SlideShare a Scribd company logo
1 of 20
Data Link Layer

Network Fundamentals – Chapter 7

ITE I Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

1
Objectives


Identify Data Link layer protocols in data transmission.



Identify types of media access control methods.



Identify several common logical network topologies
and describe how the logical topology determines the
media access control method for that network.



Identify purpose of encapsulating packets into frames
to facilitate media access.



Identify Layer 2 frame structure and generic fields.



Identify key frame header and trailer fields including
addressing, QoS, type of protocol and Frame Check
Sequence.

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

2
Data Link Layer – Accessing the Media
 Prepares Network layer packets for transmission on
media via encapsulation
 Control access to the physical media
 Allows exchange data over a common local media

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

3
Data Link Layer – Accessing the Media
 Data Link layer protocols are required to control media
access

WAN layer 2 protocols HDLC,
SLIP, PPP

LAN layer 2 protocols IEEE 802.3,
FDDI and Token Ring
ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

4
Data Link Layer – Accessing the Media


Network layer packets are encapsulated into layer 2 frames



Frames contain fields that allow the delivery of the data across the WAN or LAN link to be managed



Typical fields include:



Which nodes are in communication with each other



When communication between individual nodes begins and when it ends



Which errors occurred while the nodes communicated

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

5
Data Link Layer – Accessing the Media


To support a wide variety of network functions, the Data Link layer is often divided into two sublayers:
an upper sublayer and an lower sublayer.



Logical Link Control
The upper sublayer defines the software processes that provide services to the Network layer
protocols.



Media Access Control
The lower sublayer defines the media access processes performed by the hardware.

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

6
Data Link Layer – Accessing the Media
 Standards used by the Data Link layer

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

7
Media Access Control Techniques
 The need for controlling access to the media

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

8
Media Access Control Techniques
 Controlled Access (Token Ring, FDDI)
 Contention Based Access (CSMA/CD and CSMA/CA)
Carrier Sense Multiple Access / Collision Detection
Carrier Sense Multiple Access / Collision Avoidance

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

9
Media Access Control – Duplex and Non
Shared Media
 Full Duplex Transmit and Receive simultaneously (can
double Bandwidth)
 Half Duplex Transmit or Receive in turns

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

10
Media Access Control Topologies


A logical topology is the way a network transfers frames from one node to the next. Consists of virtual
connections between the nodes of a network independent of their physical layout. These logical signal
paths are defined by Data Link layer protocols. The Data Link layer "sees" the logical topology of a
network when controlling data access to the media. The logical topology influences the type of
network framing and media access control used.



The physical topology is an arrangement of the nodes and the physical connections between them. The
representation of how the media is used to interconnect the devices is the physical topology.

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

11
Media Access Control Topology
 Logical topology example

Type of Layer 2 frame include:
PPP,HDLC, ATM ,FRAME-RELAY etc

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

12
Media Access Control Topology
 Physical point-to-point topology only 2 nodes non multiaccess, non shared

Type of Layer 2 frame include:
PPP,HDLC, ATM ,FRAME-RELAY etc

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

13
Media Access Control Topology
 Physical multi-access topology Contention based
access, Bus topology, Collisions can occur

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

14
Media Access Control Techniques
 Physically resembles a ring topology, media access is
controlled typically by tokens passing between nodes

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

15
Media Access Control Addressing and
Framing Data
 Independence of upper layer protocols is ensured by
layer 2 encapsulation. More controls or frame fields are
required for fragile environments

GPRS (General Packet
Radio Service)

IEEE layer 2 Framing

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

16
Media access control addressing and framing
data
 Frame header contains the control information specified by the
Data Link layer protocol for the specific logical topology and
media used

Preamble Start of Frame

Upper layer Service or
Protocol i.e. IP or other
layer 3 protocol

Source and Destination
MAC address

Error checking

Upper layer data

End of Frame

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

17
Media access control addressing and framing
data
 Data Link layer address is only used for local delivery.
Addresses at this layer have no meaning beyond the
local network. Compare this to Layer 3, where
addresses in the packet header are carried from source
host to destination host regardless of the number of
network hops along the route.

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

18
Media access control addressing and framing
data
 The frame check sequence is used for error checking.
The source calculates a number based on the frame’s
data and places that number in the FCS field. The
destination then recalculates the data to see if the FCS
matches. If they don’t match, the destination discards
the frame.

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

19
Labs
 7.5.2- Frame Examination (Capturing using Wireshark,
inspecting Frame fields, Source, Destination MAC
address, Upper layer protocol, FCS)
 7.6.1- Skills Integration Challenge Data Link Layer
issues (IP subnetting, Configuring using Packet Tracer)

ITE 1 Chapter 6

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

20

More Related Content

What's hot

Point To Point Protocol
Point To Point ProtocolPoint To Point Protocol
Point To Point Protocol
Phan Vuong
 

What's hot (20)

Network Protocol and TCP/IP
Network Protocol and TCP/IPNetwork Protocol and TCP/IP
Network Protocol and TCP/IP
 
Data link layer
Data link layer Data link layer
Data link layer
 
OSI Physical Layer
OSI Physical LayerOSI Physical Layer
OSI Physical Layer
 
3a data link layer
3a data link layer 3a data link layer
3a data link layer
 
Introduction to TCP/IP
Introduction to TCP/IPIntroduction to TCP/IP
Introduction to TCP/IP
 
Reference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPReference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IP
 
Physical layer OSI Model & Transmission Media
Physical layer OSI Model & Transmission MediaPhysical layer OSI Model & Transmission Media
Physical layer OSI Model & Transmission Media
 
Routing
RoutingRouting
Routing
 
Transport layer
Transport layer Transport layer
Transport layer
 
Point To Point Protocol
Point To Point ProtocolPoint To Point Protocol
Point To Point Protocol
 
data-link layer protocols
data-link layer protocols  data-link layer protocols
data-link layer protocols
 
Network layer tanenbaum
Network layer tanenbaumNetwork layer tanenbaum
Network layer tanenbaum
 
Ip addressing classful
Ip addressing classfulIp addressing classful
Ip addressing classful
 
Open shortest path first (ospf)
Open shortest path first (ospf)Open shortest path first (ospf)
Open shortest path first (ospf)
 
OSI Layers
OSI LayersOSI Layers
OSI Layers
 
ATM Networking Concept
ATM Networking ConceptATM Networking Concept
ATM Networking Concept
 
Ch3 physical layer.ppt
Ch3 physical layer.pptCh3 physical layer.ppt
Ch3 physical layer.ppt
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
TFTP - Trivial File Transfer Protocol
TFTP - Trivial File Transfer ProtocolTFTP - Trivial File Transfer Protocol
TFTP - Trivial File Transfer Protocol
 
Frame relay
Frame relayFrame relay
Frame relay
 

Viewers also liked

CCNA Exploration 1 - Chapter 7
CCNA Exploration 1 - Chapter 7CCNA Exploration 1 - Chapter 7
CCNA Exploration 1 - Chapter 7
Irsandi Hasan
 
01 a-salinan-permendikbud-no-54-tahun-2013-ttg-skl
01 a-salinan-permendikbud-no-54-tahun-2013-ttg-skl01 a-salinan-permendikbud-no-54-tahun-2013-ttg-skl
01 a-salinan-permendikbud-no-54-tahun-2013-ttg-skl
kb candipuro
 
Subneting and vlsm ntpg (1)
Subneting and vlsm ntpg (1)Subneting and vlsm ntpg (1)
Subneting and vlsm ntpg (1)
Sachii Dosti
 
Auto con piloto automatico
Auto con piloto automaticoAuto con piloto automatico
Auto con piloto automatico
sonia_mq
 
music magazine evaluation
music magazine evaluation music magazine evaluation
music magazine evaluation
gmorgan1996
 
Wikaniko Peter Simmonds - Home page slideshow
Wikaniko Peter Simmonds - Home page slideshowWikaniko Peter Simmonds - Home page slideshow
Wikaniko Peter Simmonds - Home page slideshow
Natalie Harris
 
Mesopotamia ciudades de estado
Mesopotamia ciudades de estadoMesopotamia ciudades de estado
Mesopotamia ciudades de estado
vanessavergara18
 
Sixth sense technology
Sixth sense technologySixth sense technology
Sixth sense technology
Bhagya Shree
 

Viewers also liked (20)

The Data Link Layer
The Data Link LayerThe Data Link Layer
The Data Link Layer
 
CCNA Exploration 1 - Chapter 7
CCNA Exploration 1 - Chapter 7CCNA Exploration 1 - Chapter 7
CCNA Exploration 1 - Chapter 7
 
Dcn ppt on data link layer
Dcn ppt on data link layerDcn ppt on data link layer
Dcn ppt on data link layer
 
MPW - Management of self
MPW - Management of selfMPW - Management of self
MPW - Management of self
 
We Create KC Year 3
We Create KC Year 3We Create KC Year 3
We Create KC Year 3
 
E2
E2E2
E2
 
Injection sql
Injection sqlInjection sql
Injection sql
 
Castillos medievales
Castillos medievalesCastillos medievales
Castillos medievales
 
01 a-salinan-permendikbud-no-54-tahun-2013-ttg-skl
01 a-salinan-permendikbud-no-54-tahun-2013-ttg-skl01 a-salinan-permendikbud-no-54-tahun-2013-ttg-skl
01 a-salinan-permendikbud-no-54-tahun-2013-ttg-skl
 
Subneting and vlsm ntpg (1)
Subneting and vlsm ntpg (1)Subneting and vlsm ntpg (1)
Subneting and vlsm ntpg (1)
 
Auto con piloto automatico
Auto con piloto automaticoAuto con piloto automatico
Auto con piloto automatico
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
Ciudades eternas --
Ciudades eternas --Ciudades eternas --
Ciudades eternas --
 
Entorno natural
Entorno naturalEntorno natural
Entorno natural
 
music magazine evaluation
music magazine evaluation music magazine evaluation
music magazine evaluation
 
Wikaniko Peter Simmonds - Home page slideshow
Wikaniko Peter Simmonds - Home page slideshowWikaniko Peter Simmonds - Home page slideshow
Wikaniko Peter Simmonds - Home page slideshow
 
Ethernet
EthernetEthernet
Ethernet
 
Y'ems Group's Social Networking for Organizations Ver 1.0
Y'ems Group's Social Networking for Organizations Ver 1.0Y'ems Group's Social Networking for Organizations Ver 1.0
Y'ems Group's Social Networking for Organizations Ver 1.0
 
Mesopotamia ciudades de estado
Mesopotamia ciudades de estadoMesopotamia ciudades de estado
Mesopotamia ciudades de estado
 
Sixth sense technology
Sixth sense technologySixth sense technology
Sixth sense technology
 

Similar to Data Link Layer

Exploration network chapter7
Exploration network chapter7Exploration network chapter7
Exploration network chapter7
r82093403
 
006 Osi Model
006 Osi Model006 Osi Model
006 Osi Model
BELKA08
 

Similar to Data Link Layer (20)

Exploration network chapter7
Exploration network chapter7Exploration network chapter7
Exploration network chapter7
 
CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10
 
CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5
 
Chapter 03 - Network Protocols and Communications
Chapter 03 - Network Protocols and CommunicationsChapter 03 - Network Protocols and Communications
Chapter 03 - Network Protocols and Communications
 
CCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communicationsCCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communications
 
Chapter 3 : Network protocols and communications
Chapter 3 : Network protocols and communicationsChapter 3 : Network protocols and communications
Chapter 3 : Network protocols and communications
 
Ccna v5-S1-Chapter 5
Ccna v5-S1-Chapter 5Ccna v5-S1-Chapter 5
Ccna v5-S1-Chapter 5
 
CCNA 1 Routing and Switching v5.0 Chapter 5
CCNA 1 Routing and Switching v5.0 Chapter 5CCNA 1 Routing and Switching v5.0 Chapter 5
CCNA 1 Routing and Switching v5.0 Chapter 5
 
Chapter7
Chapter7Chapter7
Chapter7
 
Chapter 05 - Ethernet
Chapter 05 - EthernetChapter 05 - Ethernet
Chapter 05 - Ethernet
 
Chapter 5 : Ethernet
Chapter 5 : EthernetChapter 5 : Ethernet
Chapter 5 : Ethernet
 
CCNAv5 - S1: Chapter 5 - Ethernet
CCNAv5 - S1: Chapter 5 - EthernetCCNAv5 - S1: Chapter 5 - Ethernet
CCNAv5 - S1: Chapter 5 - Ethernet
 
006 Osi Model
006 Osi Model006 Osi Model
006 Osi Model
 
Wp simoneau osi_model
Wp simoneau osi_modelWp simoneau osi_model
Wp simoneau osi_model
 
Hy3313681373
Hy3313681373Hy3313681373
Hy3313681373
 
chapter 4.pptx
chapter 4.pptxchapter 4.pptx
chapter 4.pptx
 
Cisco CCNA module 6
Cisco CCNA module 6Cisco CCNA module 6
Cisco CCNA module 6
 
OSI reference Model
OSI reference ModelOSI reference Model
OSI reference Model
 
computer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptxcomputer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptx
 
OSI Reference Model
OSI Reference ModelOSI Reference Model
OSI Reference Model
 

More from Sachii Dosti (13)

Network technology Paper 2
Network technology Paper 2Network technology Paper 2
Network technology Paper 2
 
Network technology paper
Network technology paperNetwork technology paper
Network technology paper
 
Subneting and vlsm ntpg
Subneting and vlsm ntpgSubneting and vlsm ntpg
Subneting and vlsm ntpg
 
Static Routing
Static RoutingStatic Routing
Static Routing
 
ip v6
ip v6ip v6
ip v6
 
Exploration routing chapter 10 & 11
Exploration routing chapter 10 & 11Exploration routing chapter 10 & 11
Exploration routing chapter 10 & 11
 
Addressing the Network – IPv4
Addressing the Network – IPv4Addressing the Network – IPv4
Addressing the Network – IPv4
 
OSI Network Layer
OSI Network LayerOSI Network Layer
OSI Network Layer
 
Exploration routing chapter 4
Exploration routing chapter 4Exploration routing chapter 4
Exploration routing chapter 4
 
OSI Transport Layer
OSI Transport LayerOSI Transport Layer
OSI Transport Layer
 
Application Layer Functionality and Protocols
Application Layer Functionality and ProtocolsApplication Layer Functionality and Protocols
Application Layer Functionality and Protocols
 
Network Fundamentals – Chapter 2
Network Fundamentals – Chapter 2Network Fundamentals – Chapter 2
Network Fundamentals – Chapter 2
 
Network Fundamentals – Chapter 1
Network Fundamentals – Chapter 1Network Fundamentals – Chapter 1
Network Fundamentals – Chapter 1
 

Recently uploaded

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 

Recently uploaded (20)

A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 

Data Link Layer

  • 1. Data Link Layer Network Fundamentals – Chapter 7 ITE I Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1
  • 2. Objectives  Identify Data Link layer protocols in data transmission.  Identify types of media access control methods.  Identify several common logical network topologies and describe how the logical topology determines the media access control method for that network.  Identify purpose of encapsulating packets into frames to facilitate media access.  Identify Layer 2 frame structure and generic fields.  Identify key frame header and trailer fields including addressing, QoS, type of protocol and Frame Check Sequence. ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 2
  • 3. Data Link Layer – Accessing the Media  Prepares Network layer packets for transmission on media via encapsulation  Control access to the physical media  Allows exchange data over a common local media ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 3
  • 4. Data Link Layer – Accessing the Media  Data Link layer protocols are required to control media access WAN layer 2 protocols HDLC, SLIP, PPP LAN layer 2 protocols IEEE 802.3, FDDI and Token Ring ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 4
  • 5. Data Link Layer – Accessing the Media  Network layer packets are encapsulated into layer 2 frames  Frames contain fields that allow the delivery of the data across the WAN or LAN link to be managed  Typical fields include:  Which nodes are in communication with each other  When communication between individual nodes begins and when it ends  Which errors occurred while the nodes communicated ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 5
  • 6. Data Link Layer – Accessing the Media  To support a wide variety of network functions, the Data Link layer is often divided into two sublayers: an upper sublayer and an lower sublayer.  Logical Link Control The upper sublayer defines the software processes that provide services to the Network layer protocols.  Media Access Control The lower sublayer defines the media access processes performed by the hardware. ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 6
  • 7. Data Link Layer – Accessing the Media  Standards used by the Data Link layer ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 7
  • 8. Media Access Control Techniques  The need for controlling access to the media ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 8
  • 9. Media Access Control Techniques  Controlled Access (Token Ring, FDDI)  Contention Based Access (CSMA/CD and CSMA/CA) Carrier Sense Multiple Access / Collision Detection Carrier Sense Multiple Access / Collision Avoidance ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 9
  • 10. Media Access Control – Duplex and Non Shared Media  Full Duplex Transmit and Receive simultaneously (can double Bandwidth)  Half Duplex Transmit or Receive in turns ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 10
  • 11. Media Access Control Topologies  A logical topology is the way a network transfers frames from one node to the next. Consists of virtual connections between the nodes of a network independent of their physical layout. These logical signal paths are defined by Data Link layer protocols. The Data Link layer "sees" the logical topology of a network when controlling data access to the media. The logical topology influences the type of network framing and media access control used.  The physical topology is an arrangement of the nodes and the physical connections between them. The representation of how the media is used to interconnect the devices is the physical topology. ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 11
  • 12. Media Access Control Topology  Logical topology example Type of Layer 2 frame include: PPP,HDLC, ATM ,FRAME-RELAY etc ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 12
  • 13. Media Access Control Topology  Physical point-to-point topology only 2 nodes non multiaccess, non shared Type of Layer 2 frame include: PPP,HDLC, ATM ,FRAME-RELAY etc ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 13
  • 14. Media Access Control Topology  Physical multi-access topology Contention based access, Bus topology, Collisions can occur ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 14
  • 15. Media Access Control Techniques  Physically resembles a ring topology, media access is controlled typically by tokens passing between nodes ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 15
  • 16. Media Access Control Addressing and Framing Data  Independence of upper layer protocols is ensured by layer 2 encapsulation. More controls or frame fields are required for fragile environments GPRS (General Packet Radio Service) IEEE layer 2 Framing ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 16
  • 17. Media access control addressing and framing data  Frame header contains the control information specified by the Data Link layer protocol for the specific logical topology and media used Preamble Start of Frame Upper layer Service or Protocol i.e. IP or other layer 3 protocol Source and Destination MAC address Error checking Upper layer data End of Frame ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 17
  • 18. Media access control addressing and framing data  Data Link layer address is only used for local delivery. Addresses at this layer have no meaning beyond the local network. Compare this to Layer 3, where addresses in the packet header are carried from source host to destination host regardless of the number of network hops along the route. ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 18
  • 19. Media access control addressing and framing data  The frame check sequence is used for error checking. The source calculates a number based on the frame’s data and places that number in the FCS field. The destination then recalculates the data to see if the FCS matches. If they don’t match, the destination discards the frame. ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 19
  • 20. Labs  7.5.2- Frame Examination (Capturing using Wireshark, inspecting Frame fields, Source, Destination MAC address, Upper layer protocol, FCS)  7.6.1- Skills Integration Challenge Data Link Layer issues (IP subnetting, Configuring using Packet Tracer) ITE 1 Chapter 6 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 20

Editor's Notes

  1. The Application layer provides the interface to the user. The Transport layer is responsible for dividing and managing communications between the processes running in the two end systems. The Network layer protocols organize our communication data so that it can travel across internetworks from the originating host to a destination host. It is the role of the OSI Data Link layer to prepare Network layer packets for transmission and to control access to the physical media. The Data Link layer provides a means for exchanging data over a common local media. The Data Link layer performs two basic services: Allows the upper layers to access the media using techniques such as framing Controls how data is placed onto the media and is received from the media using techniques such as media access control and error detection The Data Link layer is responsible for the exchange of frames between nodes over the media of a physical network.
  2. In any given exchange of Network layer packets, there may be numerous Data Link layer and media transitions. At each hop along the path, an intermediary device - usually a router - accepts frames from a medium, decapsulates the frame, and then forwards the packet in a new frame appropriate to the medium of that segment of the physical network.
  3. Layer 2 protocols specify the encapsulation of a packet into a frame and the techniques for getting the encapsulated packet on and off each medium. The technique used for getting the frame on and off media is called the media access control method. For the data to be transferred across a number of different media, different media access control methods may be required during the course of a single communication. The media access control methods described by the Data Link layer protocols define the processes by which network devices can access the network media and transmit frames in diverse network environments. Data Link layer protocols require control information to enable the protocols to function. Control information may tell: Which nodes are in communication with each other When communication between individual nodes begins and when it ends Which errors occurred while the nodes communicated Which nodes will communicate next The Data Link layer frame includes: Data - The packet from the Network layer Header - Contains control information, such addressing, and is located at the beginning of the PDU Trailer - Contains control information added to the end of the PDU Typical field types include: Start and stop indicator fields - The beginning and end limits of the frame Naming or addressing fields Type field - The type of PDU contained in the frame Quality - control fields A data field -The frame payload (Network layer packet)
  4. To support a wide variety of network functions, the Data Link layer is often divided into two sublayers: an upper sublayer and an lower sublayer. Logical Link Control The upper sublayer defines the software processes that provide services to the Network layer protocols. Media Access Control The lower sublayer defines the media access processes performed by the hardware.
  5. Regulating the placement of data frames onto the media is known as media access control. Among the different implementations of the Data Link layer protocols, there are different methods of controlling access to the media. These media access control techniques define if and how the nodes share the media. The method of media access control used depends on: Media sharing - If and how the nodes share the media Topology - How the connection between the nodes appears to the Data Link layer
  6. There are two basic media access control methods for shared media: Controlled - Each node has its own time to use the medium Contention-based - All nodes compete for the use of the medium
  7. In full-duplex communication, both devices can transmit and receive on the media at the same time. The Data Link layer assumes that the media is available for transmission for both nodes at any time. Therefore, there is no media arbitration necessary in the Data Link layer.
  8. The topology of a network is the arrangement or relationship of the network devices and the interconnections between them. Network topologies can be viewed at the physical level and the logical level. The physical topology is an arrangement of the nodes and the physical connections between them. The representation of how the media is used to interconnect the devices is the physical topology. A logical topology is the way a network transfers frames from one node to the next. This arrangement consists of virtual connections between the nodes of a network independent of their physical layout. These logical signal paths are defined by Data Link layer protocols. The Data Link layer "sees" the logical topology of a network when controlling data access to the media. It is the logical topology that influences the type of network framing and media access control used.
  9. The end nodes communicating in a point-to-point network can be physically connected via a number of intermediate devices. However the use of physical devices in the network does not affect the logical topology. In some cases, the logical connection between nodes forms what is called a virtual circuit. A virtual circuit is a logical connection created within a network between two network devices. The two nodes on either end of the virtual circuit exchange the frames with each other.
  10. Link layer protocols that describe Data Link layer frames, each frame type has three basic parts: Header Data Trailer All Data Link layer protocols encapsulate the Layer 3 PDU within the data field of the frame. However, the structure of the frame and the fields contained in the header and trailer vary according to the protocol. The Data Link layer protocol describes the features required for the transport of packets across different media. These features of the protocol are integrated into the encapsulation of the frame. When the frame arrives at its destination and the Data Link protocol takes the frame off the media, the framing information is read and discarded.
  11. As shown in the figure, the frame header contains the control information specified by the Data Link layer protocol for the specific logical topology and media used. Frame control information is unique to each type of protocol. It is used by the Layer 2 protocol to provide features demanded by the communication environment. Typical frame header fields include: Start Frame field - Indicates the beginning of the frame Source and Destination address fields - Indicates the source and destination nodes on the media Priority/Quality of Service field - Indicates a particular type of communication service for processing Type field - Indicates the upper layer service contained in the frame Logical connection control field - Used to establish a logical connection between nodes Physical link control field - Used to establish the media link Flow control field - Used to start and stop traffic over the media Congestion control field - Indicates congestion in the media
  12. Because the frame is only used to transport data between nodes across the local media, the Data Link layer address is only used for local delivery. Addresses at this layer have no meaning beyond the local network. Compare this to Layer 3, where addresses in the packet header are carried from source host to destination host regardless of the number of network hops along the route. If the packet in the frame must pass onto another network segment, the intermediate device - a router - will decapsulate the original frame, create a new frame for the packet, and send it onto the new segment. The new frame will use source and destination addressing as necessary to transport the packet across the new media.
  13. The frame check sequence is used for error checking. The source calculates a number based on the frame’s data and places that number in the FCS field. The destination then recalculates the data to see if the FCS matches. If they don’t match, the destination discards the frame.