Professional Documents
Culture Documents
this layer.
1
Chapter 6 – Layer 2: Data Link Layer – Concepts & Technologies
2
Chapter 6 – Layer 2: Data Link Layer – Concepts & Technologies
6.3 Framing
Framing helps to organise essential information
gathered at the source node that could be
interpreted by the destination node. Such
information includes:
1. Which computers are communicating with one another?
2. When is the start and end of the communication between
individual computers?
3. Where the data is located within a frame?
4. How communication errors are recorded?
6.3 – Framing
3
Chapter 6 – Layer 2: Data Link Layer – Concepts & Technologies
Data Frame
6.3 – Framing
4
Chapter 6 – Layer 2: Data Link Layer – Concepts & Technologies
5
Chapter 6 – Layer 2: Data Link Layer – Concepts & Technologies
2.Token Passing
A token frame circulates around the network and
the node that acquires the token will have the
right to send data. Network will not face any data
collision since only one token is available in the
network.
Token passing is considered deterministic
6.4 – Media Access Control
6
Chapter 6 – Layer 2: Data Link Layer – Concepts & Technologies
2.Token Passing
2.Token Passing
The token bit distinguishes the token frame from a
data frame.
The monitor bit determines if a frame is continuously
circulating in the network e.g. this is an indication
that the token frame or the data frame is damaged.
6.4 – Media Access Control
7
Chapter 6 – Layer 2: Data Link Layer – Concepts & Technologies
2.Token Passing
A value is set in the priority field. Nodes with equal
or higher priority acquires the token frame. After the
token is seized and changed to a data frame, only
nodes with a priority value higher than the
transmitting node can reserve the token at the
reservation field for the next use. Node that raise
6.4 – Media Access Control
2.Token Passing
Source node that seizes the token frame changes
the token bit to busy and attaches the source
address, the destination address, the frame control
field, data field, error checking field and frame status
to the token frame to form the data frame. The data
frame then circulates around the network.
6.4 – Media Access Control
8
Chapter 6 – Layer 2: Data Link Layer – Concepts & Technologies
2.Token Passing
Only the destination node accepts the data frame
because of the matching address. The data frame
continues to circulate and ends at the source node.
The source node removes all attachments, changes
the token bit back to free and set the token frame
back into circulation again.
6.4 – Media Access Control
Advantages
CSMA/CD Token Passing
No waiting time, node Deterministic e.g. good for
transmit as long as media is time critical activities
free from use
Simple algorithm that is Good for heavy load e.g.
6.4 – Media Access Control
9
Chapter 6 – Layer 2: Data Link Layer – Concepts & Technologies
Disadvantages
CSMA/CD Token Passing
No priority given to nodes of Source node may wait for a
higher level of importance long time for free token
frame
More data collision occurs Token may be faulty leading
6.4 – Media Access Control
10
Chapter 6 – Layer 2: Data Link Layer – Concepts & Technologies
11
Chapter 6 – Layer 2: Data Link Layer – Concepts & Technologies
12
Chapter 6 – Layer 2: Data Link Layer – Concepts & Technologies
13
Chapter 6 – Layer 2: Data Link Layer – Concepts & Technologies
bypassed if faulty.
14