SlideShare a Scribd company logo
1 of 25
Functions of data link layer
Subject: computer network
CE-B
 Maulik togadiya
Data link layer
 The data link layer transmit data packet(frames)
sequentially over the transmission medium.
 The data link layer provides reliable information
transfer capabilities by sending ack frame to the
sender after receiving data packet.
 The data link layer has two sub layers:
1) logical link control (LLC)
2) media access control (MAC).
LLC: It specifies which mechanisms are to be used for
addressing stations over the transmission medium and
for controlling the data exchanged between the
originator and recipient machines.
MAC: when several computer are trying to transmit data,
MAC determine which computer should get a
transmission medium to transfer the data.
Main functions
 Encapsulation of network layer data packets
into frames.
 Frame synchronization
 Error control and error detection
 Flow control
Frames
 A frame is a digital data transmission unit
in computer networking and telecommunication .
 A frame typically includes frame
synchronization features consisting of a sequence of
bits or symbols that indicate to the receiver the
beginning and end of the payload data within the
stream of symbols or bits it receives. If a receiver is
connected to the system in the middle of a frame
transmission, it ignores the data until it detects a
new frame synchronization sequence.
Framing Method Implemented By
Data Link Layer Are:-
 Character Count.
 Starting & Ending Characters With Character
Stuffing.
 Starting & ending Flags With Bit Stuffing.
 Physical Layer Coding Violation.
3 0 41 1 57 7 02 41 26 12
Character count
Character Count Method
Frame 1 Frame 2 Frame 3 Frame 4
Starting & Ending Characters With Character
Stuffing
DLE ASTX B DC ETXDLE
Start Of Frame Data End Of Frame
A B DC Data From Network Layer
Character Stuffing
DLE ASTX B DC ETXDLE
Start Of
Frame
Data End Of
Frame
A B DCDLE
DLEDLE
A B DCDLE
data on
Sender
side
data on
Receiver
side
Starting & ending Flags With Bit Stuffing
0 1 10 0 10 1 11 1 01 1001111110 01111110
Starting flag Bit
Ending Flag BIT
Shifted Bit
BIT stuffing
Stuffing
Performed
By Data
Link layer
0 1 10 0 10 1 11 1 01 101
Data received by
Network layer On
receiver side After
Performing Destuffing
By data link Layer
Physical Layer Coding Violation
 In this method Bit 1 Is encoded into high-low(10)
Pair And Bit 0 Is Encoded Into low-high(01)pair
shown in figure.
0 1 10 01
Menchester Encoding
Physical Layer Coding Violation.
0 1 10 01
Menchester Encoding
Error detection and correction
Error detection
Error detection means to decide whether the received
data is correct or not without having a copy of the
original message.
Error detection uses the concept of redundancy, which
means adding extra bits for detecting errors at the
destination.
Four types of redundancy checks are used
in data communications
Vertical Redundancy Check
VRC
Longitudinal Redundancy Check
LRC
Cyclic Redundancy Check
CRC
Checksum
Error Correction
It can be handled in two ways:
1) receiver can have the sender retransmit the entire
data unit.
2) The receiver can use an error-correcting code,
which automatically corrects certain errors.
Hamming Code
Hamming Code
Hamming Code
Example of Hamming Code
Error
Detection
Computer networking

More Related Content

What's hot

Network connectivity devices
Network connectivity devicesNetwork connectivity devices
Network connectivity devices
Numaan Tole
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch Configuration
Dsunte Wilson
 
Internetworking
InternetworkingInternetworking
Internetworking
Raghu nath
 
Basic concepts of computer Networking
Basic concepts of computer NetworkingBasic concepts of computer Networking
Basic concepts of computer Networking
Hj Habib
 

What's hot (20)

TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
 
Network connectivity devices
Network connectivity devicesNetwork connectivity devices
Network connectivity devices
 
Ppt for tranmission media
Ppt for tranmission mediaPpt for tranmission media
Ppt for tranmission media
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch Configuration
 
Internetworking
InternetworkingInternetworking
Internetworking
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devices
 
TCP/IP
TCP/IPTCP/IP
TCP/IP
 
switching techniques in data communication and networking
switching techniques in data communication and networkingswitching techniques in data communication and networking
switching techniques in data communication and networking
 
Computer Network
Computer NetworkComputer Network
Computer Network
 
Data Communications and Computer Networks
Data Communications and Computer Networks Data Communications and Computer Networks
Data Communications and Computer Networks
 
Data communication basics
Data communication basicsData communication basics
Data communication basics
 
Data Link Layer
Data Link LayerData Link Layer
Data Link Layer
 
Reference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPReference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IP
 
Basic concepts of computer Networking
Basic concepts of computer NetworkingBasic concepts of computer Networking
Basic concepts of computer Networking
 
Network layer tanenbaum
Network layer tanenbaumNetwork layer tanenbaum
Network layer tanenbaum
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Network devices
Network devicesNetwork devices
Network devices
 
Network Fundamentals: Ch8 - Physical Layer
Network Fundamentals: Ch8 - Physical LayerNetwork Fundamentals: Ch8 - Physical Layer
Network Fundamentals: Ch8 - Physical Layer
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
 
Network administration and Management
Network administration and ManagementNetwork administration and Management
Network administration and Management
 

Viewers also liked

Layer Examples in Data Communication CD4
Layer Examples in Data Communication CD4Layer Examples in Data Communication CD4
Layer Examples in Data Communication CD4
koolkampus
 
Introduction to Data-Link Layer
Introduction to Data-Link LayerIntroduction to Data-Link Layer
Introduction to Data-Link Layer
Abdullaziz Tagawy
 

Viewers also liked (15)

Error Correction And Hamming Code Ibrar
Error Correction And Hamming Code IbrarError Correction And Hamming Code Ibrar
Error Correction And Hamming Code Ibrar
 
Computer Networks - Error Detection & Error Correction
Computer Networks - Error Detection & Error CorrectionComputer Networks - Error Detection & Error Correction
Computer Networks - Error Detection & Error Correction
 
Wwwwww
WwwwwwWwwwww
Wwwwww
 
Layer Examples in Data Communication CD4
Layer Examples in Data Communication CD4Layer Examples in Data Communication CD4
Layer Examples in Data Communication CD4
 
Introduction to Data-Link Layer
Introduction to Data-Link LayerIntroduction to Data-Link Layer
Introduction to Data-Link Layer
 
Lecture 5
Lecture 5Lecture 5
Lecture 5
 
Error control coding
Error control codingError control coding
Error control coding
 
CS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKSCS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKS
 
Lecture 20
Lecture 20Lecture 20
Lecture 20
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
 
Presentation on cyclic redundancy check (crc)
Presentation on cyclic redundancy check (crc)Presentation on cyclic redundancy check (crc)
Presentation on cyclic redundancy check (crc)
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
 
Error Detection And Correction
Error Detection And CorrectionError Detection And Correction
Error Detection And Correction
 
Internet Protocol version 6
Internet Protocol version 6Internet Protocol version 6
Internet Protocol version 6
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 

Similar to Computer networking

datalinklayermukesh-150130061041-conversion-gate01.pptx
datalinklayermukesh-150130061041-conversion-gate01.pptxdatalinklayermukesh-150130061041-conversion-gate01.pptx
datalinklayermukesh-150130061041-conversion-gate01.pptx
lathass5
 
U2CH1Data Link Layerxxxxxxxxxxxxxxxxx.pptx
U2CH1Data Link Layerxxxxxxxxxxxxxxxxx.pptxU2CH1Data Link Layerxxxxxxxxxxxxxxxxx.pptx
U2CH1Data Link Layerxxxxxxxxxxxxxxxxx.pptx
k2w9psdb96
 
unit2-210710110327.pdf
unit2-210710110327.pdfunit2-210710110327.pdf
unit2-210710110327.pdf
ssuser3aa461
 
Introduction to the OSI 7 layer model and Data Link Layer
Introduction to the OSI 7 layer model and Data Link LayerIntroduction to the OSI 7 layer model and Data Link Layer
Introduction to the OSI 7 layer model and Data Link Layer
VNIT-ACM Student Chapter
 
IEEE standards and Data Link Layer Protocol
IEEE standards and Data Link Layer ProtocolIEEE standards and Data Link Layer Protocol
IEEE standards and Data Link Layer Protocol
Sajith Ekanayaka
 

Similar to Computer networking (20)

Unit 3 - Data Link Layer - Part A
Unit 3 - Data Link Layer - Part AUnit 3 - Data Link Layer - Part A
Unit 3 - Data Link Layer - Part A
 
DLL
DLLDLL
DLL
 
datalinklayermukesh-150130061041-conversion-gate01.pptx
datalinklayermukesh-150130061041-conversion-gate01.pptxdatalinklayermukesh-150130061041-conversion-gate01.pptx
datalinklayermukesh-150130061041-conversion-gate01.pptx
 
datalinklayermukesh
datalinklayermukeshdatalinklayermukesh
datalinklayermukesh
 
Data link layer
Data link layer Data link layer
Data link layer
 
Unit 2
Unit 2Unit 2
Unit 2
 
U2CH1Data Link Layerxxxxxxxxxxxxxxxxx.pptx
U2CH1Data Link Layerxxxxxxxxxxxxxxxxx.pptxU2CH1Data Link Layerxxxxxxxxxxxxxxxxx.pptx
U2CH1Data Link Layerxxxxxxxxxxxxxxxxx.pptx
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
 
unit2-210710110327.pdf
unit2-210710110327.pdfunit2-210710110327.pdf
unit2-210710110327.pdf
 
Unit 2 [autosaved]
Unit 2 [autosaved]Unit 2 [autosaved]
Unit 2 [autosaved]
 
Jaimin chp-3 - data-link layer- 2011 batch
Jaimin   chp-3 - data-link layer- 2011 batchJaimin   chp-3 - data-link layer- 2011 batch
Jaimin chp-3 - data-link layer- 2011 batch
 
CN UNIT II.pptx
CN UNIT II.pptxCN UNIT II.pptx
CN UNIT II.pptx
 
data link layer to print
data link layer to printdata link layer to print
data link layer to print
 
Introduction to the OSI 7 layer model and Data Link Layer
Introduction to the OSI 7 layer model and Data Link LayerIntroduction to the OSI 7 layer model and Data Link Layer
Introduction to the OSI 7 layer model and Data Link Layer
 
OSI MODELS.pptx
OSI  MODELS.pptxOSI  MODELS.pptx
OSI MODELS.pptx
 
IEEE standards and Data Link Layer Protocol
IEEE standards and Data Link Layer ProtocolIEEE standards and Data Link Layer Protocol
IEEE standards and Data Link Layer Protocol
 
frame relay
frame relayframe relay
frame relay
 
CN R16 -UNIT-3.pdf
CN R16 -UNIT-3.pdfCN R16 -UNIT-3.pdf
CN R16 -UNIT-3.pdf
 
Data Link Layer of OSI Model responsibilities
Data Link Layer of OSI Model responsibilitiesData Link Layer of OSI Model responsibilities
Data Link Layer of OSI Model responsibilities
 
Data_Link_Layer.ppt
Data_Link_Layer.pptData_Link_Layer.ppt
Data_Link_Layer.ppt
 

More from Maulik Togadiya (8)

Information and Network Security
Information and Network SecurityInformation and Network Security
Information and Network Security
 
Data mining
Data miningData mining
Data mining
 
Multiple Access in wireless communication
Multiple Access in wireless communicationMultiple Access in wireless communication
Multiple Access in wireless communication
 
optimization of DFA
optimization of DFAoptimization of DFA
optimization of DFA
 
Turing machine-TOC
Turing machine-TOCTuring machine-TOC
Turing machine-TOC
 
Select query in JDBC
Select query in JDBCSelect query in JDBC
Select query in JDBC
 
Distributed shred memory architecture
Distributed shred memory architectureDistributed shred memory architecture
Distributed shred memory architecture
 
Regular expression with DFA
Regular expression with DFARegular expression with DFA
Regular expression with DFA
 

Recently uploaded

DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
Kamal Acharya
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
jaanualu31
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech Civil
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planes
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 

Computer networking

  • 1. Functions of data link layer Subject: computer network CE-B  Maulik togadiya
  • 2. Data link layer  The data link layer transmit data packet(frames) sequentially over the transmission medium.  The data link layer provides reliable information transfer capabilities by sending ack frame to the sender after receiving data packet.
  • 3.  The data link layer has two sub layers: 1) logical link control (LLC) 2) media access control (MAC). LLC: It specifies which mechanisms are to be used for addressing stations over the transmission medium and for controlling the data exchanged between the originator and recipient machines. MAC: when several computer are trying to transmit data, MAC determine which computer should get a transmission medium to transfer the data.
  • 4. Main functions  Encapsulation of network layer data packets into frames.  Frame synchronization  Error control and error detection  Flow control
  • 5. Frames  A frame is a digital data transmission unit in computer networking and telecommunication .  A frame typically includes frame synchronization features consisting of a sequence of bits or symbols that indicate to the receiver the beginning and end of the payload data within the stream of symbols or bits it receives. If a receiver is connected to the system in the middle of a frame transmission, it ignores the data until it detects a new frame synchronization sequence.
  • 6. Framing Method Implemented By Data Link Layer Are:-  Character Count.  Starting & Ending Characters With Character Stuffing.  Starting & ending Flags With Bit Stuffing.  Physical Layer Coding Violation.
  • 7. 3 0 41 1 57 7 02 41 26 12 Character count Character Count Method Frame 1 Frame 2 Frame 3 Frame 4
  • 8. Starting & Ending Characters With Character Stuffing DLE ASTX B DC ETXDLE Start Of Frame Data End Of Frame A B DC Data From Network Layer
  • 9. Character Stuffing DLE ASTX B DC ETXDLE Start Of Frame Data End Of Frame A B DCDLE DLEDLE A B DCDLE data on Sender side data on Receiver side
  • 10. Starting & ending Flags With Bit Stuffing 0 1 10 0 10 1 11 1 01 1001111110 01111110 Starting flag Bit Ending Flag BIT Shifted Bit BIT stuffing Stuffing Performed By Data Link layer 0 1 10 0 10 1 11 1 01 101 Data received by Network layer On receiver side After Performing Destuffing By data link Layer
  • 11. Physical Layer Coding Violation  In this method Bit 1 Is encoded into high-low(10) Pair And Bit 0 Is Encoded Into low-high(01)pair shown in figure. 0 1 10 01 Menchester Encoding
  • 12. Physical Layer Coding Violation. 0 1 10 01 Menchester Encoding
  • 13. Error detection and correction Error detection Error detection means to decide whether the received data is correct or not without having a copy of the original message. Error detection uses the concept of redundancy, which means adding extra bits for detecting errors at the destination.
  • 14. Four types of redundancy checks are used in data communications
  • 19. Error Correction It can be handled in two ways: 1) receiver can have the sender retransmit the entire data unit. 2) The receiver can use an error-correcting code, which automatically corrects certain errors.