SlideShare a Scribd company logo
3
Most read
15
Most read
18
Most read
Module 6: Data Link Layer
Introduction to Networks v7.0
(ITN)
2
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
6.1 Purpose of the Data Link
Layer
3
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Purpose of the Data Link Layer
The Data Link Layer
1. The Data Link layer is responsible
for communications between end-
device network interface cards or end to
end delivery.
2. It allows upper layer protocols to access
the physical layer media and
encapsulates Layer 3 packets (IPv4
and IPv6) into Layer 2 Frames.
3. It also performs error detection and
rejects corrupts frames.
4
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Purpose of the Data Link Layer
IEEE 802 LAN/MAN Data Link Sublayers
IEEE 802 LAN/MAN standards are specific to
the type of network (Ethernet, WLAN, WPAN,
etc).
The Data Link Layer consists of two
sublayers. Logical Link Control (LLC) and
Media Access Control (MAC).
• The LLC sublayer communicates
between the networking software at the
upper layers and the device hardware at
the lower layers.
• The MAC sublayer is responsible for
data encapsulation and media access
control.
5
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Purpose of the Data Link Layer
Providing Access to Media
Packets exchanged between nodes may experience numerous data
link layers and media transitions.
At each hop along the path, a router performs four basic Layer 2
functions:
1. Accepts a frame from the network medium.
2. De-encapsulates the frame to expose the encapsulated packet.
3. Re-encapsulates the packet into a new frame.
4. Forwards the new frame on the medium of the next network segment.
6
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Purpose of the Data Link Layer
Data Link Layer Standards
Data link layer protocols are
defined by engineering
organizations:
• Institute for Electrical and
Electronic Engineers (IEEE).
• International Telecommunications
Union (ITU).
• International Organizations for
Standardization (ISO).
• American National Standards
Institute (ANSI).
7
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
6.2 Topologies
8
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Topologies
Physical and Logical Topologies
The topology of a network is the arrangement and relationship of the network
devices and the interconnections between them.
There are two types of topologies used when describing networks:
• Physical topology – shows physical connections and how devices are
interconnected.
• Logical topology – identifies the virtual connections between devices
using device interfaces and IP addressing schemes.
9
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Topologies
WAN Topologies
There are three common physical WAN topologies:
• Point-to-point – the simplest and most common WAN topology. Consists of
a permanent link between two endpoints.
• Hub and spoke – similar to a star topology where a central site
interconnects branch sites through point-to-point links.
• Mesh – provides high availability but requires every end system to be
connected to every other end system.
10
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Topologies
Point-to-Point WAN Topology
• Physical point-to-point topologies directly connect two nodes.
• The nodes may not share the media with other hosts.
• Because all frames on the media can only travel to or from the two
nodes, Point-to-Point WAN protocols can be very simple.
11
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Topologies
LAN Topologies
End devices on LANs are typically
interconnected using a star or extended
star topology. Star and extended star
topologies are easy to install, very scalable
and easy to troubleshoot.
Early Ethernet and Legacy Token Ring
technologies provide two additional
topologies:
• Bus – All end systems chained
together and terminated on each end.
• Ring – Each end system is connected
to its respective neighbors to form a
ring.
12
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Topologies
Half and Full Duplex Communication
Half-duplex communication
• Only allows one device to send or receive at a time on a shared medium.
• Used on WLANs and legacy bus topologies with Ethernet hubs.
Full-duplex communication
• Allows both devices to simultaneously transmit and receive on a shared medium.
• Ethernet switches operate in full-duplex mode.
13
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Topologies
Access Control Methods
Contention-based access
All nodes operating in half-duplex, competing for use of the medium. Examples are:
• Carrier sense multiple access with collision detection (CSMA/CD) as used on legacy
bus-topology Ethernet.
• Carrier sense multiple access with collision avoidance (CSMA/CA) as used on
Wireless LANs.
Controlled access
• Deterministic access where each node has its own time on the medium.
• Used on legacy networks such as Token Ring and ARCNET.
14
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Topologies
Contention-Based Access – CSMA/CD
CSMA/CD
• Used by legacy Ethernet LANs.
• Operates in half-duplex mode where only one device sends or receives at a time.
• Uses a collision detection process to govern when a device can send and what
happens if multiple devices send at the same time.
CSMA/CD collision detection process:
• Devices transmitting simultaneously will result in a signal collision on the shared
media.
• Devices detect the collision.
• Devices wait a random period of time and retransmit data.
15
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Topologies
Contention-Based Access – CSMA/CA
CSMA/CA
• Used by IEEE 802.11 WLANs.
• Operates in half-duplex mode where only one device sends or receives at a time.
• Uses a collision avoidance process to govern when a device can send and what
happens if multiple devices send at the same time.
CSMA/CA collision avoidance process:
• When transmitting, devices also include the time duration needed for the
transmission.
• Other devices on the shared medium receive the time duration information and know
how long the medium will be unavailable.
16
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
6.3 Data Link Frame
17
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Data Link Frame
The Frame
Data is encapsulated by the data link layer with a header and a trailer to form a frame.
A data link frame has three parts:
• Header
• Data
• Trailer
The fields of the header and trailer vary according to data link layer protocol.
The amount of control information carried with in the frame varies according to access
control information and logical topology.
18
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Data Link Frame
Frame Fields
Field Description
Frame Start and Stop Identifies beginning and end of frame
Addressing Indicates source and destination nodes
Type Identifies encapsulated Layer 3 protocol
Control Identifies flow control services
Data Contains the frame payload
Error Detection Used for determine transmission errors
19
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Data Link Frame
Layer 2 Addresses
• Also referred to as a physical address.
• Contained in the frame header.
• Used only for local delivery of a frame on the link.
• Updated by each device that forwards the frame.
20
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Data Link Frame
LAN and WAN Frames
The logical topology and physical media determine the data link
protocol used:
• Ethernet
• 802.11 Wireless
• Point-to-Point (PPP)
• High-Level Data Link Control (HDLC)
• Frame-Relay
Each protocol performs media access control for specified logical
topologies.
ITN_Module_6.pptx

More Related Content

PPTX
ITN_Module_8.pptx
PPTX
ITN_Module_3.pptx
PPTX
ITN_Module_2.pptx
PDF
Itn module 1
PPTX
ITN_Module_2.pptx
PPTX
CCNA v6.0 ITN - Chapter 05
PPTX
CCNA v6.0 ITN - Chapter 06
PPTX
ITN_Module_12.pptx
ITN_Module_8.pptx
ITN_Module_3.pptx
ITN_Module_2.pptx
Itn module 1
ITN_Module_2.pptx
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 06
ITN_Module_12.pptx

What's hot (20)

PPTX
2022_ITN_Module_5.pptx
PPTX
CCNA v6.0 ITN - Chapter 07
PPTX
CCNA v6.0 ITN - Chapter 10
PPTX
CCNA Introduction to Networks Module 1
PPTX
CCNA v6.0 ITN - Chapter 04
PPTX
CCNA 2 Routing and Switching v5.0 Chapter 2
PDF
ITN_Module_2_Basic_Switch_and_End_Device_Configuration.pdf.pdf
PPTX
CCNA v6.0 ITN - Chapter 08
PPTX
CCNA v6.0 ITN - Chapter 02
PDF
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
PPTX
CCNA Protocols and Models Lecture Slides
PPTX
CCNA v6.0 ITN - Chapter 03
PDF
CCNAv5 - S2: Chapter3 Vlans
PPTX
CCNA 1 Routing and Switching v5.0 Chapter 1
PPT
CCNA Introducing Networks
PPTX
CCNA 2 Routing and Switching v5.0 Chapter 4
PPTX
CCNA 1 Routing and Switching v5.0 Chapter 6
PPTX
CCNA Course Training Presentation
PDF
Ccna rse chp6 VLAN
PPTX
CCNA Product Overview.pptx
2022_ITN_Module_5.pptx
CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 10
CCNA Introduction to Networks Module 1
CCNA v6.0 ITN - Chapter 04
CCNA 2 Routing and Switching v5.0 Chapter 2
ITN_Module_2_Basic_Switch_and_End_Device_Configuration.pdf.pdf
CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 02
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNA Protocols and Models Lecture Slides
CCNA v6.0 ITN - Chapter 03
CCNAv5 - S2: Chapter3 Vlans
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA Introducing Networks
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA Course Training Presentation
Ccna rse chp6 VLAN
CCNA Product Overview.pptx
Ad

Similar to ITN_Module_6.pptx (20)

PDF
6.1 Data Link Layer.pdf 1234567891011121314
PPTX
Ccna routing and_switching_chapter-4-5
PPTX
CCNA RS_NB - Chapter 9
PPTX
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 4
PPTX
Itn6 instructor materials_chapter4
PPTX
Itn instructor ppt_chapter4_network_access
PPTX
Itn instructor ppt_chapter4_network_access
PPTX
Ccna v5-S1-Chapter 4
PDF
CCNAv5 - S1: Chapter 5 - Ethernet
PPTX
Chapter 5 : Ethernet
PPTX
Ccna v5-S1-Chapter 5
PDF
Networking Protocols.pdf
PPTX
04. network access
PPTX
CCNA_ITN_Chp4.pptx
PPTX
AD-WAN-Tech-Chapter 1.pptx
PPTX
CCNA RS_ITN - Chapter 4
PPTX
CCNA RS_NB - Chapter 10
PDF
CCNAv5 - S1: Chapter 4 - Network Access
PPTX
Chapter 4 : Network access
6.1 Data Link Layer.pdf 1234567891011121314
Ccna routing and_switching_chapter-4-5
CCNA RS_NB - Chapter 9
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 4
Itn6 instructor materials_chapter4
Itn instructor ppt_chapter4_network_access
Itn instructor ppt_chapter4_network_access
Ccna v5-S1-Chapter 4
CCNAv5 - S1: Chapter 5 - Ethernet
Chapter 5 : Ethernet
Ccna v5-S1-Chapter 5
Networking Protocols.pdf
04. network access
CCNA_ITN_Chp4.pptx
AD-WAN-Tech-Chapter 1.pptx
CCNA RS_ITN - Chapter 4
CCNA RS_NB - Chapter 10
CCNAv5 - S1: Chapter 4 - Network Access
Chapter 4 : Network access
Ad

Recently uploaded (20)

PDF
Introduction to the IoT system, how the IoT system works
PPTX
Database Information System - Management Information System
PPTX
Introduction to cybersecurity and digital nettiquette
PDF
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
PPTX
Funds Management Learning Material for Beg
PDF
Smart Home Technology for Health Monitoring (www.kiu.ac.ug)
DOCX
Unit-3 cyber security network security of internet system
PPTX
Mathew Digital SEO Checklist Guidlines 2025
PDF
Exploring VPS Hosting Trends for SMBs in 2025
PDF
Tenda Login Guide: Access Your Router in 5 Easy Steps
PPTX
Digital Literacy And Online Safety on internet
PPTX
Internet___Basics___Styled_ presentation
PPTX
Slides PPTX World Game (s) Eco Economic Epochs.pptx
PPTX
artificial intelligence overview of it and more
PPTX
E -tech empowerment technologies PowerPoint
PDF
The New Creative Director: How AI Tools for Social Media Content Creation Are...
PPTX
innovation process that make everything different.pptx
PDF
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
PPT
Ethics in Information System - Management Information System
DOC
Rose毕业证学历认证,利物浦约翰摩尔斯大学毕业证国外本科毕业证
Introduction to the IoT system, how the IoT system works
Database Information System - Management Information System
Introduction to cybersecurity and digital nettiquette
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
Funds Management Learning Material for Beg
Smart Home Technology for Health Monitoring (www.kiu.ac.ug)
Unit-3 cyber security network security of internet system
Mathew Digital SEO Checklist Guidlines 2025
Exploring VPS Hosting Trends for SMBs in 2025
Tenda Login Guide: Access Your Router in 5 Easy Steps
Digital Literacy And Online Safety on internet
Internet___Basics___Styled_ presentation
Slides PPTX World Game (s) Eco Economic Epochs.pptx
artificial intelligence overview of it and more
E -tech empowerment technologies PowerPoint
The New Creative Director: How AI Tools for Social Media Content Creation Are...
innovation process that make everything different.pptx
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
Ethics in Information System - Management Information System
Rose毕业证学历认证,利物浦约翰摩尔斯大学毕业证国外本科毕业证

ITN_Module_6.pptx

  • 1. Module 6: Data Link Layer Introduction to Networks v7.0 (ITN)
  • 2. 2 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6.1 Purpose of the Data Link Layer
  • 3. 3 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Purpose of the Data Link Layer The Data Link Layer 1. The Data Link layer is responsible for communications between end- device network interface cards or end to end delivery. 2. It allows upper layer protocols to access the physical layer media and encapsulates Layer 3 packets (IPv4 and IPv6) into Layer 2 Frames. 3. It also performs error detection and rejects corrupts frames.
  • 4. 4 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Purpose of the Data Link Layer IEEE 802 LAN/MAN Data Link Sublayers IEEE 802 LAN/MAN standards are specific to the type of network (Ethernet, WLAN, WPAN, etc). The Data Link Layer consists of two sublayers. Logical Link Control (LLC) and Media Access Control (MAC). • The LLC sublayer communicates between the networking software at the upper layers and the device hardware at the lower layers. • The MAC sublayer is responsible for data encapsulation and media access control.
  • 5. 5 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Purpose of the Data Link Layer Providing Access to Media Packets exchanged between nodes may experience numerous data link layers and media transitions. At each hop along the path, a router performs four basic Layer 2 functions: 1. Accepts a frame from the network medium. 2. De-encapsulates the frame to expose the encapsulated packet. 3. Re-encapsulates the packet into a new frame. 4. Forwards the new frame on the medium of the next network segment.
  • 6. 6 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Purpose of the Data Link Layer Data Link Layer Standards Data link layer protocols are defined by engineering organizations: • Institute for Electrical and Electronic Engineers (IEEE). • International Telecommunications Union (ITU). • International Organizations for Standardization (ISO). • American National Standards Institute (ANSI).
  • 7. 7 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6.2 Topologies
  • 8. 8 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Topologies Physical and Logical Topologies The topology of a network is the arrangement and relationship of the network devices and the interconnections between them. There are two types of topologies used when describing networks: • Physical topology – shows physical connections and how devices are interconnected. • Logical topology – identifies the virtual connections between devices using device interfaces and IP addressing schemes.
  • 9. 9 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Topologies WAN Topologies There are three common physical WAN topologies: • Point-to-point – the simplest and most common WAN topology. Consists of a permanent link between two endpoints. • Hub and spoke – similar to a star topology where a central site interconnects branch sites through point-to-point links. • Mesh – provides high availability but requires every end system to be connected to every other end system.
  • 10. 10 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Topologies Point-to-Point WAN Topology • Physical point-to-point topologies directly connect two nodes. • The nodes may not share the media with other hosts. • Because all frames on the media can only travel to or from the two nodes, Point-to-Point WAN protocols can be very simple.
  • 11. 11 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Topologies LAN Topologies End devices on LANs are typically interconnected using a star or extended star topology. Star and extended star topologies are easy to install, very scalable and easy to troubleshoot. Early Ethernet and Legacy Token Ring technologies provide two additional topologies: • Bus – All end systems chained together and terminated on each end. • Ring – Each end system is connected to its respective neighbors to form a ring.
  • 12. 12 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Topologies Half and Full Duplex Communication Half-duplex communication • Only allows one device to send or receive at a time on a shared medium. • Used on WLANs and legacy bus topologies with Ethernet hubs. Full-duplex communication • Allows both devices to simultaneously transmit and receive on a shared medium. • Ethernet switches operate in full-duplex mode.
  • 13. 13 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Topologies Access Control Methods Contention-based access All nodes operating in half-duplex, competing for use of the medium. Examples are: • Carrier sense multiple access with collision detection (CSMA/CD) as used on legacy bus-topology Ethernet. • Carrier sense multiple access with collision avoidance (CSMA/CA) as used on Wireless LANs. Controlled access • Deterministic access where each node has its own time on the medium. • Used on legacy networks such as Token Ring and ARCNET.
  • 14. 14 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Topologies Contention-Based Access – CSMA/CD CSMA/CD • Used by legacy Ethernet LANs. • Operates in half-duplex mode where only one device sends or receives at a time. • Uses a collision detection process to govern when a device can send and what happens if multiple devices send at the same time. CSMA/CD collision detection process: • Devices transmitting simultaneously will result in a signal collision on the shared media. • Devices detect the collision. • Devices wait a random period of time and retransmit data.
  • 15. 15 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Topologies Contention-Based Access – CSMA/CA CSMA/CA • Used by IEEE 802.11 WLANs. • Operates in half-duplex mode where only one device sends or receives at a time. • Uses a collision avoidance process to govern when a device can send and what happens if multiple devices send at the same time. CSMA/CA collision avoidance process: • When transmitting, devices also include the time duration needed for the transmission. • Other devices on the shared medium receive the time duration information and know how long the medium will be unavailable.
  • 16. 16 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6.3 Data Link Frame
  • 17. 17 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Data Link Frame The Frame Data is encapsulated by the data link layer with a header and a trailer to form a frame. A data link frame has three parts: • Header • Data • Trailer The fields of the header and trailer vary according to data link layer protocol. The amount of control information carried with in the frame varies according to access control information and logical topology.
  • 18. 18 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Data Link Frame Frame Fields Field Description Frame Start and Stop Identifies beginning and end of frame Addressing Indicates source and destination nodes Type Identifies encapsulated Layer 3 protocol Control Identifies flow control services Data Contains the frame payload Error Detection Used for determine transmission errors
  • 19. 19 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Data Link Frame Layer 2 Addresses • Also referred to as a physical address. • Contained in the frame header. • Used only for local delivery of a frame on the link. • Updated by each device that forwards the frame.
  • 20. 20 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Data Link Frame LAN and WAN Frames The logical topology and physical media determine the data link protocol used: • Ethernet • 802.11 Wireless • Point-to-Point (PPP) • High-Level Data Link Control (HDLC) • Frame-Relay Each protocol performs media access control for specified logical topologies.

Editor's Notes

  • #2: Cisco Networking Academy Program Introduction to Networks v7.0 (ITN) Module 6: Data Link Layer
  • #3: 6 - Data Link Layer 6.1 - Purpose of the Data Link Layer
  • #4: 6 – Data Link Layer 6.1 – Purpose of the Data Link Layer 6.1.1 – The Data Link Layer
  • #5: 6 – Data Link Layer 6.1 – Purpose of the Data Link Layer 6.1.2 – IEEE 802 LAN/MAN Data Link Sublayers
  • #6: 6 – Data Link Layer 6.1 – Purpose of the Data Link Layer 6.1.3 – Providing Access to Media
  • #7: 6 – Data Link Layer 6.1 – Purpose of the Data Link Layer 6.1.4 – Data Link Layer Standards 6.1.5 – Check Your Understanding – Purpose of Data Link Layer
  • #8: 6 - Data Link Layer 6.2 - Topologies
  • #9: 6 – Data Link Layer 6.2 – Topologies 6.2.1 – Physical and Logical Topologies
  • #10: 6 – Data Link Layer 6.2 – Topologies 6.2.2 – WAN Topologies
  • #11: 6 – Data Link Layer 6.2 – Topologies 6.2.3– Point-to-Point WAN Topology
  • #12: 6 – Data Link Layer 6.2 – Topologies 6.2.4 – LAN Topologies
  • #13: 6 – Data Link Layer 6.2 – Topologies 6.2.5 – Half and Full Duplex Communication
  • #14: 6 – Data Link Layer 6.2 – Topologies 6.2.6 – Access Control Methods
  • #15: 6 – Data Link Layer 6.2 – Topologies 6.2.7 – Contention-Based Access – CSMA/CD
  • #16: 6 – Data Link Layer 6.2 – Topologies 6.2.8 – Contention-Based Access – CSMA/CA 6.2.9 – Check Your Understanding - Topologies
  • #17: 6 - Data Link Layer 6.3 - Data Link Frame
  • #18: 6 – Data Link Layer 6.3 – Data Link Frame 6.3.1 – The Frame
  • #19: 6 – Data Link Layer 6.3 – Data Link Frame 6.3.2 – Frame Fields
  • #20: 6 – Data Link Layer 6.3 – Data Link Frame 6.3.3 – Layer 2 Address
  • #21: 6 – Data Link Layer 6.3 – Data Link Frame 6.3.4 – LAN and WAN Frames 6.3.5 – Check Your Understanding – Data Link Frame