Professional Documents
Culture Documents
CN - 3 - Data-Link Layer
CN - 3 - Data-Link Layer
CN - 3 - Data-Link Layer
Internet Technology
IETF publishes RFCs for internet
protocols
More Organizations
American National Standards Institute (ANSI)
Electronic Industries Association (EIA)
National Institute of Standards and Technology (NIST)
Internet assigned number authority (IANA)
Twisted pair
One of the oldest and still most commonly
used media is twisted pair
It consist of two insulating copper wires
(typically about 1mm thick) arranged in
spiral fashion
Most common application of the twisted pair
is the telephone system
Twisted pair can run several kilometers with
out amplification but for long distance
communication repeaters are required
Twisted pair can be used for transmitting either analog
or digital information
SC Connector
100BaseFX Fiber Optic
100BaseBX Single mode Fiber
100BaseSX Multimode Fiber
Fiber optic cabling consists of a center glass core surrounded
by several layers of protective materials. It transmits light
rather than electronic signals eliminating the problem of
electrical interference.
Fiber optic cable has the ability to transmit signals over
much longer distances than coaxial and twisted pair. It also
has the capability to carry information at vastly greater
speeds. This capacity broadens communication
possibilities to include services such as video conferencing
and interactive services
S1 S2
Server
Network1
Network5
Network3
Internet
Network4
Network2
s1
Client
Data Link Layer design
issues
1. Provide well defined services to the network
layer
2. Dealing with transmission errors
3. How to control fast sender or slow receiver
using flow control
4. Data link layer uses physical layer to send or
receive bits over communication channels
5. Data link layer takes the packets from network
layer and encapsulates them into frames for
transmission. Each frame contains header, a
payload field to hold packet and a trailer.
6. The data link layer transferring data from the
network layer on the source machine to
network layer on destination machine
Services provide to
network layer
1. Byte count
2. Flag bytes with byte stuffing
3. Flag bits with bit stuffing
Byte stuffing : Byte stuffing is a process of add one extra byte
When there FLAG or ESC character inside the data (Payload)
Data link layer functions
1. Error Control
To control errors in the data frame we
use special control frames called
Positive ACK
Negative ACK
Error control consist of two functions
1. Error Detection
2. Error Correction
Error Correction
1. Hamming code
2. Binary convolutional codes
3. Reed- Solomon Codes
4. Low-density parity check codes
Error Detection
1. Parity
2. Checksum
3. Cyclic Redundancy Checks(CRC)
Flow Control
1. Stop-wait
Stop-wait ARQ
2. Sliding Window
Go-Back-N ARQ
Selective Repeat ARQ
Piggybacking method
ADSL( Asymmetric Digital
Subscriber loop)
1. There are two protocols send packets
over data links ( PPP, SLIP, HDLC)
2. ADSL links running on the local loop of
the telephone network at the edge of the
internet . These links connect millions of
individuals and businesses to the internet
1. A dial up service which uses telephone
line to get internet
2. On ADSL technology a telephone line
side by side can transmit data and voice
3. It uses two link uplink and downlink
4. Down link capacity(8Mbps) is more than
uplink capacity (1 Mbps)
5. It uses DSL and DSLAM connect home
system to network
6. It uses PPP protocol to transmit data
MAC (Medium Access Control)
There are two types of links
1. point-to-point link
2. Multi-point link (Broadcast link)
Channel Allocation
1. Static channel allocation
2. Dynamic channel allocation
Multiple Access protocols
1. Pure aloha
2. Slotted aloha
3. Carrier sense protocols
a. 1-persistent CSMA
b. Nonpersistent CSMA
c. p-persistent CSMA ( It is designed for
Slotted channels)
4. CAMA/CD (Collision detection)
A link share a 36-kbps pure ALOHA channel. What is the maximum
utilization of link.