Submit Search
6.1 Data Link Layer.pdf 1234567891011121314
0 likes
9 views
M
MinaMolky
it course
Technology
Read more
1 of 21
Download now
Download to read offline
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
More Related Content
PPTX
ITN_Module_6.pptx
argost1003
PPTX
CCNA_RSE_Chp4 - Switched Networks for CCNA
MonchaiPhaichitchan1
PPTX
CCNA_RSE_Chp4.pptx
RichardChecca1
PPTX
communication-protocols
Ali Kamil
PPT
networking1.ppt
ChinmayWaingankar3
PDF
OSI Model.pdf
Madhumitha J
PPT
Ccna day1
Sanjeev Jain
PPT
C C N A Day1
darulquthni
ITN_Module_6.pptx
argost1003
CCNA_RSE_Chp4 - Switched Networks for CCNA
MonchaiPhaichitchan1
CCNA_RSE_Chp4.pptx
RichardChecca1
communication-protocols
Ali Kamil
networking1.ppt
ChinmayWaingankar3
OSI Model.pdf
Madhumitha J
Ccna day1
Sanjeev Jain
C C N A Day1
darulquthni
Similar to 6.1 Data Link Layer.pdf 1234567891011121314
(20)
PPT
Ccna day1
Nazmi Deligözoğlu
PPT
Ccna day1
Dwi Yulianto
PPT
Ccna day1
danishrafiq
PPT
Ccna day1-130802165909-phpapp01
Sabiulla Barkathullah
PPT
Ccna day1
AHMED NADIM JILANI
PPT
Ccna day1
kkhan745
PPT
Ccna day 1
Sachin Morya
PPTX
Ccna PPT
AIRTEL
PPT
Ccna day1
Chaynika Verma
PPT
06 - OSI Model.ppt
ssuserf7cd2b
PPT
06 - OSI Model.ppt
ssuserf7cd2b
PPTX
Westermo webinar: Learning the Basics of Ethernet Networking
Westermo Network Technologies
PPTX
ITN_Module_3.pptx
argost1003
PPTX
Omnya Ashraf.Network (chp1 OSI MODEL.).pptx
FutureTechnologies3
PPTX
CCNA_RSE_Chp4 and their working principles.pptx
ParthaDas754073
PPTX
Module 1 Internet of Things Introduction
SushmaSJ2
PPTX
The Basics of Industrial Ethernet Communications
Westermo Network Technologies
PDF
Wp simoneau osi_model
Jagadish Gurrala
PPT
computer networks
dee_rosal
PPTX
CCNA RS_ITN - Chapter 5
Irsandi Hasan
Ccna day1
Nazmi Deligözoğlu
Ccna day1
Dwi Yulianto
Ccna day1
danishrafiq
Ccna day1-130802165909-phpapp01
Sabiulla Barkathullah
Ccna day1
AHMED NADIM JILANI
Ccna day1
kkhan745
Ccna day 1
Sachin Morya
Ccna PPT
AIRTEL
Ccna day1
Chaynika Verma
06 - OSI Model.ppt
ssuserf7cd2b
06 - OSI Model.ppt
ssuserf7cd2b
Westermo webinar: Learning the Basics of Ethernet Networking
Westermo Network Technologies
ITN_Module_3.pptx
argost1003
Omnya Ashraf.Network (chp1 OSI MODEL.).pptx
FutureTechnologies3
CCNA_RSE_Chp4 and their working principles.pptx
ParthaDas754073
Module 1 Internet of Things Introduction
SushmaSJ2
The Basics of Industrial Ethernet Communications
Westermo Network Technologies
Wp simoneau osi_model
Jagadish Gurrala
computer networks
dee_rosal
CCNA RS_ITN - Chapter 5
Irsandi Hasan
Ad
Recently uploaded
(20)
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
David Malick Dieng
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
IAESIJAI
PDF
cuic standard and advanced reporting.pdf
SimoneTitaniumTomase
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
IAESIJAI
PDF
Approach and Philosophy of On baking technology
30anthuong17
PDF
NewMind AI Weekly Chronicles - August'25-Week II
NewMind AI
PPTX
Big Data Technologies - Introduction.pptx
kuthubussaman1
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
Dropbox
PPTX
Spectroscopy.pptx food analysis technology
nawahassan45
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
SandeepSingh286037
PDF
Electronic commerce courselecture one. Pdf
OmerMohamed64
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
3G4G
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
SOFTTECHHUB
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
AgnesMunisi
PDF
Encapsulation theory and applications.pdf
gurumoop
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Chinchu40
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
DatVoNgoc
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Akar16
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
flufftailshop
PDF
Unlocking AI with Model Context Protocol (MCP)
Brian McKeiver
Digital-Transformation-Roadmap-for-Companies.pptx
David Malick Dieng
Diabetes mellitus diagnosis method based random forest with bat algorithm
IAESIJAI
cuic standard and advanced reporting.pdf
SimoneTitaniumTomase
Per capita expenditure prediction using model stacking based on satellite ima...
IAESIJAI
Approach and Philosophy of On baking technology
30anthuong17
NewMind AI Weekly Chronicles - August'25-Week II
NewMind AI
Big Data Technologies - Introduction.pptx
kuthubussaman1
Dropbox Q2 2025 Financial Results & Investor Presentation
Dropbox
Spectroscopy.pptx food analysis technology
nawahassan45
Agricultural_Statistics_at_a_Glance_2022_0.pdf
SandeepSingh286037
Electronic commerce courselecture one. Pdf
OmerMohamed64
The Rise and Fall of 3GPP – Time for a Sabbatical?
3G4G
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
SOFTTECHHUB
SOPHOS-XG Firewall Administrator PPT.pptx
AgnesMunisi
Encapsulation theory and applications.pdf
gurumoop
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Chinchu40
20250228 LYD VKU AI Blended-Learning.pptx
DatVoNgoc
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Akar16
Mobile App Security Testing_ A Comprehensive Guide.pdf
flufftailshop
Unlocking AI with Model Context Protocol (MCP)
Brian McKeiver
Ad
6.1 Data Link Layer.pdf 1234567891011121314
1.
Module 6: Data
Link Layer Introduction to Networks v7.0 (ITN)
2.
2 © 2016 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential Module Objectives Module Title: Data Link Layer Module Objective: Explain how media access control in the data link layer supports communication across networks. Topic Title Topic Objective Purpose of the Data Link Layer Describe the purpose and function of the data link layer in preparing communication for transmission on specific media. Topologies Compare the characteristics of media access control methods on WAN and LAN topologies. Data Link Frame Describe the characteristics and functions of the data link frame.
3.
3 © 2016 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential 6.1 Purpose of the Data Link Layer
4.
4 © 2016 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential Purpose of the Data Link Layer The Data Link Layer 1. The Data Link layer is responsible for communications between end- device network interface cards or end to end delivery. 2. It allows upper layer protocols to access the physical layer media and encapsulates Layer 3 packets (IPv4 and IPv6) into Layer 2 Frames. 3. It also performs error detection and rejects corrupts frames.
5.
5 © 2016 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential Purpose of the Data Link Layer IEEE 802 LAN/MAN Data Link Sublayers IEEE 802 LAN/MAN standards are specific to the type of network (Ethernet, WLAN, WPAN, etc). The Data Link Layer consists of two sublayers. Logical Link Control (LLC) and Media Access Control (MAC). • The LLC sublayer communicates between the networking software at the upper layers and the device hardware at the lower layers. • The MAC sublayer is responsible for data encapsulation and media access control.
6.
6 © 2016 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential Purpose of the Data Link Layer Providing Access to Media Packets exchanged between nodes may experience numerous data link layers and media transitions. At each hop along the path, a router performs four basic Layer 2 functions: 1. Accepts a frame from the network medium. 2. De-encapsulates the frame to expose the encapsulated packet. 3. Re-encapsulates the packet into a new frame. 4. Forwards the new frame on the medium of the next network segment.
7.
7 © 2016 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential Purpose of the Data Link Layer Data Link Layer Standards Data link layer protocols are defined by engineering organizations: • Institute for Electrical and Electronic Engineers (IEEE). • International Telecommunications Union (ITU). • International Organizations for Standardization (ISO). • American National Standards Institute (ANSI).
8.
8 © 2016 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential 6.2 Topologies
9.
9 © 2016 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential Topologies Physical and Logical Topologies The topology of a network is the arrangement and relationship of the network devices and the interconnections between them. There are two types of topologies used when describing networks: • Physical topology – shows physical connections and how devices are interconnected. • Logical topology – identifies the virtual connections between devices using device interfaces and IP addressing schemes.
10.
10 © 2016 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential Topologies WAN Topologies There are three common physical WAN topologies: • Point-to-point – the simplest and most common WAN topology. Consists of a permanent link between two endpoints. • Hub and spoke – similar to a star topology where a central site interconnects branch sites through point-to-point links. • Mesh – provides high availability but requires every end system to be connected to every other end system.
11.
11 © 2016 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential Topologies Point-to-Point WAN Topology • Physical point-to-point topologies directly connect two nodes. • The nodes may not share the media with other hosts. • Because all frames on the media can only travel to or from the two nodes, Point-to-Point WAN protocols can be very simple.
12.
12 © 2016 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential Topologies LAN Topologies End devices on LANs are typically interconnected using a star or extended star topology. Star and extended star topologies are easy to install, very scalable and easy to troubleshoot. Early Ethernet and Legacy Token Ring technologies provide two additional topologies: • Bus – All end systems chained together and terminated on each end. • Ring – Each end system is connected to its respective neighbors to form a ring.
13.
13 © 2016 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential Topologies Half and Full Duplex Communication Half-duplex communication • Only allows one device to send or receive at a time on a shared medium. • Used on WLANs and legacy bus topologies with Ethernet hubs. Full-duplex communication • Allows both devices to simultaneously transmit and receive on a shared medium. • Ethernet switches operate in full-duplex mode.
14.
14 © 2016 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential Topologies Access Control Methods Contention-based access All nodes operating in half-duplex, competing for use of the medium. Examples are: • Carrier sense multiple access with collision detection (CSMA/CD) as used on legacy bus-topology Ethernet. • Carrier sense multiple access with collision avoidance (CSMA/CA) as used on Wireless LANs. Controlled access • Deterministic access where each node has its own time on the medium. • Used on legacy networks such as Token Ring and ARCNET.
15.
15 © 2016 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential Topologies Contention-Based Access – CSMA/CD CSMA/CD • Used by legacy Ethernet LANs. • Operates in half-duplex mode where only one device sends or receives at a time. • Uses a collision detection process to govern when a device can send and what happens if multiple devices send at the same time. CSMA/CD collision detection process: • Devices transmitting simultaneously will result in a signal collision on the shared media. • Devices detect the collision. • Devices wait a random period of time and retransmit data.
16.
16 © 2016 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential Topologies Contention-Based Access – CSMA/CA CSMA/CA • Used by IEEE 802.11 WLANs. • Operates in half-duplex mode where only one device sends or receives at a time. • Uses a collision avoidance process to govern when a device can send and what happens if multiple devices send at the same time. CSMA/CA collision avoidance process: • When transmitting, devices also include the time duration needed for the transmission. • Other devices on the shared medium receive the time duration information and know how long the medium will be unavailable.
17.
17 © 2016 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential 6.3 Data Link Frame
18.
18 © 2016 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential Data Link Frame The Frame Data is encapsulated by the data link layer with a header and a trailer to form a frame. A data link frame has three parts: • Header • Data • Trailer The fields of the header and trailer vary according to data link layer protocol. The amount of control information carried with in the frame varies according to access control information and logical topology.
19.
19 © 2016 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential Data Link Frame Frame Fields Field Description Frame Start and Stop Identifies beginning and end of frame Addressing Indicates source and destination nodes Type Identifies encapsulated Layer 3 protocol Control Identifies flow control services Data Contains the frame payload Error Detection Used for determine transmission errors
20.
20 © 2016 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential Data Link Frame Layer 2 Addresses • Also referred to as a physical address. • Contained in the frame header. • Used only for local delivery of a frame on the link. • Updated by each device that forwards the frame.
21.
21 © 2016 Cisco
and/or its affiliates. All rights reserved. Cisco Confidential Data Link Frame LAN and WAN Frames The logical topology and physical media determine the data link protocol used: • Ethernet • 802.11 Wireless • Point-to-Point (PPP) • High-Level Data Link Control (HDLC) • Frame-Relay Each protocol performs media access control for specified logical topologies.
Download