control?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about Computer Science

IEEE has divided the Transport layer into two sublayers?

No. It is the Data Link layer that IEEE has divided into two sublayers. The Data Link layers are Logical Link Control and Media Access Control.


What are the sublayers of the data link layer as defined in the IEEE 802 standards?

Logical Link Control sublayerThe uppermost sublayer is Logical Link Control (LLC). This sublayer multiplexes protocols running atop the Data Link Layer, and optionally provides flow control, acknowledgment, and error notification. The LLC provides addressing and control of the data link. It specifies which mechanisms are to be used for addressing stations over the transmission medium and for controlling the data exchanged between the originator and recipient machines. Media Access Control sublayerThe sublayer below it is Media Access Control (MAC). Sometimes this refers to the sublayer that determines who is allowed to access the media at any one time (usually CSMA/CD). Other times it refers to a frame structure with MAC addresses inside.There are generally two forms of media access control: distributed and centralized. Both of these may be compared to communication between people. In a network made up of people speaking, i.e. a conversation, we look for clues from our fellow talkers to see if any of them appear to be about to speak. If two people speak at the same time, they will back off and begin a long and elaborate game of saying "no, you first".The Media Access Control sublayer also determines where one frame of data ends and the next one starts -- frame synchronization. There are four means of frame synchronization: time based, character counting, byte stuffing and bit stuffing.The time based approach simply puts a specified amount of time between frames. The major drawback of this is that new gaps can be introduced or old gaps can be lost due to external influences.Character counting simply notes the count of remaining characters in the frame's header. This method, however, is easily disturbed if this field gets faulty in some way, thus making it hard to keep up synchronization.Byte stuffing precedes the frame with a special byte sequence such as DLE STX and succeeds it with DLE ETX. Appearances of DLE (byte value 0x10) has to be escaped with another DLE. The start and stop marks are detected at the receiver and removed as well as the inserted DLE characters.Similarly, bit stuffing replaces these start and end marks with flag consisting of a special bit pattern (e.g. a 0, six 1 bits and a 0). Occurrences of this bit pattern in the data to be transmitted is avoided by inserting a bit. To use the example where the flag is 01111110, a 0 is inserted after 5 consecutive 1's in the data stream. The flags and the inserted 0's are removed at the receiving end. This makes for arbitrary long frames and easy synchronization for the recipient. Note that this stuffed bit is added even if the following data bit is 0, which could not be mistaken for a sync sequence, so that the receiver can unambiguously distinguish stuffed bits from normal bits.


What are the types of services provided by LLC layer?

The Logical Link Control specifies the following mechanisms1. for addressing stations across the medium2. for controlling the exchange of data between two users.There are three types of services provided by the Logical Link Layer. They are1. Connection mode service - A logical connection is set up between two users.2. Acknowledged connectionless service- No connections are involved. But data grams are acknowledged.3. Unacknowledged connectionless service- Operates in datagram style. No guarantee for the delivery of data. The service does not include flow control or error control mechanisms.


Which layer of the osi model provides the address and routing necessary to ensure that data moves from one system to another?

Network Layer This layer addresses the data. It adds an IP address which allows our data to flow across networks. The protocols involved in this layer are IP and IPX. Data Link Layer This layer provides the functional and procedural means to transfer data. It also corrects any errors that may occur in the Physical layer. The protocols used at this layer are media access control and logical link control.


How can someone set up remote control support on my computer?

One can set up remote control support on a computer using the 'android-remote' website. It allows one to link their cell phone and PC to control certain functions remotely. One can remotely access their PC using the Team Viewer software.

Related questions

What are the IEEE sublayers?

Logical Link Control (LLC) Media Access Control (MAC)


What are the sublayers of the Data Link layer are as defined in the IEEE 802 standards?

Logical link control sublayer and media access control sublayer


What are two primary responsiblity of ethernet mac sublayer?

No, frame delimiting is a primary responsibility of the Logical Link Control sublayer of the Data Link Layer.. Data link layer exists of 2 sublayers; Media Acces control Sublayer (MAC) & Logical Link Control sublayer (LLC)


What Data Link sublayer manages flow control?

LLC (Logical Link Control) sublayer - The LLC provides a common interface and supplies reliability andflow control services.Hope this helps,A. York


IEEE has divided the Transport layer into two sublayers?

No. It is the Data Link layer that IEEE has divided into two sublayers. The Data Link layers are Logical Link Control and Media Access Control.


Which of the following functions are associated with the logical link control sublayer?

delimiter for data according to the physical signaling requirements of the medium


Suppose transmission channels become virtually error free.Is the data link layer still needed?

The data link layer is still needed for flow control over the transmission channel and for framing the data. In a multiple access medium such as a LAN, the data link layer is required to coordinate access to the shared medium among the multiple users.


What does the IEEE 802.2 standard represent in Ethernet technologies?

logical link control sublayer


What is Mac protocol?

mac protocols are medium access protocol. mac is sublayer of data link layer in osi model.it provides addressing and medium access mechanism


What acronym is used to reference the data link sublayer that identifies the network layer protocol encapsulated in the frame?

LLC Logical Link Control


What are the differences between logical link control and media access control sub layers?

MAC function is framing of packets and LLC functions are protocol multiplexing, flow control, detection, and error control through a retransmission of dropped packets.LLC acts as an interface between MAC and Network Layer.The following definitions are also true:Logical Link Control (LLC). This sublayer is responsible for the data transmission between computers or devices on a network.Media Access Control (MAC). On a network, the network interface card (NIC) has an unique hardware address which identifies a computer or device. The physical address is utilized for the MAC sublayer addressing.


What are the sublayers of the data link layer as defined in the IEEE 802 standards?

Logical Link Control sublayerThe uppermost sublayer is Logical Link Control (LLC). This sublayer multiplexes protocols running atop the Data Link Layer, and optionally provides flow control, acknowledgment, and error notification. The LLC provides addressing and control of the data link. It specifies which mechanisms are to be used for addressing stations over the transmission medium and for controlling the data exchanged between the originator and recipient machines. Media Access Control sublayerThe sublayer below it is Media Access Control (MAC). Sometimes this refers to the sublayer that determines who is allowed to access the media at any one time (usually CSMA/CD). Other times it refers to a frame structure with MAC addresses inside.There are generally two forms of media access control: distributed and centralized. Both of these may be compared to communication between people. In a network made up of people speaking, i.e. a conversation, we look for clues from our fellow talkers to see if any of them appear to be about to speak. If two people speak at the same time, they will back off and begin a long and elaborate game of saying "no, you first".The Media Access Control sublayer also determines where one frame of data ends and the next one starts -- frame synchronization. There are four means of frame synchronization: time based, character counting, byte stuffing and bit stuffing.The time based approach simply puts a specified amount of time between frames. The major drawback of this is that new gaps can be introduced or old gaps can be lost due to external influences.Character counting simply notes the count of remaining characters in the frame's header. This method, however, is easily disturbed if this field gets faulty in some way, thus making it hard to keep up synchronization.Byte stuffing precedes the frame with a special byte sequence such as DLE STX and succeeds it with DLE ETX. Appearances of DLE (byte value 0x10) has to be escaped with another DLE. The start and stop marks are detected at the receiver and removed as well as the inserted DLE characters.Similarly, bit stuffing replaces these start and end marks with flag consisting of a special bit pattern (e.g. a 0, six 1 bits and a 0). Occurrences of this bit pattern in the data to be transmitted is avoided by inserting a bit. To use the example where the flag is 01111110, a 0 is inserted after 5 consecutive 1's in the data stream. The flags and the inserted 0's are removed at the receiving end. This makes for arbitrary long frames and easy synchronization for the recipient. Note that this stuffed bit is added even if the following data bit is 0, which could not be mistaken for a sync sequence, so that the receiver can unambiguously distinguish stuffed bits from normal bits.