Chapter 4 Data Link Layer (OSI Model) - July 2023
Chapter 4 Data Link Layer (OSI Model) - July 2023
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1
Chapter 4
4.1 Data Link Layer Protocols
4.2 Media Access Control
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
4.1Data Link Layer
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
Purpose of the Data Link Layer
4.1 The Data Link Layer
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
▪ Prepares network data for the physical network.
▪ Responsible for network interface card (NIC) to network interface
card communications
▪ Does the following :
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
Purpose of the Data Link Layer
Data Link Sublayers
Network
LLC Sublayer
Data Link
MAC Sublayer
Physical
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
▪ The IEEE 802 LAN/MAN data link layer consists of the following two
sublayers:
• Logical Link Control (LLC) -
• This IEEE 802.2 sublayer communicates between the networking software at
the upper layers and the device hardware at the lower layers.
• It places information in the frame that identifies which network layer
protocol is being used for the frame.
• This information allows multiple Layer 3 protocols, such as IPv4 and IPv6, to
use the same network interface and media.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7
LLC sublayer
▪ takes the network protocol data, which is typically an IPv4 or IPv6
packet,
▪ and adds Layer 2 control information to help deliver the packet to
the destination node.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
MAC Sublayer
▪ controls the NIC and other hardware
that is responsible for sending and receiving data on the wired or wireless
LAN/MAN medium.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
LAN Topologies
▪ Legacy LAN Topologies
▪ Early Ethernet and legacy Token Ring LAN technologies
included two other types of topologies:
•Bus
o All end systems are chained to each other and terminated
in some form on each end.
o Infrastructure devices such as switches are not required to
interconnect the end devices.
o Legacy Ethernet networks were often bus topologies using
coax cables because it was inexpensive and easy to set up.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
LAN Topologies
▪ Legacy LAN Topologies
•Ring
• End systems are connected to their respective neighbor
forming a ring.
• The ring does not need to be terminated, unlike in the bus
topology.
• example > Legacy Fiber Distributed Data Interface (FDDI)
and Token Ring networks
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14
Star Topology
▪ n multiaccess LANs, end devices (i.e., nodes) are interconnected
using star or extended star topologies, as shown in the figure.
▪ In this type of topology, end devices are connected to a central
intermediary device, in this case, an Ethernet switch.
▪ An extended star extends this topology by interconnecting
multiple Ethernet switches.
▪ The star and extended topologies are easy to install, very scalable
(easy to add and remove end devices), and easy to troubleshoot.
▪ Early star topologies interconnected end devices using Ethernet
hubs.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
Point to Point Topology
▪ At times there may be only two devices connected on the Ethernet
LAN. An example is two interconnected routers.
▪ This would be an example of Ethernet used on a point-to-point
topology.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
Half Duplex and Full Duplex Communication
▪ Half Duplex
• Both devices can transmit and receive on the media
but cannot do so simultaneously.
• WLANs and legacy bus topologies with Ethernet hubs
use the half-duplex mode.
• Half-duplex allows only one device to send or receive
at a time on the shared medium
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17
▪ Full Duplex
• Both devices can simultaneously transmit and receive
on the shared media.
• The data link layer assumes that the media is
available for transmission for both nodes at any time
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18
Half and Full Duplex
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19
▪ Hubs operate in half duplex mode
▪ Ethernet switches operate in full-duplex mode by default, but they
can operate in half-duplex if connecting to a device such as an
Ethernet hub.
▪ It is important that two interconnected interfaces, such as a host
NIC and an interface on an Ethernet switch, operate using the
same duplex mode.
• Otherwise, there will be a duplex mismatch creating
inefficiency and latency on the link.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20
4.2 Media Access Control
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 21
Providing Access to Media
▪ Ethernet LAN usually consists of many hosts contending
for access on the network medium.
▪ The MAC sublayer resolves this
▪ Different type of networks uses different network access
methods
• Point to point connection eg serial connection
• Multiaccess networks eg Ethernet LANs and WLANS
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 22
Access Control Methods
▪ A multiaccess network is a network that can have two or
more end devices attempting to access the network
simultaneously.
▪ require rules to govern how devices share the physical
media
▪ There are two basic access control methods for shared
media:
•Contention-based access
•Controlled access
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 23
Contention Based Access
▪ all nodes are operating in half-duplex, competing for the
use of the medium.
▪ only one device can send at a time.
▪ there is a process if more than one device transmits at
the same time.
▪ Examples of contention-based access methods include
the following:
•Carrier sense multiple access with collision detection (CSMA/CD)
used on legacy bus-topology Ethernet LANs
•Carrier sense multiple access with collision avoidance
(CSMA/CA) used on Wireless LANs
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 24
LAN Topologies
Contention-Based Access
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 25
Controlled Access
▪ In a controlled-based multiaccess network, each node
has its own time to use the medium.
▪ These deterministic types of legacy networks are
inefficient because a device must wait its turn to access
the medium.
▪ Examples of multiaccess networks that use controlled
access include the following:
•Legacy Token Ring
•Legacy ARCNET
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 26
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 27
LAN Topologies
Controlled Access
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 28
4.2a
Data Link Layer Frame
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 29
DATA LINK FRAME
❑ Each frame type has three basic parts:
•Header
•Data
•Trailer
❑ the structure of the frame and the fields
contained in the header and trailer vary
according to the protocol.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 30
Data Link Frame
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 31
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 32
LAN Data Link Layer Frames
▪ There is no one frame structure that meets the needs of all data transportation
across all types of media.
▪ Depending on the environment, the amount of control information needed in
the frame varies to match the access control requirements of the media and
logical topology.
▪ For example, a WLAN frame must include procedures for collision avoidance and
therefore requires additional control information when compared to an
Ethernet frame.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 33
Data Link Frame
Ethernet Frame
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 34
Data Link Frame
Point-to-Point Protocol Frame
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 35
Data Link Frame
802.11 Wireless Frame
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 36
WAN Data Link Layer Protocols
▪ A LAN typically uses a high bandwidth technology capable of
supporting large numbers of hosts
▪ However, using a high bandwidth technology is usually not cost-
effective for WANs that cover large geographic areas (cities or
multiple cities, for example).
▪ The cost of the long-distance physical links and the technology
used to carry the signals over those distances typically results in
lower bandwidth capacity.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 37
Data Link Frame
WAN Protocols