You are on page 1of 209

COMPUTE

R
NETWORK
S

Presented by
E.Rajkumar
(Asst.prof/CSE)
UNIT-II
DATALINK LAYER &
MEDIA ACCESS
DATA LINK LAYER
DATALINK LAYER
DATALINK LAYER

In the OSI model, the data link layer is a 4th layer from the top
and 2nd layer from the bottom.
Data link layer is responsible for transmitting frames from one
node to the next
Use FDDI protocal-Fiber Distributed Data Interface (FDDI)
The Data link layer protocol defines the format of the packet
exchanged across the nodes as well as the actions such as Error
detection, retransmission, flow control, and random access.
DATALINK LAYER
DATALINK LAYER
SERVICES OR
FUNCTIONS
DATALINK LAYER
SERVICES (DLS)

Framing: The data link layer translates the physical's raw bit
stream into packets known as Frames. The Data link layer adds
the header and trailer to the frame.
Physical Addressing: The Data link layer adds a header(MAC
address) to the frame that contains a destination address.
DATALINK LAYER
SERVICES (DLS)

Flow control: A receiving node can receive the frames at a faster


rate than it can process the frame. Without flow control, the
receiver's buffer can overflow, and frames can get lost. To
overcome this problem, the data link layer uses the flow control
to prevent the sending node on one side of the link from
overwhelming the receiving node on another side of the link.
DATALINK LAYER
SERVICES (DLS)

ERROR DETECTION: Errors can be introduced by signal


attenuation and noise. Data Link Layer protocol provides a
mechanism to detect one or more errors. This is achieved by
adding error detection bits in the frame and then receiving node
can perform an error check.
DATALINK LAYER
SERVICES (DLS)

ERROR CORRECTION: Error correction is similar to the


Error detection, except that receiving node not only detect the
errors but also determine where the errors have occurred in the
frame
SUBLAYERS
DATA LINK
SUBLAYERS
TWO SUB LAYERS
ERROR DETECTION AND
CORRECTION
ERROR

TWO TYPES OF ERROR

BIT ERROR

BURST ERROR
ERROR DETECTION
ERROR DETECTION
ERROR DETECTION
ERROR DETECTION
ERROR CORRECTION

The error correction means the process of correcting the


errors by the receiver

The receiver has to correct the error


ERROR CORRECTION
ERROR CORRECTION
ERROR DETECTION
TECHNIQUES
ERROR DETECTION
TECHNIQUES
ERROR DETECTION
TECHNIQUES
ERROR DETECTION
TECHNIQUES
ERROR DETECTION
TECHNIQUES
ERROR DETECTION
TECHNIQUES
ERROR DETECTION
TECHNIQUES
ERROR DETECTION
TECHNIQUES
ERROR DETECTION
TECHNIQUES
ERROR DETECTION
TECHNIQUES
ERROR DETECTION
TECHNIQUES
ERROR DETECTION
TECHNIQUES
ERROR DETECTION
TECHNIQUES
ERROR DETECTION
TECHNIQUES
ERROR DETECTION
TECHNIQUES
ERROR DETECTION
TECHNIQUES
ERROR DETECTION
TECHNIQUES
ERROR DETECTION
TECHNIQUES
ERROR DETECTION
TECHNIQUES
ERROR DETECTION
TECHNIQUES
ERROR DETECTION
TECHNIQUES
ERROR DETECTION
TECHNIQUES
ERROR DETECTION
TECHNIQUES
ERROR DETECTION
TECHNIQUES

Cyclic Redundancy check- CRC


ERROR DETECTION
TECHNIQUES
ERROR DETECTION
TECHNIQUES
ERROR DETECTION
TECHNIQUES
ERROR DETECTION
TECHNIQUES
ERROR DETECTION
TECHNIQUES
ERROR DETECTION
TECHNIQUES
ERROR DETECTION
TECHNIQUES
ERROR DETECTION
TECHNIQUES
ERROR CORRECTION
TECHNIQUES
ERROR CORRECTION
TECHNIQUES
ERROR CORRECTION
TECHNIQUES
ERROR CORRECTION
TECHNIQUES
ERROR CORRECTION
TECHNIQUES
ERROR CORRECTION
TECHNIQUES
ERROR CORRECTION
TECHNIQUES
ERROR CORRECTION
TECHNIQUES
ERROR CORRECTION
TECHNIQUES
ERROR CORRECTION
TECHNIQUES
ERROR CORRECTION
TECHNIQUES
ERROR CORRECTION
TECHNIQUES
ERROR CORRECTION
TECHNIQUES
ERROR CORRECTION
TECHNIQUES
ERROR CORRECTION
TECHNIQUES
ERROR CORRECTION
TECHNIQUES
ERROR CORRECTION
TECHNIQUES
STOP-AND-WAIT PROTOCOL
STOP-AND-WAIT PROTOCOL
STOP-AND-WAIT PROTOCOL
STOP-AND-WAIT PROTOCOL
STOP-AND-WAIT PROTOCOL
STOP-AND-WAIT PROTOCOL
STOP-AND-WAIT PROTOCOL
STOP-AND-WAIT PROTOCOL
STOP-AND-WAIT PROTOCOL
STOP-AND-WAIT PROTOCOL
STOP-AND-WAIT PROTOCOL
STOP-AND-WAIT PROTOCOL
STOP-AND-WAIT PROTOCOL
STOP-AND-WAIT PROTOCOL
STOP-AND-WAIT PROTOCOL
STOP-AND-WAIT PROTOCOL
STOP-AND-WAIT PROTOCOL
STOP-AND-WAIT PROTOCOL
STOP-AND-WAIT PROTOCOL
STOP-AND-WAIT PROTOCOL
SLIDING WINDOW
PROTOCOL
SLIDING WINDOW
PROTOCOL
SLIDING WINDOW
PROTOCOL
SLIDING WINDOW
PROTOCOL
SLIDING WINDOW
PROTOCOL
SLIDING WINDOW
PROTOCOL
SLIDING WINDOW
PROTOCOL
SLIDING WINDOW
PROTOCOL
SLIDING WINDOW
PROTOCOL
SLIDING WINDOW
PROTOCOL
SLIDING WINDOW
PROTOCOL
SLIDING WINDOW
PROTOCOL
SLIDING WINDOW
PROTOCOL
SLIDING WINDOW
PROTOCOL
SLIDING WINDOW
PROTOCOL
SLIDING WINDOW
PROTOCOL
SLIDING WINDOW
PROTOCOL
SLIDING WINDOW
PROTOCOL
SLIDING WINDOW
PROTOCOL
SLIDING WINDOW
PROTOCOL
SELECTIVE- REPEAT
PROTOCOL
SELECTIVE- REPEAT
PROTOCOL
SELECTIVE- REPEAT
PROTOCOL
SELECTIVE- REPEAT
PROTOCOL
SELECTIVE- REPEAT
PROTOCOL
MAC
SUBLAYER
MAC SUBLAYER
DATA LINK
SUBLAYERS
MEDIA ACCESS
CONTROL(MAC)

The medium access control (MAC) is a sublayer of the


data link layer of the open system interconnections (OSI)
reference model for data transmission.

 It is responsible for flow control and multiplexing for


transmission medium.

It controls the transmission of data packets via remotely


shared channels.

 It sends data over the network interface card.


MAC LAYER FUNCTIONS
It provides an abstraction of the physical layer to the LLC
and upper layers of the OSI network.

It is responsible for encapsulating frames so that they are


suitable for transmission via the physical medium.

It generates the frame check sequences and thus


contributes to protection against transmission errors.

.
MAC ADDRESS
MAC address or media access control address is a unique
identifier allotted to a network interface controller (NIC) of a
device.
It is used as a network address for data transmission
within a network segment like Ethernet, Wi-Fi, and
Bluetooth.

MAC address is assigned to a network adapter at the time


of manufacturing. It is hardwired or hard-coded in the
network interface card (NIC).

A MAC address comprises of six groups of two


hexadecimal digits, separated by hyphens, colons, or no
separators. An example of a MAC address is
00:0A:89:5B:F0:11.
MAC ADDRESS
MAC ADDRESS
MAC ADDRESS
Format of MAC Address –
 MAC Address is a 12-digit hexadecimal number which is mostly
represented by Colon-Hexadecimal notation.

 First 6-digits (say 00:40:96) of MAC Address identifies the


manufacturer, called as OUI (Organizational Unique Identifier).

 IEEE Registration Authority Committee assign these MAC prefixes to


its registered vendors.
 Here are some OUI of well known manufacturers :

 CC:46:D6 - Cisco
 3C:5A:B4 - Google,
 Inc. 3C:D9:2B - Hewlett Packard
 00:9A:CD - HUAWEI TECHNOLOGIES CO.,LTD

 The rightmost six digits represents Network Interface Controller,


which is assigned by manufacturer.
CHANNEL ALLOCATION
What is Channel

In telecommunications in general, a channel is a


separate path through which signals can flow.

mediums through which you can send a message or


data
CHANNEL ALLOCATION
CHANNEL ALLOCATION
CHANNEL ALLOCATION
CHANNEL ALLOCATION
Static Channel Allocation

In static channel allocation scheme, a fixed portion of


the frequency channel is allotted to each user.

For N competing users, the bandwidth is divided into


N channels using frequency division multiplexing
(FDM), and each portion is assigned to one user.
This scheme is also referred as fixed channel
allocation or fixed channel assignment.
Static Channel Allocation

In this allocation scheme, there is no interference


between the users since each user is assigned a fixed
channel.

 However, it is not suitable in case of a large number


of users with variable bandwidth requirements.
STATIC CHANNEL
ALLOCATION
Dynamic Channel
Allocation

In dynamic channel allocation scheme, frequency


bands are not permanently assigned to the users.

Instead channels are allotted to users dynamically as


needed, from a central pool.
DYNAMIC CHANNEL
ALLOCATION
Multiple Access protocols
 Multiple access protocols are required to decrease collision and avoid
crosstalk.

 if there is no dedicated link present then multiple stations can access


the channel simultaneously. Hence multiple access protocols are
required to decrease collision and avoid crosstalk.

 For example, in a classroom full of students, when a teacher asks a


question and all the students (or stations) start answering
simultaneously (send data at same time) then a lot of chaos is
created( data overlap or data lost) then it is the job of the teacher
(multiple access protocols) to manage the students and make them
answer one at a time.
CHANNEL ALLOCATION
MULTIPLE ACCESS
PROTOCOLS
CHANNEL ALLOCATION
PROTOCOLS
Random Access protocols
RANDOM ACCESS
PROTOCOLS
CONTROLLED ACCESS
PROTOCOLS
CONTROLLED ACCESS
PROTOCOLS
CHANNELIZATION
PROTOCOLS
CHANNELIZATION
PROTOCOLS
ALOHA

ALOHA Random Access Protocol


It is designed for wireless LAN (Local Area Network) but can also
be used in a shared medium to transmit data.
multiple stations can transmit data at the same time and can
hence lead to collision and data being garbled.
 Using this method, any station can transmit data across a network
simultaneously when a data frameset is available for transmission.
ALOHA

ALOHA RULES
Any station can transmit data to a channel at any time.
It does not require any carrier sensing.
Collision and data frames may be lost during the transmission of
data through multiple stations.
Acknowledgment of the frames exists in Aloha. Hence, there is no
collision detection.
It requires retransmission of data after some random amount of
ALOHA
Pure Aloha

When a station sends data it waits for an acknowledgement. If the


acknowledgement doesn’t come within the allotted time then the
station waits for a random amount of time called back-off time
(Tb) and re-sends the data.

Since different stations wait for different amount of time, the


probability of further collision decreases.
Slotted Aloha

It is similar to pure aloha, except that we divide time into slots
and sending of data is allowed only at the beginning of these
slots.

If a station misses out the allowed time, it must wait for the
next slot. This reduces the probability of collision.
CSMA

CSMA – Carrier Sense Multiple Access ensures fewer


collisions as the station is required to first sense the medium (for
idle or busy) before transmitting data.
 If it is idle then it sends data, otherwise it waits till the channel
becomes idle. However there is still chance of collision in CSMA
due to propagation delay.
CSMA

For example, if station A wants to send data, it will first sense


the medium.If it finds the channel idle, it will start sending
data..
. However, by the time the first bit of data is transmitted
(delayed due to propagation delay) from station A, if station B
requests to send data and senses the medium it will also find it
idle and will also send data. This will result in collision of data
from station A and B.
CSMA MODES

1-persistent: The node senses the channel, if idle it sends the


data, otherwise it continuously keeps on checking the medium
for being idle and transmits unconditionally(with 1 probability)
as soon as the channel gets idle.
Non-Persistent: The node senses the channel, if idle it sends
the data, otherwise it checks the medium after a random
amount of time (not continuously) and transmits when found
idle.
CSMA MODES

: P-persistent: The node senses the medium, if idle it sends the


data with p probability. If the data is not transmitted then it
waits for some time and checks the medium again, now if it is
found idle then it send with p probability. This repeat continues
until the frame is sent. It is used in Wifi and packet radio
systems.
O-persistent: Superiority of nodes is decided beforehand and
transmission occurs in that order. If the medium is idle, node
waits for its time slot to send data.
CSMA MODES
CSMA/CD

CSMA/CD – Carrier sense multiple access with collision


detection. Stations can terminate transmission of data if
collision is detected.
it first senses the shared channel before broadcasting the
frames, and if the channel is idle, it transmits a frame to check
whether the transmission was successful. If the frame is
successfully received, the station sends another frame. If any
collision is detected in the CSMA/CD, the station sends a jam/
stop signal to the shared channel to terminate data
CSMA/CA

CSMA/CA – Carrier sense multiple access with collision


avoidance. The process of collisions detection involves sender
receiving acknowledgement signals. If there is just one signal(its
own) then the data is successfully sent but if there are two
signals(its own and the one with which it has collided) then it
means a collision has occurred.
CSMA/CA

Following are the methods used in the CSMA/ CA to avoid the


collision:
Interframe space: In this method, the station waits for the
channel to become idle, and if it gets the channel is idle, it does
not immediately send the data. Instead of this, it waits for some
time, and this time period is called the Interframe space or IFS.
However, the IFS time is often used to define the priority of the
station.
CSMA/CA

Following are the methods used in the CSMA/ CA to avoid the


collision:
Contention window: In the Contention window, the total time
is divided into different slots. When the station/ sender is ready
to transmit the data frame, it chooses a random slot number of
slots as wait time. If the channel is still busy, it does not restart
the entire process, except that it restarts the timer only to send
data packets when the channel is inactive.
CSMA/CA

Following are the methods used in the CSMA/ CA to avoid the


collision:
Acknowledgment: In the acknowledgment method, the sender
station sends the data frame to the shared channel if the
acknowledgment is not received ahead of time.
Channelization
Protocols
It is a channelization protocol that allows the total usable
bandwidth in a shared channel to be shared across multiple
stations based on their time, distance and codes. It can access all
the stations at the same time to send the data frames to the
channel.
Following are the various methods to access the channel based
on their time, distance and codes:
FDMA (Frequency Division Multiple Access)
TDMA (Time Division Multiple Access)
Channelization Protocols-
FDMA
It is a frequency division multiple access (FDMA) method used
to divide the available bandwidth into equal bands so that
multiple users can send data through a different frequency to
the subchannel.

Each station is reserved with a particular band to prevent the


crosstalk between the channels and interferences of stations.
Channelization Protocols-
FDMA
Channelization Protocols-
TDMA
Time Division Multiple Access (TDMA) is a channel access
method. It allows the same frequency bandwidth to be shared
across multiple stations. And to avoid collisions in the shared
channel, it divides the channel into different frequency slots that
allocate stations to transmit the data frames.

The same frequency bandwidth into the shared channel by


dividing the signal into various time slots to transmit it.
However, TDMA has an overhead of synchronization that
Channelization Protocols-
CDMA
The code division multiple access (CDMA) is a channel access
method. In CDMA, all stations can simultaneously send the data
over the same channel.
 It means that it allows each station to transmit the data
frames with full frequency on the shared channel at all times. It
does not require the division of bandwidth on a shared channel
based on time slots.
If multiple stations send data to a channel simultaneously,
their data frames are separated by a unique code sequence.
Channelization Protocols-
CDMA
The code division multiple access (CDMA) is a channel access
method. In CDMA, all stations can simultaneously send the data
over the same channel.
 It means that it allows each station to transmit the data
frames with full frequency on the shared channel at all times. It
does not require the division of bandwidth on a shared channel
based on time slots.
If multiple stations send data to a channel simultaneously,
their data frames are separated by a unique code sequence.
Channelization Protocols-
CDMA
For example, there are multiple users in a room that are
continuously speaking. Data is received by the users if only two-
person interact with each other using the same language.
Similarly, in the network, if different stations communicate with
each other simultaneously with different code language.
.

ETHERNET
ETHERNET

.
ETHERNET
 Ethernet is the traditional technology for connecting devices in a wired local
area network (LAN) or wide area network (WAN).

 It enables devices to communicate with each other via a protocol, which is a


set of rules or common network language.

 Numerous devices like printers and laptops can be connected by LAN and
WAN within buildings, homes, and even small neighborhoods

 the maximum data transfer rate will be 100 Mbps if you have
a Gigabit Ethernet router and use it to connect the device.

 Family of networking technologies that are defined in IEEE 802.2 and 802.3
standards

.
ETHERNET

.
ETHERNET

.
ETHERNET

.
ETHERNET

.
ETHERNET

.
ETHERNET

.
ETHERNET STANDARDS

.
ETHERNET

.
ETHERNET FRAME
FORMAT

.
WIRELESS LAN (IEEE 802.11)

Wireless communication is one of the fastest


growing technologies.

The demand for connecting devices without


the use of cables is increasing everywhere.

Wireless LANs can be found on college


campuses, in office buildings, and in many
public areas.
TOPOLOGY IN WLAN / 802.11

WLANs can be built with either of the


following two topologies /architecture

 Infra-Structure Network Topology


 Ad Hoc Network Topology
TOPOLOGY IN WLAN / 802.11
ARCHITECURE OF WLAN /
802.11

The standard defines two kinds of services:


Basic Service Set (BSS)
 Extended Service Set (ESS).
Basic Service Set (BSS)
Extended Service Set (ESS)
FRAME FORMAT OF WLAN /
802.11
FRAME FORMAT OF WLAN /
802.11
BLUETOOTH (IEEE 802.15.1 )
BLUETOOTH (IEEE 802.15.1)
WIRELESS LAN: BLUETOOTH
WIRELESS LAN: BLUETOOTH
WIRELESS LAN: BLUETOOTH
WIRELESS LAN: BLUETOOTH
WIRELESS LAN: BLUETOOTH
WIRELESS LAN: BLUETOOTH
WIRELESS LAN: BLUETOOTH
WIRELESS LAN: BLUETOOTH
WIRELESS LAN: BLUETOOTH
WIRELESS LAN: BLUETOOTH
WIRELESS LAN: BLUETOOTH
WIRELESS LAN: BLUETOOTH
WIRELESS LAN: BLUETOOTH
THE END
NEXT SLIDES ARE ADDITIONAL
TOPICS
IEEE STANDARDS

In 1985, the Computer Society of the IEEE started a


project, called Project 802, to set standards to enable
intercommunication among equipment from a variety
of manufacturers.

 Project 802 is a way of specifying functions of the


physical layer and the data link layer of major LAN
protocols
.
IEEE STANDARDS

The relationship of the 802 Standard to the traditional


OSI (open source interconnection )model is shown in
Figure .

The IEEE has subdivided the data link layer into two
sublayers: logical link control (LLC) and media
access control (MAC).

IEEE has also created several physical layer


standards for different LAN protocols
.
IEEE STANDARDS


.
IEEE STANDARDS

You might also like