data link layer n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
Data Link Layer PowerPoint Presentation
Download Presentation
Data Link Layer

Loading in 2 Seconds...

play fullscreen
1 / 17

Data Link Layer - PowerPoint PPT Presentation


  • 117 Views
  • Uploaded on

Data Link Layer. B. Konkoth. PDU. Protocol Data Unit A unit of data which is specified in a protocol of a given layer Layer 5, 6, 7 – Data Layer 4 – Segment Layer 3 – Packet Layer 2 – Frame Layer 1 - Bit. Data Link Layer.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

Data Link Layer


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
    Presentation Transcript
    1. Data Link Layer B. Konkoth

    2. PDU • Protocol Data Unit • A unit of data which is specified in a protocol of a given layer • Layer 5, 6, 7 – Data • Layer 4 – Segment • Layer 3 – Packet • Layer 2 – Frame • Layer 1 - Bit

    3. Data Link Layer • Provides a well-defined service interface to the network layer. • Determines how the bits of the physical layer are grouped into frames (framing). • Deals with transmission errors . • Regulates the flow of frames. • Performs general link layer management.

    4. Some terminology: hosts and routers are nodes (bridges and switches too) communication channels that connect adjacent nodes along communication path are links wired links wireless links LANs PDU is a frame “link” Link Layer: Introduction

    5. 2 sub-layers in Data Link Layer • logical link control (LLC) • media access control (MAC)

    6. logical link control (LLC) • starts and maintains connections between devices. • when you send data from your workstation to a server on the same network segment, LLC sub-layer establishes a connection with that server

    7. media access control (MAC) • The MAC Layer enables multiple devices to share the media • MAC sub-layer maintains physical device addresses for communicating with other devices (commonly referred to as MAC addresses) • Most LANs have more than one computer, and the MAC sub-layer determines who may speak and when • Ethernet – CSMA/CD • Token ring – Token passing • FDDI – Dual ring

    8. IEEE 802 Project

    9. IEEE 802 • Institute of Electrical and Electronic Engineers (IEEE) began a project in February of 1980, known as Project 802 • for the year and month it began • It is a set of standards given to the various LAN architectures such as Ethernet and Token Ring

    10. 802.11 • Specifications developed for wireless LAN technology • Examples are 802.11a, 802.11g, 802.11n

    11. 802.2 • Standard defining Logical Link Control (LLC) • responsible for the data transmission between computers or devices on a network • provides a general interface between the different protocols (IPX, TCP/IP, etc.) and the different network types (Ethernet, Token Ring, etc.)

    12. 802.3 • 802.3 is the standard for popular Ethernet networks today • 802.3 specifies the physical media and the working characteristics of Ethernet • Data are transmitted using CSMA/CD

    13. CSMA (Carrier Sense Multiple Access) CSMA: listen before transmit: • If channel sensed idle: transmit entire frame • If channel sensed busy, defer transmission • Human analogy: listen, don’t interrupt others!

    14. CSMA/CD (Collision Detection) • collision detection: • measure signal strengths, compare transmitted, received signals: easy in wired LANs • difficult in wireless LANs: receiver shut off while transmitting • Most used protocol in Ethernet

    15. CSMA/CD • CSMA/CD doesn’t stop collisions from happening, but it helps manage the situations when collisions occur. • In fact, collisions are a very normal part of Ethernet operation. It’s only when collisions begin to occur frequently that you need to become concerned.

    16. 802.5 • The 802.5 standard was modeled after the IBM Token Ring network • Introduced a unique access method: token passing

    17. Token Ring • A token is generated by the first computer that comes online on the network. • When a workstation wants to transmit data, it grabs the token and then begins transmitting • The destination computer receives the data frame, modifies it, and sends it back to the sender, indicating that the transmission of data was successful. • When the workstation completes transmitting, the token is released back to the network