SlideShare a Scribd company logo
1 of 49
Download to read offline
Data Communication
and Computer Networks
[EEE 314]
Mubashir Husain RehmaniMubashir Husain Rehmani
Assistant Professor
Department of Electrical Engineering
COMSATS Institute of Information Technology,
Wah Cantt, Pakistan
Wired LAN
Ethernet
Data Link
Layer
Position of Data Link Layer
LLC and MAC
IEEE standards for LAN
Data Link Layer
Data Link Layer consists of two sub-layers
Logical Link Control (LLC) Layer
Medium Access Control (MAC) Layer
We may not have a dedicated link (channel) forWe may not have a dedicated link (channel) for
communication
Upper layer (LLC) is responsible for
Data link control (flow or error control)
Lower layer (MAC) is responsible for
Medium access resolution
Multiple Access to a Link
Multicast link or Broadcast link
Nodes are connected with single link
We need multiple access protocol
To coordinate access to the linkTo coordinate access to the link
Two devices do not send data at the same time
Two devices do not interrupt each other
A device do not monopolize the link
Multiple
Access
Multiple Access Protocols
Random Access
Also called ‘contention methods’
No device is superior to another device
No station permits another station to send data
At each instance, when a station has data to send, it willAt each instance, when a station has data to send, it will
make a decision by itself on whether or not to send
This decision is based on the state of the medium
Why we call Random Access or Contention Methods?
There is no scheduled time for a station to transmit
Transmission is random among the stations
No rules say which station should send next
Stations compete with each other
Random Access
In Random Access, each station has a right to send
However, if more than one station tries to send, collision
will occur
In order to avoid this collision problem, each station will
answer these questions
When can the station access the medium?
What can the station do if the medium is busy?
How can the station determine the success or failure of the
transmission?
What can the station do if there is an access conflict?
ALOHA Protocol
Random access evolved from ALOHA Protocol
It uses a simple procedure called ‘Multiple Access (MA)’
MA is further improved by forces the station to sense theMA is further improved by forces the station to sense the
medium before transmitting
Called Carrier Sense Multiple Access (CSMA)
CSMA evolved into two methods:
CSMA/CD: Carrier Sense Multiple Access / Collision Detection
Tells the station what to do when a collision is detected
CSMA/CA: Carrier Sense Multiple Access / Collision Avoidance
Tries to avoid the collision
Evolution of Random Access
Methods
ALOHA Protocol
Developed at University of Hawaii in early1970
Original ALOHA protocol is called as Pure ALOHA
Slotted ALOHA was invented to improve the performance of PureSlotted ALOHA was invented to improve the performance of Pure
ALOHA
ALOHA Network
Pure ALOHA
Slotted ALOHA
Some Questions
A pure ALOHA network transmits 200-bit frames on a shared
channel of 200 kbps. What is the requirement to make this frame
collision-free?
A pure ALOHA network transmits 200-bit frames on a shared
channel of 200 kbps. What is the throughput if the system (all
stations together) produces
1000 frames per second
500 frames per second
250 frames per second
A slotted ALOHA network transmits 200-bit frames using a shared
channel with a 200-kbps bandwidth. Find the throughput if the
system (all stations together) produces
1000 frames per second
500 frames per second
250 frames per second
Random Access
MA
CSMA
CSMA/CD
CSMA/CA
Collision in CSMA
Persistence Strategies
CSMA/CD Procedure
CSMA/CA Procedure
Controlled Access
• Stations consult each other to find which station has the
right to send
• A station can not send unless it has been authorized by
other stations
Reservation: make reservation before sending data
Polling: Select and Poll functions are used
Token Passing: Network is organized in logical ring
other stations
Select
Poll
Token Passing Network
Token Passing Procedure
Channelization
Channelization is a multiple-access method in which the
available bandwidth of a link is shared in time, frequency, or
through code, between different stations.
FDMA
TDMA
CDMA
In FDMA, the bandwidth is divided into
channels.
In TDMA, the bandwidth is just one
channel that is timeshared.
In CDMA, one channel carries all
transmissions simultaneously.
Project 802
Project 802
Ethernet Address in
Hexadecimal Notation
A Network with and without a
Bridge
Collision Domain
Switched Ethernet
Fast Ethernet

More Related Content

What's hot

Controlled Access Protocols
Controlled Access ProtocolsControlled Access Protocols
Controlled Access ProtocolsPruthviraj Konu
 
Multiple access protocols in data communication networks
Multiple access protocols in data communication networksMultiple access protocols in data communication networks
Multiple access protocols in data communication networksNt Arvind
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocaltes31
 
3.Medium Access Control
3.Medium Access Control3.Medium Access Control
3.Medium Access ControlSonali Chauhan
 
Routing protocols-network-layer
Routing protocols-network-layerRouting protocols-network-layer
Routing protocols-network-layerNitesh Singh
 
Multiple Access Methods
Multiple Access MethodsMultiple Access Methods
Multiple Access MethodsPrateek Soni
 
Chapter 11: Data Link Control
Chapter 11: Data Link ControlChapter 11: Data Link Control
Chapter 11: Data Link ControlJeoffnaRuth
 
Multiple Access in Computer Network
Multiple Access in Computer NetworkMultiple Access in Computer Network
Multiple Access in Computer NetworkHitesh Mohapatra
 
Media Access Control (MAC Layer)
Media Access Control (MAC Layer)Media Access Control (MAC Layer)
Media Access Control (MAC Layer)Meenakshi Paul
 
Media Access and Internetworking
Media Access and InternetworkingMedia Access and Internetworking
Media Access and InternetworkingN.Jagadish Kumar
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSDr. SELVAGANESAN S
 

What's hot (20)

MAC seminar
MAC seminarMAC seminar
MAC seminar
 
Controlled Access Protocols
Controlled Access ProtocolsControlled Access Protocols
Controlled Access Protocols
 
Multiple access protocols in data communication networks
Multiple access protocols in data communication networksMultiple access protocols in data communication networks
Multiple access protocols in data communication networks
 
Aloha
AlohaAloha
Aloha
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
 
Mac sub layer
Mac sub layerMac sub layer
Mac sub layer
 
3.Medium Access Control
3.Medium Access Control3.Medium Access Control
3.Medium Access Control
 
Mac layer
Mac  layerMac  layer
Mac layer
 
Routing protocols-network-layer
Routing protocols-network-layerRouting protocols-network-layer
Routing protocols-network-layer
 
Unit 3 - Data Link Layer - Part B
Unit 3 - Data Link Layer - Part BUnit 3 - Data Link Layer - Part B
Unit 3 - Data Link Layer - Part B
 
Multiple access protocol
Multiple access protocolMultiple access protocol
Multiple access protocol
 
Multiple Access Methods
Multiple Access MethodsMultiple Access Methods
Multiple Access Methods
 
Chapter 11: Data Link Control
Chapter 11: Data Link ControlChapter 11: Data Link Control
Chapter 11: Data Link Control
 
Multiple Access in Computer Network
Multiple Access in Computer NetworkMultiple Access in Computer Network
Multiple Access in Computer Network
 
Media Access Control (MAC Layer)
Media Access Control (MAC Layer)Media Access Control (MAC Layer)
Media Access Control (MAC Layer)
 
Lecture 6
Lecture 6Lecture 6
Lecture 6
 
MAC
MACMAC
MAC
 
Unit 1 mac vsd
Unit 1 mac vsdUnit 1 mac vsd
Unit 1 mac vsd
 
Media Access and Internetworking
Media Access and InternetworkingMedia Access and Internetworking
Media Access and Internetworking
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
 

Similar to Wired Lan Ethernet - DATA Link Layer

9 multiple access
9 multiple access9 multiple access
9 multiple accessampas03
 
datalinklayer-200201062315 (1).pptx
datalinklayer-200201062315 (1).pptxdatalinklayer-200201062315 (1).pptx
datalinklayer-200201062315 (1).pptxMeenaAnusha1
 
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptxComputer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptxPravinbhargav
 
Network Topologies
Network TopologiesNetwork Topologies
Network TopologiesJason Hando
 
Random Access Protocols presentation 4th Sem
Random Access Protocols presentation 4th SemRandom Access Protocols presentation 4th Sem
Random Access Protocols presentation 4th Semvishalkug22cs
 
Networking and Data Communications
Networking and Data CommunicationsNetworking and Data Communications
Networking and Data Communicationskuramartin
 
Multiole acccess
Multiole acccessMultiole acccess
Multiole acccessjasscheema
 
Media Access Control
Media Access ControlMedia Access Control
Media Access ControlHusnainHadi
 
WHAT IS MAC-1 presentation for information .pptx
WHAT IS MAC-1 presentation for information  .pptxWHAT IS MAC-1 presentation for information  .pptx
WHAT IS MAC-1 presentation for information .pptxSaqlainKhan39
 
Introduction to networking
Introduction to networkingIntroduction to networking
Introduction to networkingIdealGraphics
 
Computer networks lan
Computer networks lanComputer networks lan
Computer networks lanDeepak John
 
C:\Fakepath\802 11b Wireless Lan
C:\Fakepath\802 11b Wireless LanC:\Fakepath\802 11b Wireless Lan
C:\Fakepath\802 11b Wireless Laniamtheone90
 
RANDOM ACCESS PROTOCOL IN COMMUNICATION
RANDOM ACCESS PROTOCOL IN COMMUNICATION           RANDOM ACCESS PROTOCOL IN COMMUNICATION
RANDOM ACCESS PROTOCOL IN COMMUNICATION AMOGHA A K
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Ethernet and token ring
Ethernet and token ringEthernet and token ring
Ethernet and token ringAbhijeet Shah
 

Similar to Wired Lan Ethernet - DATA Link Layer (20)

9 multiple access
9 multiple access9 multiple access
9 multiple access
 
datalinklayer-200201062315 (1).pptx
datalinklayer-200201062315 (1).pptxdatalinklayer-200201062315 (1).pptx
datalinklayer-200201062315 (1).pptx
 
Data link layer
Data link layerData link layer
Data link layer
 
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptxComputer Network presention  Pravin Bhargav , Surykant Ratrey (1).pptx
Computer Network presention Pravin Bhargav , Surykant Ratrey (1).pptx
 
Network Topologies
Network TopologiesNetwork Topologies
Network Topologies
 
Random Access Protocols presentation 4th Sem
Random Access Protocols presentation 4th SemRandom Access Protocols presentation 4th Sem
Random Access Protocols presentation 4th Sem
 
Networking and Data Communications
Networking and Data CommunicationsNetworking and Data Communications
Networking and Data Communications
 
Multiole acccess
Multiole acccessMultiole acccess
Multiole acccess
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
 
WHAT IS MAC-1 presentation for information .pptx
WHAT IS MAC-1 presentation for information  .pptxWHAT IS MAC-1 presentation for information  .pptx
WHAT IS MAC-1 presentation for information .pptx
 
dcn.pdf
dcn.pdfdcn.pdf
dcn.pdf
 
Introduction to networking
Introduction to networkingIntroduction to networking
Introduction to networking
 
Computer networks lan
Computer networks lanComputer networks lan
Computer networks lan
 
9 lan
9 lan9 lan
9 lan
 
C:\Fakepath\802 11b Wireless Lan
C:\Fakepath\802 11b Wireless LanC:\Fakepath\802 11b Wireless Lan
C:\Fakepath\802 11b Wireless Lan
 
RANDOM ACCESS PROTOCOL IN COMMUNICATION
RANDOM ACCESS PROTOCOL IN COMMUNICATION           RANDOM ACCESS PROTOCOL IN COMMUNICATION
RANDOM ACCESS PROTOCOL IN COMMUNICATION
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Ethernet and token ring
Ethernet and token ringEthernet and token ring
Ethernet and token ring
 
10 high speedla-ns
10 high speedla-ns10 high speedla-ns
10 high speedla-ns
 

More from Taimoor Muzaffar Gondal

Lecture 04: Errors During the Measurement Process
Lecture 04: Errors During the Measurement ProcessLecture 04: Errors During the Measurement Process
Lecture 04: Errors During the Measurement ProcessTaimoor Muzaffar Gondal
 
Effects of Currents and Type of Cells and Batteries
Effects of Currents and Type of Cells and BatteriesEffects of Currents and Type of Cells and Batteries
Effects of Currents and Type of Cells and BatteriesTaimoor Muzaffar Gondal
 

More from Taimoor Muzaffar Gondal (20)

Basics of Computer
Basics of ComputerBasics of Computer
Basics of Computer
 
Lecture 04: Errors During the Measurement Process
Lecture 04: Errors During the Measurement ProcessLecture 04: Errors During the Measurement Process
Lecture 04: Errors During the Measurement Process
 
Introduction to Measurements-Lecture 01
Introduction to Measurements-Lecture 01Introduction to Measurements-Lecture 01
Introduction to Measurements-Lecture 01
 
Updated Lecture 01- History of Atom
Updated Lecture 01- History of AtomUpdated Lecture 01- History of Atom
Updated Lecture 01- History of Atom
 
Heat and Its Transfer
Heat and Its TransferHeat and Its Transfer
Heat and Its Transfer
 
Low, Medium and High Frequency Current
Low, Medium and High Frequency CurrentLow, Medium and High Frequency Current
Low, Medium and High Frequency Current
 
Rectification and Electrotherapy
Rectification and ElectrotherapyRectification and Electrotherapy
Rectification and Electrotherapy
 
Applications of EM Waves
Applications of EM WavesApplications of EM Waves
Applications of EM Waves
 
Electromagnetism Fundamentals
Electromagnetism FundamentalsElectromagnetism Fundamentals
Electromagnetism Fundamentals
 
Effects of Currents and Type of Cells and Batteries
Effects of Currents and Type of Cells and BatteriesEffects of Currents and Type of Cells and Batteries
Effects of Currents and Type of Cells and Batteries
 
Current Electricity
Current ElectricityCurrent Electricity
Current Electricity
 
Static Electricity
Static ElectricityStatic Electricity
Static Electricity
 
Lecture 01- Atomic Structure
Lecture 01- Atomic StructureLecture 01- Atomic Structure
Lecture 01- Atomic Structure
 
An Overview of PLC
An Overview of PLCAn Overview of PLC
An Overview of PLC
 
Regula falsi MATLAB Code
Regula falsi MATLAB CodeRegula falsi MATLAB Code
Regula falsi MATLAB Code
 
Newton's method for MATLAB Code
Newton's method for MATLAB CodeNewton's method for MATLAB Code
Newton's method for MATLAB Code
 
Langrange method for MATLAB Code
Langrange method for MATLAB CodeLangrange method for MATLAB Code
Langrange method for MATLAB Code
 
Jacobi method for MATLAB
Jacobi method for MATLAB Jacobi method for MATLAB
Jacobi method for MATLAB
 
Gauss seidal Matlab Code
Gauss seidal Matlab CodeGauss seidal Matlab Code
Gauss seidal Matlab Code
 
Finite difference Matlab Code
Finite difference Matlab CodeFinite difference Matlab Code
Finite difference Matlab Code
 

Recently uploaded

Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 

Recently uploaded (20)

Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 

Wired Lan Ethernet - DATA Link Layer

  • 1. Data Communication and Computer Networks [EEE 314] Mubashir Husain RehmaniMubashir Husain Rehmani Assistant Professor Department of Electrical Engineering COMSATS Institute of Information Technology, Wah Cantt, Pakistan
  • 4. Position of Data Link Layer
  • 7. Data Link Layer Data Link Layer consists of two sub-layers Logical Link Control (LLC) Layer Medium Access Control (MAC) Layer We may not have a dedicated link (channel) forWe may not have a dedicated link (channel) for communication Upper layer (LLC) is responsible for Data link control (flow or error control) Lower layer (MAC) is responsible for Medium access resolution
  • 8. Multiple Access to a Link Multicast link or Broadcast link Nodes are connected with single link We need multiple access protocol To coordinate access to the linkTo coordinate access to the link Two devices do not send data at the same time Two devices do not interrupt each other A device do not monopolize the link
  • 11. Random Access Also called ‘contention methods’ No device is superior to another device No station permits another station to send data At each instance, when a station has data to send, it willAt each instance, when a station has data to send, it will make a decision by itself on whether or not to send This decision is based on the state of the medium Why we call Random Access or Contention Methods? There is no scheduled time for a station to transmit Transmission is random among the stations No rules say which station should send next Stations compete with each other
  • 12. Random Access In Random Access, each station has a right to send However, if more than one station tries to send, collision will occur In order to avoid this collision problem, each station will answer these questions When can the station access the medium? What can the station do if the medium is busy? How can the station determine the success or failure of the transmission? What can the station do if there is an access conflict?
  • 13. ALOHA Protocol Random access evolved from ALOHA Protocol It uses a simple procedure called ‘Multiple Access (MA)’ MA is further improved by forces the station to sense theMA is further improved by forces the station to sense the medium before transmitting Called Carrier Sense Multiple Access (CSMA) CSMA evolved into two methods: CSMA/CD: Carrier Sense Multiple Access / Collision Detection Tells the station what to do when a collision is detected CSMA/CA: Carrier Sense Multiple Access / Collision Avoidance Tries to avoid the collision
  • 14. Evolution of Random Access Methods
  • 15. ALOHA Protocol Developed at University of Hawaii in early1970 Original ALOHA protocol is called as Pure ALOHA Slotted ALOHA was invented to improve the performance of PureSlotted ALOHA was invented to improve the performance of Pure ALOHA
  • 19. Some Questions A pure ALOHA network transmits 200-bit frames on a shared channel of 200 kbps. What is the requirement to make this frame collision-free? A pure ALOHA network transmits 200-bit frames on a shared channel of 200 kbps. What is the throughput if the system (all stations together) produces 1000 frames per second 500 frames per second 250 frames per second A slotted ALOHA network transmits 200-bit frames using a shared channel with a 200-kbps bandwidth. Find the throughput if the system (all stations together) produces 1000 frames per second 500 frames per second 250 frames per second
  • 20.
  • 26. Controlled Access • Stations consult each other to find which station has the right to send • A station can not send unless it has been authorized by other stations Reservation: make reservation before sending data Polling: Select and Poll functions are used Token Passing: Network is organized in logical ring other stations
  • 28. Poll
  • 31. Channelization Channelization is a multiple-access method in which the available bandwidth of a link is shared in time, frequency, or through code, between different stations. FDMA TDMA CDMA
  • 32. In FDMA, the bandwidth is divided into channels.
  • 33. In TDMA, the bandwidth is just one channel that is timeshared.
  • 34. In CDMA, one channel carries all transmissions simultaneously.
  • 35.
  • 36.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 45.
  • 46. A Network with and without a Bridge