Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 30

UNIVERSITY OF SCIENCE, VNU-HCM

FACULTY OF ELECTRONICS AND


TELECOMMUNICATIONS

LAN: PHYSICAL LAYER AND DATA LINK

Email: info@hcmus.edu.vn
Group members

Nguyen Thi My Hanh Ly Bich Phung


20207091 20207095

Vu Thanh Dat Tran Trong Tien


20207029 20207014

2
01
DATA LINK

3
01. DATA LINK
APPLICATION

PRESENTATION
LANS (Local Area
Networks) SESSION

TRANSPORT

NETWORK

DATA LINK
PHYSICAL
Figure 1: Seven layers of the OSI Model 4
01. DATA LINK
Data link Frames Data link

Figure 2: Data transmission in the Data Link layer

• The data link which is the 2nd layer in OSI model.

• Divide data into frames and add error control


information to ensure data integrity.

• Ensure authentication, access control, and flow control


to ensure network performance.
5
01. DATA LINK

• The frame contains the source address, destination


address, data, and error-checking information.

• When the frame arrives at the destination, the target


devices decode and extract the data from the frame.

• The MAC address information routes the data frame


to the correct destination address.
6
01. DATA LINK
 Framing, link access:
 Encapsulate datagram into frame, adding header,
trailer.
 Channel access if shared medium.
 “MAC” addresses used in frame headers to identify
source and destination.

 Flow Control:
 Pacing between adjacent sending and receiving nodes.
7
01. DATA LINK
 Error Detection:
 Errors caused by signal attenuation and noise.
 Receiver detects presence of errors.

 Error Correction:
 Receiver identifies and corrects bit error without
resorting to retransmission.
 Transmission mode (Half-duplex and Full-duplex)
 With Half-duplex, nodes at both ends of link can
transmit , but not at same time 8
01. DATA LINK
 Frames

 Frames Synchronization
 Bit-sequence-based frame synchronization.

0111110 Address Control Data Checksum 0111110

Header Payload

9
02
PHYSICAL LAYER

10
02.PHYSICAL LAYER
APPLICATION

PRESENTATION

LANS (Local Area Networks) SESSION

TRANSPORT

NETWORK

DATA LINK

PHYSICAL
Figure 3: Seven layers of the OSI Model 11
02.PHYSICAL LAYER

 The physical layer which is the 1st layer in OSI


model.

 Fundamental Transmission procedures for “bits”


over communication media.

 The physical layer data consists of a stream of bits


(sequence of 0s or 1s).

12
02.PHYSICAL LAYER
From data link layer To data link layer

Bits
Physical Physical
01011110101
Transmission
Figure 4: Data transmission in the physical
layer

 Frames from the Data link layer when moving to the


Physical layer will be converted into a sequence of
binary bits (0 1….) (figure 4).

 Signals can be interpreted as either Analog or Digital.


13
02.PHYSICAL LAYER
 Digital-to-Digital Conversion
 In this section, we will discuss Line Coding because
Line Coding is always needed.
Sender Receiver

Digital data Digital data

Encoder Decoder
Link

Figure 5: Line Coding and Decoding


14
02.PHYSICAL LAYER
 Digital-to-Digital Conversion

 However, data transmission can be affected by channel


transmission such as interference, loss of synchronization
and loss of information at the receiver.

 Some methods are used to increase reliability in digital


data transmission such as Manchester, NRZ, AMI,..

 This ensures that in each signal cycle, there is at least one


change occurring to synchronize the clocks of the sender
and the receiver. 15
02.PHYSICAL LAYER
 Digital-to-Digital Conversion
Example: Effect of lack of synchronization

Sent

Receiver

16
02.PHYSICAL LAYER
 Digital-to-Digital Conversion
 In Manchester encoding the transition at the
middle of the bit is used for synchronization.

Bitstream

Manchester

Figure 6: Digital Signal Encoding Formats


17
02.PHYSICAL LAYER
 Analog-to-Digital Conversion

 The tendency today is to change an analog signal to


digital data. Because digital signal is superior to an analog
signal.

 In this part, we will cover Modulator and Demodulator.

 Analog signals are continuous, non-discrete. So need to


convert it to binary bits before transmitting.
18
02.PHYSICAL LAYER
 Analog-to-Digital Conversion

PCM encoder

Analog signal Digital data


Sampling Quantizing Encoding

19
03
Common LAN Technologies

20
03. Common LAN Technologies
LAN Technologies Overview

Token
Ring

Ethernet Token Ring

Figure 7: Ethernet and Token Ring model


21
03. Common LAN Technologies
3.1.Ethernet ( IEEE 802.3 ):
3.1.1.Concept: It is a network protocol commonly used in LANs to connect devices with each other and
transmit data between them..
3.1.2.Role:
-Connect and transmit data between devices in the network.

-Provide an easy and reliable link environment. -Allow


devices to connect and transmit data at high speeds.

3.1.3.Operation:
-Data is transmitted between devices through data packets.

-Each packet is packaged and attached with information


such as MAC addresses and IP addresses-> easy to
recognize and process data accurately.

-Devices are connected to each other via (twisted pair or


fiber optic cable)-> connected to network switches to switch
data between devices. 22
03. Common LAN Technologies
3.1.4. Advantages & Disadvantages

Advantages
• Fast and reliable transmission speed.
• Ability to handle multiple data streams
simultaneously.
• High security.
• Stable signal intensity.

Disadvantages
• Limited distance for data transmission.

• Issues related to connection reliability and


network stability when multiple devices are
connected to the network at the same time.

• Limited number of connection ports.


• Costly to purchase cables.

23
03. Common LAN Technologies
3.2.Token Ring(IEEE 802.5):

3.2.1. Concept:

• It is a type of LAN or local network technology


(developed by IBM) that sends data to a specific
location in a certain direction through a token.

• It controls and monitors all activities through a


specific station called an activity monitor.
3.2.2. Role:

• Token Ring is used to connect computers in a LAN


network for resource sharing and data
communication.

• Computers can send and receive data on the


transmission line in priority order and
synchronization, which is managed by the token.
24
03. Common LAN Technologies
3.2.3. Operation:
•Devices are connected and operate in a circular (clockwise)
shape.
•Each network device is called a node and is assigned information
such as a MAC address to determine its location on the loop.
•Each node is connected to 2 nodes before and after it,
information is transmitted from one node to another using a signal
called a token.
•When a node wants to transmit information, it waits for the
previous node to pass the token to it. After receiving the token, it
transmits its information and passes the token to the next node.
This process is repeated.
•If a node does not want to transmit information, it immediately
passes the token to the next node and continues to transmit.
•When a node is faulty, it immediately stops passing the token and
notifies other nodes of the problem. Other nodes continue to
transmit information.
•Information transmission is tight and efficient compared to other
LAN protocols.
25
03. Common LAN Technologies
3.2.4. Advantages & Disadvantages:

Advantages
• Can accommodate more computers than Ethernet.

• Provides more stable performance under high load.

• Data is transmitted through nodes in a sequential


manner, ensuring avoidance of data collision.

Disadvantages
• More complex installation than Ethernet.

• Lower data transfer speed than Ethernet.

• If one computer fails, the entire Token Ring network


will be disrupted.

• Difficult to configure and more expensive than other


LAN protocols. 26
03. Common LAN Technologies
  Token Ring Ethernet
Physical layer Uses the Shielded Twisted Uses UTP wiring.
Ring
3.3 Compare Ethernet & Token

Pair (STP) wiring.

Workstation Priority handling is Ethernet does not employ any


priority followed by the priority to the workstations
handling workstations in the Token while transmission of data.
Ring while transmission of
data frames.

Cost More expensive than Cheaper than Token ring


Ethernet
Topology Uses star-shaped topology Uses the Bus topology.
is used.
Media Uses a token passing Uses the CSMA/ CD (Carrier-
Access mechanism. sense multiple access/ collision
detection).

IEEE 802.5 802.3

Nature of Deterministic in nature. Non-deterministic in nature.


determinism
Rrouting Contains the routing Does not contain the routing
information. information. information.

Speed Maximum is 16Mbps 10Mbps -> 100Gbps 27


03. Common LAN Technologies
3.4. Compare Ethernet and Wifi
  Ethernet Wifi
Transmit Over a cable. -Through wireless signals rather than
over a cable.
data
Mobility Limited, as a physical cable is -Better, as no cables are required
required

Speed, -More speed, reliability, and -Not as fast, reliable, or secure as


security than Wi-Fi Ethernet
Reliability, -Consistent speed - Inconsistent speed ;Wi-Fi is prone to
Security signal interference
-More convenient ;users can connect to
the internet from anywhere

Data Data encryption is not required -Requires data encryption


 
encryption

Latency Lower latency; and more complex -Higher latency than Ethernet; and
installation process. simpler installation process.
   
28 28
REFERENCE
[1] Forouzan, B. A. (2012). Data Communications and Networking. McGraw-Hill Education.

[2] Dixon, M. (2022, October 19). What is Ethernet? The Easiest Way to Learn Industrial

[3] H. (2022b, September 24). 5-1 Link Physical Layers 2-89-90 Link Physical Layers Computer
Networks.

[4] F. (2022, June 6). Token ring vs Ethernet. EDUCBA.

[5] Froehlich, A., & Hwang, D. (2021, February 12). local area network (LAN). Networking.

[6] BasuMallick, C. (2022, February 10). What Is Local Area Network (LAN)? Definition, Types,
Architecture, and Best Practices. Spiceworks.
Thanks!
Do you have any questions?

https://www.facebook.com/osa.hcmus

https://hcmus.edu.vn/

You might also like