SlideShare a Scribd company logo
1 of 31
Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy
Network Fundamentals
Abdelkhalik Elsaid Mosa
abdu.elsaid@yahoo.com
http://abdelkhalik.staff.scuegypt.edu.eg/
Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy
Introduction
• The Application layer provides the interface to the user.
• The Transport layer is responsible for dividing and managing
communications between the processes running in the two end
systems.
• The Network layer protocols organize our communication data so
that it can travel across internetworks from source to destination
 Packets do not have a way to directly access different media.
• OSI Data Link layer prepares Network layer packets for
transmission and controls access to the physical media.
• The Data Link layer provides a means for exchanging data over a
common local media, hop to hop delivery.
Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy
Data Link Layer terms and services
• Frame: The Data Link layer PDU.
• Node: The Layer 2 notation for a device on a network.
• Media/medium (physical): The physical means for the transfer
of information between two nodes.
• Network (physical): Two or more nodes connected to a common
medium, also called “Network segment”.
• The Data Link layer performs two basic services:
1. Allows the upper layers to access the media using techniques
such as Framing.
2. Controls how data is placed onto and received from the media
using techniques such as Media Access Control and error
detection.
Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy
Upper Layer Access to media
Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy
Creating a frame
Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy
Connecting upper layer services to media
Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy
Data Link Layer sublayers
• Separating the Data Link layer into sublayers allows for one type of frame
defined by the upper layer to access different types of media defined by the
lower layer.
IEEE 802.2
IEEE 802.3
Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy
Placing data on the media
• Media Access Control “equivalent to traffic rules”: Regulating the placement
of data frames onto the media. MAC techniques define if and how the nodes
share the media.
• The method of media access control used depends on
1. Media sharing: If and how the nodes share the media.
2. Topology: How the connection between the nodes appears to the Data Link layer.
Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy
Media Access control for shared media
• Media access control methods for shared media:
1.Controlled “scheduled access or deterministic”: Each node has
its own time to use the medium.
Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy
Media Access control for shared media
• Media access control methods for shared media:
2. Contention-based ” non-deterministic”: All nodes compete for
the use of the medium.
Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy
Media Access control for non-shared media
• Media access control protocols for non-shared media require little
or no control before placing frames onto the media.
Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy
Logical topology vs. physical topology
• Physical Topology: is an arrangement of the nodes and the
physical connections between them.
• Logical Topology: is the way a network transfers frames from
one node to the next.
 The Data Link layer "sees" the logical topology of a network
when controlling data access to the media.
 The logical topology influences the type of network framing
and media access control used.
• Logical and physical topologies typically used in networks are
1. Point-to-Point
2. Multi-Access
3. Ring
Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy
Point to Point Topology
• Point-to-Point topology: connects two nodes directly/ Indirectly together.
• The media access control protocol can be very simple.
• The end nodes communicating in a point-to-point network can be physically
connected via a number of intermediate devices.
Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy
Multi-Access Topology
• A logical multi-access topology enables a number of nodes to
communicate by using the same shared media.
• Data from only one node can be placed on the medium at any
one time.
• CSMA/CD or CSMA/CA Access Control methods can be used.
• Token passing methods can also be used.
Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy
Ring Topology
• In a logical ring topology, each node in turn receives a frame. If
the frame is not addressed to the node, the node passes the
frame to the next node.
• Uses a controlled media access control called token passing.
Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy
Data Link Layer Protocols – The frame
• There are many different Data Link layer protocols that describe
Data Link layer frames.
Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy
Addressing Requirements
• Data Link layer addressing depends on the logical topology.
Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy
Data Link Layer Protocols – The frame
• The L2 protocol used depends on the logical topology of the
network and the implementation of the Physical layer.
• Ex: Ethernet , PPP, HDLC, Frame Relay, ATM.
• The Layer 2 protocol used for a particular network topology is
determined by the technology used to implement that topology.
These technologies are
1. LAN Technology
2. WAN Technology
• These technologies are determined by the size of the network,
the number of hosts and the geographic scope, and the services
to be provided over the network.
Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy
Ethernet Protocol for LANs
• A family of networking technologies , IEEE 802.2 and 802.3.
• Define both the Layer 2 protocols and the Layer 1 technologies.
• Provides unacknowledged connectionless service over a shared
media using CSMA/CD as the media access methods.
Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy
Point-to-Point Protocol for WANs
• PPP is a protocol used to deliver frames between two nodes.
• PPP standard is defined by RFCs.
Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy
Wireless Protocol for LANs
• 802.11, Wi-Fi, is an extension of the IEEE 802 standards. It uses
the same 802.2 LLC and 48-bit addressing scheme.
• Contention-based system using CSMA/CA media access process.
• uses Data Link acknowledgements to confirm that a frame is
received successfully.
Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy
Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy
Follow data through an Internetwork
1
2
Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy
Follow data through an Internetwork
3
4
Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy
Follow data through an Internetwork
5
6
Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy
Follow data through an Internetwork
Data Link Layer of Router B gets data of the media7
8
Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy
Follow data through an Internetwork
Data Link Layer of Router A gets data off the media
Data Link Layer of Router B puts data on the media9
10
Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy
Follow data through an Internetwork
Data Link Layer of Router A puts data on the media
11
12
Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy
Follow data through an Internetwork
Physical Layer transports data across the media13
14
Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy
Follow data through an Internetwork
15
16
Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy
Follow data through an Internetwork
17

More Related Content

What's hot

Frequency Division Multiple Access (FDMA)
Frequency Division Multiple Access (FDMA)Frequency Division Multiple Access (FDMA)
Frequency Division Multiple Access (FDMA)
Miles Kevin Galario
 
Chap 4 (large scale propagation)
Chap 4 (large scale propagation)Chap 4 (large scale propagation)
Chap 4 (large scale propagation)
asadkhan1327
 

What's hot (20)

Eye diagram in Communication
Eye diagram in CommunicationEye diagram in Communication
Eye diagram in Communication
 
Go back-n protocol
Go back-n protocolGo back-n protocol
Go back-n protocol
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
 
OSI Network Layer
OSI Network LayerOSI Network Layer
OSI Network Layer
 
Ethernet Computer network
Ethernet Computer networkEthernet Computer network
Ethernet Computer network
 
Osi reference model
Osi reference modelOsi reference model
Osi reference model
 
Mac layer
Mac  layerMac  layer
Mac layer
 
Large scale path loss 1
Large scale path loss 1Large scale path loss 1
Large scale path loss 1
 
Frequency Division Multiple Access (FDMA)
Frequency Division Multiple Access (FDMA)Frequency Division Multiple Access (FDMA)
Frequency Division Multiple Access (FDMA)
 
Chap 4 (large scale propagation)
Chap 4 (large scale propagation)Chap 4 (large scale propagation)
Chap 4 (large scale propagation)
 
Telephone system & multiplexing
Telephone system & multiplexingTelephone system & multiplexing
Telephone system & multiplexing
 
Computer network switching
Computer network switchingComputer network switching
Computer network switching
 
Chapter 11: Data Link Control
Chapter 11: Data Link ControlChapter 11: Data Link Control
Chapter 11: Data Link Control
 
5. 2 ray propagation model part 1
5. 2 ray propagation model   part 15. 2 ray propagation model   part 1
5. 2 ray propagation model part 1
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11
 
Multi Carrier Modulation OFDM & FBMC
Multi Carrier Modulation OFDM & FBMCMulti Carrier Modulation OFDM & FBMC
Multi Carrier Modulation OFDM & FBMC
 
ISSUES IN AD HOC WIRELESS NETWORKS
ISSUES IN  AD HOC WIRELESS  NETWORKS ISSUES IN  AD HOC WIRELESS  NETWORKS
ISSUES IN AD HOC WIRELESS NETWORKS
 
Issues in Data Link Layer
Issues in Data Link LayerIssues in Data Link Layer
Issues in Data Link Layer
 
Mac protocols of adhoc network
Mac protocols of adhoc networkMac protocols of adhoc network
Mac protocols of adhoc network
 

Viewers also liked (6)

CCNA Exploration 1 - Chapter 9
CCNA Exploration 1 - Chapter 9CCNA Exploration 1 - Chapter 9
CCNA Exploration 1 - Chapter 9
 
CCNA Exploration 1 - Chapter 5
CCNA Exploration 1 - Chapter 5CCNA Exploration 1 - Chapter 5
CCNA Exploration 1 - Chapter 5
 
Data Link Layer
Data Link LayerData Link Layer
Data Link Layer
 
Chapter3
Chapter3Chapter3
Chapter3
 
CCNA Exploration 1 - Chapter 7
CCNA Exploration 1 - Chapter 7CCNA Exploration 1 - Chapter 7
CCNA Exploration 1 - Chapter 7
 
Unit 4 data link layer
Unit 4 data link layerUnit 4 data link layer
Unit 4 data link layer
 

Similar to Network Fundamentals: Ch7 - Data Link Layer

communication-protocols
 communication-protocols communication-protocols
communication-protocols
Ali Kamil
 
New microsoft power point presentation
New microsoft power point presentationNew microsoft power point presentation
New microsoft power point presentation
Vince Brandez
 

Similar to Network Fundamentals: Ch7 - Data Link Layer (20)

Network Fundamentals: Ch8 - Physical Layer
Network Fundamentals: Ch8 - Physical LayerNetwork Fundamentals: Ch8 - Physical Layer
Network Fundamentals: Ch8 - Physical Layer
 
Open System interconnection OSI Model.pptx
Open System interconnection OSI Model.pptxOpen System interconnection OSI Model.pptx
Open System interconnection OSI Model.pptx
 
06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.ppt
 
06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.ppt
 
ITN_Module_6.pptx
ITN_Module_6.pptxITN_Module_6.pptx
ITN_Module_6.pptx
 
Networking Fundamentals.ppt
Networking Fundamentals.pptNetworking Fundamentals.ppt
Networking Fundamentals.ppt
 
communication-protocols
 communication-protocols communication-protocols
communication-protocols
 
ppt_dcn.pdf
ppt_dcn.pdfppt_dcn.pdf
ppt_dcn.pdf
 
Datacom module 2: Data Communication Architecture, Protocols, and Standards
Datacom module 2:  Data Communication Architecture, Protocols, and StandardsDatacom module 2:  Data Communication Architecture, Protocols, and Standards
Datacom module 2: Data Communication Architecture, Protocols, and Standards
 
Osi model
Osi modelOsi model
Osi model
 
ch01.ppt
ch01.pptch01.ppt
ch01.ppt
 
PC 106 PPT-06
PC 106 PPT-06PC 106 PPT-06
PC 106 PPT-06
 
New microsoft power point presentation
New microsoft power point presentationNew microsoft power point presentation
New microsoft power point presentation
 
Sept 2017 network standards and models
Sept 2017   network standards and modelsSept 2017   network standards and models
Sept 2017 network standards and models
 
LAN Switching and Wireless: Ch1 - LAN Design
LAN Switching and Wireless: Ch1 - LAN DesignLAN Switching and Wireless: Ch1 - LAN Design
LAN Switching and Wireless: Ch1 - LAN Design
 
Network Models.pptx
Network  Models.pptxNetwork  Models.pptx
Network Models.pptx
 
It107 ch02
It107 ch02It107 ch02
It107 ch02
 
Chapter4
Chapter4Chapter4
Chapter4
 
UNIT 4 computer networking powerpoint presentation .pdf
UNIT 4 computer networking powerpoint presentation .pdfUNIT 4 computer networking powerpoint presentation .pdf
UNIT 4 computer networking powerpoint presentation .pdf
 
01 coms 525 tcpip - networking concepts review
01   coms 525 tcpip - networking concepts review01   coms 525 tcpip - networking concepts review
01 coms 525 tcpip - networking concepts review
 

More from Abdelkhalik Mosa

More from Abdelkhalik Mosa (18)

Towards a Cloud Native Big Data Platform using MiCADO
Towards a Cloud Native Big Data Platform using MiCADOTowards a Cloud Native Big Data Platform using MiCADO
Towards a Cloud Native Big Data Platform using MiCADO
 
Virtual machine consolidation for cloud data centers using parameter based ad...
Virtual machine consolidation for cloud data centers using parameter based ad...Virtual machine consolidation for cloud data centers using parameter based ad...
Virtual machine consolidation for cloud data centers using parameter based ad...
 
Cloud computing and Cloud Enabling Technologies
Cloud computing and Cloud Enabling TechnologiesCloud computing and Cloud Enabling Technologies
Cloud computing and Cloud Enabling Technologies
 
Academic Poster Design, Review and Presentation
Academic Poster Design, Review and PresentationAcademic Poster Design, Review and Presentation
Academic Poster Design, Review and Presentation
 
IPv6
IPv6IPv6
IPv6
 
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and ConfigurationLAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
 
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)
 
LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)
LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)
LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)
 
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and ConfigurationLAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
 
Accessing the WAN: Ch4 - Network Security
Accessing the WAN: Ch4 - Network SecurityAccessing the WAN: Ch4 - Network Security
Accessing the WAN: Ch4 - Network Security
 
Routing Protocols and Concepts: Ch9 - EIGRP
Routing Protocols and Concepts: Ch9 - EIGRPRouting Protocols and Concepts: Ch9 - EIGRP
Routing Protocols and Concepts: Ch9 - EIGRP
 
Network Fundamentals: Ch11 - Configuring and Testing your Network
Network Fundamentals: Ch11 - Configuring and Testing your NetworkNetwork Fundamentals: Ch11 - Configuring and Testing your Network
Network Fundamentals: Ch11 - Configuring and Testing your Network
 
Network Fundamentals: Ch6 - Addressing the Network IP v4
Network Fundamentals: Ch6 - Addressing the Network IP v4Network Fundamentals: Ch6 - Addressing the Network IP v4
Network Fundamentals: Ch6 - Addressing the Network IP v4
 
Network Fundamentals: Ch5 - Network Layer
Network Fundamentals: Ch5 - Network LayerNetwork Fundamentals: Ch5 - Network Layer
Network Fundamentals: Ch5 - Network Layer
 
Network Fundamentals: Ch4 - Transport Layer
Network Fundamentals: Ch4 - Transport LayerNetwork Fundamentals: Ch4 - Transport Layer
Network Fundamentals: Ch4 - Transport Layer
 
Network Fundamentals: Ch3 - Application Layer Functionality and Protocols
Network Fundamentals: Ch3 - Application Layer Functionality and ProtocolsNetwork Fundamentals: Ch3 - Application Layer Functionality and Protocols
Network Fundamentals: Ch3 - Application Layer Functionality and Protocols
 
Network Fundamentals: Ch9 - Ethernet
Network Fundamentals: Ch9 - EthernetNetwork Fundamentals: Ch9 - Ethernet
Network Fundamentals: Ch9 - Ethernet
 
Routing Protocols and Concepts: Ch5 - Routing Information Protocol (RIP v1)
Routing Protocols and Concepts: Ch5 - Routing Information Protocol (RIP v1)Routing Protocols and Concepts: Ch5 - Routing Information Protocol (RIP v1)
Routing Protocols and Concepts: Ch5 - Routing Information Protocol (RIP v1)
 

Recently uploaded

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 

Network Fundamentals: Ch7 - Data Link Layer

  • 1. Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy Network Fundamentals Abdelkhalik Elsaid Mosa abdu.elsaid@yahoo.com http://abdelkhalik.staff.scuegypt.edu.eg/
  • 2. Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy Introduction • The Application layer provides the interface to the user. • The Transport layer is responsible for dividing and managing communications between the processes running in the two end systems. • The Network layer protocols organize our communication data so that it can travel across internetworks from source to destination  Packets do not have a way to directly access different media. • OSI Data Link layer prepares Network layer packets for transmission and controls access to the physical media. • The Data Link layer provides a means for exchanging data over a common local media, hop to hop delivery.
  • 3. Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy Data Link Layer terms and services • Frame: The Data Link layer PDU. • Node: The Layer 2 notation for a device on a network. • Media/medium (physical): The physical means for the transfer of information between two nodes. • Network (physical): Two or more nodes connected to a common medium, also called “Network segment”. • The Data Link layer performs two basic services: 1. Allows the upper layers to access the media using techniques such as Framing. 2. Controls how data is placed onto and received from the media using techniques such as Media Access Control and error detection.
  • 4. Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy Upper Layer Access to media
  • 5. Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy Creating a frame
  • 6. Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy Connecting upper layer services to media
  • 7. Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy Data Link Layer sublayers • Separating the Data Link layer into sublayers allows for one type of frame defined by the upper layer to access different types of media defined by the lower layer. IEEE 802.2 IEEE 802.3
  • 8. Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy Placing data on the media • Media Access Control “equivalent to traffic rules”: Regulating the placement of data frames onto the media. MAC techniques define if and how the nodes share the media. • The method of media access control used depends on 1. Media sharing: If and how the nodes share the media. 2. Topology: How the connection between the nodes appears to the Data Link layer.
  • 9. Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy Media Access control for shared media • Media access control methods for shared media: 1.Controlled “scheduled access or deterministic”: Each node has its own time to use the medium.
  • 10. Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy Media Access control for shared media • Media access control methods for shared media: 2. Contention-based ” non-deterministic”: All nodes compete for the use of the medium.
  • 11. Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy Media Access control for non-shared media • Media access control protocols for non-shared media require little or no control before placing frames onto the media.
  • 12. Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy Logical topology vs. physical topology • Physical Topology: is an arrangement of the nodes and the physical connections between them. • Logical Topology: is the way a network transfers frames from one node to the next.  The Data Link layer "sees" the logical topology of a network when controlling data access to the media.  The logical topology influences the type of network framing and media access control used. • Logical and physical topologies typically used in networks are 1. Point-to-Point 2. Multi-Access 3. Ring
  • 13. Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy Point to Point Topology • Point-to-Point topology: connects two nodes directly/ Indirectly together. • The media access control protocol can be very simple. • The end nodes communicating in a point-to-point network can be physically connected via a number of intermediate devices.
  • 14. Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy Multi-Access Topology • A logical multi-access topology enables a number of nodes to communicate by using the same shared media. • Data from only one node can be placed on the medium at any one time. • CSMA/CD or CSMA/CA Access Control methods can be used. • Token passing methods can also be used.
  • 15. Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy Ring Topology • In a logical ring topology, each node in turn receives a frame. If the frame is not addressed to the node, the node passes the frame to the next node. • Uses a controlled media access control called token passing.
  • 16. Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy Data Link Layer Protocols – The frame • There are many different Data Link layer protocols that describe Data Link layer frames.
  • 17. Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy Addressing Requirements • Data Link layer addressing depends on the logical topology.
  • 18. Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy Data Link Layer Protocols – The frame • The L2 protocol used depends on the logical topology of the network and the implementation of the Physical layer. • Ex: Ethernet , PPP, HDLC, Frame Relay, ATM. • The Layer 2 protocol used for a particular network topology is determined by the technology used to implement that topology. These technologies are 1. LAN Technology 2. WAN Technology • These technologies are determined by the size of the network, the number of hosts and the geographic scope, and the services to be provided over the network.
  • 19. Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy Ethernet Protocol for LANs • A family of networking technologies , IEEE 802.2 and 802.3. • Define both the Layer 2 protocols and the Layer 1 technologies. • Provides unacknowledged connectionless service over a shared media using CSMA/CD as the media access methods.
  • 20. Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy Point-to-Point Protocol for WANs • PPP is a protocol used to deliver frames between two nodes. • PPP standard is defined by RFCs.
  • 21. Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy Wireless Protocol for LANs • 802.11, Wi-Fi, is an extension of the IEEE 802 standards. It uses the same 802.2 LLC and 48-bit addressing scheme. • Contention-based system using CSMA/CA media access process. • uses Data Link acknowledgements to confirm that a frame is received successfully.
  • 22. Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy
  • 23. Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy Follow data through an Internetwork 1 2
  • 24. Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy Follow data through an Internetwork 3 4
  • 25. Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy Follow data through an Internetwork 5 6
  • 26. Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy Follow data through an Internetwork Data Link Layer of Router B gets data of the media7 8
  • 27. Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy Follow data through an Internetwork Data Link Layer of Router A gets data off the media Data Link Layer of Router B puts data on the media9 10
  • 28. Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy Follow data through an Internetwork Data Link Layer of Router A puts data on the media 11 12
  • 29. Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy Follow data through an Internetwork Physical Layer transports data across the media13 14
  • 30. Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy Follow data through an Internetwork 15 16
  • 31. Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy Follow data through an Internetwork 17