SlideShare a Scribd company logo
1 of 97
UNIT – II
DATA LINK LAYER
10/18/2023 Ms.Meenalochini.M Assistant 1
Data Link Control
Communication
Minimum 2 devices are needed for data
communication. So line discipline is necessary
for co-operation b/w2 devices.
The 2 important functions of data link layer
is flow control and error control.This
functions are otherwise called as Data link
control.
10/18/2023 Ms.Meenalochini.M Assistant 2
LineDiscipline
It coordinates the link system
It is done in 2 ways
◦ ENQ (Enquiry)
 Used in peer – peercommunication
 Enquire whether there is arequired link b/w
two devices
 Check whether theintended deviceis capableto receive
◦ ACK (Acknowledgment)
 Used in Primary secondary communication
 The intended devicewillacknowledge aboutits status to the
receiver
10/18/2023 Ms.Meenalochini.M Assistant 3
There are2 categories inline
discipline
10/18/2023 Ms.Meenalochini.M Assistant 4
ENQ/ACK LineDiscipline
10/18/2023 Ms.Meenalochini.M Assistant 5
Select
It is a line discipline used in topologies
with primary secondary relationship.
Select
It is uses whenever the primary device
has something to send.ie)Primary
controls the link.
10/18/2023 Ms.Meenalochini.M Assistant 6
Select
10/18/2023 Ms.Meenalochini.M Assistant 7
Select
10/18/2023 Ms.Meenalochini.M Assistant 8
Poll
The polling function is used by the
primary device to Select transmissions
from the secondary devices.
If the primary device is ready to receive
data , It ask each device in turn if it has
anything to send.
10/18/2023 Ms.Meenalochini.M Assistant 9
Poll
10/18/2023 Ms.Meenalochini.M Assistant 10
Flow Control
It is a set of procedures to tell the sender
how much data it can transmit before it must
wait for an acknowledgement from the
receiver.
T
wo categories of flow control:
◦ Stop-and-wait
Send one frame at a time.
◦ Sliding window
Send several frames at a time.
10/18/2023 Ms.Meenalochini.M Assistant 11
10/18/2023 Ms.Meenalochini.M Assistant 12
Stop-and-wait
Sender sends one frame and waits for an
acknowledgementbefore sendingthe next frame.
10/18/2023 Ms.Meenalochini.M Assistant 13
Stop-and-wait
Advantages:
◦ Simplicity.
◦ Each frame is checked and acknowledged
before the next frame is sent.
Disadvantages:
◦ Slow.
Can addsignificantlyto thetotaltransmission time
ifthe distance betweendevices is long.
◦ Inefficiency
Each frame is alone on the line.
10/18/2023 Ms.Meenalochini.M Assistant 14
SlidingWindow
Sender can send several frames before
needing an acknowledgement.
Advantages:
◦ The link can carry several frames at once.
◦ Its capacity can be used efficiently.
10/18/2023 Ms.Meenalochini.M Assistant 15
Error Control
10/18/2023 Ms.Meenalochini.M Assistant 16
10/18/2023 Ms.Meenalochini.M Assistant 17
Error Detection
10/18/2023 Ms.Meenalochini.M Assistant 18
Error Detection
10/18/2023 Ms.Meenalochini.M Assistant 19
Can detect all single-bit errors. Can detect burst errors only if the total
number of errors in each data unit is odd.
Even number of ones
–add 0
Odd number of ones
– add 1
10/18/2023 Ms.Meenalochini.M Assistant 20
•Increases the likelihood of detecting burst errors.
•n bits LRC can detect a burst error of n bits.
•Errors may be undetected if:
•Have even number of errors in that position.
10/18/2023 Ms.Meenalochini.M Assistant 21
10/18/2023 Ms.Meenalochini.M Assistant 22
10/18/2023 Ms.Meenalochini.M Assistant 23
Error Correction
10/18/2023 Ms.Meenalochini.M Assistant 24
Hamming Codes-Error correction
Hamming codes, like polynomial codes,
are appended to the transmitted message
Hamming codes, unlike polynomial codes,
contain the information necessary to
locate asingle bit error
10/18/2023 Ms.Meenalochini.M Assistant 25
CalculatingtheHamming Code
The keyto theHamming Code is theuse of extra paritybits to allow the
identificationof asingle error
. Create the code word as follows:
◦ Mark allbitpositions thatare powers of two asparitybits.(positions 1,2,4,8, 16,
32, 64,etc.)
◦ All other bitpositions are for thedatato beencoded.(positions 3,5,6,7,9,10,
11,12,13,14,15,17,etc.)
◦ Eachparitybitcalculatestheparityfor some of thebitsinthecode word.The
position oftheparitybitdetermines thesequence ofbitsthatitalternately
checks and skips.
Position 1:check 1 bit,skip 1 bit,check 1 bit,skip 1 bit,etc.(1,3,5,7,9,11,13,15,...)
Position 2:check 2 bits,skip 2 bits,check 2 bits,skip 2 bits,etc.
(2,3,6,7,10,11,14,15,...)
Position 4:check 4 bits,skip 4 bits,check 4 bits,skip 4 bits,etc.
(4,5,6,7,12,13,14,15,20,21,22,23,...)
Position 8:check 8 bits,skip 8 bits,check 8 bits,skip 8bits,etc.(8-15,24-31,40-
47,...)
Position 16:check 16 bits,skip 16 bits,check 16 bits,skip 16 bits,etc.(16-31,48-
63,80-95,...)
Position 32:check 32 bits,skip 32 bits,check 32 bits,skip 32 bits,etc.(32-63,96-
127,160-191,...)
etc.
◦ Setaparitybitto 1 ifthetotalnumberof ones inthepositions itchecksis odd.
Set aparity bit to 0 ifthe total number of ones in the positions itchecks is even.
10/18/2023 Ms.Meenalochini.M Assistant 26
Position ofRedundancy bitin
Hamming code
10/18/2023 Ms.Meenalochini.M Assistant 27
Error
10/18/2023 Ms.Meenalochini.M Assistant 28
Error Control
10/18/2023 Ms.Meenalochini.M Assistant 29
Stop-and-WaitARQ
10/18/2023 Ms.Meenalochini.M Assistant 30
Sliding windowARQ
10/18/2023 Ms.Meenalochini.M Assistant 31
10/18/2023 Ms.Meenalochini.M Assistant 32
10/18/2023 Ms.Meenalochini.M Assistant 33
10/18/2023 Ms.Meenalochini.M Assistant 34
MAC
IEEE has subdivided(Project 802) the data
link layer into two sub layers:
◦ Logical Link Control
◦ Medium access control
Functions of MAC
It resolves the contention of shared media
It contains allinformation to move information
from one place to another
It containsthephysicaladdress of next station
to route packet.
MAC protocol are specific to LAN
10/18/2023 Ms.Meenalochini.M Assistant 35
The project 802 which governs internet working. Here each
subdivision is identified by a number
802.1(internetworking)
802.2(LLC)
and MAC modules
802.3(CSMA/CD)
802.4(Tokenbus)
802.5(Tokenring)
10/18/2023 Ms.Meenalochini.M Assistant 36
IEEE standard for LANs
10/18/2023 Ms.Meenalochini.M Assistant 37
MAC protocol arespecifictoLAN
LAN is aLocalArea Network used for
communication inside building
Protocols for LAN are,
◦ Ethernet
◦ T
oken Ring
◦ T
oken bus
◦ FDDI
10/18/2023 Ms.Meenalochini.M Assistant 38
IEEE STANDARDS
Ethernet: It is a LAN protocol that is used in Bus and Star topologiesand
implements CSMA/CD as the medium access method
Original (traditional) Ethernet developed in 1980 by
three companies: Digital, Intel, Xerox (DIX).
In 1985, the Computer Society of the IEEE started a
project, called Project 802, to set standards to enable
intercommunication among equipment from a variety of
manufacturers.
 Current version is called IEEE Ethernet
10/18/2023 Ms.Meenalochini.M Assistant 39
◦ IEEE 802.3supports LAN standardEthernet
◦ IEEE802.3 defines two categories
Baseband
Broadband
◦ Base band has fivedifferent category
10Base5
10Base2
10BaseT
1Base5 etc.,
◦ Broad band has a category
10Broad36
10/18/2023 Ms.Meenalochini.M Assistant 40
802.3 MAC frame
10/18/2023 Ms.Meenalochini.M Assistant 41
IEEE Ethernet
In IEEE 802.3EthernetData linklayerissplitintotwo sublayers:
◦ Bottom part:MAC
The frame is called IEEE 802.3
Handles framing,MAC addressing,MediumAccess control
Implemented in hardware
◦ Toppart:LLC (LogicalLinkControl)
The subframe is called IEEE 802.2
Provides error and flow control ifneeded
It makes the MAC sublayer transparent
Allows interconnectivitybetween different LANs datalink layers
Used to multiplex multiplenetwork layerprotocols in thedatalink
layer
frame
Implemented in software
10/18/2023 Ms.Meenalochini.M Assistant 42
Ethernet Provides Unreliable, connectionless Service
◦ Ethernet data link layer protocol provides
connectionless service to the network layer
No handshaking between sending and receiving
adapter.
◦ Ethernet protocol provides Unreliable service to the
network layer :
Receiving adapter doesn’t sendACK or NAK to
sending adapter
This means stream of datagrams passed to network
layer can have gaps (missing data)
Gaps will be filled if application is using reliable transport layer
protocol
Otherwise, application will see the gaps
10/18/2023 Ms.Meenalochini.M Assistant 43
Ethernet
Frame formats. (a) DIX Ethernet ,(b) IEEE
802.3.
FCS
FCS
 Ethernet Frame format
10/18/2023 Ms.Meenalochini.M Assistant 44
Ethernet Frame
PREAMBLE
◦ 8 bytes with pattern 10101010 used to synchronize receiver, sender clock rates.
◦ In IEEE 802.3, eighth byte is start of frame (10101011)
Addresses: 6 bytes (explained latter)
Type (DIX)
◦ Indicates the type of the Network layer protocol being carried in the payload
(data) field, mostly IP but others may be supported such as IP (0800), Novell IPX
(8137) andAppleTalk (809B),ARP (0806) )
◦ Allow multiple network layer protocols to be supported on a single machine
(multiplexing)
◦ Its value starts at 0600h (=1536 in decimal)
Length (IEEE 802.3): number of bytes in the data field.
◦ Maximum 1500 bytes (= 05DCh)
CRC: checked at receiver, if error is detected, the frame is discarded
◦ CRC-32
Data: carries data encapsulated from the upper-layer protocols
Pad: Zeros are added to the data field to make the minimum data length = 46 bytes
10/18/2023 Ms.Meenalochini.M Assistant 45
Ethernet address
 Six bytes = 48 bits
 Flat address not hierarchical
 Burned into the NIC ROM
First three bytes from left specify the vendor. Cisco 00-00-
0C, 3Com 02-60-8C and the last 24 bit should be created
uniquely by the company
 DestinationAddress canbe:
 Unicast: second digit from left is even (one recipient)
 Multicast: Second digit from left is odd (group of stations
to receive the frame – conferencing applications)
 Broadcast (ALL ones) (all stations receive theframe)
 Source address is always Unicast
10/18/2023 Ms.Meenalochini.M Assistant 46
Ethernet evolution through four generations
10/18/2023 Ms.Meenalochini.M Assistant 47
Categories of traditional Ethernet
•<data rate><Signaling method><Max segment length or cable type>
10/18/2023 Ms.Meenalochini.M Assistant 48
10Base5 implementation
10/18/2023 Ms.Meenalochini.M Assistant 49
Connection of stations to the medium using 10Base2
10/18/2023 Ms.Meenalochini.M Assistant 50
10BaseT
• Uses twisted pair Cat3 cable
 Star-wire topology
• Ahub functions as a repeater with additional functions
• Fewer cable problems, easier to troubleshoot than coax
• Cable length at most 100 meters
10/18/2023 Ms.Meenalochini.M Assistant 51
10Base-T implementation
10/18/2023 Ms.Meenalochini.M Assistant 52
10Base-F implementation
10/18/2023 Ms.Meenalochini.M Assistant 53
Fast Ethernet
100 Mbps transmission rate
same frame format, media access, and collision
detection rules as 10 Mbps Ethernet
can combine 10 Mbps Ethernet and Fast Ethernet
on same network using a switch
media: twisted pair (CAT5) or fiber optic cable
(no coax)
Star-wire topology
◦ Similar to 10BASE-T
CAT 3
CAT 5
10/18/2023 Ms.Meenalochini.M Assistant 54
Fast Ethernet topology
10/18/2023 Ms.Meenalochini.M Assistant 55
Fast Ethernet implementations
10/18/2023 Ms.Meenalochini.M Assistant 56
Gigabit Ethernet
Speed 1Gpbs
Minimum frame length is 512 bytes
Operates in ful/halfduplex modes mostly
full duplex
10/18/2023 Ms.Meenalochini.M Assistant 57
In the full-duplex mode of Gigabit Ethernet,
there is no collision;
the maximum length of the cable is
determined by the signal attenuation
in the cable.
10/18/2023 Ms.Meenalochini.M Assistant 58
Gigabit Ethernet implementations
10/18/2023 Ms.Meenalochini.M Assistant 59
10Gbps Ethernet
 Maximum link distances cover 300 m to 40 km
 Full-duplex mode only
 No CSMA/CD
 Uses optical fiber only
10/18/2023 Ms.Meenalochini.M Assistant 60
Piggybacking
In real life, data frames are normally flowing
in both directions: from node A to node B
and from node B to node A.
This means that the control information also
needs to flow in both directions.
A technique called piggybacking is used to
improve the efficiency of the bidirectional
protocols.
When a frame is carrying data from A to B,
it can also carry control information about
arrived (or lost) frames from B; when a
10/18/2023 Ms.Meenalochini.M Assistant 61
Why Interconnect?
• Toseparate / connect one corporate division with another.
• Toconnect two LANs with differentprotocols.
• T
oconnect a LAN to the Internet.
• Tobreak a LAN into segments to relieve traffic congestion.
• Toprovide a security wall between two different types ofusers.
10/18/2023 Ms.Meenalochini.M Assistant 62
Connecting Devices
Networking Devices
Repeaters Bridges
Internetworking
Devices
Routers Gateways
10/18/2023 Ms.Meenalochini.M Assistant 63
Introduction
•Many times it is necessary to connect a local area network to anotherlocal
area network or to a wide area network.
•Local area network to local area network connections are usually performed
with a bridge.
•Local area network to wide area network connections are usually performed
with a router.
•A third device, the switch, can be used to interconnect segmentsof a local
area network.
10/18/2023 Ms.Meenalochini.M Assistant 64
98/
25
Connecting Devices
Hub
10/18/2023 Ms.Meenalochini.M Assistant 65
Repeater:
A repeater is aregenerator
, not an
amplifier
A repeater installed on alink receives the
signal before it becomes too weak or
corrupted ,regenerates the original bit
pattern, and put the refreshed copy back
onto the link.
10/18/2023 Ms.Meenalochini.M Assistant 66
Gateways:
A gatewayis aprotocolconvertor
.
It accepts apacket format for one
protocol(e.g.,Apple T
alk)andconvertsit
into apacket format for another
protocol(e.g.,TCP/IP).
10/18/2023 Ms.Meenalochini.M Assistant 67
104
/ 25
A gateway
SNAnetwork (IBM)
Netware network (Novell)
10/18/2023 Ms.Meenalochini.M Assistant 68
105
/ 25
Bridges
Divide alargenetwork into smaller segment
It filters the traffic . It contains logic(Bridge
table) that allows them to keep the traffic for
each segment separate.
Ie) Isolatingandcontrolling the link problems
(e.g.congestion)
Bridges have look-up table that contains physical
address of every station connected to it.
10/18/2023 Ms.Meenalochini.M Assistant 69
10/18/2023 Ms.Meenalochini.M Assistant 70
108
/ 25
Bridge
10/18/2023 Ms.Meenalochini.M Assistant 71
When aframe enters abridge ,itchecks the address of
thedestinationand forwardthenewcopyonlytothe
segmentto whichtheaddresswhich belongs
10/18/2023 Ms.Meenalochini.M Assistant 72
Types
Simple
Multiport
Transparent
Remote
Source routing
10/18/2023 Ms.Meenalochini.M Assistant 73
SimpleBridge
It is aless expensive type of bridge
It links 2 segments (LANS) and lists the
address of all the stations in table
included in each of them.
Here address must be entered manually.
The table is modified when stations are
added and removed.
10/18/2023 Ms.Meenalochini.M Assistant 74
Multiport Bridge
It is used to connect more thantwo LANS.
So the bridge has 3 tables.
Here address must be entered manually
T
ransparent Bridge:
• A transparent or learning bridge builds its table of
station on its own (automatically).
• The table is empty when it is installed, it builds its table
when it encounters the packet for transmission. It
uses thesource address for buildingtable.
• It identifies the changes and update the table when
system moved from one station to another
10/18/2023 Ms.Meenalochini.M Assistant 75
113
/ 25
Multiport bridge
10/18/2023 Ms.Meenalochini.M Assistant 76
Cont.,
Bridges are normally installed
redundantly,that is two LANS may be
connected by more than one bridge.in
this cases they maycreate a loop.
So packet may go round and round,It can
be avoided by algorithms like
◦ Spannig tree algorithm
◦ Source routing
10/18/2023 Ms.Meenalochini.M Assistant 77
115
/ 25
Functionofabridge
10/18/2023 Ms.Meenalochini.M Assistant 78
Data Communications and Computer Networks
Remote Bridges
•A remote bridge is capable of passing a data frame
from one local area network to another when the two
LANs are separated by a long distance and there is a
wide area network connecting the two LANs.
•A remote bridge takes the frame before it leaves the
first LAN and encapsulates the WAN headers and
trailers.
•When the packet arrives at the destination remote
bridge, that bridge removes the WAN headers and
trailers leaving the original frame.
10/18/2023 Ms.Meenalochini.M Assistant 79
Data Communications and Computer Networks
Switches
•A switch is a combination of a hub and a bridge(multi-
port bridge).
•It can interconnect two or more workstations, but like a
bridge, it observes traffic flow and learns.
•When a frame arrives at a switch, the switch examines the
destination address and forwards the frame out the one
necessary connection.
•Workstations that connect to a hub are on a shared
segment.
•Workstations that connect to a switch are on a switched
segment.
10/18/2023 Ms.Meenalochini.M Assistant 80
Wireless LANs
10/18/2023 Ms.Meenalochini.M Assistant 81
LAN/WLANWorld
 LANs provide connectivity for interconnecting
computing resources at the local levels of an
organization
 Wired LANs
Limitations because of physical,hard-
wired infrastructure
 Wireless LANs provide
Flexibility
Portability
Mobility
Ease of Installation
10/18/2023 Ms.Meenalochini.M Assistant 82
Wireless LAN Applications
Medical Professionals
Education
T
emporary Situations
Airlines
Security Staff
Emergency Centers
10/18/2023 Ms.Meenalochini.M Assistant 83
IEEE 802.11 Wireless LAN
Standard
In response to lacking standards, IEEE
developed the first internationally
recognized wireless LAN standard – IEEE
802.11
IEEE published 802.11 in 1997, after seven
years of work
Scope of IEEE 802.11 is limited to Physical
and Data Link Layers.
10/18/2023 Ms.Meenalochini.M Assistant 84
Benefitsof802.11 Standard
Appliance Interoperability
Fast Product Development
Stable Future Migration
Price Reductions
The 802.11standard takesinto account the
following significant differences between
wireless and wired LANs:
Power Management
Security
Bandwidth
10/18/2023 Ms.Meenalochini.M Assistant 85
WLAN Topology
Ad-Hoc Network
The BSS without an AP is a stand-alone network and cannot send data to otherBSSs.
they can locate one another and agree to be part of a BSS.
10/18/2023 Ms.Meenalochini.M Assistant 86
WLAN Topology
Infrastructure
EX: cellular network if we consider each BSS to be a cell and
each AP to be a basestation.
10/18/2023 Ms.Meenalochini.M Assistant 87
Basic service sets (BSSs)
10/18/2023 Ms.Meenalochini.M Assistant 88
StationTypes
IEEE 802.11 defines three types of stations
based on their mobilityin awireless LAN:
◦ no-transition
A station is either stationary (not moving) or moving only insidea BSS
◦ BSS-transition
station canmove from one BSS to another
,butthemovementis confined
inside one ESS.
◦ and ESS-transition mobility
.
A station can move from one ESS to another
10/18/2023 Ms.Meenalochini.M Assistant 89
collisionavoidanceCSMAICA
network allocation vector (NAV) used to
avoid collision.
◦ RTS frameincludes the duration of timethatit needs to occupy
the channel.
◦ stations affectedby this transmission create atimer called(NAV)
◦ thenetwork allocationvector (NAV) shows thetimemust pass
before these stations allowed to check the channelfor idleness.
there is no mechanism for collision detection, ifthe
sender has not received aCTS frame from the receiver
,
assumes there has been acollision ,thesender tries
again.
10/18/2023 Ms.Meenalochini.M Assistant 90
BLUETOOTH
Bluetooth is a wireless LAN technology
designed to connect devices of different functions
such as telephones, notebooks, computers,
and so on. A
cameras, printers, coffee makers,
Bluetooth LAN is an ad hoc network, which
means that the network is formed spontaneously.
Bluetooth defines two types of networks:
piconet and scatternet.
10/18/2023 Ms.Meenalochini.M Assistant 91
Piconet
A Bluetooth network is calledapiconet, or asmall net.
It canhaveup to eightstations,one of whichis calledthemaster;the rest
arecalled slaves.
Maximum of sevenslaves.Only one master
.
Slaves synchronize their clocks and hopping sequence with the master
.
But anadditionaleightslavescanstayinparked state,whichmeansthey
canbesynchronized withthemasterbut cannottakepartin
communicationuntil it is moved from the parked state.
10/18/2023 Ms.Meenalochini.M Assistant 92
Scatternet
Piconets canbecombined to form whatis calleda
scatternet.
A slavestation inone piconet canbecome the
master in
• another piconet.
Bluetooth devices hasabuilt-in short-range radio
transmitter.
10/18/2023 Ms.Meenalochini.M Assistant 93
Bluetooth layers
Radio Layer:Roughly equivalent to physicallayerof theInternet model.
Physicallinks canbesynchronous or asynchronous.
◦ Uses Frequency-hopping spread spectrum [Changing frequencyof usage].
Changes itmodulation frequency1600 timesper second.
◦ Uses frequencyshiftkeying(FSK )withGaussian bandwidthfiltering to
transform bits to a signal.
Basebandlayer:Roughly equivalent to MAC sublayerinLANs. Accessis
usingTime Division (Time slots).
◦ Length of timeslot = dwelltime= 625 microsec. So,during one frequency
,a
sender sends aframeto aslave,or aslavesends aframeto themaster
.
Time division duplexingTDMA (TDD-TDMA) is a kind of half-duplex
communicationinwhichtheslaveandreceiver send andreceivedata,but
not atthesametime(half-duplex). However
,thecommunicationfor each
directionuses differenthops,like walkie-talkies.
10/18/2023 Ms.Meenalochini.M Assistant 94
Bluetooth layers
10/18/2023 Ms.Meenalochini.M Assistant 95
PhysicalLinks
Synchronous connection-oriented (SCO)
◦ Latency is important than integrity
.
◦ T
ransmission using slots.
◦ No retransmission.
Asynchronous connectionless link (ACL)
◦ Integrity is important than latency
.
◦ Does like multiple-slave communication.
◦ Retransmission is done.
L2CAP (Logical Link Control andAdaptationProtocol)
◦ Equivalent to LLC sublayer in LANs.
◦ Used for dataexchange onACL Link.SCO channels do not use L2CAP
.
◦ Frame format has 16-bit length [Size of datacoming from upper layerin bytes],
channel ID, data and control.
◦ Can do Multiplexing, segmentation and Reassembly
, QoS [with no QoS, best-
effort delivery is provided] and Group mangement [Can do like multicast group,
using some kind of logical addresses].
10/18/2023 Ms.Meenalochini.M Assistant 96
THANK YOU
10/18/2023 Ms.Meenalochini.M Assistant 97

More Related Content

Similar to Link layer, checksum, ethenet.pptx

CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10Irsandi Hasan
 
LAN Design for 15 flats : Park Pride Apartments
LAN Design for 15 flats : Park Pride ApartmentsLAN Design for 15 flats : Park Pride Apartments
LAN Design for 15 flats : Park Pride ApartmentsSubhajit Sahu
 
Ccna 1 chapter 7 v4.0 answers 2011
Ccna 1 chapter 7 v4.0 answers 2011Ccna 1 chapter 7 v4.0 answers 2011
Ccna 1 chapter 7 v4.0 answers 2011Dân Chơi
 
Networking and Data Communications
Networking and Data CommunicationsNetworking and Data Communications
Networking and Data Communicationskuramartin
 
IT_210_Week06_Forouzan_Chapter_13.ppt
IT_210_Week06_Forouzan_Chapter_13.pptIT_210_Week06_Forouzan_Chapter_13.ppt
IT_210_Week06_Forouzan_Chapter_13.pptشحرة فؤاد
 
Significance
SignificanceSignificance
SignificanceJulie May
 
module 2 cn new.pptx
module 2 cn new.pptxmodule 2 cn new.pptx
module 2 cn new.pptxDrPreethiD1
 
A427 nic card
A427 nic cardA427 nic card
A427 nic cardsurajbhai
 
CN_lec 3_Protocol_Layering
CN_lec 3_Protocol_LayeringCN_lec 3_Protocol_Layering
CN_lec 3_Protocol_LayeringRijutha Kumar
 
Design and Structuring of a Multiprocessor System based on Transputers
Design and Structuring of a Multiprocessor System based on TransputersDesign and Structuring of a Multiprocessor System based on Transputers
Design and Structuring of a Multiprocessor System based on TransputersIJERA Editor
 
Scaling Networks Lab Manual 1st Edition Cisco Solutions Manual
Scaling Networks Lab Manual 1st Edition Cisco Solutions ManualScaling Networks Lab Manual 1st Edition Cisco Solutions Manual
Scaling Networks Lab Manual 1st Edition Cisco Solutions Manualnudicixox
 

Similar to Link layer, checksum, ethenet.pptx (20)

CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10
 
Ethernet 802.3.pptx
Ethernet 802.3.pptxEthernet 802.3.pptx
Ethernet 802.3.pptx
 
LAN Design for 15 flats : Park Pride Apartments
LAN Design for 15 flats : Park Pride ApartmentsLAN Design for 15 flats : Park Pride Apartments
LAN Design for 15 flats : Park Pride Apartments
 
Ccna 1 chapter 7 v4.0 answers 2011
Ccna 1 chapter 7 v4.0 answers 2011Ccna 1 chapter 7 v4.0 answers 2011
Ccna 1 chapter 7 v4.0 answers 2011
 
Networking and Data Communications
Networking and Data CommunicationsNetworking and Data Communications
Networking and Data Communications
 
IT_210_Week06_Forouzan_Chapter_13.ppt
IT_210_Week06_Forouzan_Chapter_13.pptIT_210_Week06_Forouzan_Chapter_13.ppt
IT_210_Week06_Forouzan_Chapter_13.ppt
 
Significance
SignificanceSignificance
Significance
 
Cn lab-manual
Cn lab-manualCn lab-manual
Cn lab-manual
 
Cn lab-manual
Cn lab-manualCn lab-manual
Cn lab-manual
 
module 2 cn new.pptx
module 2 cn new.pptxmodule 2 cn new.pptx
module 2 cn new.pptx
 
lecciones ccna3
lecciones ccna3lecciones ccna3
lecciones ccna3
 
III_UNIT.pptx
III_UNIT.pptxIII_UNIT.pptx
III_UNIT.pptx
 
III_UNIT.pptx
III_UNIT.pptxIII_UNIT.pptx
III_UNIT.pptx
 
A427 nic card
A427 nic cardA427 nic card
A427 nic card
 
CN_lec 3_Protocol_Layering
CN_lec 3_Protocol_LayeringCN_lec 3_Protocol_Layering
CN_lec 3_Protocol_Layering
 
Ethernet
EthernetEthernet
Ethernet
 
Unit 3 - Data Link Layer - Part A
Unit 3 - Data Link Layer - Part AUnit 3 - Data Link Layer - Part A
Unit 3 - Data Link Layer - Part A
 
Design and Structuring of a Multiprocessor System based on Transputers
Design and Structuring of a Multiprocessor System based on TransputersDesign and Structuring of a Multiprocessor System based on Transputers
Design and Structuring of a Multiprocessor System based on Transputers
 
Bm36382385
Bm36382385Bm36382385
Bm36382385
 
Scaling Networks Lab Manual 1st Edition Cisco Solutions Manual
Scaling Networks Lab Manual 1st Edition Cisco Solutions ManualScaling Networks Lab Manual 1st Edition Cisco Solutions Manual
Scaling Networks Lab Manual 1st Edition Cisco Solutions Manual
 

Recently uploaded

Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...Call Girls in Nagpur High Profile
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 

Recently uploaded (20)

Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 

Link layer, checksum, ethenet.pptx

  • 1. UNIT – II DATA LINK LAYER 10/18/2023 Ms.Meenalochini.M Assistant 1
  • 2. Data Link Control Communication Minimum 2 devices are needed for data communication. So line discipline is necessary for co-operation b/w2 devices. The 2 important functions of data link layer is flow control and error control.This functions are otherwise called as Data link control. 10/18/2023 Ms.Meenalochini.M Assistant 2
  • 3. LineDiscipline It coordinates the link system It is done in 2 ways ◦ ENQ (Enquiry)  Used in peer – peercommunication  Enquire whether there is arequired link b/w two devices  Check whether theintended deviceis capableto receive ◦ ACK (Acknowledgment)  Used in Primary secondary communication  The intended devicewillacknowledge aboutits status to the receiver 10/18/2023 Ms.Meenalochini.M Assistant 3
  • 4. There are2 categories inline discipline 10/18/2023 Ms.Meenalochini.M Assistant 4
  • 6. Select It is a line discipline used in topologies with primary secondary relationship. Select It is uses whenever the primary device has something to send.ie)Primary controls the link. 10/18/2023 Ms.Meenalochini.M Assistant 6
  • 9. Poll The polling function is used by the primary device to Select transmissions from the secondary devices. If the primary device is ready to receive data , It ask each device in turn if it has anything to send. 10/18/2023 Ms.Meenalochini.M Assistant 9
  • 11. Flow Control It is a set of procedures to tell the sender how much data it can transmit before it must wait for an acknowledgement from the receiver. T wo categories of flow control: ◦ Stop-and-wait Send one frame at a time. ◦ Sliding window Send several frames at a time. 10/18/2023 Ms.Meenalochini.M Assistant 11
  • 13. Stop-and-wait Sender sends one frame and waits for an acknowledgementbefore sendingthe next frame. 10/18/2023 Ms.Meenalochini.M Assistant 13
  • 14. Stop-and-wait Advantages: ◦ Simplicity. ◦ Each frame is checked and acknowledged before the next frame is sent. Disadvantages: ◦ Slow. Can addsignificantlyto thetotaltransmission time ifthe distance betweendevices is long. ◦ Inefficiency Each frame is alone on the line. 10/18/2023 Ms.Meenalochini.M Assistant 14
  • 15. SlidingWindow Sender can send several frames before needing an acknowledgement. Advantages: ◦ The link can carry several frames at once. ◦ Its capacity can be used efficiently. 10/18/2023 Ms.Meenalochini.M Assistant 15
  • 20. Can detect all single-bit errors. Can detect burst errors only if the total number of errors in each data unit is odd. Even number of ones –add 0 Odd number of ones – add 1 10/18/2023 Ms.Meenalochini.M Assistant 20
  • 21. •Increases the likelihood of detecting burst errors. •n bits LRC can detect a burst error of n bits. •Errors may be undetected if: •Have even number of errors in that position. 10/18/2023 Ms.Meenalochini.M Assistant 21
  • 25. Hamming Codes-Error correction Hamming codes, like polynomial codes, are appended to the transmitted message Hamming codes, unlike polynomial codes, contain the information necessary to locate asingle bit error 10/18/2023 Ms.Meenalochini.M Assistant 25
  • 26. CalculatingtheHamming Code The keyto theHamming Code is theuse of extra paritybits to allow the identificationof asingle error . Create the code word as follows: ◦ Mark allbitpositions thatare powers of two asparitybits.(positions 1,2,4,8, 16, 32, 64,etc.) ◦ All other bitpositions are for thedatato beencoded.(positions 3,5,6,7,9,10, 11,12,13,14,15,17,etc.) ◦ Eachparitybitcalculatestheparityfor some of thebitsinthecode word.The position oftheparitybitdetermines thesequence ofbitsthatitalternately checks and skips. Position 1:check 1 bit,skip 1 bit,check 1 bit,skip 1 bit,etc.(1,3,5,7,9,11,13,15,...) Position 2:check 2 bits,skip 2 bits,check 2 bits,skip 2 bits,etc. (2,3,6,7,10,11,14,15,...) Position 4:check 4 bits,skip 4 bits,check 4 bits,skip 4 bits,etc. (4,5,6,7,12,13,14,15,20,21,22,23,...) Position 8:check 8 bits,skip 8 bits,check 8 bits,skip 8bits,etc.(8-15,24-31,40- 47,...) Position 16:check 16 bits,skip 16 bits,check 16 bits,skip 16 bits,etc.(16-31,48- 63,80-95,...) Position 32:check 32 bits,skip 32 bits,check 32 bits,skip 32 bits,etc.(32-63,96- 127,160-191,...) etc. ◦ Setaparitybitto 1 ifthetotalnumberof ones inthepositions itchecksis odd. Set aparity bit to 0 ifthe total number of ones in the positions itchecks is even. 10/18/2023 Ms.Meenalochini.M Assistant 26
  • 27. Position ofRedundancy bitin Hamming code 10/18/2023 Ms.Meenalochini.M Assistant 27
  • 35. MAC IEEE has subdivided(Project 802) the data link layer into two sub layers: ◦ Logical Link Control ◦ Medium access control Functions of MAC It resolves the contention of shared media It contains allinformation to move information from one place to another It containsthephysicaladdress of next station to route packet. MAC protocol are specific to LAN 10/18/2023 Ms.Meenalochini.M Assistant 35
  • 36. The project 802 which governs internet working. Here each subdivision is identified by a number 802.1(internetworking) 802.2(LLC) and MAC modules 802.3(CSMA/CD) 802.4(Tokenbus) 802.5(Tokenring) 10/18/2023 Ms.Meenalochini.M Assistant 36
  • 37. IEEE standard for LANs 10/18/2023 Ms.Meenalochini.M Assistant 37
  • 38. MAC protocol arespecifictoLAN LAN is aLocalArea Network used for communication inside building Protocols for LAN are, ◦ Ethernet ◦ T oken Ring ◦ T oken bus ◦ FDDI 10/18/2023 Ms.Meenalochini.M Assistant 38
  • 39. IEEE STANDARDS Ethernet: It is a LAN protocol that is used in Bus and Star topologiesand implements CSMA/CD as the medium access method Original (traditional) Ethernet developed in 1980 by three companies: Digital, Intel, Xerox (DIX). In 1985, the Computer Society of the IEEE started a project, called Project 802, to set standards to enable intercommunication among equipment from a variety of manufacturers.  Current version is called IEEE Ethernet 10/18/2023 Ms.Meenalochini.M Assistant 39
  • 40. ◦ IEEE 802.3supports LAN standardEthernet ◦ IEEE802.3 defines two categories Baseband Broadband ◦ Base band has fivedifferent category 10Base5 10Base2 10BaseT 1Base5 etc., ◦ Broad band has a category 10Broad36 10/18/2023 Ms.Meenalochini.M Assistant 40
  • 41. 802.3 MAC frame 10/18/2023 Ms.Meenalochini.M Assistant 41
  • 42. IEEE Ethernet In IEEE 802.3EthernetData linklayerissplitintotwo sublayers: ◦ Bottom part:MAC The frame is called IEEE 802.3 Handles framing,MAC addressing,MediumAccess control Implemented in hardware ◦ Toppart:LLC (LogicalLinkControl) The subframe is called IEEE 802.2 Provides error and flow control ifneeded It makes the MAC sublayer transparent Allows interconnectivitybetween different LANs datalink layers Used to multiplex multiplenetwork layerprotocols in thedatalink layer frame Implemented in software 10/18/2023 Ms.Meenalochini.M Assistant 42
  • 43. Ethernet Provides Unreliable, connectionless Service ◦ Ethernet data link layer protocol provides connectionless service to the network layer No handshaking between sending and receiving adapter. ◦ Ethernet protocol provides Unreliable service to the network layer : Receiving adapter doesn’t sendACK or NAK to sending adapter This means stream of datagrams passed to network layer can have gaps (missing data) Gaps will be filled if application is using reliable transport layer protocol Otherwise, application will see the gaps 10/18/2023 Ms.Meenalochini.M Assistant 43
  • 44. Ethernet Frame formats. (a) DIX Ethernet ,(b) IEEE 802.3. FCS FCS  Ethernet Frame format 10/18/2023 Ms.Meenalochini.M Assistant 44
  • 45. Ethernet Frame PREAMBLE ◦ 8 bytes with pattern 10101010 used to synchronize receiver, sender clock rates. ◦ In IEEE 802.3, eighth byte is start of frame (10101011) Addresses: 6 bytes (explained latter) Type (DIX) ◦ Indicates the type of the Network layer protocol being carried in the payload (data) field, mostly IP but others may be supported such as IP (0800), Novell IPX (8137) andAppleTalk (809B),ARP (0806) ) ◦ Allow multiple network layer protocols to be supported on a single machine (multiplexing) ◦ Its value starts at 0600h (=1536 in decimal) Length (IEEE 802.3): number of bytes in the data field. ◦ Maximum 1500 bytes (= 05DCh) CRC: checked at receiver, if error is detected, the frame is discarded ◦ CRC-32 Data: carries data encapsulated from the upper-layer protocols Pad: Zeros are added to the data field to make the minimum data length = 46 bytes 10/18/2023 Ms.Meenalochini.M Assistant 45
  • 46. Ethernet address  Six bytes = 48 bits  Flat address not hierarchical  Burned into the NIC ROM First three bytes from left specify the vendor. Cisco 00-00- 0C, 3Com 02-60-8C and the last 24 bit should be created uniquely by the company  DestinationAddress canbe:  Unicast: second digit from left is even (one recipient)  Multicast: Second digit from left is odd (group of stations to receive the frame – conferencing applications)  Broadcast (ALL ones) (all stations receive theframe)  Source address is always Unicast 10/18/2023 Ms.Meenalochini.M Assistant 46
  • 47. Ethernet evolution through four generations 10/18/2023 Ms.Meenalochini.M Assistant 47
  • 48. Categories of traditional Ethernet •<data rate><Signaling method><Max segment length or cable type> 10/18/2023 Ms.Meenalochini.M Assistant 48
  • 50. Connection of stations to the medium using 10Base2 10/18/2023 Ms.Meenalochini.M Assistant 50
  • 51. 10BaseT • Uses twisted pair Cat3 cable  Star-wire topology • Ahub functions as a repeater with additional functions • Fewer cable problems, easier to troubleshoot than coax • Cable length at most 100 meters 10/18/2023 Ms.Meenalochini.M Assistant 51
  • 54. Fast Ethernet 100 Mbps transmission rate same frame format, media access, and collision detection rules as 10 Mbps Ethernet can combine 10 Mbps Ethernet and Fast Ethernet on same network using a switch media: twisted pair (CAT5) or fiber optic cable (no coax) Star-wire topology ◦ Similar to 10BASE-T CAT 3 CAT 5 10/18/2023 Ms.Meenalochini.M Assistant 54
  • 55. Fast Ethernet topology 10/18/2023 Ms.Meenalochini.M Assistant 55
  • 56. Fast Ethernet implementations 10/18/2023 Ms.Meenalochini.M Assistant 56
  • 57. Gigabit Ethernet Speed 1Gpbs Minimum frame length is 512 bytes Operates in ful/halfduplex modes mostly full duplex 10/18/2023 Ms.Meenalochini.M Assistant 57
  • 58. In the full-duplex mode of Gigabit Ethernet, there is no collision; the maximum length of the cable is determined by the signal attenuation in the cable. 10/18/2023 Ms.Meenalochini.M Assistant 58
  • 59. Gigabit Ethernet implementations 10/18/2023 Ms.Meenalochini.M Assistant 59
  • 60. 10Gbps Ethernet  Maximum link distances cover 300 m to 40 km  Full-duplex mode only  No CSMA/CD  Uses optical fiber only 10/18/2023 Ms.Meenalochini.M Assistant 60
  • 61. Piggybacking In real life, data frames are normally flowing in both directions: from node A to node B and from node B to node A. This means that the control information also needs to flow in both directions. A technique called piggybacking is used to improve the efficiency of the bidirectional protocols. When a frame is carrying data from A to B, it can also carry control information about arrived (or lost) frames from B; when a 10/18/2023 Ms.Meenalochini.M Assistant 61
  • 62. Why Interconnect? • Toseparate / connect one corporate division with another. • Toconnect two LANs with differentprotocols. • T oconnect a LAN to the Internet. • Tobreak a LAN into segments to relieve traffic congestion. • Toprovide a security wall between two different types ofusers. 10/18/2023 Ms.Meenalochini.M Assistant 62
  • 63. Connecting Devices Networking Devices Repeaters Bridges Internetworking Devices Routers Gateways 10/18/2023 Ms.Meenalochini.M Assistant 63
  • 64. Introduction •Many times it is necessary to connect a local area network to anotherlocal area network or to a wide area network. •Local area network to local area network connections are usually performed with a bridge. •Local area network to wide area network connections are usually performed with a router. •A third device, the switch, can be used to interconnect segmentsof a local area network. 10/18/2023 Ms.Meenalochini.M Assistant 64
  • 66. Repeater: A repeater is aregenerator , not an amplifier A repeater installed on alink receives the signal before it becomes too weak or corrupted ,regenerates the original bit pattern, and put the refreshed copy back onto the link. 10/18/2023 Ms.Meenalochini.M Assistant 66
  • 67. Gateways: A gatewayis aprotocolconvertor . It accepts apacket format for one protocol(e.g.,Apple T alk)andconvertsit into apacket format for another protocol(e.g.,TCP/IP). 10/18/2023 Ms.Meenalochini.M Assistant 67
  • 68. 104 / 25 A gateway SNAnetwork (IBM) Netware network (Novell) 10/18/2023 Ms.Meenalochini.M Assistant 68
  • 69. 105 / 25 Bridges Divide alargenetwork into smaller segment It filters the traffic . It contains logic(Bridge table) that allows them to keep the traffic for each segment separate. Ie) Isolatingandcontrolling the link problems (e.g.congestion) Bridges have look-up table that contains physical address of every station connected to it. 10/18/2023 Ms.Meenalochini.M Assistant 69
  • 72. When aframe enters abridge ,itchecks the address of thedestinationand forwardthenewcopyonlytothe segmentto whichtheaddresswhich belongs 10/18/2023 Ms.Meenalochini.M Assistant 72
  • 74. SimpleBridge It is aless expensive type of bridge It links 2 segments (LANS) and lists the address of all the stations in table included in each of them. Here address must be entered manually. The table is modified when stations are added and removed. 10/18/2023 Ms.Meenalochini.M Assistant 74
  • 75. Multiport Bridge It is used to connect more thantwo LANS. So the bridge has 3 tables. Here address must be entered manually T ransparent Bridge: • A transparent or learning bridge builds its table of station on its own (automatically). • The table is empty when it is installed, it builds its table when it encounters the packet for transmission. It uses thesource address for buildingtable. • It identifies the changes and update the table when system moved from one station to another 10/18/2023 Ms.Meenalochini.M Assistant 75
  • 76. 113 / 25 Multiport bridge 10/18/2023 Ms.Meenalochini.M Assistant 76
  • 77. Cont., Bridges are normally installed redundantly,that is two LANS may be connected by more than one bridge.in this cases they maycreate a loop. So packet may go round and round,It can be avoided by algorithms like ◦ Spannig tree algorithm ◦ Source routing 10/18/2023 Ms.Meenalochini.M Assistant 77
  • 79. Data Communications and Computer Networks Remote Bridges •A remote bridge is capable of passing a data frame from one local area network to another when the two LANs are separated by a long distance and there is a wide area network connecting the two LANs. •A remote bridge takes the frame before it leaves the first LAN and encapsulates the WAN headers and trailers. •When the packet arrives at the destination remote bridge, that bridge removes the WAN headers and trailers leaving the original frame. 10/18/2023 Ms.Meenalochini.M Assistant 79
  • 80. Data Communications and Computer Networks Switches •A switch is a combination of a hub and a bridge(multi- port bridge). •It can interconnect two or more workstations, but like a bridge, it observes traffic flow and learns. •When a frame arrives at a switch, the switch examines the destination address and forwards the frame out the one necessary connection. •Workstations that connect to a hub are on a shared segment. •Workstations that connect to a switch are on a switched segment. 10/18/2023 Ms.Meenalochini.M Assistant 80
  • 82. LAN/WLANWorld  LANs provide connectivity for interconnecting computing resources at the local levels of an organization  Wired LANs Limitations because of physical,hard- wired infrastructure  Wireless LANs provide Flexibility Portability Mobility Ease of Installation 10/18/2023 Ms.Meenalochini.M Assistant 82
  • 83. Wireless LAN Applications Medical Professionals Education T emporary Situations Airlines Security Staff Emergency Centers 10/18/2023 Ms.Meenalochini.M Assistant 83
  • 84. IEEE 802.11 Wireless LAN Standard In response to lacking standards, IEEE developed the first internationally recognized wireless LAN standard – IEEE 802.11 IEEE published 802.11 in 1997, after seven years of work Scope of IEEE 802.11 is limited to Physical and Data Link Layers. 10/18/2023 Ms.Meenalochini.M Assistant 84
  • 85. Benefitsof802.11 Standard Appliance Interoperability Fast Product Development Stable Future Migration Price Reductions The 802.11standard takesinto account the following significant differences between wireless and wired LANs: Power Management Security Bandwidth 10/18/2023 Ms.Meenalochini.M Assistant 85
  • 86. WLAN Topology Ad-Hoc Network The BSS without an AP is a stand-alone network and cannot send data to otherBSSs. they can locate one another and agree to be part of a BSS. 10/18/2023 Ms.Meenalochini.M Assistant 86
  • 87. WLAN Topology Infrastructure EX: cellular network if we consider each BSS to be a cell and each AP to be a basestation. 10/18/2023 Ms.Meenalochini.M Assistant 87
  • 88. Basic service sets (BSSs) 10/18/2023 Ms.Meenalochini.M Assistant 88
  • 89. StationTypes IEEE 802.11 defines three types of stations based on their mobilityin awireless LAN: ◦ no-transition A station is either stationary (not moving) or moving only insidea BSS ◦ BSS-transition station canmove from one BSS to another ,butthemovementis confined inside one ESS. ◦ and ESS-transition mobility . A station can move from one ESS to another 10/18/2023 Ms.Meenalochini.M Assistant 89
  • 90. collisionavoidanceCSMAICA network allocation vector (NAV) used to avoid collision. ◦ RTS frameincludes the duration of timethatit needs to occupy the channel. ◦ stations affectedby this transmission create atimer called(NAV) ◦ thenetwork allocationvector (NAV) shows thetimemust pass before these stations allowed to check the channelfor idleness. there is no mechanism for collision detection, ifthe sender has not received aCTS frame from the receiver , assumes there has been acollision ,thesender tries again. 10/18/2023 Ms.Meenalochini.M Assistant 90
  • 91. BLUETOOTH Bluetooth is a wireless LAN technology designed to connect devices of different functions such as telephones, notebooks, computers, and so on. A cameras, printers, coffee makers, Bluetooth LAN is an ad hoc network, which means that the network is formed spontaneously. Bluetooth defines two types of networks: piconet and scatternet. 10/18/2023 Ms.Meenalochini.M Assistant 91
  • 92. Piconet A Bluetooth network is calledapiconet, or asmall net. It canhaveup to eightstations,one of whichis calledthemaster;the rest arecalled slaves. Maximum of sevenslaves.Only one master . Slaves synchronize their clocks and hopping sequence with the master . But anadditionaleightslavescanstayinparked state,whichmeansthey canbesynchronized withthemasterbut cannottakepartin communicationuntil it is moved from the parked state. 10/18/2023 Ms.Meenalochini.M Assistant 92
  • 93. Scatternet Piconets canbecombined to form whatis calleda scatternet. A slavestation inone piconet canbecome the master in • another piconet. Bluetooth devices hasabuilt-in short-range radio transmitter. 10/18/2023 Ms.Meenalochini.M Assistant 93
  • 94. Bluetooth layers Radio Layer:Roughly equivalent to physicallayerof theInternet model. Physicallinks canbesynchronous or asynchronous. ◦ Uses Frequency-hopping spread spectrum [Changing frequencyof usage]. Changes itmodulation frequency1600 timesper second. ◦ Uses frequencyshiftkeying(FSK )withGaussian bandwidthfiltering to transform bits to a signal. Basebandlayer:Roughly equivalent to MAC sublayerinLANs. Accessis usingTime Division (Time slots). ◦ Length of timeslot = dwelltime= 625 microsec. So,during one frequency ,a sender sends aframeto aslave,or aslavesends aframeto themaster . Time division duplexingTDMA (TDD-TDMA) is a kind of half-duplex communicationinwhichtheslaveandreceiver send andreceivedata,but not atthesametime(half-duplex). However ,thecommunicationfor each directionuses differenthops,like walkie-talkies. 10/18/2023 Ms.Meenalochini.M Assistant 94
  • 96. PhysicalLinks Synchronous connection-oriented (SCO) ◦ Latency is important than integrity . ◦ T ransmission using slots. ◦ No retransmission. Asynchronous connectionless link (ACL) ◦ Integrity is important than latency . ◦ Does like multiple-slave communication. ◦ Retransmission is done. L2CAP (Logical Link Control andAdaptationProtocol) ◦ Equivalent to LLC sublayer in LANs. ◦ Used for dataexchange onACL Link.SCO channels do not use L2CAP . ◦ Frame format has 16-bit length [Size of datacoming from upper layerin bytes], channel ID, data and control. ◦ Can do Multiplexing, segmentation and Reassembly , QoS [with no QoS, best- effort delivery is provided] and Group mangement [Can do like multicast group, using some kind of logical addresses]. 10/18/2023 Ms.Meenalochini.M Assistant 96