Professional Documents
Culture Documents
Chapter 3: Data Link Layer Jobs: Framing
Chapter 3: Data Link Layer Jobs: Framing
JOBS: The DLL is responsible for taking the packets of information that it
receives from the network layer and putting them into frames for
Provides a well-defined interface to the network layer.
transmission.
Deal with transmission errors.
Each frame holds the payload plus a header and a trailer
Regulate the flow of data (so that slow receivers are not
(overhead).
overloaded)
It is the frames that are transmitted over the physical layer.
The data link layer sits between the network layer and the physical
layer.
Provides an interface for the network layer to send information from
one machine to another.
To network layer, it looks as though the path to the new machine
happens at the DLL, when it is really happening at the physical level.
Example:
This will dynamically assign IP address to home PC. Hence, LOGICAL LINK sublayer
Transport
home PC will be the member of ISP LAN.
Now, it will be able to receive/send IP packets. Thus, internet Network
can be browsed with the help of dial-up connection.
Framing Error
While breaking the connection, firstly, NCP breaks Network control Flow
Data Link
Layer connection by releasing IP address. Then, LCP breaks control
the link and modem breaks the physical layer connection.
And telephone line will be free. Physical
MEDIA ACCESS sub-layer
Pure/Slotted ALOHA
Carrie Sense Multiple Access (CSMA) Protocols
Collision free protocols
Synchronous system: time is divided into slots and frames can only be
transmitted at the start of the slot.
Pure ALOHA: Requires synchronization of clocks.
Vulnerable period halved: maximum efficiency is doubled.
Time slot is used so as to manage the collisions.
Suppose there is only one channel and two computers C1 and C2 are
willing to send data through it. If C1 is transmitting data, it sends
signal to all the other computers notifying that C1 is about to send This problem can be solved if the computers do not wait for a fixed
data. After the time slot has completed, only then C2 can transmit time; rather they should wait for the random number N times. The
data through that channel. possibility of computers that wait for same random number is very
low. This is called N-persistent.
802.4 is physical bus and logical ring topology, with each station knowing
the address of the station to its logical left and right. When logical ring is
initialized, highest number station may send first frame and passes
permission to its immediate neighbor by sending a special control frame
called a token. The token propagates around the logical ring, with only
Preamble SOF (1 Dest.addr. Source addr. Length (2 Data (0- Pad CRC (4 the token holder being permitted to transmit frame. Since only one
(7 bytes) byte) (6 bytes) (6 bytes) bytes) 1500by (0-46 bytes) station at a time holds the token, collisions do not occur.
tes) bytes
)
Fig: frame format of IEEE 802.3
SD/ED: to mark frame boundaries A station may hold the token for the token holding time, which is 10 ms
unless an installation sets a different value. After all frames transmitted
Checksum: used in error detection
or the transmission of another frame would exceed the token holding
802.5 Token Ring: time, the station regenerates the token.
-AC (Access control) contains the token bit, and also monitor bit, priority
bits, and reservation bits
-FC (Frame control) byte distinguishes data frames from various possible
control frames as 802.4
Fig. Token Ring
-Data may be as long as necessary, provided that the frame can still be FDDI deals with network reliable issues as mission-critical
transmitted within the token holding time. applications were implemented on high speed networks. It is
frequently used as a backbone technology, and to connect high
-FS (frame status) contains the A and C bits. When the sending station speed computer on LAN
drain the frame from the ring, it examines the A and C bits. Three Based on two counter–rotating fiber rings, only one used at a
combinations are possible: time and next is for backup. So if there is any problem in one ring,
next ring works automatically
A=0 and C=0; destination not present or not powered up. It allows 16 to 48 bits address and maximum frame size is 4500
bytes
A=1 and C=0; destination present but frame not accepted It prefers multimode fiber optic cable rather than single mode as
multimode reduces cost for high data transmission
A=1 and C=1; destination present and frame copied It prefers LEDs instead of Laser for light source not only for
cheaper but also to remove accidental chances at user end
connector (if user open connector and sees cable by naked eye,
eye may damage on laser light)
At physical layer, 802.5 call for STP (Shielded Twisted Pair) running at 1 or It operates at low error (1 bit error for 2.5 x 1010 )
4 Mbps, although IBM later introduced a 16 Mbps version. Signals are It uses 4B/5B encoding in place of Manchester encoding in Token
encoded with differential Manchester encoding, also permitting high-high Ring
and low-low in certain control bits, as normally differential Manchester It capture token before transmitting and does not wait for
acknowledgement to regenerate token as ring might be very long
encoding uses high-low or low-high for each bit.
and may occurs much delay to wait for ACK.
One major problem in ring network is that if the cable breaks somewhere, In normal operation, the token and frames travel only on the
primary ring in a single direction. The second ring transmits idle
the ring dies. One solution to this problem is wire center with bypass
signals in the opposite direction
relay. If a cable or device becomes disabled, the primary ring raps back
around onto the secondary ring
Stations may be directly connected to FDDI dual ring or attached
to FDDI concentrator. There are three types of nodes:
FDDI (Fiber Distributed Data Interface):
-DAS (Dual attachment station)
Similar to Token ring in the sense that it share some features such
as topology(ring) and media access technique(token-passing) -SAS (Single attachment station)
High performance Fiber Optic token ring running at 100 mbps
-DAC(Dual attachment concentrator)
over distance 200 KM and permits up to 1000 stations
FDDI deploys following timers:
-Token holding time: upper limit on how long a station
can hold token Where, B=Byte, SD=start of delimiter, FC= frame control, DA=source
address
-Token Rotation time: how long it takes the token to
traverse the ring or the interval between two successive SA=source address, ED= end of delimiter, FS= Frame status
arrivals of the token
Frame format:
SONET (Synchronous Optical NETwork):
The basic SONET channel (STS-1; synchronous transport signal-1) has the IEEE 802.11 – Wireless Ethernet:
capacity of 51.84 Mbps (8x810) bits in 125 µsec. All SONET trunks are a
Two configurations:
multiple of STS-1. STS-48 or OC-48 (consisting of 48 STS-1 or OC-1) has
Ad-hoc: no central control, no connection to the outside
the capacity of 2.488Gbps, high bandwidth range.
world.
VLAN (Virtual LAN): Infrastructure: uses fixed network access point to connect to
the outside world.
VLANs are a new type of LAN/BN architecture using intelligent, high- It doesn’t implement collision detection because it can’t detect
speed switches. collisions at the receiver end (hidden terminal problem).
VLANs assign computers to LAN segments by using software. To avoid collisions, the frames contains field indicating the length of
Standardized as IEEE802.1q and IEEE 802.1p. transmission. Other stations defer transmission.
802.11 lives in physical layer and data link layer in the OSI.
IEEE 802.11b (WiFi) is a wireless LAN technology that is growing
rapidly in popularity. It is convenient, inexpensive and easy to use.
Uses: airports, hotels, bookstores, parks, etc.
Estimates: 70% of WLANs are insecure.