Chapter Six The Data Link Layer. Objectives Learn about physical addressing on the network. Explore the MAC and LLC sublayers of Data Link. Get introduced.

Slides:



Advertisements
Similar presentations
Data Link Layer B. Konkoth. PDU  Protocol Data Unit  A unit of data which is specified in a protocol of a given layer  Layer 5, 6, 7 – Data  Layer.
Advertisements

Chapter 7 Data Link Layer
Answers of Exercise 7 1. Explain what are the connection-oriented communication and the connectionless communication. Give some examples for each of the.
1 Chapter 9 Computer Networks. 2 Chapter Topics OSI network layers Network Topology Media access control Addressing and routing Network hardware Network.
Ethernet Kenneth Castelino. Network Architecture - Protocols Physical: Actual signal transmission Data-Link: Framing / Error Detection Network: Routing.
TDC /502, Summer II Unit 2: Underlying Technologies Transmission media (Section 3.1. Read on your own) Local Area Networks (LANs) –Ethernet.
1 Computer Networks Local Area Networks. 2 A LAN is a network: –provides Connectivity of computers, mainframes, storage devices, etc. –spans limited geographical.
Chapter 14 LAN Systems Ethernet (CSMA/CD) ALOHA Slotted ALOHA CSMA
Internetworking School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 4, Tuesday 1/30/2007)
Network Concepts. Networks LAN WAN Main Concepts n Protocol n Media n Topology.
TDC 461 Basic Communications Systems Local Area Networks 29 May, 2001.
Ethernet: CSMA/CD (Carrier Sense Multiple Access with Collision Detection) Access method: method of controlling how network nodes access communications.
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
5-1 Data Link Layer r Today, we will study the data link layer… r This is the last layer in the network protocol stack we will study in this class…
Understanding Networks II. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
Understanding Network Architecture Access Methods –CSMA/CD Carrier Sense Multiple Access/Collision Detect –CSMA/CA Carrier Sense Multiple Access/Collision.
Error Checking continued. Network Layers in Action Each layer in the OSI Model will add header information that pertains to that specific protocol. On.
The Saigon CTT Semester 1 CHAPTER 6. The Saigon CTT  Content LAN Standards. Hexadecimal Numbers. MAC Addressing. Framing. Media Access Control (MAC).
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
Chapter Five Network Architecture. Chapter Objectives  Describe the basic and hybrid LAN technologies  Describe a variety of enterprise-wide and WAN.
SIMS-201 Computer Networks. 2 Introduction to Computer Networks Chapter 19 The Local Area Network  Overview.
Chapter 7 Local Area Networks: The Basics. Topics Definition of LAN Primary function, advantage and disadvantage Difference between Client/Server network.
1 LAN Technologies and Network Topology. 2 Direct Point-to-Point Communication.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Data Link Layer Dr. Muazzam A. Khan.
Ethernet Fundamentals. The success of Ethernet is due to the following factors: Simplicity and ease of maintenance Ability to incorporate new technologies.
Access to Shared Media - Media Access Control protocols RD-CSY10171.
CCNA1 v3 Module 1 v3 CCNA 1 Module 6 JEOPARDY K. Martin.
Link Layer: MAC Ilam University Dr. Mozafar Bag-Mohammadi.
Data Link Layer Moving Frames. Link Layer Protocols: ethernet, wireless, Token Ring and PPP Has node-to-node job of moving network layer.
Networks and Protocols CE Week 2b. Topologies, CSMA/CD, CSMA/CA.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Unit-II Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Day10 LAN. Why? Allow more than one machine to share –Resources –Internet connectivity –Information.
The Saigon CTT Semester 1 CHAPTER 6 Le Chi Trung.
Lecture 4 Overview. Ethernet Data Link Layer protocol Ethernet (IEEE 802.3) is widely used Supported by a variety of physical layer implementations Multi-access.
Chabot College ELEC Layer 2 - Highlights.
Data Link Layer and Ethernet COM211 Communications and Networks CDA College Theodoros Christophides
IEEE 802.X Standards The Institute of Electrical and Electronics Engineers (IEEE) has developed a series of networking standards to ensure that networking.
Understanding Network Architecture CHAPTER FOUR. The Function of Access Methods The set of rules that defines how a computer puts data onto the network.
Internetworking School of Business Eastern Illinois University © Abdou Illia, Spring 2016 (February 3, 2016)
Networking and Health Information Exchange Unit 1b ISO Open Systems Interconnection (OSI) Component 9/Unit 1b1 Health IT Workforce Curriculum Version 1.0/Fall.
2016/3/11 1 Data Link Layer. 2016/3/11 2 Two basic services of Data Link Allows the upper layers to access the media using techniques such as framing.
+ Lecture#2: Ethernet Asma ALOsaimi. + Objectives In this chapter, you will learn to: Describe the operation of the Ethernet sublayers. Identify the major.
Chapter Objectives After completing this chapter you will be able to: Describe in detail the following Local Area Network (LAN) technologies: Ethernet.
COMPUTER NETWORKS Lecture-8 Husnain Sherazi. Review Lecture 7  Shared Communication Channel  Locality of Reference Principle  LAN Topologies – Star.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 OSI data link layer CCNA Exploration Semester 1 Chapter 7.
Cisco I Introduction to Networks Semester 1 Chapter 4 JEOPADY.
SIMS-201 Computer Networks.
Link Layer 5.1 Introduction and services
Chapter 12 Multiple Access.
Lab 7 – CSMA/CD (Data Link Layer Layer)
Local Area Networks: Topologies
Chapter 14 LAN Systems Ethernet (CSMA/CD) ALOHA Slotted ALOHA CSMA
Data Link Layer Dr. Muazzam A. Khan.
Physical & Data-link ISQS 6343 #2 John R. Durrett.
Ct1403 Lecture#2: DATA LINK LAYER
Chapter 12 Local Area Networks
Data Link Issues Relates to Lab 2.
Protocol layering and data
Data Communication Networks
Lecture 5- Data Link Layer
CCNA 1 v3 JEOPARDY Module 6 CCNA1 v3 Module 6 K. Martin.
SIMS-201 Computer Networks.
Chapter 12 Local Area Networks
Protocol layering and data
Chapter 12 Local Area Networks
Chapter 6 Multiple Radio Access.
Dr. John P. Abraham Professor UTPA
Error Checking continued
LEARNING COMPUTER NETWORKS OSI Model (layers). Why a layered model?  Easier to teach communication process.  Speeds development, changes in one layer.
Presentation transcript:

Chapter Six The Data Link Layer

Objectives Learn about physical addressing on the network. Explore the MAC and LLC sublayers of Data Link. Get introduced to some of the hardware protocols in greater detail. Learn about end-to-end error correction. Examine flow control methods in detail.

The Two Layers of Data Link Media access control –Dictates how data will access the medium –Defines physical addressing mechanisms Logical link control –Defines the hardware protocols

Addressing in Data Link Physical addressing –The MAC address is burned onto the interface at the factory. –Physical addressing uses a flat addressing model. Logical addressing –Service access points (SAP) are generated by Data Link.

The MAC Address A 48-bit address –24 bits is the organizational unique identifier Assigned by IEEE and identifies the make and model of the device –24 bits is a manufacturer assigned interface serial number. –No two devices can have the same MAC address.

Hardware Protocols CSMA/CD (Ethernet) Demand Priority (now defunct) Token Ring FDDI

CSMA/CD Carrier Sense Multiple Access/Collision Detection –It listens to the wire for a quiet moment, then transmits. –If two devices transmit at once, a collision occurs. –After a collision, a backoff algorithm is issued. –Each device waits a predetermined interval before trying to transmit again. –It is known as probabilistic networking.

Ethernet over Copper 10BaseT10Mb/sCAT3 10Base210Mb/sRG-58 10Base510Mb/sRG-8 100BaseT100Mb/sCAT5 100BaseT4100Mb/sCAT5 using all four pairs 1000BaseT1000Mb/sCAT5e or CAT6 1000BaseCX1000Mb/sBalanced copper over coax

Ethernet over Fiber 100BaseFL100Mb/s 100BaseFB100Mb/s fiber backbone 1000BaseLX1000Mb/s 1000BaseSX1000Mb/s

Demand Priority It was a good idea that never made it. –Now defunct, but enough existing networks remain to make it worth discussing An “intelligent” hub controls access to the network by the devices attached. When a device needs to transmit, it sends a signal to the hub “demanding access.” –The hub determines when and if the device can transmit.

CSMA/CA Carrier Sense Multiple Access/Collision Avoidance –It is used by Apple’s LocalTalk. –A device broadcasts its intention to transmit. –Upon receiving this broadcast, all other devices are induced to wait a predetermined amount of time.

Token Passing A small packet of data called the token runs round and round the network. For a device to transmit, it must take possession of the token. It is used by token ring and FDDI.

Token Ring It uses a virtual ring network topology. A multi-station access unit (MAU) interconnects devices in the manner of a hub. The first device to power up on the network becomes the active monitor (and generates tokens as needed).

Beaconing When the token does not arrive at a workstation, that workstation broadcasts messages in both directions across the ring. The point at which the two broadcasts each reach a dead end is dropped from the MAU. The active monitor generates a new token and life goes on.

FDDI FDDI is another ring-based token passing network. It uses two concentric rings (although a network can be built on a single ring). Rings are virtual structures and do not even need to be geographically adjacent. Devices can be dual-attached (dual ring) or single-attached (single ring).

Error Detection in Data Link Data Link is responsible for finding and fixing: –Lost frames –Incorrect checksum or CRC –Offending frame sizes –Buffer overflow –Frame corrupted through interference

Lost Frames When a device is transmitting data, it waits for ACK packets for each data packet sent. –If an ACK does not arrive within the time to live specified in the header, the transmitting workstation will retransmit the frame. –If duplicate frames arrive, the receiving workstation will discard the second to arrive.

Incorrect Checksum or CRC The same calculations that are performed by the transmitting workstation are done by the receiver. If the value achieved by the receiving workstation does not match the value in the trailer, a NACK is issued. The transmitting workstation retransmits the data.

Offending Frame Size Protocols are picky about the size of frames they create. –Frames that are too small (runts) or frames that are too large (giants) are discarded. Eventually the TTL will expire and the transmitting workstation will retransmit.

Buffer Overflow If data is coming into the receiving workstation too quickly, the memory buffer will fill up. Depending on the flow control method used, the session will either be aborted or transmission speeds will be renegotiated.

Interference EMI or other interference can result in corrupted frames. –These are dropped and treated as lost frames.

Flow Control Most flow control is under the umbrella of the Transport layer. One Data Link protocol, HDLC, uses flow control. –X-on/X-off –Stop and wait –Sliding window

X-on/X-off Data flows until the buffer fills. The receiving device issues a STOP command. Receiving device processes data and then issues a stop command. Data flows until the buffer fills.

Stop and Wait Transmitting device sends one packet and waits. Receiving device receives packet and sends an ACK; receives a corrupted packet and sends a NACK; or doesn’t receive it and the TTL expires. Transmitting device receives ACK and sends next packet; receives a NACK and retransmits previous packet; or TTL expires and it retransmits previous packet.

Sliding Window Transmitting packet sends a series of packets and sits back to wait for the ACKs. If all ACKs return, another blast of packets goes out. If only some of the packets return ACKs, the number of packets is reduced for the next burst.

Data Link Protocols HDLC SLIP PPP