Unit 5
Unit 5
1. Framing: This involves breaking the stream of data received from the Network Layer above it
into manageable units called frames. Frames consist of a header and a trailer, which contain
control information such as source and destination addresses, error checking codes, and
data. Framing allows the receiving node to recognize the beginning and end of each frame,
facilitating the extraction of data.
Parts of a Frame
MAC Addresses are unique 48-bit hardware numbers of a computer that are embedded into
a network card (known as a Network Interface Card) during manufacturing. The MAC
Address is also known as the Physical Address of a network device. In the IEEE 802 standard
Example:
IEEE Registration Authority Committee assigns these MAC prefixes to its registered vendors.
CC:46:D6 - Cisco
3C:5A:B4 - Google, Inc.
3C:D9:2B - Hewlett Packard
00:9A:CD - HUAWEI TECHNOLOGIES CO.,LTD
3. Error Detection and Correction: The Data Link Layer employs error detection techniques to
identify any transmission errors that may occur during data transfer. Common methods of
error detection include checksums and cyclic redundancy checks (CRC). While error
detection identifies the presence of errors, error correction mechanisms such as automatic
retransmission request (ARQ) protocols are often implemented at higher layers to request
retransmission of corrupted frames.
4. Flow Control: Flow control mechanisms regulate the flow of data between the sender and
receiver to prevent data loss due to buffer overflow. Flow control ensures that the sender
does not overwhelm the receiver with data faster than it can process. Techniques such as
sliding window protocols and stop-and-wait protocols are used for flow control.
5. Media Access Control (MAC): The Data Link Layer also manages access to the physical
medium, particularly in shared media environments such as Ethernet LANs. MAC protocols
determine how devices contend for access to the transmission medium and handle collisions
when multiple devices attempt to transmit simultaneously.
6. Address Resolution Protocol (ARP): ARP is a protocol used by the Data Link Layer to map IP
addresses to MAC addresses. When a device wants to communicate with another device on
the same local network segment, it uses ARP to resolve the destination IP address to the
corresponding MAC address.
The data link layer in computer networking is responsible for the reliable transfer of data between
adjacent network nodes. Here are some advantages and disadvantages of the data link layer:
Advantages:
1. Error Detection and Correction: One of the primary functions of the data link layer is to
detect and correct errors that may occur during data transmission, ensuring the integrity of
the data.
2. Flow Control: The data link layer manages the flow of data between devices, preventing
data loss due to congestion or mismatches in data rates between sender and receiver.
3. Media Access Control (MAC): This layer governs access to the physical transmission
medium, regulating how devices on a network share and transmit data, thus preventing
collisions and ensuring fair access.
4. Frame Synchronization: Data link layer protocols often include mechanisms for
synchronizing the transmission and reception of data frames, ensuring that data is correctly
interpreted by the receiving device.
5. Addressing: Data link layer protocols assign unique addresses to network devices, facilitating
the routing of data packets to their intended destinations.
Disadvantages:
1. Limited Scope: The data link layer operates only within the boundaries of a single network
segment or link, meaning that its functionality does not extend beyond directly connected
devices.
2. Overhead: Data link layer protocols add overhead to transmitted data in the form of control
information, such as headers and checksums, which can consume bandwidth and reduce the
efficiency of data transmission.
3. Complexity: Implementing and managing data link layer protocols can be complex,
especially in large-scale networks with diverse hardware and software configurations.
4. Dependence on Physical Layer: The data link layer relies on the physical layer for
transmitting data over the network medium. Any issues or limitations at the physical layer
can affect the performance and reliability of the data link layer.
5. Security Concerns: Data link layer protocols may not provide robust security features,
leaving networks vulnerable to unauthorized access, data interception, and other security
threats.
Overall, while the data link layer plays a crucial role in ensuring reliable communication within a
network segment, it also has limitations and challenges that need to be addressed for efficient
network operation.