SlideShare a Scribd company logo
Data Communications & Networking
                       Lecture-19

             Course Instructor : Sehrish Rafiq
             Department Of Computer Science
             University Of Peshawar
DATA LINK LAYER
Data Link Layer
Data Link Layer
 The data link layer lies between the network layer and the
  physical layer in the internet model.

 The data link layer is responsible for carrying a packet from one
  hop(computer or router) to the next hop.

 The data link layer has local responsibilty but the network layer
  has global responsibility.

 The journey through LAN or a WAN(between two nodes) must
  preserve the integrity of the packet.
Data Link Layer
 If the packet is corrupted during the transmission it must either
  corrected or retransmitted.
 Access to LAN or a WAN for the sending of data is also an issue.
 If several computers or routers are connected to a common
  medium(link) and more than one want to send data at the same
  time,which has the righrt to send?
 What is the access method?
Duties of Data Link Layer
Packetizing/ Framing
 The data link layer is responsible for moving data from one hop to
  the next hop.
 The data must pass through a LAN or a WAN,each of which has
  its own protocols.
 The packet coming from the upperlayer must therefore be
  encapsulated by the appropriate packet defined by the data link
  layer of the underlying LAN or WAN.
 Different protocols have different names for the packet at the data
  link layer.
 Most LANs refer to packet as a frame.
 The ATM WAN refers to a packet as a cell.
Addressing
 We need one addressing mechanism at the data link layer.


 The data link layer addresses are called physical addresses or MAC
  addresses.

 MAC addresses are used to find the address of the next hop in
  hop-to-hop delivery.

 The physical addresses used by a LAN is totally different from that
  used by WAN.
Error control
 In data communications errors are inevitable.
 Using better equipment and more reliable transmission media
  may reduce the severity or the frequency of occurrence but it can
  never eliminate errors.
 Networks must be able to transfer data from one device to
  another with complete accuracy.
 In hop to hop delivery error detection and correction is the
  responsibilty of data link layer.
Flow control
 Another responsibility of the data link layer is flow control.
 In most protocols flow control is a set of procedures that tells the
  sender how much data can it transmit before it must wait for an
  acknowledgement from the receiver.
 The flow of data must not be allowed to overwhelm the receiver.
 The receiving device must be able to inform the sending device
  before som limit is reached and request that the transmitting
  device send fewer frames or stop temporarily.
Media Access control
 When computers use a shared medium there must be a method to
  control access to the medium at any moment.

 To prevent this conflict or collision on a network there is a need
  for medium access control method.

 This method defines the procedure a computer follows when it
  needs to send a frame or frames.
Error detection and
correction
Error detection and
                correction
 Networks must be able to transfer data from one device to
  another with complete accuracy.

 A system that cannot guarantee that data received by one device
  are identical to the data transmitted by another device is
  essentially useless.

 Because any time data are transmitted from one node to next,
  they can become corrupted in the passage.

 Reliable systems must have a mechanism for detecting and
  correcting such errors.
Types of errors
Whenever bits flow from one point to another they are
  subjected to unpredictable changes because of interference.
This interference can change the shape of a signal.
Single-Bit Error:
 Only one bit of a data unit is changed.
Burst Error:
 Multiple bits are changed.
Single bit error
Burst error
Single Bit Error in serial
                   transmission
 Single-bit errors are the least likely type of error in serial data
  transmission.

 Suppose:
 A sender sends data at 1 Mbps.
 This means that the bit duration is 1 micro sec.
 For a single bit error to occur the noise must have a duration of 1
  micro sec which is very rare.
Single bit error in parallel
                 transmission
A single bit error can occur if we are sending data using
  parallel transmission.



Suppose:
 8 wires are used to send all 8 bits of 1 byte at the same time
 one of the wires is noisy, one bit can be corrupted in each
  byte.
Burst Error
The term burst error means that two or more bits in the data
 unit have changed.
The burst error does not necessarily mean that errors occur
 in consecutive bits.
The length of a burst is measured from the first corrupted bit
 to the last corrupted bit.
Some bits in between may not have been corrupted.
Burst error in serial
                transmission
Burst error is most likely to occur in serial transmission.
The duration of noise is normally longer than the duration of
 one bit.
Which means that when noise affects data, it affects a set of
 bits.
The number of bits affected depends on the data rate and
 duration of noise.
Have Nice time at home!!!

More Related Content

What's hot

Framing in data link layer
Framing in data link layerFraming in data link layer
Framing in data link layer
Ahtesham Ullah khan
 
Dcn ppt by roma
Dcn ppt by romaDcn ppt by roma
Dcn ppt by roma
boraroma
 
Switching Concepts presentation
Switching Concepts presentationSwitching Concepts presentation
Switching Concepts presentation
zameer Abbas
 
Chap 8 switching
Chap 8 switchingChap 8 switching
Chap 8 switching
Mukesh Tekwani
 
11 circuit-packet
11 circuit-packet11 circuit-packet
11 circuit-packet
Hattori Sidek
 
Switching Techniques
Switching TechniquesSwitching Techniques
Switching Techniques
tameemyousaf
 
Packet Switching
Packet SwitchingPacket Switching
Packet Switching
Fathin Fakhriah Abdul Aziz
 
Cn 317 1
Cn 317 1Cn 317 1
Cn 317 1
NowrinJahanSiam
 
Design issues for the layers
Design issues for the layersDesign issues for the layers
Design issues for the layers
jayaprakash
 
Final several design issues at network layer
Final several design issues at network layerFinal several design issues at network layer
Final several design issues at network layer
Kashyap Davariya
 
Dcn data link_layer
Dcn data link_layerDcn data link_layer
Dcn data link_layer
mangal das
 
10 Circuit Packet
10 Circuit Packet10 Circuit Packet
10 Circuit Packet
Waqas !!!!
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
guesta81d4b
 
Switching techniques
Switching techniquesSwitching techniques
Switching techniques
Amit Kumar
 
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
Kaushik Panta
 
Swiching
SwichingSwiching
Swiching
Mohammed Romi
 
Introduction to Data-Link Layer
Introduction to Data-Link LayerIntroduction to Data-Link Layer
Introduction to Data-Link Layer
Abdullaziz Tagawy
 
Computer network transmission channel & topology
Computer network transmission channel & topologyComputer network transmission channel & topology
Computer network transmission channel & topology
Sweta Kumari Barnwal
 
Switching Techniques (Lecture #2 ET3003 Sem1 2014/2015)
Switching Techniques (Lecture #2 ET3003 Sem1 2014/2015)Switching Techniques (Lecture #2 ET3003 Sem1 2014/2015)
Switching Techniques (Lecture #2 ET3003 Sem1 2014/2015)
Tutun Juhana
 
Circuit and packet_switching
Circuit and packet_switchingCircuit and packet_switching
Circuit and packet_switching
hoanv
 

What's hot (20)

Framing in data link layer
Framing in data link layerFraming in data link layer
Framing in data link layer
 
Dcn ppt by roma
Dcn ppt by romaDcn ppt by roma
Dcn ppt by roma
 
Switching Concepts presentation
Switching Concepts presentationSwitching Concepts presentation
Switching Concepts presentation
 
Chap 8 switching
Chap 8 switchingChap 8 switching
Chap 8 switching
 
11 circuit-packet
11 circuit-packet11 circuit-packet
11 circuit-packet
 
Switching Techniques
Switching TechniquesSwitching Techniques
Switching Techniques
 
Packet Switching
Packet SwitchingPacket Switching
Packet Switching
 
Cn 317 1
Cn 317 1Cn 317 1
Cn 317 1
 
Design issues for the layers
Design issues for the layersDesign issues for the layers
Design issues for the layers
 
Final several design issues at network layer
Final several design issues at network layerFinal several design issues at network layer
Final several design issues at network layer
 
Dcn data link_layer
Dcn data link_layerDcn data link_layer
Dcn data link_layer
 
10 Circuit Packet
10 Circuit Packet10 Circuit Packet
10 Circuit Packet
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
 
Switching techniques
Switching techniquesSwitching techniques
Switching techniques
 
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
 
Swiching
SwichingSwiching
Swiching
 
Introduction to Data-Link Layer
Introduction to Data-Link LayerIntroduction to Data-Link Layer
Introduction to Data-Link Layer
 
Computer network transmission channel & topology
Computer network transmission channel & topologyComputer network transmission channel & topology
Computer network transmission channel & topology
 
Switching Techniques (Lecture #2 ET3003 Sem1 2014/2015)
Switching Techniques (Lecture #2 ET3003 Sem1 2014/2015)Switching Techniques (Lecture #2 ET3003 Sem1 2014/2015)
Switching Techniques (Lecture #2 ET3003 Sem1 2014/2015)
 
Circuit and packet_switching
Circuit and packet_switchingCircuit and packet_switching
Circuit and packet_switching
 

Viewers also liked

Lecture 24
Lecture 24Lecture 24
Lecture 24
Sehrish Rafiq
 
Lecture 18
Lecture 18Lecture 18
Lecture 18
Sehrish Rafiq
 
Lecture 03
Lecture 03Lecture 03
Lecture 03
Sehrish Rafiq
 
Lecture 12
Lecture 12Lecture 12
Lecture 12
Sehrish Rafiq
 
Lecture 13
Lecture 13Lecture 13
Lecture 13
Sehrish Rafiq
 
Lecture 07
Lecture 07Lecture 07
Lecture 07
Sehrish Rafiq
 
Lecture 21
Lecture 21Lecture 21
Lecture 21
Sehrish Rafiq
 
Lecture 17
Lecture 17Lecture 17
Lecture 17
Sehrish Rafiq
 
Lecture 11
Lecture 11Lecture 11
Lecture 11
Sehrish Rafiq
 
Data communication - Lecture-01
Data communication - Lecture-01 Data communication - Lecture-01
Data communication - Lecture-01
Sehrish Rafiq
 
Powerpoint for data communication
Powerpoint for data communication Powerpoint for data communication
Powerpoint for data communication
samanthaanderson21
 
Data communication (simple explanation)
Data communication (simple explanation)Data communication (simple explanation)
Data communication (simple explanation)
Twist Akid Sultan
 
Chapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and NetworksChapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and Networks
Shafaan Khaliq Bhatti
 
Lecture 14
Lecture 14Lecture 14
Lecture 14
Sehrish Rafiq
 
Lecture 23
Lecture 23Lecture 23
Lecture 23
Sehrish Rafiq
 
Lecture 15
Lecture 15Lecture 15
Lecture 15
Sehrish Rafiq
 
Lecture 22
Lecture 22Lecture 22
Lecture 22
Sehrish Rafiq
 
Lecture 10
Lecture 10Lecture 10
Lecture 10
Sehrish Rafiq
 
Lecture 20
Lecture 20Lecture 20
Lecture 20
Sehrish Rafiq
 
RTOS APPLICATIONS
RTOS  APPLICATIONSRTOS  APPLICATIONS
RTOS APPLICATIONS
Dr.YNM
 

Viewers also liked (20)

Lecture 24
Lecture 24Lecture 24
Lecture 24
 
Lecture 18
Lecture 18Lecture 18
Lecture 18
 
Lecture 03
Lecture 03Lecture 03
Lecture 03
 
Lecture 12
Lecture 12Lecture 12
Lecture 12
 
Lecture 13
Lecture 13Lecture 13
Lecture 13
 
Lecture 07
Lecture 07Lecture 07
Lecture 07
 
Lecture 21
Lecture 21Lecture 21
Lecture 21
 
Lecture 17
Lecture 17Lecture 17
Lecture 17
 
Lecture 11
Lecture 11Lecture 11
Lecture 11
 
Data communication - Lecture-01
Data communication - Lecture-01 Data communication - Lecture-01
Data communication - Lecture-01
 
Powerpoint for data communication
Powerpoint for data communication Powerpoint for data communication
Powerpoint for data communication
 
Data communication (simple explanation)
Data communication (simple explanation)Data communication (simple explanation)
Data communication (simple explanation)
 
Chapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and NetworksChapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and Networks
 
Lecture 14
Lecture 14Lecture 14
Lecture 14
 
Lecture 23
Lecture 23Lecture 23
Lecture 23
 
Lecture 15
Lecture 15Lecture 15
Lecture 15
 
Lecture 22
Lecture 22Lecture 22
Lecture 22
 
Lecture 10
Lecture 10Lecture 10
Lecture 10
 
Lecture 20
Lecture 20Lecture 20
Lecture 20
 
RTOS APPLICATIONS
RTOS  APPLICATIONSRTOS  APPLICATIONS
RTOS APPLICATIONS
 

Similar to Lecture 19

CN UNIT II.pptx
CN UNIT II.pptxCN UNIT II.pptx
CN UNIT II.pptx
VISWANATHAN R V
 
CN R16 -UNIT-3.pdf
CN R16 -UNIT-3.pdfCN R16 -UNIT-3.pdf
CN R16 -UNIT-3.pdf
Joshuaeeda1
 
OSI Model.It was created in 1983 by osi.
OSI Model.It was created in 1983 by osi.OSI Model.It was created in 1983 by osi.
OSI Model.It was created in 1983 by osi.
muhammadsaudm19a
 
Computer Network Unit-1 ppt
Computer Network Unit-1 pptComputer Network Unit-1 ppt
Computer Network Unit-1 ppt
vmdharxfr
 
Networking and Data Communications
Networking and Data CommunicationsNetworking and Data Communications
Networking and Data Communications
kuramartin
 
Network software
Network softwareNetwork software
Network software
SakthiVinoth78
 
Osi model detail description
Osi model  detail descriptionOsi model  detail description
Osi model detail description
Bathshebaparimala
 
Learning Guide of Determine Best Fit Topology LO 2.pptx
Learning Guide of Determine Best Fit Topology LO 2.pptxLearning Guide of Determine Best Fit Topology LO 2.pptx
Learning Guide of Determine Best Fit Topology LO 2.pptx
aytenewbelay1
 
Serial And Parallel Data Transmission By ZAK
Serial And Parallel Data Transmission By ZAKSerial And Parallel Data Transmission By ZAK
Serial And Parallel Data Transmission By ZAK
Tabsheer Hasan
 
Osi(1)
Osi(1)Osi(1)
Osi(1)
Nitesh Singh
 
seven layer OSI model
seven layer OSI modelseven layer OSI model
seven layer OSI model
Manjeet MN
 
Class notes 1
Class notes 1Class notes 1
Class notes 1
FaysalAhmed395259
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer Description
Shubham Khedekar
 
High performance communication networkss
High performance communication networkssHigh performance communication networkss
High performance communication networkss
HemaDarshana
 
Introduction to Computer Networks
 Introduction to Computer Networks Introduction to Computer Networks
Introduction to Computer Networks
Ghaffar Khan
 
OSI Model
OSI ModelOSI Model
OSI Model
Rahul Marwaha
 
computer network basics
computer network basicscomputer network basics
computer network basics
MohammedAdhil11
 
Notes on Class 3
Notes on Class 3Notes on Class 3
Notes on Class 3
Zillur Rahman
 
The Osi Model
The Osi ModelThe Osi Model
The Osi Model
Amit Pandey
 
CN chapter1.ppt
CN chapter1.pptCN chapter1.ppt
CN chapter1.ppt
RoopaliChavan1
 

Similar to Lecture 19 (20)

CN UNIT II.pptx
CN UNIT II.pptxCN UNIT II.pptx
CN UNIT II.pptx
 
CN R16 -UNIT-3.pdf
CN R16 -UNIT-3.pdfCN R16 -UNIT-3.pdf
CN R16 -UNIT-3.pdf
 
OSI Model.It was created in 1983 by osi.
OSI Model.It was created in 1983 by osi.OSI Model.It was created in 1983 by osi.
OSI Model.It was created in 1983 by osi.
 
Computer Network Unit-1 ppt
Computer Network Unit-1 pptComputer Network Unit-1 ppt
Computer Network Unit-1 ppt
 
Networking and Data Communications
Networking and Data CommunicationsNetworking and Data Communications
Networking and Data Communications
 
Network software
Network softwareNetwork software
Network software
 
Osi model detail description
Osi model  detail descriptionOsi model  detail description
Osi model detail description
 
Learning Guide of Determine Best Fit Topology LO 2.pptx
Learning Guide of Determine Best Fit Topology LO 2.pptxLearning Guide of Determine Best Fit Topology LO 2.pptx
Learning Guide of Determine Best Fit Topology LO 2.pptx
 
Serial And Parallel Data Transmission By ZAK
Serial And Parallel Data Transmission By ZAKSerial And Parallel Data Transmission By ZAK
Serial And Parallel Data Transmission By ZAK
 
Osi(1)
Osi(1)Osi(1)
Osi(1)
 
seven layer OSI model
seven layer OSI modelseven layer OSI model
seven layer OSI model
 
Class notes 1
Class notes 1Class notes 1
Class notes 1
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer Description
 
High performance communication networkss
High performance communication networkssHigh performance communication networkss
High performance communication networkss
 
Introduction to Computer Networks
 Introduction to Computer Networks Introduction to Computer Networks
Introduction to Computer Networks
 
OSI Model
OSI ModelOSI Model
OSI Model
 
computer network basics
computer network basicscomputer network basics
computer network basics
 
Notes on Class 3
Notes on Class 3Notes on Class 3
Notes on Class 3
 
The Osi Model
The Osi ModelThe Osi Model
The Osi Model
 
CN chapter1.ppt
CN chapter1.pptCN chapter1.ppt
CN chapter1.ppt
 

More from Sehrish Rafiq

Introduction to Computers Lecture # 14
Introduction to Computers Lecture # 14Introduction to Computers Lecture # 14
Introduction to Computers Lecture # 14
Sehrish Rafiq
 
Introduction to Computers Lecture # 13
Introduction to Computers Lecture # 13Introduction to Computers Lecture # 13
Introduction to Computers Lecture # 13
Sehrish Rafiq
 
Introduction to Computers Lecture # 12
Introduction to Computers Lecture # 12Introduction to Computers Lecture # 12
Introduction to Computers Lecture # 12
Sehrish Rafiq
 
Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11
Sehrish Rafiq
 
Introduction to Computers Lecture # 10
Introduction to Computers Lecture # 10Introduction to Computers Lecture # 10
Introduction to Computers Lecture # 10
Sehrish Rafiq
 
Introduction to Computers Lecture # 9
Introduction to Computers Lecture # 9Introduction to Computers Lecture # 9
Introduction to Computers Lecture # 9
Sehrish Rafiq
 
Introduction to Computers Lecture # 8
Introduction to Computers Lecture # 8Introduction to Computers Lecture # 8
Introduction to Computers Lecture # 8
Sehrish Rafiq
 
Introduction to Computers Lecture # 7
Introduction to Computers Lecture # 7Introduction to Computers Lecture # 7
Introduction to Computers Lecture # 7
Sehrish Rafiq
 
Introduction to computers Lecture # 4
Introduction to computers Lecture # 4Introduction to computers Lecture # 4
Introduction to computers Lecture # 4
Sehrish Rafiq
 
Introduction to Computers Lecture # 5
Introduction to Computers Lecture # 5Introduction to Computers Lecture # 5
Introduction to Computers Lecture # 5
Sehrish Rafiq
 
Introduction to Computers Lecture # 3
Introduction to Computers Lecture # 3Introduction to Computers Lecture # 3
Introduction to Computers Lecture # 3
Sehrish Rafiq
 
Introduction to Computers Lecture # 2
Introduction to Computers Lecture # 2Introduction to Computers Lecture # 2
Introduction to Computers Lecture # 2
Sehrish Rafiq
 
Introduction to Computers Lecture # 1
Introduction to Computers Lecture # 1Introduction to Computers Lecture # 1
Introduction to Computers Lecture # 1
Sehrish Rafiq
 

More from Sehrish Rafiq (13)

Introduction to Computers Lecture # 14
Introduction to Computers Lecture # 14Introduction to Computers Lecture # 14
Introduction to Computers Lecture # 14
 
Introduction to Computers Lecture # 13
Introduction to Computers Lecture # 13Introduction to Computers Lecture # 13
Introduction to Computers Lecture # 13
 
Introduction to Computers Lecture # 12
Introduction to Computers Lecture # 12Introduction to Computers Lecture # 12
Introduction to Computers Lecture # 12
 
Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11
 
Introduction to Computers Lecture # 10
Introduction to Computers Lecture # 10Introduction to Computers Lecture # 10
Introduction to Computers Lecture # 10
 
Introduction to Computers Lecture # 9
Introduction to Computers Lecture # 9Introduction to Computers Lecture # 9
Introduction to Computers Lecture # 9
 
Introduction to Computers Lecture # 8
Introduction to Computers Lecture # 8Introduction to Computers Lecture # 8
Introduction to Computers Lecture # 8
 
Introduction to Computers Lecture # 7
Introduction to Computers Lecture # 7Introduction to Computers Lecture # 7
Introduction to Computers Lecture # 7
 
Introduction to computers Lecture # 4
Introduction to computers Lecture # 4Introduction to computers Lecture # 4
Introduction to computers Lecture # 4
 
Introduction to Computers Lecture # 5
Introduction to Computers Lecture # 5Introduction to Computers Lecture # 5
Introduction to Computers Lecture # 5
 
Introduction to Computers Lecture # 3
Introduction to Computers Lecture # 3Introduction to Computers Lecture # 3
Introduction to Computers Lecture # 3
 
Introduction to Computers Lecture # 2
Introduction to Computers Lecture # 2Introduction to Computers Lecture # 2
Introduction to Computers Lecture # 2
 
Introduction to Computers Lecture # 1
Introduction to Computers Lecture # 1Introduction to Computers Lecture # 1
Introduction to Computers Lecture # 1
 

Recently uploaded

June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
Data Hops
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
alexjohnson7307
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 

Recently uploaded (20)

June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 

Lecture 19

  • 1. Data Communications & Networking Lecture-19 Course Instructor : Sehrish Rafiq Department Of Computer Science University Of Peshawar
  • 4. Data Link Layer  The data link layer lies between the network layer and the physical layer in the internet model.  The data link layer is responsible for carrying a packet from one hop(computer or router) to the next hop.  The data link layer has local responsibilty but the network layer has global responsibility.  The journey through LAN or a WAN(between two nodes) must preserve the integrity of the packet.
  • 5. Data Link Layer  If the packet is corrupted during the transmission it must either corrected or retransmitted.  Access to LAN or a WAN for the sending of data is also an issue.  If several computers or routers are connected to a common medium(link) and more than one want to send data at the same time,which has the righrt to send?  What is the access method?
  • 6. Duties of Data Link Layer
  • 7. Packetizing/ Framing  The data link layer is responsible for moving data from one hop to the next hop.  The data must pass through a LAN or a WAN,each of which has its own protocols.  The packet coming from the upperlayer must therefore be encapsulated by the appropriate packet defined by the data link layer of the underlying LAN or WAN.  Different protocols have different names for the packet at the data link layer.  Most LANs refer to packet as a frame.  The ATM WAN refers to a packet as a cell.
  • 8. Addressing  We need one addressing mechanism at the data link layer.  The data link layer addresses are called physical addresses or MAC addresses.  MAC addresses are used to find the address of the next hop in hop-to-hop delivery.  The physical addresses used by a LAN is totally different from that used by WAN.
  • 9. Error control  In data communications errors are inevitable.  Using better equipment and more reliable transmission media may reduce the severity or the frequency of occurrence but it can never eliminate errors.  Networks must be able to transfer data from one device to another with complete accuracy.  In hop to hop delivery error detection and correction is the responsibilty of data link layer.
  • 10. Flow control  Another responsibility of the data link layer is flow control.  In most protocols flow control is a set of procedures that tells the sender how much data can it transmit before it must wait for an acknowledgement from the receiver.  The flow of data must not be allowed to overwhelm the receiver.  The receiving device must be able to inform the sending device before som limit is reached and request that the transmitting device send fewer frames or stop temporarily.
  • 11. Media Access control  When computers use a shared medium there must be a method to control access to the medium at any moment.  To prevent this conflict or collision on a network there is a need for medium access control method.  This method defines the procedure a computer follows when it needs to send a frame or frames.
  • 13. Error detection and correction  Networks must be able to transfer data from one device to another with complete accuracy.  A system that cannot guarantee that data received by one device are identical to the data transmitted by another device is essentially useless.  Because any time data are transmitted from one node to next, they can become corrupted in the passage.  Reliable systems must have a mechanism for detecting and correcting such errors.
  • 14. Types of errors Whenever bits flow from one point to another they are subjected to unpredictable changes because of interference. This interference can change the shape of a signal. Single-Bit Error:  Only one bit of a data unit is changed. Burst Error:  Multiple bits are changed.
  • 17. Single Bit Error in serial transmission  Single-bit errors are the least likely type of error in serial data transmission.  Suppose:  A sender sends data at 1 Mbps.  This means that the bit duration is 1 micro sec.  For a single bit error to occur the noise must have a duration of 1 micro sec which is very rare.
  • 18. Single bit error in parallel transmission A single bit error can occur if we are sending data using parallel transmission. Suppose:  8 wires are used to send all 8 bits of 1 byte at the same time  one of the wires is noisy, one bit can be corrupted in each byte.
  • 19. Burst Error The term burst error means that two or more bits in the data unit have changed. The burst error does not necessarily mean that errors occur in consecutive bits. The length of a burst is measured from the first corrupted bit to the last corrupted bit. Some bits in between may not have been corrupted.
  • 20. Burst error in serial transmission Burst error is most likely to occur in serial transmission. The duration of noise is normally longer than the duration of one bit. Which means that when noise affects data, it affects a set of bits. The number of bits affected depends on the data rate and duration of noise.
  • 21. Have Nice time at home!!!