slide1
Download
Skip this Video
Download Presentation
Chapter 5

Loading in 2 Seconds...

play fullscreen
1 / 44

Chapter 5 - PowerPoint PPT Presentation


  • 107 Views
  • Uploaded on

Chapter 5. Data Link Layer. O BJECTIVES. Understand the concept of the hop-to-hop delivery compared to host-to-host delivery and application-to-application delivery. Understand the concept of access method and define different access methods used in LANs and WANs.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Chapter 5' - rowena


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
slide1
Chapter 5

Data Link

Layer

slide2
OBJECTIVES

Understand the concept of the hop-to-hop delivery compared to

host-to-host delivery and application-to-application delivery.

Understand the concept of access method and define different

access methods used in LANs and WANs.

Understand the addressing mechanism used in the data link

layer and how network layer addresses are mapped to data

layer addresses.

Understand how error control is handled at the data link layer.

Understand the functions of the data link layer.

After reading this chapter, the reader should be able to:

slide3
5.1

DUTIES OF THE

DATA LINK LAYER

slide4
Figure 5-1

Data link layer in the Internet model

slide5
Figure 5-2

Data-link layer duties

slide6
5.2

HOP-TO-HOP

DELIVERY

slide7
Figure 5-3

Hop-to-hop delivery

slide8
5.3

PACKETIZING

slide9
5.4

ADDRESSING

slide10
Technical Focus:Addresses in Local Area Networks

The physical address for most computers on local area networks

is imprinted on the network card that is installed in the computer.

If the user or network manager changes the network card

(because of a failure, for example), the physical address

of the computer is changed. In most cases, changing

the network card requires reconfiguration of the computer.

slide11
Figure 5-4

ARP operation

slide12
5.5

ERROR CONTROL

slide13
Note:

Data can be corrupted during transmission. For reliable communication, errors must be prevented, or detected and corrected.

slide14
Note:

In a single-bit error, only 1 bit in the data unit has changed.

slide15
Figure 5-5

Single-bit error

slide16
Note:

A burst error means that two or more bits in the data unit have changed.

slide17
Figure 5-6

Burst error of length five

slide18
Note:

Error detection uses the concept of redundancy, which means adding extra bits for detecting errors at the destination.

slide19
Figure 5-7

Redundancy

slide20
Figure 5-8

Detection methods

slide21
Note:

In vertical redundancy check (VRC), a parity bit is added to every data unit so that the total number of 1s becomes even.

slide22
Figure 5-9

Even parity VRC concept

slide24
Note:

In longitudinal redundancy check (LRC), a block of bits is divided into rows and a redundant row of bits is added to the whole block.

slide26
Figure 5-12

Stop and wait ARQ

slide27
The sending device keeps a copy of the last frame transmitteduntil it receives an acknowledgment for that frame.

Both data frames and ACK frames are

numbered 0 and 1 alternately. A data 0 frame is acknowledged

by an ACK 1 frame.

If an error is discovered in a data frame, a negative

acknowledgment (NAK) frame is returned.

If an expected acknowledgment is not received within an

allotted time period, the sender assumes that the last data frame was lost in transit and sends it again.

Technical Focus:Procedure for Stop-And-Wait ARQ

slide28
Figure 5-13

Sliding-window ARQ

slide29
The sending device keeps copies of all transmitted frames until

they have been acknowledged.

In addition to ACK frames, a receiver can return a NAK frame

if the data have been received damaged. The NAK frame

tells the sender to retransmit a damaged frame.

Like stop-and-wait ARQ, the sending device in sliding-window

ARQ is equipped with a timer to enable it to handle lost

acknowledgments.

Technical Focus:Procedure for Sliding-Window ARQ

slide30
5.6

FLOW CONTROL

slide31
Note:

Flow control refers to a set of procedures used to restrict the amount of data the sender can send before waiting for acknowledgment.

slide32
5.1

MEDIUM ACCESS

CONTROL

slide33
Figure 5-14

Medium access methods

slide36
Note:

The poll/select method is mostly used in time-sharing systems when a central computer is used to control other computers.

slide37
Figure 5-17

Token passing network

slide38
Note:

Token passing is used mostly by local area networks (LANs). We discuss LANs in Chapter 9.

slide39
Note:

CSMA/CD is used in the Ethernet LAN discussed in Chapter 9.

slide40
Note:

CSMA/CA is used in the wireless LANs discussed in Chapter 10.

slide41
5.8

DATA LINK

PROTOCOLS

slide42
Note:

A data link protocol is a set of specifications used to implement the data link layer.

slide43
Note:

In a character-oriented protocol, the frame is interpreted as a series of characters. In a bit-oriented protocol, the frame or packet is interpreted as a series of bits.

slide44
Note:

All bit-oriented protocols are relatedto high-level data link control(HDLC), a bit-oriented protocol.

ad