SlideShare a Scribd company logo
1 of 16
INTRODUCTION TO DATA LINK
LAYER
DONE BY:
NAME: Shashank HP
SJC Inititute of Technology
Data Communication – 18CS46
Physical layer
Gives services to
Receives services
from
OVERVIEW OF DLL
● The data link layer transforms the physical layer, a raw transmission
facility, to a link responsible for node-to-node communication.
● Specific responsibilities of the data link layer include framing,
addressing, flow control, error control and media access control
L
A
N
s
W
A
N
s
Network layer
Packetizing
Flow
control
Media
Access
control
Addressing
Error
control
Data Link Layer
DLL DESIGN
● Services Provided to the Network Layer:
The network layer wants to send packets to its neighbours without
worrying about the details of it in one piece.
● Framing:
Group the physical layer bit stream into units called frames. Frames are
nothing more than “packets” or “messages”. By convention , we use the term
“frames” when discussing DLL.
● Error Control:
Sender checksums the frame and transmits checksums together with data.
Receiver re-computes the checksum and compares it with the received
value.
● Flow control:
Prevent a fast sender from overwhelming a slower receiver.
SERVICES PROVIDED TO THE NETWORK LAYER
● The function of the data link layer is to
provide services to the network layer.
● The principal service is transferring data
from the network layer on the source
machine to the network layer on the
destination machine.
● The data link layer can be designed to offer
various services. The actual services offered
can vary from system.
FRAMING
● DLL translates the physical layer’s raw stream into discrete units (messages) called frames.
● How can the frame be transmitted so the receiver can detect frame boundaries? That is, how can the
receiver recognize the start and end of a frame?
○ Character Count.
○ Flag byte with Byte Stuffing.
○ Starting and ending flag with bit stuffing.
○ Encoding Violations.
FRAMING - CHARACTER COUNT
● The first framing method uses a field in the header to specify the number of characters in the frame. When
the data link layer at the destination sees the character count, it knows how many characters follow and
hence where the end of the frame is.
FRAMING - BYTE STUFFING
● Use reserved characters to indicate the start and end of a frame. For instance, use the
two-character sequence DLE STX(Data-Link Escape, Start of TeXt) to signal the beginning
of a frame, and the sequence DLE ETX(End of TeXt) to flag the frame’s end.
● The second framing method, Starting and ending character stuffing, gets around the
problem of resynchronization after an error by having each frame start with the
sequence DLE ETX.
● EXAMPLE: If the frame contained “A B DLE D E DLE”, the characters transmitted over
the channel would be “DLE STX A B DLE DLE D E DLE DLE DLE ETX”
FRAMING-BIT STUFFING
● This technique allows data frames to contain an arbitrary number of bits and allows character
codes with an arbitrary number of bits per character. Each frame begins and ends with a
special bit pattern, 01111110.
● Whenever the sender’s data link layer encounters five consecutive 1s in the data, it
automatically stuffs a 0 bit into the outgoing bit stream.
● This bit stuffing is analogous to byte stuffing ,in which an escape byte is stuffed into the
outgoing character stream before a flag byte in the data. When the receiver sees five
consecutive incoming 1 bits,followed by a 0 bit, it automatically destuffs (i.e deletes) the 0 bit.
PHYSICAL LAYER CODING VIOLATIONS
● This Framing Method is used only in those networks in which Encoding on the Physical
Medium contains some redundancy.
● Some LANs encode each bit of data by using two Physical Bits i.e. Manchester coding is
Used. Here, Bit 1 is encoded into high-low(10) pair and Bit 0 is encoded into low-high(01)
pair.
● The scheme means that every data bit has a transition in the middle, making it easy for
the receiver to locate the bit boundaries. The combinations high-high and low-low are not
used for data but are used for delimiting frames in some protocols.
ERROR CONTROL
There are many reasons such as noise, cross-talk etc., which may help data to get corrupted during
transmission. Error control is concerned with insuring that all frames are eventually delivered (possibly
in order) to destination.
Data-link layer uses some error control mechanism to ensure that frames (data bit streams) are
transmitted with certain level of accuracy. But to understand how errors is controlled, it is essential to
know what types of errors may occur.
Types of Errors
There may be three types of errors:
Single bit error
Multiple bits error
Burst error
Error Detection
Errors in the received frames are detected by means of Parity Check and Cyclic
Redundancy Check (CRC). In both cases, few extra bits are sent along with actual data
to confirm that bits received at other end are same as they were sent. If the counter-
check at receiver’ end fails, the bits are considered corrupted.
• Parity Check
One extra bit is sent along with the original bits to make number of 1s either even in case of even
parity, or odd in case of odd parity.
For example, if even parity is used and number of 1s is even then one bit with value 0 is added. This
way number of 1s remains even. If the number of 1s is odd, to make it even a bit with value 1 is
added.
● Cyclic Redundancy Check (CRC)
CRC is a different approach to detect if the received frame contains valid data. This technique
involves binary division of the data bits being sent. The divisor is generated using polynomials. The
sender performs a division operation on the bits being sent and calculates the remainder. Before
sending the actual bits, the sender adds the remainder at the end of the actual bits. Actual data bits
plus the remainder is called a codeword. The sender transmits data bits as codewords.
At the other end, the receiver
performs division operation on
codewords using the same CRC
divisor. If the remainder contains
all zeros the data bits are
accepted, otherwise it is
considered as there some data
corruption occurred in transit.
Error Correction
In the digital world, error correction can be done in two ways:
● Backward Error Correction When the receiver detects an error in the data received, it requests
back the sender to retransmit the data unit.
● Forward Error Correction When the receiver detects some error in the data received, it
executes error-correcting code, which helps it to auto-recover and to correct some kinds of
errors.
The first one, Backward Error Correction, is simple and can only be efficiently used where retransmitting is not expensive.
For example, fiber optics. But in case of wireless transmission retransmitting may cost too much. In the latter case,
Forward Error Correction is used.
To correct the error in data frame, the receiver must know exactly which bit in the frame is corrupted. To locate the bit in
error, redundant bits are used as parity bits for error detection. For example, we take ASCII words (7 bits data), then there
could be 8 kind of information we need: first seven bits to tell us which bit is error and one more bit to tell that there is no
error.
FLOW CONTROL
● Flow control deals with throttling the speed of the sender to match that of the receiver.
● Two Approaches:
○ Feedback-based flow control, the receiver send back information to the sender giving it permission
to send more data or atleast telling the sender how the receiver is doing.
○ rate -based flow control, the protocol has a built-in mechanism that limits the rate at which senders
may transmit data, without using feedback from the receiver.
● Various Flow Control schemes uses a common protocol that contains well-defined rules
about when a sender may transmit the next frame. These rules often prohibit frames from
being sent until the receiver has granted permission, either implicitly or explicitly.
Network Layer Features
With its standard functionalities, various features as:
● Quality of service management
● Load balancing and link management
● Security
● Interrelation of different protocols and subnets with different schema.
● Different logical network design over the physical network design.
● L3 VPN and tunnels can be used to provide end to end dedicated
connectivity.
THANK YOU!

More Related Content

What's hot

data-link layer protocols
data-link layer protocols  data-link layer protocols
data-link layer protocols BE Smârt
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocaltes31
 
Ethernet Computer network
Ethernet Computer networkEthernet Computer network
Ethernet Computer networkmiteshppt
 
Transport layer services
Transport layer servicesTransport layer services
Transport layer servicesMelvin Cabatuan
 
Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer Dr. SELVAGANESAN S
 
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)Kruti Niranjan
 
Switching
Switching Switching
Switching Abid Ali
 
Packet Switching and X.25 Protocol
Packet Switching and X.25 ProtocolPacket Switching and X.25 Protocol
Packet Switching and X.25 ProtocolMiles Kevin Galario
 
Packet switching
Packet switchingPacket switching
Packet switchingasimnawaz54
 
CS8591 Computer Networks - Unit IV
CS8591 Computer Networks - Unit IVCS8591 Computer Networks - Unit IV
CS8591 Computer Networks - Unit IVpkaviya
 

What's hot (20)

Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
 
data-link layer protocols
data-link layer protocols  data-link layer protocols
data-link layer protocols
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
 
Ethernet
EthernetEthernet
Ethernet
 
Ethernet Computer network
Ethernet Computer networkEthernet Computer network
Ethernet Computer network
 
Transport Protocols
Transport ProtocolsTransport Protocols
Transport Protocols
 
Tcp IP Model
Tcp IP ModelTcp IP Model
Tcp IP Model
 
Osi reference model
Osi reference modelOsi reference model
Osi reference model
 
Transport layer services
Transport layer servicesTransport layer services
Transport layer services
 
Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer
 
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
 
Data link layer
Data link layerData link layer
Data link layer
 
Csma
CsmaCsma
Csma
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Switching
Switching Switching
Switching
 
Packet Switching and X.25 Protocol
Packet Switching and X.25 ProtocolPacket Switching and X.25 Protocol
Packet Switching and X.25 Protocol
 
Ethernet
EthernetEthernet
Ethernet
 
Dqdb
DqdbDqdb
Dqdb
 
Packet switching
Packet switchingPacket switching
Packet switching
 
CS8591 Computer Networks - Unit IV
CS8591 Computer Networks - Unit IVCS8591 Computer Networks - Unit IV
CS8591 Computer Networks - Unit IV
 

Similar to Introduction to data link layer

Unit 4 data link layer
Unit 4 data link layerUnit 4 data link layer
Unit 4 data link layermekind
 
data link layer - Chapter 3
data link layer - Chapter 3data link layer - Chapter 3
data link layer - Chapter 3SakthiVinoth78
 
data link layer to print
data link layer to printdata link layer to print
data link layer to printBishalWosti1
 
U2CH1Data Link Layerxxxxxxxxxxxxxxxxx.pptx
U2CH1Data Link Layerxxxxxxxxxxxxxxxxx.pptxU2CH1Data Link Layerxxxxxxxxxxxxxxxxx.pptx
U2CH1Data Link Layerxxxxxxxxxxxxxxxxx.pptxk2w9psdb96
 
datalinklayermukesh-150130061041-conversion-gate01.pptx
datalinklayermukesh-150130061041-conversion-gate01.pptxdatalinklayermukesh-150130061041-conversion-gate01.pptx
datalinklayermukesh-150130061041-conversion-gate01.pptxlathass5
 
CN R16 -UNIT-3.pdf
CN R16 -UNIT-3.pdfCN R16 -UNIT-3.pdf
CN R16 -UNIT-3.pdfJoshuaeeda1
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSDr. SELVAGANESAN S
 
unit2-210710110327.pdf
unit2-210710110327.pdfunit2-210710110327.pdf
unit2-210710110327.pdfssuser3aa461
 
Computer network coe351- part4- final
Computer network coe351- part4- finalComputer network coe351- part4- final
Computer network coe351- part4- finalTaymoor Nazmy
 
Osi model detail description
Osi model  detail descriptionOsi model  detail description
Osi model detail descriptionBathshebaparimala
 
computer network-unit 2
computer network-unit 2computer network-unit 2
computer network-unit 2sharmilas38
 
Chapter 2.1.1.pptx
Chapter 2.1.1.pptxChapter 2.1.1.pptx
Chapter 2.1.1.pptxbotAlert
 

Similar to Introduction to data link layer (20)

Unit 2
Unit 2Unit 2
Unit 2
 
DLL
DLLDLL
DLL
 
datalinklayermukesh
datalinklayermukeshdatalinklayermukesh
datalinklayermukesh
 
Data link layer
Data link layer Data link layer
Data link layer
 
Unit 4 data link layer
Unit 4 data link layerUnit 4 data link layer
Unit 4 data link layer
 
data link layer - Chapter 3
data link layer - Chapter 3data link layer - Chapter 3
data link layer - Chapter 3
 
Unit 2 [autosaved]
Unit 2 [autosaved]Unit 2 [autosaved]
Unit 2 [autosaved]
 
Data link layer tutorial
Data link layer tutorialData link layer tutorial
Data link layer tutorial
 
data link layer to print
data link layer to printdata link layer to print
data link layer to print
 
U2CH1Data Link Layerxxxxxxxxxxxxxxxxx.pptx
U2CH1Data Link Layerxxxxxxxxxxxxxxxxx.pptxU2CH1Data Link Layerxxxxxxxxxxxxxxxxx.pptx
U2CH1Data Link Layerxxxxxxxxxxxxxxxxx.pptx
 
datalinklayermukesh-150130061041-conversion-gate01.pptx
datalinklayermukesh-150130061041-conversion-gate01.pptxdatalinklayermukesh-150130061041-conversion-gate01.pptx
datalinklayermukesh-150130061041-conversion-gate01.pptx
 
CN R16 -UNIT-3.pdf
CN R16 -UNIT-3.pdfCN R16 -UNIT-3.pdf
CN R16 -UNIT-3.pdf
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
 
unit2-210710110327.pdf
unit2-210710110327.pdfunit2-210710110327.pdf
unit2-210710110327.pdf
 
CN UNIT II.pptx
CN UNIT II.pptxCN UNIT II.pptx
CN UNIT II.pptx
 
Computer network coe351- part4- final
Computer network coe351- part4- finalComputer network coe351- part4- final
Computer network coe351- part4- final
 
Osi model detail description
Osi model  detail descriptionOsi model  detail description
Osi model detail description
 
computer network-unit 2
computer network-unit 2computer network-unit 2
computer network-unit 2
 
COMPUTER NETWORKS UNIT 2
COMPUTER NETWORKS UNIT 2COMPUTER NETWORKS UNIT 2
COMPUTER NETWORKS UNIT 2
 
Chapter 2.1.1.pptx
Chapter 2.1.1.pptxChapter 2.1.1.pptx
Chapter 2.1.1.pptx
 

Recently uploaded

Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Aminabad Call Girl Agent 9548273370 , Call Girls Service Lucknow
Aminabad Call Girl Agent 9548273370 , Call Girls Service LucknowAminabad Call Girl Agent 9548273370 , Call Girls Service Lucknow
Aminabad Call Girl Agent 9548273370 , Call Girls Service Lucknowmakika9823
 
04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationshipsccctableauusergroup
 
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779Delhi Call girls
 
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /WhatsappsBeautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsappssapnasaifi408
 
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls DubaiDubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubaihf8803863
 
Digi Khata Problem along complete plan.pptx
Digi Khata Problem along complete plan.pptxDigi Khata Problem along complete plan.pptx
Digi Khata Problem along complete plan.pptxTanveerAhmed817946
 
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...Suhani Kapoor
 
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一ffjhghh
 
Brighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingBrighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingNeil Barnes
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Callshivangimorya083
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfLars Albertsson
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptxAnupama Kate
 
Predicting Employee Churn: A Data-Driven Approach Project Presentation
Predicting Employee Churn: A Data-Driven Approach Project PresentationPredicting Employee Churn: A Data-Driven Approach Project Presentation
Predicting Employee Churn: A Data-Driven Approach Project PresentationBoston Institute of Analytics
 
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...Florian Roscheck
 
Full night 🥵 Call Girls Delhi New Friends Colony {9711199171} Sanya Reddy ✌️o...
Full night 🥵 Call Girls Delhi New Friends Colony {9711199171} Sanya Reddy ✌️o...Full night 🥵 Call Girls Delhi New Friends Colony {9711199171} Sanya Reddy ✌️o...
Full night 🥵 Call Girls Delhi New Friends Colony {9711199171} Sanya Reddy ✌️o...shivangimorya083
 
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...dajasot375
 

Recently uploaded (20)

Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Aminabad Call Girl Agent 9548273370 , Call Girls Service Lucknow
Aminabad Call Girl Agent 9548273370 , Call Girls Service LucknowAminabad Call Girl Agent 9548273370 , Call Girls Service Lucknow
Aminabad Call Girl Agent 9548273370 , Call Girls Service Lucknow
 
04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships
 
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
 
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /WhatsappsBeautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
 
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls DubaiDubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
 
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
 
Digi Khata Problem along complete plan.pptx
Digi Khata Problem along complete plan.pptxDigi Khata Problem along complete plan.pptx
Digi Khata Problem along complete plan.pptx
 
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
 
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
 
Brighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingBrighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data Storytelling
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdf
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx
 
Predicting Employee Churn: A Data-Driven Approach Project Presentation
Predicting Employee Churn: A Data-Driven Approach Project PresentationPredicting Employee Churn: A Data-Driven Approach Project Presentation
Predicting Employee Churn: A Data-Driven Approach Project Presentation
 
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
 
E-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptxE-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptx
 
Full night 🥵 Call Girls Delhi New Friends Colony {9711199171} Sanya Reddy ✌️o...
Full night 🥵 Call Girls Delhi New Friends Colony {9711199171} Sanya Reddy ✌️o...Full night 🥵 Call Girls Delhi New Friends Colony {9711199171} Sanya Reddy ✌️o...
Full night 🥵 Call Girls Delhi New Friends Colony {9711199171} Sanya Reddy ✌️o...
 
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
 

Introduction to data link layer

  • 1. INTRODUCTION TO DATA LINK LAYER DONE BY: NAME: Shashank HP SJC Inititute of Technology Data Communication – 18CS46
  • 2. Physical layer Gives services to Receives services from OVERVIEW OF DLL ● The data link layer transforms the physical layer, a raw transmission facility, to a link responsible for node-to-node communication. ● Specific responsibilities of the data link layer include framing, addressing, flow control, error control and media access control L A N s W A N s Network layer Packetizing Flow control Media Access control Addressing Error control Data Link Layer
  • 3. DLL DESIGN ● Services Provided to the Network Layer: The network layer wants to send packets to its neighbours without worrying about the details of it in one piece. ● Framing: Group the physical layer bit stream into units called frames. Frames are nothing more than “packets” or “messages”. By convention , we use the term “frames” when discussing DLL. ● Error Control: Sender checksums the frame and transmits checksums together with data. Receiver re-computes the checksum and compares it with the received value. ● Flow control: Prevent a fast sender from overwhelming a slower receiver.
  • 4. SERVICES PROVIDED TO THE NETWORK LAYER ● The function of the data link layer is to provide services to the network layer. ● The principal service is transferring data from the network layer on the source machine to the network layer on the destination machine. ● The data link layer can be designed to offer various services. The actual services offered can vary from system.
  • 5. FRAMING ● DLL translates the physical layer’s raw stream into discrete units (messages) called frames. ● How can the frame be transmitted so the receiver can detect frame boundaries? That is, how can the receiver recognize the start and end of a frame? ○ Character Count. ○ Flag byte with Byte Stuffing. ○ Starting and ending flag with bit stuffing. ○ Encoding Violations.
  • 6. FRAMING - CHARACTER COUNT ● The first framing method uses a field in the header to specify the number of characters in the frame. When the data link layer at the destination sees the character count, it knows how many characters follow and hence where the end of the frame is.
  • 7. FRAMING - BYTE STUFFING ● Use reserved characters to indicate the start and end of a frame. For instance, use the two-character sequence DLE STX(Data-Link Escape, Start of TeXt) to signal the beginning of a frame, and the sequence DLE ETX(End of TeXt) to flag the frame’s end. ● The second framing method, Starting and ending character stuffing, gets around the problem of resynchronization after an error by having each frame start with the sequence DLE ETX. ● EXAMPLE: If the frame contained “A B DLE D E DLE”, the characters transmitted over the channel would be “DLE STX A B DLE DLE D E DLE DLE DLE ETX”
  • 8. FRAMING-BIT STUFFING ● This technique allows data frames to contain an arbitrary number of bits and allows character codes with an arbitrary number of bits per character. Each frame begins and ends with a special bit pattern, 01111110. ● Whenever the sender’s data link layer encounters five consecutive 1s in the data, it automatically stuffs a 0 bit into the outgoing bit stream. ● This bit stuffing is analogous to byte stuffing ,in which an escape byte is stuffed into the outgoing character stream before a flag byte in the data. When the receiver sees five consecutive incoming 1 bits,followed by a 0 bit, it automatically destuffs (i.e deletes) the 0 bit.
  • 9. PHYSICAL LAYER CODING VIOLATIONS ● This Framing Method is used only in those networks in which Encoding on the Physical Medium contains some redundancy. ● Some LANs encode each bit of data by using two Physical Bits i.e. Manchester coding is Used. Here, Bit 1 is encoded into high-low(10) pair and Bit 0 is encoded into low-high(01) pair. ● The scheme means that every data bit has a transition in the middle, making it easy for the receiver to locate the bit boundaries. The combinations high-high and low-low are not used for data but are used for delimiting frames in some protocols.
  • 10. ERROR CONTROL There are many reasons such as noise, cross-talk etc., which may help data to get corrupted during transmission. Error control is concerned with insuring that all frames are eventually delivered (possibly in order) to destination. Data-link layer uses some error control mechanism to ensure that frames (data bit streams) are transmitted with certain level of accuracy. But to understand how errors is controlled, it is essential to know what types of errors may occur. Types of Errors There may be three types of errors: Single bit error Multiple bits error Burst error
  • 11. Error Detection Errors in the received frames are detected by means of Parity Check and Cyclic Redundancy Check (CRC). In both cases, few extra bits are sent along with actual data to confirm that bits received at other end are same as they were sent. If the counter- check at receiver’ end fails, the bits are considered corrupted. • Parity Check One extra bit is sent along with the original bits to make number of 1s either even in case of even parity, or odd in case of odd parity. For example, if even parity is used and number of 1s is even then one bit with value 0 is added. This way number of 1s remains even. If the number of 1s is odd, to make it even a bit with value 1 is added.
  • 12. ● Cyclic Redundancy Check (CRC) CRC is a different approach to detect if the received frame contains valid data. This technique involves binary division of the data bits being sent. The divisor is generated using polynomials. The sender performs a division operation on the bits being sent and calculates the remainder. Before sending the actual bits, the sender adds the remainder at the end of the actual bits. Actual data bits plus the remainder is called a codeword. The sender transmits data bits as codewords. At the other end, the receiver performs division operation on codewords using the same CRC divisor. If the remainder contains all zeros the data bits are accepted, otherwise it is considered as there some data corruption occurred in transit.
  • 13. Error Correction In the digital world, error correction can be done in two ways: ● Backward Error Correction When the receiver detects an error in the data received, it requests back the sender to retransmit the data unit. ● Forward Error Correction When the receiver detects some error in the data received, it executes error-correcting code, which helps it to auto-recover and to correct some kinds of errors. The first one, Backward Error Correction, is simple and can only be efficiently used where retransmitting is not expensive. For example, fiber optics. But in case of wireless transmission retransmitting may cost too much. In the latter case, Forward Error Correction is used. To correct the error in data frame, the receiver must know exactly which bit in the frame is corrupted. To locate the bit in error, redundant bits are used as parity bits for error detection. For example, we take ASCII words (7 bits data), then there could be 8 kind of information we need: first seven bits to tell us which bit is error and one more bit to tell that there is no error.
  • 14. FLOW CONTROL ● Flow control deals with throttling the speed of the sender to match that of the receiver. ● Two Approaches: ○ Feedback-based flow control, the receiver send back information to the sender giving it permission to send more data or atleast telling the sender how the receiver is doing. ○ rate -based flow control, the protocol has a built-in mechanism that limits the rate at which senders may transmit data, without using feedback from the receiver. ● Various Flow Control schemes uses a common protocol that contains well-defined rules about when a sender may transmit the next frame. These rules often prohibit frames from being sent until the receiver has granted permission, either implicitly or explicitly.
  • 15. Network Layer Features With its standard functionalities, various features as: ● Quality of service management ● Load balancing and link management ● Security ● Interrelation of different protocols and subnets with different schema. ● Different logical network design over the physical network design. ● L3 VPN and tunnels can be used to provide end to end dedicated connectivity.