IRIG 106 Chapter 28

Total Page:16

File Type:pdf, Size:1020Kb

IRIG 106 Chapter 28 Telemetry Standards, RCC Standard 106-17 Chapter 28, July 2017 CHAPTER 28 RF Network Management Table of Contents Acronyms ...................................................................................................................................... iii Chapter 28. RF Network Management ............................................................................... 28-1 28.1 Introduction .................................................................................................................... 28-1 28.2 RF Network Management Concepts and Definitions .................................................... 28-2 28.2.1 Data Link Layer Framing................................................................................... 28-2 28.2.2 RF Link Management ........................................................................................ 28-3 28.2.3 Epoch Structure .................................................................................................. 28-3 28.2.4 Transmission Opportunities ............................................................................... 28-3 28.2.5 Guard Time ........................................................................................................ 28-4 28.2.6 Traffic Engineering Queues ............................................................................... 28-4 28.2.7 Handoff .............................................................................................................. 28-4 28.2.8 Heartbeat ............................................................................................................ 28-4 28.2.9 RF MAC Header Addressing ............................................................................. 28-5 28.2.10 Timing ................................................................................................................ 28-5 28.2.11 Virtual TxOps .................................................................................................... 28-5 28.2.12 Independent Operation ....................................................................................... 28-5 28.3 RF Media Access Control Layer.................................................................................... 28-6 28.3.1 Epoch ................................................................................................................. 28-6 28.3.2 Media Access Control Frame Structure ............................................................. 28-8 28.3.3 RF MAC Payloads ............................................................................................. 28-8 28.3.4 Frame Check Sequence .................................................................................... 28-11 28.4 Logical Link Control Layer ......................................................................................... 28-11 28.4.1 TxOp Processing .............................................................................................. 28-12 28.4.2 Queue Management Processing ....................................................................... 28-14 28.4.3 Link Metric Processing .................................................................................... 28-15 28.4.4 Heartbeat Processing ........................................................................................ 28-15 28.5 Tunnel Management .................................................................................................... 28-16 28.5.1 Tunnel Connection ........................................................................................... 28-17 28.5.2 TSS Interface Initialization .............................................................................. 28-17 28.5.3 Tunnel Operation ............................................................................................. 28-18 28.5.4 Tunnel Selection .............................................................................................. 28-18 Appendix 28-A. Documentation of TunTap Device Driver for Linux .............................. A-1 Appendix 28-B. Documentation of TunTap Project for macOS ........................................ B-1 i Telemetry Standards, RCC Standard 106-17 Chapter 28, July 2017 Appendix 28-C. Citations ...................................................................................................... C-1 List of Figures Figure 28-1. OSI Model as Related to the TmNS RF Network.............................................. 28-1 Figure 28-2. Data Link Layer Framing Overview .................................................................. 28-3 Figure 28-3. Typical Epoch Structure .................................................................................... 28-6 Figure 28-4. MSDU Insertion into RF MAC Frame .............................................................. 28-9 Figure 28-5. Fragmentation/Packing Sub-Header ................................................................ 28-10 Figure 28-6. Notional Diagram of RF MAC Frame Containing Two MSDU_Blocks ........ 28-11 List of Tables Table 28-1. RF MAC Header Vendor IDs ............................................................................ 28-5 Table 28-2. Definition of Fields in Fragmentation/Packing Sub-Header ............................. 28-9 Table 28-3. Default Interface Values for TSS Interface of Transceivers ............................ 28-17 ii Telemetry Standards, RCC Standard 106-17 Chapter 28, July 2017 Acronyms AES Advanced Encryption Standard BSN block sequence number CCMP Counter with Cipher Block Chaining Message Authentication Code mode Protocol FCS frame check sequence FPSH fragmentation/packing sub-header GPS Global Positioning System IETF Internet Engineering Task Force IP Internet Protocol LLC logical link control MAC media access control MDL Metadata Description Language ms millisecond MSDU MAC service data unit OSI Open Systems Interconnection QoS Quality of Service RF radio frequency RFC Request for Comment SDU service data unit TCP Transmission Control Protocol TE Traffic Engineering TLV Type Length Value TmNS Telemetry Network Standard TSS TmNS Source Selector TxOp transmission opportunity UDP User Datagram Protocol iii Telemetry Standards, RCC Standard 106-17 Chapter 28, July 2017 This page intentionally left blank. iv Telemetry Standards, RCC Standard 106-17 Chapter 28, July 2017 CHAPTER 28 RF Network Management 28.1 Introduction This chapter defines the mechanisms and processes for managing radio frequency (RF) links with the RF network. The RF network implements an Open Systems Interconnection (OSI) model approach (Figure 28-1) to data transmission, where data moves through the OSI stack from the application layer to the physical layer, from physical layer to physical layer through some transmission medium, then back up the stack to another application on the receiving side. For the most part, the RF network operates just like any other Transmission Control Protocol (TCP)/Internet Protocol (IP) network, where a message is created using a standard data management protocol, such as Simple Network Management Protocol; is encapsulated at the transport layer to TCP or User Datagram Protocol (UDP); and then is further encapsulated into an IP packet that contains the logical addressing and path routing determination. Where the RF network differs from the standard OSI model is in the data link and physical layers, where media access controls (MACs) have been modified to support transmission over RF links. OSI Model Layer Data Unit Function Examples High Level APIs, including resource sharing, remote file 7. Application HTTP, FTP, SNMP, SSH, TELNET access, directory services and virtual terminals Translation of data between a networking service and 6. Presentation Data an application, including character encoding, data HTML, CSS, GIF Host compression and encryption/decryption Layers Managing communications sessions, i.e. continuous 5. Session exchange of information in the form of multiple back- RPC, PAP, SSL, SQL and-forth transmissions between two nodes Managing communications sessions, i.e. continuous 4. Transport Segments/Datagram exchange of information in the form of multiple back- TCP, UDP, NETBEUI and-forth transmissions between two nodes Structuring and managing a multi-node network, 3. Network Packet IPv4 IPv6, IPSec, Apple Talk, ICMP including addressing, routing and traffic control Covered Media Reliable transmission of data frames between two 2. Data Link Frame PPP, IEE 802.2 L2TP, MAC, LLDP by this Layers nodes connected by a physical layer chapter Transmission and reception of raw bit streams over a IRIG 106 1. Physical Bit Ethernet physical layer, DSL USB, ISDN, DOCSIS physical medium Chapter 27 Figure 28-1. OSI Model as Related to the Telemetry Network Standard (TmNS) RF Network The RF network manages communications at the data link and physical layers of the OSI model. This chapter focuses on the RF network with respect to managing the data link layer of the OSI model. The RF network is a multi-node network with a network layer control and data plane. The control plane for managing the RF link layer multiple access is described in this document. For information on the physical layer of the RF network, refer to Chapter 27. The RF network’s control plane uses the existing ground network and adds RF connectivity to allow changes to RF transmission and capacity allocation in transceivers during missions. Radios need not establish direct bidirectional links with other transceivers in order to be part of the RF network. Rather, they are part of
Recommended publications
  • Logical Link Control and Channel Scheduling for Multichannel Underwater Sensor Networks
    ICST Transactions on Mobile Communications and Applications Research Article Logical Link Control and Channel Scheduling for Multichannel Underwater Sensor Networks Jun Li ∗, Mylene` Toulgoat, Yifeng Zhou, and Louise Lamont Communications Research Centre Canada, 3701 Carling Avenue, Ottawa, ON. K2H 8S2 Canada Abstract With recent developments in terrestrial wireless networks and advances in acoustic communications, multichannel technologies have been proposed to be used in underwater networks to increase data transmission rate over bandwidth-limited underwater channels. Due to high bit error rates in underwater networks, an efficient error control technique is critical in the logical link control (LLC) sublayer to establish reliable data communications over intrinsically unreliable underwater channels. In this paper, we propose a novel protocol stack architecture featuring cross-layer design of LLC sublayer and more efficient packet- to-channel scheduling for multichannel underwater sensor networks. In the proposed stack architecture, a selective-repeat automatic repeat request (SR-ARQ) based error control protocol is combined with a dynamic channel scheduling policy at the LLC sublayer. The dynamic channel scheduling policy uses the channel state information provided via cross-layer design. It is demonstrated that the proposed protocol stack architecture leads to more efficient transmission of multiple packets over parallel channels. Simulation studies are conducted to evaluate the packet delay performance of the proposed cross-layer protocol stack architecture with two different scheduling policies: the proposed dynamic channel scheduling and a static channel scheduling. Simulation results show that the dynamic channel scheduling used in the cross-layer protocol stack outperforms the static channel scheduling. It is observed that, when the dynamic channel scheduling is used, the number of parallel channels has only an insignificant impact on the average packet delay.
    [Show full text]
  • Medium Access Control Layer
    Telematics Chapter 5: Medium Access Control Sublayer User Server watching with video Beispielbildvideo clip clips Application Layer Application Layer Presentation Layer Presentation Layer Session Layer Session Layer Transport Layer Transport Layer Network Layer Network Layer Network Layer Univ.-Prof. Dr.-Ing. Jochen H. Schiller Data Link Layer Data Link Layer Data Link Layer Computer Systems and Telematics (CST) Physical Layer Physical Layer Physical Layer Institute of Computer Science Freie Universität Berlin http://cst.mi.fu-berlin.de Contents ● Design Issues ● Metropolitan Area Networks ● Network Topologies (MAN) ● The Channel Allocation Problem ● Wide Area Networks (WAN) ● Multiple Access Protocols ● Frame Relay (historical) ● Ethernet ● ATM ● IEEE 802.2 – Logical Link Control ● SDH ● Token Bus (historical) ● Network Infrastructure ● Token Ring (historical) ● Virtual LANs ● Fiber Distributed Data Interface ● Structured Cabling Univ.-Prof. Dr.-Ing. Jochen H. Schiller ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 5: Medium Access Control Sublayer 5.2 Design Issues Univ.-Prof. Dr.-Ing. Jochen H. Schiller ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 5: Medium Access Control Sublayer 5.3 Design Issues ● Two kinds of connections in networks ● Point-to-point connections OSI Reference Model ● Broadcast (Multi-access channel, Application Layer Random access channel) Presentation Layer ● In a network with broadcast Session Layer connections ● Who gets the channel? Transport Layer Network Layer ● Protocols used to determine who gets next access to the channel Data Link Layer ● Medium Access Control (MAC) sublayer Physical Layer Univ.-Prof. Dr.-Ing. Jochen H. Schiller ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 5: Medium Access Control Sublayer 5.4 Network Types for the Local Range ● LLC layer: uniform interface and same frame format to upper layers ● MAC layer: defines medium access ..
    [Show full text]
  • SELECTION of CYCLIC REDUNDANCY CODE and CHECKSUM March 2015 ALGORITHMS to ENSURE CRITICAL DATA INTEGRITY 6
    DOT/FAA/TC-14/49 Selection of Federal Aviation Administration William J. Hughes Technical Center Cyclic Redundancy Code and Aviation Research Division Atlantic City International Airport New Jersey 08405 Checksum Algorithms to Ensure Critical Data Integrity March 2015 Final Report This document is available to the U.S. public through the National Technical Information Services (NTIS), Springfield, Virginia 22161. U.S. Department of Transportation Federal Aviation Administration NOTICE This document is disseminated under the sponsorship of the U.S. Department of Transportation in the interest of information exchange. The U.S. Government assumes no liability for the contents or use thereof. The U.S. Government does not endorse products or manufacturers. Trade or manufacturers’ names appear herein solely because they are considered essential to the objective of this report. The findings and conclusions in this report are those of the author(s) and do not necessarily represent the views of the funding agency. This document does not constitute FAA policy. Consult the FAA sponsoring organization listed on the Technical Documentation page as to its use. This report is available at the Federal Aviation Administration William J. Hughes Technical Center’s Full-Text Technical Reports page: actlibrary.tc.faa.gov in Adobe Acrobat portable document format (PDF). Technical Report Documentation Page 1. Report No. 2. Government Accession No. 3. Recipient's Catalog No. DOT/FAA/TC-14/49 4. Title and Subitle 5. Report Date SELECTION OF CYCLIC REDUNDANCY CODE AND CHECKSUM March 2015 ALGORITHMS TO ENSURE CRITICAL DATA INTEGRITY 6. Performing Organization Code 220410 7. Author(s) 8. Performing Organization Report No.
    [Show full text]
  • IEEE Std 802.3™-2012 New York, NY 10016-5997 (Revision of USA IEEE Std 802.3-2008)
    IEEE Standard for Ethernet IEEE Computer Society Sponsored by the LAN/MAN Standards Committee IEEE 3 Park Avenue IEEE Std 802.3™-2012 New York, NY 10016-5997 (Revision of USA IEEE Std 802.3-2008) 28 December 2012 IEEE Std 802.3™-2012 (Revision of IEEE Std 802.3-2008) IEEE Standard for Ethernet Sponsor LAN/MAN Standards Committee of the IEEE Computer Society Approved 30 August 2012 IEEE-SA Standard Board Abstract: Ethernet local area network operation is specified for selected speeds of operation from 1 Mb/s to 100 Gb/s using a common media access control (MAC) specification and management information base (MIB). The Carrier Sense Multiple Access with Collision Detection (CSMA/CD) MAC protocol specifies shared medium (half duplex) operation, as well as full duplex operation. Speed specific Media Independent Interfaces (MIIs) allow use of selected Physical Layer devices (PHY) for operation over coaxial, twisted-pair or fiber optic cables. System considerations for multisegment shared access networks describe the use of Repeaters that are defined for operational speeds up to 1000 Mb/s. Local Area Network (LAN) operation is supported at all speeds. Other specified capabilities include various PHY types for access networks, PHYs suitable for metropolitan area network applications, and the provision of power over selected twisted-pair PHY types. Keywords: 10BASE; 100BASE; 1000BASE; 10GBASE; 40GBASE; 100GBASE; 10 Gigabit Ethernet; 40 Gigabit Ethernet; 100 Gigabit Ethernet; attachment unit interface; AUI; Auto Negotiation; Backplane Ethernet; data processing; DTE Power via the MDI; EPON; Ethernet; Ethernet in the First Mile; Ethernet passive optical network; Fast Ethernet; Gigabit Ethernet; GMII; information exchange; IEEE 802.3; local area network; management; medium dependent interface; media independent interface; MDI; MIB; MII; PHY; physical coding sublayer; Physical Layer; physical medium attachment; PMA; Power over Ethernet; repeater; type field; VLAN TAG; XGMII The Institute of Electrical and Electronics Engineers, Inc.
    [Show full text]
  • GS970M Datasheet
    Switches | Product Information CentreCOM® GS970M Series Managed Gigabit Ethernet Switches The Allied Telesis CentreCOM GS970M Series of Layer 3 Gigabit switches offer an impressive set of features in a compact design, making them ideal for applications at the network edge. STP root guard ۼۼ Overview Management (UniDirectional Link Detection (UDLD ۼۼ Allied Telesis Autonomous Management ۼۼ Allied Telesis CentreCOM GS970M Series switches provide an excellent Framework™ (AMF) enables powerful centralized management and zerotouch device installation and Security Features access solution for today’s networks, recovery Access Control Lists (ACLs) based on Layer 2, 3 ۼۼ supporting Gigabit to the desktop for Console management port on the front panel for and 4 headers ۼۼ maximum performance. The Power ease of access Configurable auth-fail and guest VLANs ۼۼ Eco-friendly mode allows ports and LEDs to be ۼۼ over Ethernet Plus (PoE+) models Authentication, Authorization, and Accounting ۼۼ provide an ideal solution for connecting disabled to save power (AAA) Industry-standard CLI with context-sensitive help ۼ and remotely powering wireless access ۼ ۼ Bootloader can be password protected for device ۼ ,points, IP video surveillance cameras Powerful CLI scripting engine security ۼۼ ۼ and IP phones. The GS970M models BPDU protection ۼۼ -Comprehensive SNMP MIB support for standards ۼ feature 8, 16 or 24 Gigabit ports, based device management ۼ DHCP snooping, IP source guard and Dynamic ARP ۼ and 2 or 4 SFP uplinks, for secure (Built-in text editor Inspection
    [Show full text]
  • Communications Programming Concepts
    AIX Version 7.1 Communications Programming Concepts IBM Note Before using this information and the product it supports, read the information in “Notices” on page 323 . This edition applies to AIX Version 7.1 and to all subsequent releases and modifications until otherwise indicated in new editions. © Copyright International Business Machines Corporation 2010, 2014. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents About this document............................................................................................vii How to use this document..........................................................................................................................vii Highlighting.................................................................................................................................................vii Case-sensitivity in AIX................................................................................................................................vii ISO 9000.....................................................................................................................................................vii Communication Programming Concepts................................................................. 1 Data Link Control..........................................................................................................................................1 Generic Data Link Control Environment Overview...............................................................................
    [Show full text]
  • Tutorial on Network Communications and Security
    Lecture Notes Introduction to Digital Networks and Security Raj Bridgelall, PhD © Raj Bridgelall, PhD (North Dakota State University, College of Business) Page 1/23 Table of Contents PART I – NETWORKING CONCEPTS.....................................................................................4 1 INTRODUCTION..................................................................................................................4 2 DATA COMMUNICATIONS ..............................................................................................4 2.1 THE OSI MODEL ...............................................................................................................4 2.2 NETWORKING DEVICES .....................................................................................................5 2.3 TCP/IP ..............................................................................................................................6 3 MOBILE IP ............................................................................................................................7 3.1 FIREWALLS........................................................................................................................9 3.2 DHCP AND DNS ..............................................................................................................9 3.3 IPV6 ................................................................................................................................10 PART II – CRYPTOGRAPHY AND NETWORK SECURITY .............................................12
    [Show full text]
  • 1.2. OSI Model
    1.2. OSI Model The OSI model classifies and organizes the tasks that hosts perform to prepare data for transport across the network. You should be familiar with the OSI model because it is the most widely used method for understanding and talking about network communications. However, remember that it is only a theoretical model that defines standards for programmers and network administrators, not a model of actual physical layers. Using the OSI model to discuss networking concepts has the following advantages: Provides a common language or reference point between network professionals Divides networking tasks into logical layers for easier comprehension Allows specialization of features at different levels Aids in troubleshooting Promotes standards interoperability between networks and devices Provides modularity in networking features (developers can change features without changing the entire approach) However, you must remember the following limitations of the OSI model: OSI layers are theoretical and do not actually perform real functions. Industry implementations rarely have a layer‐to‐layer correspondence with the OSI layers. Different protocols within the stack perform different functions that help send or receive the overall message. A particular protocol implementation may not represent every OSI layer (or may spread across multiple layers). To help remember the layer names of the OSI model, try the following mnemonic devices: Mnemonic Mnemonic Layer Name (Bottom to top) (Top to bottom) Layer 7 Application Away All Layer 6 Presentation Pizza People Layer 5 Session Sausage Seem Layer 4 Transport Throw To Layer 3 Network Not Need Layer 2 Data Link Do Data Layer 1 Physical Please Processing Have some fun and come up with your own mnemonic for the OSI model, but stick to just one so you don't get confused.
    [Show full text]
  • High-Level Data Link Control
    ELEC3030 (EL336) Computer Networks S Chen High-Level Data Link Control • This class of data link layer protocols includes High-level Data Link Control (HDLC), Link Access Procedure Balanced (LAPB) for X.25, Link Access Procedure for D-channel (LAPD) for ISDN, and Logic Link Control (LLC) for FDDI • The frame format is: Flag Address Control Data FCS Flag Note that address and control bits 8 8 8 variable 16 8 can be extended to 16 bits, so bit position 12 3 4 5 6 7 8 N(S)=send sequence number N(R)=receive sequence number that sequence number is 7-bit Information: 0 N(S) P/F N(R) S=supervisory function bits P/F • Frame flag: 01111110, so bit Supervisory: 1 0 S N(R) M=unumbered function bits stuffing is used Unumbered: 1 1 M P/F M P/F=poll/final bit • Address: For multipoint operation, it is used to identify the terminal that transmits or receives the frame and, in point-to-point link, it is used to distinguish Commands from Responses (2nd bit for C/R: 0/1). The address is now extended to 16 bits (1st bit indicates long/short 16/8 bits) • Checksum: FCS contains the remainder of a 16-bit CRC calculation of the frame. It may be extended to 32 bits, using a 32-bit CRC • Control: Three types of frames, I, S and U frames. The old protocol uses a sliding window with 3-bit sequence number and the maximum window size is N = 7. The control field is now extended to 16 bits with 7-bit sequence number 60 ELEC3030 (EL336) Computer Networks S Chen HDLC (continue) • I-frames: carry user data.
    [Show full text]
  • Etsi En 301 192 V1.7.1 (2021-08)
    ETSI EN 301 192 V1.7.1 (2021-08) EUROPEAN STANDARD Digital Video Broadcasting (DVB); DVB specification for data broadcasting 2 ETSI EN 301 192 V1.7.1 (2021-08) Reference REN/JTC-DVB-367 Keywords broadcasting, data, digital, DVB, MPEG, video ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N° 348 623 562 00017 - APE 7112B Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° w061004871 Important notice The present document can be downloaded from: http://www.etsi.org/standards-search The present document may be made available in electronic versions and/or in print. The content of any electronic and/or print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any existing or perceived difference in contents between such versions and/or in print, the prevailing version of an ETSI deliverable is the one made publicly available in PDF format at www.etsi.org/deliver. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at https://portal.etsi.org/TB/ETSIDeliverableStatus.aspx If you find errors in the present document, please send your comment to one of the following services: https://portal.etsi.org/People/CommiteeSupportStaff.aspx Notice of disclaimer & limitation of liability The information provided in the present deliverable is directed solely to professionals who have the appropriate degree of experience to understand and interpret its content in accordance with generally accepted engineering or other professional standard and applicable regulations.
    [Show full text]
  • A PROPOSED REVISION to IRIG 218 BASED on REAL WORLD EXPERIENCE Gary A
    A PROPOSED REVISION TO IRIG 218 BASED ON REAL WORLD EXPERIENCE Gary A. Thom GDP Space Systems 300 Welsh Road, Horsham, PA 19044 [email protected] Abstract The Range Commanders Council has been attempting to standardize Telemetry over IP (TMoIP) for many years now. While the attempt has been valiant, the outcome to date has not been very successful. As a result, many vendors have implemented their own proprietary methods for sending PCM data over IP networks resulting in a lack of interoperability. As telemetry ground stations are finally making the move toward network centric architectures, it is worth considering the lessons learned over the previous 10 years of designing, installing, troubleshooting and optimizing telemetry data distribution over IP networks. This paper describes a proposed revision to IRIG 218 based on these real life experiences. It discusses the critical decisions and architectural decisions to be made and some of the pitfalls to be avoid. Key Words: IRIG 218, TMoIP, IP, TCP, UDP, network, PCM. 1 Introduction The motivation for moving to TMoIP was twofold: first, to find cost effective PCM data distribution and second, to provide reliable and robust PCM data distribution regardless of the destination. The global explosion of IP networking has provided a built in infrastructure with access to the most remote destinations. A wide variety of transport mechanisms for IP traffic provides ubiquitous connectivity, whether twisted pair, fiber optic cable, microwave links, satellite links, analog modems and cell phones, IP connectivity is everywhere. This ubiquity and global deployment has driven down the cost of networking components such as routers and switches.
    [Show full text]
  • 3. Layer 2 - the Data Link Layer This Section of the Course, So That We Will Quickly Gain an Read [Tanenbaum96] Ch
    We will examine the Logical Link Control (top) sub-layer in 3. Layer 2 - The Data Link Layer this section of the course, so that we will quickly gain an Read [Tanenbaum96] Ch. 3. You can skim Section 3.5.2. understanding the exchange of basic frames of data. Much later in the course, after looking at this and basic store-and-forward This layer provides: networks, will we finally look at the complexities of networks • transmission of basic data frames over, based on shared media access. • and control of, The basic LLC topics that need to be covered are: a single hop link. This section only applies to non-multi-hop 1) framing transmissions. i.e. point-to-point transmission, or semi- 2) error detection and control (and it's subsidiary problem of broadcast (but not store + forward) networks. single-hop re-sequencing) There are two sub-layers to this layer: 3) flow control a) The top one does ‘logical link control’ and thus manages single-hop framing, errors, flow, and half-duplex turn control. TABLE OF CONTENTS - is located at end of the section. b) The bottom one manages media access control and is only present on broadcast (shared) media. It manages contention and multi-point turn control. NETWORK LAYER Logical Link Control (LLC) Sub-Layer DATA LINK Media Access Control (MAC) LAYER Sub-Layer PHYSICAL LAYER 3-1 3-2 3.1 Framing Since in asynchronous transmission a stream of characters is received, and in synchronous transmission a stream of bits is A ‘frame’ is the basic unit of data at ISO Level 2.
    [Show full text]