SlideShare a Scribd company logo
1 of 21
Module 6: Data Link Layer
Introduction to Networks v7.0
(ITN)
2
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
6.1 Purpose of the Data Link
Layer
3
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Purpose of the Data Link Layer
The Data Link Layer
1. The Data Link layer is responsible
for communications between end-
device network interface cards or end to
end delivery.
2. It allows upper layer protocols to access
the physical layer media and
encapsulates Layer 3 packets (IPv4
and IPv6) into Layer 2 Frames.
3. It also performs error detection and
rejects corrupts frames.
4
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Purpose of the Data Link Layer
IEEE 802 LAN/MAN Data Link Sublayers
IEEE 802 LAN/MAN standards are specific to
the type of network (Ethernet, WLAN, WPAN,
etc).
The Data Link Layer consists of two
sublayers. Logical Link Control (LLC) and
Media Access Control (MAC).
• The LLC sublayer communicates
between the networking software at the
upper layers and the device hardware at
the lower layers.
• The MAC sublayer is responsible for
data encapsulation and media access
control.
5
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Purpose of the Data Link Layer
Providing Access to Media
Packets exchanged between nodes may experience numerous data
link layers and media transitions.
At each hop along the path, a router performs four basic Layer 2
functions:
1. Accepts a frame from the network medium.
2. De-encapsulates the frame to expose the encapsulated packet.
3. Re-encapsulates the packet into a new frame.
4. Forwards the new frame on the medium of the next network segment.
6
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Purpose of the Data Link Layer
Data Link Layer Standards
Data link layer protocols are
defined by engineering
organizations:
• Institute for Electrical and
Electronic Engineers (IEEE).
• International Telecommunications
Union (ITU).
• International Organizations for
Standardization (ISO).
• American National Standards
Institute (ANSI).
7
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
6.2 Topologies
8
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Topologies
Physical and Logical Topologies
The topology of a network is the arrangement and relationship of the network
devices and the interconnections between them.
There are two types of topologies used when describing networks:
• Physical topology – shows physical connections and how devices are
interconnected.
• Logical topology – identifies the virtual connections between devices
using device interfaces and IP addressing schemes.
9
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Topologies
WAN Topologies
There are three common physical WAN topologies:
• Point-to-point – the simplest and most common WAN topology. Consists of
a permanent link between two endpoints.
• Hub and spoke – similar to a star topology where a central site
interconnects branch sites through point-to-point links.
• Mesh – provides high availability but requires every end system to be
connected to every other end system.
10
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Topologies
Point-to-Point WAN Topology
• Physical point-to-point topologies directly connect two nodes.
• The nodes may not share the media with other hosts.
• Because all frames on the media can only travel to or from the two
nodes, Point-to-Point WAN protocols can be very simple.
11
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Topologies
LAN Topologies
End devices on LANs are typically
interconnected using a star or extended
star topology. Star and extended star
topologies are easy to install, very scalable
and easy to troubleshoot.
Early Ethernet and Legacy Token Ring
technologies provide two additional
topologies:
• Bus – All end systems chained
together and terminated on each end.
• Ring – Each end system is connected
to its respective neighbors to form a
ring.
12
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Topologies
Half and Full Duplex Communication
Half-duplex communication
• Only allows one device to send or receive at a time on a shared medium.
• Used on WLANs and legacy bus topologies with Ethernet hubs.
Full-duplex communication
• Allows both devices to simultaneously transmit and receive on a shared medium.
• Ethernet switches operate in full-duplex mode.
13
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Topologies
Access Control Methods
Contention-based access
All nodes operating in half-duplex, competing for use of the medium. Examples are:
• Carrier sense multiple access with collision detection (CSMA/CD) as used on legacy
bus-topology Ethernet.
• Carrier sense multiple access with collision avoidance (CSMA/CA) as used on
Wireless LANs.
Controlled access
• Deterministic access where each node has its own time on the medium.
• Used on legacy networks such as Token Ring and ARCNET.
14
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Topologies
Contention-Based Access – CSMA/CD
CSMA/CD
• Used by legacy Ethernet LANs.
• Operates in half-duplex mode where only one device sends or receives at a time.
• Uses a collision detection process to govern when a device can send and what
happens if multiple devices send at the same time.
CSMA/CD collision detection process:
• Devices transmitting simultaneously will result in a signal collision on the shared
media.
• Devices detect the collision.
• Devices wait a random period of time and retransmit data.
15
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Topologies
Contention-Based Access – CSMA/CA
CSMA/CA
• Used by IEEE 802.11 WLANs.
• Operates in half-duplex mode where only one device sends or receives at a time.
• Uses a collision avoidance process to govern when a device can send and what
happens if multiple devices send at the same time.
CSMA/CA collision avoidance process:
• When transmitting, devices also include the time duration needed for the
transmission.
• Other devices on the shared medium receive the time duration information and know
how long the medium will be unavailable.
16
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
6.3 Data Link Frame
17
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Data Link Frame
The Frame
Data is encapsulated by the data link layer with a header and a trailer to form a frame.
A data link frame has three parts:
• Header
• Data
• Trailer
The fields of the header and trailer vary according to data link layer protocol.
The amount of control information carried with in the frame varies according to access
control information and logical topology.
18
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Data Link Frame
Frame Fields
Field Description
Frame Start and Stop Identifies beginning and end of frame
Addressing Indicates source and destination nodes
Type Identifies encapsulated Layer 3 protocol
Control Identifies flow control services
Data Contains the frame payload
Error Detection Used for determine transmission errors
19
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Data Link Frame
Layer 2 Addresses
• Also referred to as a physical address.
• Contained in the frame header.
• Used only for local delivery of a frame on the link.
• Updated by each device that forwards the frame.
20
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Data Link Frame
LAN and WAN Frames
The logical topology and physical media determine the data link
protocol used:
• Ethernet
• 802.11 Wireless
• Point-to-Point (PPP)
• High-Level Data Link Control (HDLC)
• Frame-Relay
Each protocol performs media access control for specified logical
topologies.
ITN_Module_6.pptx

More Related Content

What's hot

CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11Irsandi Hasan
 
ITN_Module_3.pptx
ITN_Module_3.pptxITN_Module_3.pptx
ITN_Module_3.pptxargost1003
 
Ccnp presentation [Day 1-3] Class
Ccnp presentation [Day 1-3] ClassCcnp presentation [Day 1-3] Class
Ccnp presentation [Day 1-3] ClassSagarR24
 
CCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point ConnectionsCCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point ConnectionsVuz Dở Hơi
 
FortiGate_Sec_02_Security Fabric (1).pptx
FortiGate_Sec_02_Security Fabric (1).pptxFortiGate_Sec_02_Security Fabric (1).pptx
FortiGate_Sec_02_Security Fabric (1).pptxNajahIdrissiMoulayRa
 
Advanced enterprise campus design. routed access (2015 milan)
Advanced enterprise campus design. routed access (2015 milan)Advanced enterprise campus design. routed access (2015 milan)
Advanced enterprise campus design. routed access (2015 milan)slide_site
 
CCNA training 101
CCNA training 101CCNA training 101
CCNA training 101Rohan Reddy
 
CCNA Network Devices
CCNA Network DevicesCCNA Network Devices
CCNA Network DevicesDsunte Wilson
 
CCMAv5 - S4: Chapter 6: Broadband Solutions
CCMAv5 - S4: Chapter 6: Broadband SolutionsCCMAv5 - S4: Chapter 6: Broadband Solutions
CCMAv5 - S4: Chapter 6: Broadband SolutionsVuz Dở Hơi
 
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03Irsandi Hasan
 
CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7Nil Menon
 
CCNAv5 - S4: Chapter 9 troubleshooting the network
CCNAv5 - S4: Chapter 9 troubleshooting the networkCCNAv5 - S4: Chapter 9 troubleshooting the network
CCNAv5 - S4: Chapter 9 troubleshooting the networkVuz Dở Hơi
 
CCNAv5 - S4: Chapter8 monitoring the network
CCNAv5 - S4: Chapter8 monitoring the networkCCNAv5 - S4: Chapter8 monitoring the network
CCNAv5 - S4: Chapter8 monitoring the networkVuz Dở Hơi
 
Network Troubleshooting - Part 2
Network Troubleshooting - Part 2Network Troubleshooting - Part 2
Network Troubleshooting - Part 2SolarWinds
 
Packet tracer practical guide
Packet tracer practical guidePacket tracer practical guide
Packet tracer practical guideNishant Gandhi
 
CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10Irsandi Hasan
 
CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7Irsandi Hasan
 

What's hot (20)

CCNA TCP/IP
CCNA TCP/IPCCNA TCP/IP
CCNA TCP/IP
 
CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11
 
ITN_Module_3.pptx
ITN_Module_3.pptxITN_Module_3.pptx
ITN_Module_3.pptx
 
Ccnp presentation [Day 1-3] Class
Ccnp presentation [Day 1-3] ClassCcnp presentation [Day 1-3] Class
Ccnp presentation [Day 1-3] Class
 
Ccna day3
Ccna day3Ccna day3
Ccna day3
 
CCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point ConnectionsCCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point Connections
 
FortiGate_Sec_02_Security Fabric (1).pptx
FortiGate_Sec_02_Security Fabric (1).pptxFortiGate_Sec_02_Security Fabric (1).pptx
FortiGate_Sec_02_Security Fabric (1).pptx
 
Advanced enterprise campus design. routed access (2015 milan)
Advanced enterprise campus design. routed access (2015 milan)Advanced enterprise campus design. routed access (2015 milan)
Advanced enterprise campus design. routed access (2015 milan)
 
CCNA training 101
CCNA training 101CCNA training 101
CCNA training 101
 
CCNA Network Devices
CCNA Network DevicesCCNA Network Devices
CCNA Network Devices
 
CCMAv5 - S4: Chapter 6: Broadband Solutions
CCMAv5 - S4: Chapter 6: Broadband SolutionsCCMAv5 - S4: Chapter 6: Broadband Solutions
CCMAv5 - S4: Chapter 6: Broadband Solutions
 
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03
 
CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7
 
CCNAv5 - S4: Chapter 9 troubleshooting the network
CCNAv5 - S4: Chapter 9 troubleshooting the networkCCNAv5 - S4: Chapter 9 troubleshooting the network
CCNAv5 - S4: Chapter 9 troubleshooting the network
 
CCNAv5 - S4: Chapter8 monitoring the network
CCNAv5 - S4: Chapter8 monitoring the networkCCNAv5 - S4: Chapter8 monitoring the network
CCNAv5 - S4: Chapter8 monitoring the network
 
Network Troubleshooting - Part 2
Network Troubleshooting - Part 2Network Troubleshooting - Part 2
Network Troubleshooting - Part 2
 
OSI Network Layer
OSI Network LayerOSI Network Layer
OSI Network Layer
 
Packet tracer practical guide
Packet tracer practical guidePacket tracer practical guide
Packet tracer practical guide
 
CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10
 
CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7
 

Similar to ITN_Module_6.pptx

Similar to ITN_Module_6.pptx (20)

communication-protocols
 communication-protocols communication-protocols
communication-protocols
 
CCNA_RSE_Chp4.pptx
CCNA_RSE_Chp4.pptxCCNA_RSE_Chp4.pptx
CCNA_RSE_Chp4.pptx
 
06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.ppt
 
06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.ppt
 
OSI Model.pdf
OSI Model.pdfOSI Model.pdf
OSI Model.pdf
 
Westermo webinar: Learning the Basics of Ethernet Networking
Westermo webinar: Learning the Basics of Ethernet NetworkingWestermo webinar: Learning the Basics of Ethernet Networking
Westermo webinar: Learning the Basics of Ethernet Networking
 
CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5
 
Cisco CCNA module 6
Cisco CCNA module 6Cisco CCNA module 6
Cisco CCNA module 6
 
Network Fundamentals: Ch7 - Data Link Layer
Network Fundamentals: Ch7 - Data Link LayerNetwork Fundamentals: Ch7 - Data Link Layer
Network Fundamentals: Ch7 - Data Link Layer
 
CCNP Switching Chapter 1
CCNP Switching Chapter 1CCNP Switching Chapter 1
CCNP Switching Chapter 1
 
The Basics of Industrial Ethernet Communications
The Basics of Industrial Ethernet CommunicationsThe Basics of Industrial Ethernet Communications
The Basics of Industrial Ethernet Communications
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
C C N A Day1
C C N A  Day1C C N A  Day1
C C N A Day1
 
Wp simoneau osi_model
Wp simoneau osi_modelWp simoneau osi_model
Wp simoneau osi_model
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Ccna v5-S1-Chapter 5
Ccna v5-S1-Chapter 5Ccna v5-S1-Chapter 5
Ccna v5-S1-Chapter 5
 
Ethernet and switches
Ethernet and switchesEthernet and switches
Ethernet and switches
 
Bhargava Presentation.ppt
Bhargava Presentation.pptBhargava Presentation.ppt
Bhargava Presentation.ppt
 
Bhargava Presentation.ppt
Bhargava Presentation.pptBhargava Presentation.ppt
Bhargava Presentation.ppt
 

Recently uploaded

定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Lucknow
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Personfurqan222004
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewingbigorange77
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...akbard9823
 

Recently uploaded (20)

定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
sasti delhi Call Girls in munirka 🔝 9953056974 🔝 escort Service-
sasti delhi Call Girls in munirka 🔝 9953056974 🔝 escort Service-sasti delhi Call Girls in munirka 🔝 9953056974 🔝 escort Service-
sasti delhi Call Girls in munirka 🔝 9953056974 🔝 escort Service-
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Person
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewing
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
 

ITN_Module_6.pptx

  • 1. Module 6: Data Link Layer Introduction to Networks v7.0 (ITN)
  • 2. 2 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6.1 Purpose of the Data Link Layer
  • 3. 3 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Purpose of the Data Link Layer The Data Link Layer 1. The Data Link layer is responsible for communications between end- device network interface cards or end to end delivery. 2. It allows upper layer protocols to access the physical layer media and encapsulates Layer 3 packets (IPv4 and IPv6) into Layer 2 Frames. 3. It also performs error detection and rejects corrupts frames.
  • 4. 4 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Purpose of the Data Link Layer IEEE 802 LAN/MAN Data Link Sublayers IEEE 802 LAN/MAN standards are specific to the type of network (Ethernet, WLAN, WPAN, etc). The Data Link Layer consists of two sublayers. Logical Link Control (LLC) and Media Access Control (MAC). • The LLC sublayer communicates between the networking software at the upper layers and the device hardware at the lower layers. • The MAC sublayer is responsible for data encapsulation and media access control.
  • 5. 5 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Purpose of the Data Link Layer Providing Access to Media Packets exchanged between nodes may experience numerous data link layers and media transitions. At each hop along the path, a router performs four basic Layer 2 functions: 1. Accepts a frame from the network medium. 2. De-encapsulates the frame to expose the encapsulated packet. 3. Re-encapsulates the packet into a new frame. 4. Forwards the new frame on the medium of the next network segment.
  • 6. 6 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Purpose of the Data Link Layer Data Link Layer Standards Data link layer protocols are defined by engineering organizations: • Institute for Electrical and Electronic Engineers (IEEE). • International Telecommunications Union (ITU). • International Organizations for Standardization (ISO). • American National Standards Institute (ANSI).
  • 7. 7 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6.2 Topologies
  • 8. 8 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Topologies Physical and Logical Topologies The topology of a network is the arrangement and relationship of the network devices and the interconnections between them. There are two types of topologies used when describing networks: • Physical topology – shows physical connections and how devices are interconnected. • Logical topology – identifies the virtual connections between devices using device interfaces and IP addressing schemes.
  • 9. 9 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Topologies WAN Topologies There are three common physical WAN topologies: • Point-to-point – the simplest and most common WAN topology. Consists of a permanent link between two endpoints. • Hub and spoke – similar to a star topology where a central site interconnects branch sites through point-to-point links. • Mesh – provides high availability but requires every end system to be connected to every other end system.
  • 10. 10 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Topologies Point-to-Point WAN Topology • Physical point-to-point topologies directly connect two nodes. • The nodes may not share the media with other hosts. • Because all frames on the media can only travel to or from the two nodes, Point-to-Point WAN protocols can be very simple.
  • 11. 11 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Topologies LAN Topologies End devices on LANs are typically interconnected using a star or extended star topology. Star and extended star topologies are easy to install, very scalable and easy to troubleshoot. Early Ethernet and Legacy Token Ring technologies provide two additional topologies: • Bus – All end systems chained together and terminated on each end. • Ring – Each end system is connected to its respective neighbors to form a ring.
  • 12. 12 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Topologies Half and Full Duplex Communication Half-duplex communication • Only allows one device to send or receive at a time on a shared medium. • Used on WLANs and legacy bus topologies with Ethernet hubs. Full-duplex communication • Allows both devices to simultaneously transmit and receive on a shared medium. • Ethernet switches operate in full-duplex mode.
  • 13. 13 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Topologies Access Control Methods Contention-based access All nodes operating in half-duplex, competing for use of the medium. Examples are: • Carrier sense multiple access with collision detection (CSMA/CD) as used on legacy bus-topology Ethernet. • Carrier sense multiple access with collision avoidance (CSMA/CA) as used on Wireless LANs. Controlled access • Deterministic access where each node has its own time on the medium. • Used on legacy networks such as Token Ring and ARCNET.
  • 14. 14 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Topologies Contention-Based Access – CSMA/CD CSMA/CD • Used by legacy Ethernet LANs. • Operates in half-duplex mode where only one device sends or receives at a time. • Uses a collision detection process to govern when a device can send and what happens if multiple devices send at the same time. CSMA/CD collision detection process: • Devices transmitting simultaneously will result in a signal collision on the shared media. • Devices detect the collision. • Devices wait a random period of time and retransmit data.
  • 15. 15 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Topologies Contention-Based Access – CSMA/CA CSMA/CA • Used by IEEE 802.11 WLANs. • Operates in half-duplex mode where only one device sends or receives at a time. • Uses a collision avoidance process to govern when a device can send and what happens if multiple devices send at the same time. CSMA/CA collision avoidance process: • When transmitting, devices also include the time duration needed for the transmission. • Other devices on the shared medium receive the time duration information and know how long the medium will be unavailable.
  • 16. 16 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6.3 Data Link Frame
  • 17. 17 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Data Link Frame The Frame Data is encapsulated by the data link layer with a header and a trailer to form a frame. A data link frame has three parts: • Header • Data • Trailer The fields of the header and trailer vary according to data link layer protocol. The amount of control information carried with in the frame varies according to access control information and logical topology.
  • 18. 18 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Data Link Frame Frame Fields Field Description Frame Start and Stop Identifies beginning and end of frame Addressing Indicates source and destination nodes Type Identifies encapsulated Layer 3 protocol Control Identifies flow control services Data Contains the frame payload Error Detection Used for determine transmission errors
  • 19. 19 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Data Link Frame Layer 2 Addresses • Also referred to as a physical address. • Contained in the frame header. • Used only for local delivery of a frame on the link. • Updated by each device that forwards the frame.
  • 20. 20 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Data Link Frame LAN and WAN Frames The logical topology and physical media determine the data link protocol used: • Ethernet • 802.11 Wireless • Point-to-Point (PPP) • High-Level Data Link Control (HDLC) • Frame-Relay Each protocol performs media access control for specified logical topologies.

Editor's Notes

  1. Cisco Networking Academy Program Introduction to Networks v7.0 (ITN) Module 6: Data Link Layer
  2. 6 - Data Link Layer 6.1 - Purpose of the Data Link Layer
  3. 6 – Data Link Layer 6.1 – Purpose of the Data Link Layer 6.1.1 – The Data Link Layer
  4. 6 – Data Link Layer 6.1 – Purpose of the Data Link Layer 6.1.2 – IEEE 802 LAN/MAN Data Link Sublayers
  5. 6 – Data Link Layer 6.1 – Purpose of the Data Link Layer 6.1.3 – Providing Access to Media
  6. 6 – Data Link Layer 6.1 – Purpose of the Data Link Layer 6.1.4 – Data Link Layer Standards 6.1.5 – Check Your Understanding – Purpose of Data Link Layer
  7. 6 - Data Link Layer 6.2 - Topologies
  8. 6 – Data Link Layer 6.2 – Topologies 6.2.1 – Physical and Logical Topologies
  9. 6 – Data Link Layer 6.2 – Topologies 6.2.2 – WAN Topologies
  10. 6 – Data Link Layer 6.2 – Topologies 6.2.3– Point-to-Point WAN Topology
  11. 6 – Data Link Layer 6.2 – Topologies 6.2.4 – LAN Topologies
  12. 6 – Data Link Layer 6.2 – Topologies 6.2.5 – Half and Full Duplex Communication
  13. 6 – Data Link Layer 6.2 – Topologies 6.2.6 – Access Control Methods
  14. 6 – Data Link Layer 6.2 – Topologies 6.2.7 – Contention-Based Access – CSMA/CD
  15. 6 – Data Link Layer 6.2 – Topologies 6.2.8 – Contention-Based Access – CSMA/CA 6.2.9 – Check Your Understanding - Topologies
  16. 6 - Data Link Layer 6.3 - Data Link Frame
  17. 6 – Data Link Layer 6.3 – Data Link Frame 6.3.1 – The Frame
  18. 6 – Data Link Layer 6.3 – Data Link Frame 6.3.2 – Frame Fields
  19. 6 – Data Link Layer 6.3 – Data Link Frame 6.3.3 – Layer 2 Address
  20. 6 – Data Link Layer 6.3 – Data Link Frame 6.3.4 – LAN and WAN Frames 6.3.5 – Check Your Understanding – Data Link Frame