Logical Link Protocols
Logical link control protocols
There are 3 types of LLC protocols.
1.Pure ALOHA
2.Slotted ALOHA
3.HDLC
ALOHA
• Aloha, also called the Aloha method, refers to a simple
communications scheme in which each source (transmitter) in a
network sends data whenever there is a frame to send.
PURE ALOHA
• It allows the stations to transmit data at any time whenever they want.
• After transmitting the data packet, station waits for some time.
• Then, following 2 cases are possible
Case-01:
• Transmitting station receives an acknowledgement from the receiving station.
• In this case, transmitting station assumes that the transmission is successful.
Case-02:
• Transmitting station does not receive any acknowledgement within specified time from the receiving
station.
• In this case, transmitting station assumes that the transmission is unsuccessful.
• Transmitting station uses a Back Off Strategy and waits for some random amount of time.
• After back off time, it transmits the data packet again.
• It keeps trying until the back off limit is reached after which it aborts the transmission.
Logical link protocols and service data.pptx
Pure (unslotted) ALOHA
• unslotted Aloha: simpler, no synchronization
• pkt needs transmission:
• send without awaiting for beginning of slot
• collision probability increases:
• pkt sent at t0 collide with other pkts sent in [t0-1, t0+1]
SLOTTED ALOHA
• Slotted Aloha divides the time of shared channel into discrete intervals
called as time slots.
• Any station can transmit its data in any time slot.
• The only condition is that station must start its transmission from the
beginning of the time slot.
• If the beginning of the slot is missed, then station has to wait until the
beginning of the next time slot.
• A collision may occur if two or more stations try to transmit data at the
beginning of the same time slot
Slotted Aloha
• time is divided into equal size slots (= pkt trans. time)
• node with new pkt: transmit at beginning of next slot
• if collision: retransmit pkt in future slots with probability p,
until successful.
Success (S), Collision (C), Empty (E) slots
Logical link protocols and service data.pptx
CSMA: (Carrier Sense Multiple Access)
CSMA: listen before transmit:
• If channel sensed idle: transmit entire pkt
• If channel sensed busy, defer transmission
• Types of CSMA
• 1-Persistent CSMA
• Non-Persistent CSMA
• P-Persistent CSMA
• O-Persistent CSMA
CSMA/CD (Collision Detection)
CSMA/CD: carrier sensing, deferral as in CSMA
• collisions detected within short time
• colliding transmissions aborted, reducing channel wastage
• persistent or non-persistent retransmission
• collision detection:
• easy in wired LANs: measure signal strengths, compare transmitted, received
signals
• difficult in wireless LANs: receiver shut off while transmitting
Token Ring
• Used in bus and ring network topologies (token ring)
• Each computer in the network can only send its data if it has the token.
This prevents collisions that occur when data is sent at the same time
over the network
• The token is a special pattern of bits/bit in a frame that is directly
detectible by each node in the network
• A computer may only transmit information if it is in possession of the
token
• The message is sent to all other computers in the network
Operation of Token Ring
FDDI (Fiber Distributed Data Interface)
• FDDI is a standard developed by the American National Standards Institute
(ANSI) for transmitting data on optical fibers
• Supports transmission rates of up to 200 Mbps
• Uses a dual ring
• First ring used to carry data at 100 Mbps
• Second ring used for primary backup in case first ring fails
• If no backup is needed, second ring can also carry data, increasing the data rate up to 200
Mbps
• Supports up to 1000 nodes
• Has a range of up to 200 km
Logical link protocols and service data.pptx
Logical link protocols and service data.pptx
Ethernet
• Most successful local area networking technology of last 20
years.
• Developed in the mid-1970s by researchers at the Xerox Palo
Alto Research Centers (PARC).
• Uses CSMA/CD technology
• Carrier Sense Multiple Access with Collision Detection.
• A set of nodes send and receive frames over a shared link.
• Carrier sense means that all nodes can distinguish between an idle and a
busy link.
• Collision detection means that a node listens as it transmits and can
therefore detect when a frame it is transmitting has collided with a
frame transmitted by another node.
Ethernet
• Multiple Ethernet segments can be joined together by repeaters.
• A repeater is a device that forwards digital signals.
• No more than four repeaters may be positioned between any pair of hosts.
• An Ethernet has a total reach of only 2500 m.
Frame Format
Logical link protocols and service data.pptx
• Worst-case scenario: (a) A sends a frame at time t; (b) A’s frame
arrives
• at B at time t + d; (c) B begins transmitting at time t + d and
collides with A’s frame;
• (d) B’s runt (32-bit) frame arrives at A at time t + 2d.
Bluetooth
• The basic Bluetooth network configuration is called a piconet
• Consists of a master device and up to seven slave devices
• Any communication is between the master and a slave
• The slaves do not communicate directly with each other
• A slave can be parked: set to an inactive, low-power state
Logical link protocols and service data.pptx
802.11
IEEE 802.11
• Also known as Wi-Fi
• Like its Ethernet and token ring siblings, 802.11 is designed
for use in a limited geographical area (homes, office
buildings, campuses)
• Primary challenge is to mediate access to a shared communication
medium – in this case, signals propagating through space
• 802.11 supports additional features
• power management and
• security mechanisms
• Consider the situation shown in the following figure when node C moves
from the cell serviced by AP-1 to the cell serviced by AP-2.
• As it moves, it sends Probe frames, which eventually result in Probe
Responses from AP-2.
• At some point, C prefers AP-2 over AP-1 , and so it associates itself with
that access point.
• This is called active scanning since the node is actively searching for an
access point
IEEE 802.11 – Distribution System
Node Mobility
IEEE

More Related Content

PPTX
Multiple Access Protocal
PDF
Unit-2 Media Access Protocols.pdf
PPTX
MAC COMPUTER NETWORK DATA LINK LAYER PROTOCOLS.pptx
PPTX
Computer networks unit ii
PPT
Mac sub layer
PPT
MEDIUM-ACCESS CONTROL SUB LAYER.ppt
PPTX
link-medium-access-control.pptx
PPTX
Multiple access protocols in data communication networks
Multiple Access Protocal
Unit-2 Media Access Protocols.pdf
MAC COMPUTER NETWORK DATA LINK LAYER PROTOCOLS.pptx
Computer networks unit ii
Mac sub layer
MEDIUM-ACCESS CONTROL SUB LAYER.ppt
link-medium-access-control.pptx
Multiple access protocols in data communication networks

Similar to Logical link protocols and service data.pptx (20)

PPT
CN_unit2.ppt Data Link Layer characteristics, categories
PPTX
Ethernet Data link layer Local area network
PPTX
DLL Elementary protocols from computer networks.pptx
PPTX
Ethernet___how___network___works___.pptx
PPTX
Switching Concepts presentation
PPTX
CN Unit 2 - cs8591.pptx
PPTX
LAN ARCHITECTURE in computer networking.ppt
PPTX
Media Access Control
PPTX
ETHERNET IEEE802.pptx
PDF
lecture06-link-layer.pdf
PPT
datalink.ppt
PPTX
Computer Network
PPTX
clas 8
PPTX
wireless networks
PPTX
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)
PPT
Unit 2 ppt 3.ppt
PDF
Ethernet 19 20
PPTX
PPT
ethernet for netwoking process and encoding
PPT
Power point for ethernet and the types.ppt
CN_unit2.ppt Data Link Layer characteristics, categories
Ethernet Data link layer Local area network
DLL Elementary protocols from computer networks.pptx
Ethernet___how___network___works___.pptx
Switching Concepts presentation
CN Unit 2 - cs8591.pptx
LAN ARCHITECTURE in computer networking.ppt
Media Access Control
ETHERNET IEEE802.pptx
lecture06-link-layer.pdf
datalink.ppt
Computer Network
clas 8
wireless networks
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)
Unit 2 ppt 3.ppt
Ethernet 19 20
ethernet for netwoking process and encoding
Power point for ethernet and the types.ppt
Ad

More from RAJESH S (20)

PDF
Service Operation Managements Unit 1.pdf
PPT
Unit II Ethernet devices and Sub categories.ppt
PPT
Connecting devices in Computer parts.ppt
PPTX
unitios-22112405585Operational 3-5fc1b7da.pptx
PPT
Analysis of Algorithm DAA notes Part 1.ppt
PPT
error detection and Error control detection .ppt
PPT
Analysis of Algorithm Part one analysis.ppt
PPT
Entreprise Resource Planning s unit 2.ppt
PPTX
Decision support systems in information management
PPT
IM Unit 4 Security and its a control.ppt
PPT
unit5 Enterprise Resource Planning new trends.ppt
PPTX
science engineering and technology .pptx
PPTX
policies in economics trends for engineers
PDF
Product Decisions and its aplication in global world
PPT
Database management system basics and it applications
PPTX
Computer Animation.pptx
PPTX
IOT in agriculture.pptx
PPTX
18copy.pptx
PPT
ERP unit 1.ppt
PPT
fiscalpolicy.ppt
Service Operation Managements Unit 1.pdf
Unit II Ethernet devices and Sub categories.ppt
Connecting devices in Computer parts.ppt
unitios-22112405585Operational 3-5fc1b7da.pptx
Analysis of Algorithm DAA notes Part 1.ppt
error detection and Error control detection .ppt
Analysis of Algorithm Part one analysis.ppt
Entreprise Resource Planning s unit 2.ppt
Decision support systems in information management
IM Unit 4 Security and its a control.ppt
unit5 Enterprise Resource Planning new trends.ppt
science engineering and technology .pptx
policies in economics trends for engineers
Product Decisions and its aplication in global world
Database management system basics and it applications
Computer Animation.pptx
IOT in agriculture.pptx
18copy.pptx
ERP unit 1.ppt
fiscalpolicy.ppt
Ad

Recently uploaded (20)

PDF
distributed database system" (DDBS) is often used to refer to both the distri...
PPTX
Chemical Technological Processes, Feasibility Study and Chemical Process Indu...
PDF
August 2025 - Top 10 Read Articles in Network Security & Its Applications
PDF
III.4.1.2_The_Space_Environment.p pdffdf
PPTX
ASME PCC-02 TRAINING -DESKTOP-NLE5HNP.pptx
PDF
ChapteR012372321DFGDSFGDFGDFSGDFGDFGDFGSDFGDFGFD
PDF
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
PPTX
Fundamentals of safety and accident prevention -final (1).pptx
PDF
Soil Improvement Techniques Note - Rabbi
PDF
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
PPT
Total quality management ppt for engineering students
PPTX
Information Storage and Retrieval Techniques Unit III
PPTX
Module 8- Technological and Communication Skills.pptx
PPT
INTRODUCTION -Data Warehousing and Mining-M.Tech- VTU.ppt
PDF
Improvement effect of pyrolyzed agro-food biochar on the properties of.pdf
PDF
Visual Aids for Exploratory Data Analysis.pdf
PPTX
Fundamentals of Mechanical Engineering.pptx
PPTX
Feature types and data preprocessing steps
PPTX
CURRICULAM DESIGN engineering FOR CSE 2025.pptx
PPTX
Management Information system : MIS-e-Business Systems.pptx
distributed database system" (DDBS) is often used to refer to both the distri...
Chemical Technological Processes, Feasibility Study and Chemical Process Indu...
August 2025 - Top 10 Read Articles in Network Security & Its Applications
III.4.1.2_The_Space_Environment.p pdffdf
ASME PCC-02 TRAINING -DESKTOP-NLE5HNP.pptx
ChapteR012372321DFGDSFGDFGDFSGDFGDFGDFGSDFGDFGFD
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
Fundamentals of safety and accident prevention -final (1).pptx
Soil Improvement Techniques Note - Rabbi
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
Total quality management ppt for engineering students
Information Storage and Retrieval Techniques Unit III
Module 8- Technological and Communication Skills.pptx
INTRODUCTION -Data Warehousing and Mining-M.Tech- VTU.ppt
Improvement effect of pyrolyzed agro-food biochar on the properties of.pdf
Visual Aids for Exploratory Data Analysis.pdf
Fundamentals of Mechanical Engineering.pptx
Feature types and data preprocessing steps
CURRICULAM DESIGN engineering FOR CSE 2025.pptx
Management Information system : MIS-e-Business Systems.pptx

Logical link protocols and service data.pptx

  • 2. Logical link control protocols There are 3 types of LLC protocols. 1.Pure ALOHA 2.Slotted ALOHA 3.HDLC
  • 3. ALOHA • Aloha, also called the Aloha method, refers to a simple communications scheme in which each source (transmitter) in a network sends data whenever there is a frame to send.
  • 4. PURE ALOHA • It allows the stations to transmit data at any time whenever they want. • After transmitting the data packet, station waits for some time. • Then, following 2 cases are possible Case-01: • Transmitting station receives an acknowledgement from the receiving station. • In this case, transmitting station assumes that the transmission is successful. Case-02: • Transmitting station does not receive any acknowledgement within specified time from the receiving station. • In this case, transmitting station assumes that the transmission is unsuccessful. • Transmitting station uses a Back Off Strategy and waits for some random amount of time. • After back off time, it transmits the data packet again. • It keeps trying until the back off limit is reached after which it aborts the transmission.
  • 6. Pure (unslotted) ALOHA • unslotted Aloha: simpler, no synchronization • pkt needs transmission: • send without awaiting for beginning of slot • collision probability increases: • pkt sent at t0 collide with other pkts sent in [t0-1, t0+1]
  • 7. SLOTTED ALOHA • Slotted Aloha divides the time of shared channel into discrete intervals called as time slots. • Any station can transmit its data in any time slot. • The only condition is that station must start its transmission from the beginning of the time slot. • If the beginning of the slot is missed, then station has to wait until the beginning of the next time slot. • A collision may occur if two or more stations try to transmit data at the beginning of the same time slot
  • 8. Slotted Aloha • time is divided into equal size slots (= pkt trans. time) • node with new pkt: transmit at beginning of next slot • if collision: retransmit pkt in future slots with probability p, until successful. Success (S), Collision (C), Empty (E) slots
  • 10. CSMA: (Carrier Sense Multiple Access) CSMA: listen before transmit: • If channel sensed idle: transmit entire pkt • If channel sensed busy, defer transmission • Types of CSMA • 1-Persistent CSMA • Non-Persistent CSMA • P-Persistent CSMA • O-Persistent CSMA
  • 11. CSMA/CD (Collision Detection) CSMA/CD: carrier sensing, deferral as in CSMA • collisions detected within short time • colliding transmissions aborted, reducing channel wastage • persistent or non-persistent retransmission • collision detection: • easy in wired LANs: measure signal strengths, compare transmitted, received signals • difficult in wireless LANs: receiver shut off while transmitting
  • 12. Token Ring • Used in bus and ring network topologies (token ring) • Each computer in the network can only send its data if it has the token. This prevents collisions that occur when data is sent at the same time over the network • The token is a special pattern of bits/bit in a frame that is directly detectible by each node in the network • A computer may only transmit information if it is in possession of the token • The message is sent to all other computers in the network
  • 14. FDDI (Fiber Distributed Data Interface) • FDDI is a standard developed by the American National Standards Institute (ANSI) for transmitting data on optical fibers • Supports transmission rates of up to 200 Mbps • Uses a dual ring • First ring used to carry data at 100 Mbps • Second ring used for primary backup in case first ring fails • If no backup is needed, second ring can also carry data, increasing the data rate up to 200 Mbps • Supports up to 1000 nodes • Has a range of up to 200 km
  • 17. Ethernet • Most successful local area networking technology of last 20 years. • Developed in the mid-1970s by researchers at the Xerox Palo Alto Research Centers (PARC). • Uses CSMA/CD technology • Carrier Sense Multiple Access with Collision Detection. • A set of nodes send and receive frames over a shared link. • Carrier sense means that all nodes can distinguish between an idle and a busy link. • Collision detection means that a node listens as it transmits and can therefore detect when a frame it is transmitting has collided with a frame transmitted by another node.
  • 18. Ethernet • Multiple Ethernet segments can be joined together by repeaters. • A repeater is a device that forwards digital signals. • No more than four repeaters may be positioned between any pair of hosts. • An Ethernet has a total reach of only 2500 m.
  • 21. • Worst-case scenario: (a) A sends a frame at time t; (b) A’s frame arrives • at B at time t + d; (c) B begins transmitting at time t + d and collides with A’s frame; • (d) B’s runt (32-bit) frame arrives at A at time t + 2d.
  • 22. Bluetooth • The basic Bluetooth network configuration is called a piconet • Consists of a master device and up to seven slave devices • Any communication is between the master and a slave • The slaves do not communicate directly with each other • A slave can be parked: set to an inactive, low-power state
  • 25. IEEE 802.11 • Also known as Wi-Fi • Like its Ethernet and token ring siblings, 802.11 is designed for use in a limited geographical area (homes, office buildings, campuses) • Primary challenge is to mediate access to a shared communication medium – in this case, signals propagating through space • 802.11 supports additional features • power management and • security mechanisms
  • 26. • Consider the situation shown in the following figure when node C moves from the cell serviced by AP-1 to the cell serviced by AP-2. • As it moves, it sends Probe frames, which eventually result in Probe Responses from AP-2. • At some point, C prefers AP-2 over AP-1 , and so it associates itself with that access point. • This is called active scanning since the node is actively searching for an access point IEEE 802.11 – Distribution System Node Mobility
  • 27. IEEE