Unit I Physical Layer and Data Link Layer - 240812 - 101310
Unit I Physical Layer and Data Link Layer - 240812 - 101310
UNIT - I
Introduction to Physical Layer and Data Link Layer
Course Description
• It will also highlight the basics of transport protocols programming for different
applications and help students to gain insight into design and deployment of
Computer Networks.
Course Outcomes
1. Analyze the design issues of data link layer.
4. Implement socket programming suitable for connection oriented and connection less protocols.
• Transmission media: Guided/Bounded - Twisted Pair, Coaxial and Fiber-optic cables, Ethernet.
• Overview of protocol suite: OSI and TCP/IP, infrastructure network, ad-hoc network.
• Data Link Layer: Design Issues, Error Detection and correction, Examples on Checksum,
Stop-and-Wait protocol, Sliding Window protocols, HDLC. Point-to-Point-Access (PPP): Frame format,
Transition states, PPP Stack: LCP, NCP.
Syllabus GAP
Computer Network
• Interconnecting devices for transmitting and sharing information
Computer Components
Computer Components
Communication
Layered Protocol- IP, TCP,UDP, DHCP, SMTP, etc.
Protocols
• Cloud Network
Topology
• Bus Topology
• Ring topology
Topology
• Star Topology
• Mesh Topology
Topology
• Hybrid Topology
Physical Layer
• The physical layer is responsible for movements of individual bits from one hop (node)
to the next.
• Physical characteristics of interfaces and medium - interface between the devices and
the transmission medium. It also defines the type of transmission medium.
• Representation of bits. -The physical layer data consists of a stream of bits (sequence
of Os or 1s) with no interpretation
• Data rate - The transmission rate-the number of bits sent each second-is also defined by
the physical layer.
• Synchronization of bits - The sender and receiver not only must use the same bit rate
but also must be synchronized at the bit level.
• Line configuration – Point to Point / Multipoint configuration
• Physical topology – It defines how devices are connected to make a network.
• Transmission mode - simplex, half-duplex, or full-duplex
Transmission media
Guided/Bounded Media
The purpose of the physical layer is to transport bits from one machine to another.
Transmission media that rely on a physical cable or wire are often called guided
transmission media because the signal transmissions are guided along a path with a
physical cable or wire.
• The digital subscriber lines (DSLs) that are used by the telephone
companies to provide high-data-rate connections also use the high
bandwidth capability of unshielded twisted-pair cables.
Coaxial Cable
Better shielding and greater bandwidth than unshielded twisted pairs, so it can span longer distances at
higher speeds.
Coaxial Cable
Now a days telephone network and cable TV network replaced most of the
media with fiber-optic cable.
Now a days telephone network and cable TV network replaced most of the
media with fiber-optic cable.
fiber-optic cable
A high-bandwidth transmission medium that carries data signals in the form of
pulses of light.
It consists of a thin cylinder of glass or plastic, called the core, surrounded by a
concentric layer of glass or plastic called the cladding.
fiber-optic cable
Performance - The attenuation in an optical fiber is much less than in a twisted-pair cable
Ethernet
Ethernet is the most popular physical layer LAN technology in use today.
It defines the number of conductors that are required for a connection, the
performance thresholds that can be expected, and provides the framework
for data transmission.
Ethernet
History –
The original Ethernet was created in 1976 at Xerox’s Palo Alto Research Center
(PARC). In 1985, the Computer Society of the IEEE started a project, called Project
802, to set standards to enable intercommunication among equipment from a variety of
manufacturers Since then, it has gone through four generations.
IEEE Standard – 802.3
Advanced LAN technologies such as Fiber Distributed Data Interface (FDDI) and
Fibre Channel require speed more than 10 Mbps. So, Ethernet made a big jump by
increasing the transmission rate to 100 Mbps, and the new generation was called the
Fast Ethernet.
GIGABIT ETHERNET
The need for an even higher data rate resulted in the design of the Gigabit
Ethernet Protocol (1000 Mbps).
10-Gigabit Ethernet
Ethernet can be used as a LAN and a metropolitan area network(MAN).
10 Gigabit Ethernet design can be summarized as upgrading the data rate to 10 Gbps.
Interconnection of LANs, MANs, and WANs.
The data rate is possible only with fiber-optic technology.
10 Gigabit Ethernet operates only in full-duplex mode.
10GBase-SR, 10GBase-LR, 10GBase- EW, and 10GBase-X4.
A single-layer protocol
• OSI Model
• TCP-IP Model
An open system is a set of protocols that allows any two different systems to communicate
regardless of their underlying architecture.
• ISO is the organization
• An ISO standard that covers all aspects of network communications is the Open Systems
Interconnection (OSI) model.
• OSI is the model.
The OSI model is a layered framework for the design of network systems that allows
communication between all types of computer systems.
• Interfaces.
• Protocols.
• Ease of deployment
• Speed of deployment
• Decreased dependence on
infrastructure
What is it? In infrastructure mode, the communication In ad-hoc mode, each node communicates directly
occurs only between the wireless nodes and with other nodes, so no access point control is
access points (AP) , but not directly between needed.
wireless nodes
External Access points acts as a bridge to other Nodes in Ad-hoc can communicate if they are within
Communication wireless/wired network the same range.
Complexity Designing is simple as most of the network As no central co-ordination exists, we need to use
functionality lies within AP and client is just a decentralized MAC protocols such as CSMA/CA,
simple machine. with all nodes having same functionality. This
shoots up the complexity and cost.
When it can’t be It can’t be used in critical situations like It is not always fully connected as two mobile nodes
used: disaster relief where no infrastructure is left. may temporarily be out of range.
Applications IEEE 802.11 & HIPERLAN2 are based on Bluetooth is a typical ad-hoc network.
infrastructure mode.
• The data link layer break up the bit stream of data into discrete frames.
• It compute a short token called a checksum for each frame, and include
the checksum in the frame when it is transmitted.
• When a frame arrives at the destination, the receiver recomputes the
checksum based on the received frame.
• If the newly computed checksum is different from the one contained in the
frame
• The data link layer knows that an error has occurred and takes steps to
deal with it (e.g., discarding the bad frame and possibly also sending back
an error report).
• flag is added at the beginning and the end of a frame. The flag, composed of protocol
dependent special characters, signals the start or end of a frame.
• Problem - Any pattern used for the flag could also be part of the information. If this happens,
the receiver, when it encounters this pattern in the middle of the data, thinks it has reached the
end of the frame.
• Solution - To fix this problem, a byte-stuffing strategy was added to character-oriented
framing.
• A special byte is added to the data section of the frame when there is a character with the same
pattern as the flag.
• The data section is stuffed with an extra byte.
• This byte is usually called the escape character (ESC) and has a predefined bit pattern.
• Whenever the receiver encounters the ESC character, it removes it from the data section and
treats the next character as data, not as a delimiting flag.
Unit I : Introduction to Physical Layer and Data Link Layer 69
BTECCE21503: Computer Networks
Framing
• Bit Oriented Framing
It use a special 8-bit pattern flag, 01111110, as the delimiter to define the beginning and
end of the frame.
A sender that systematically wants to transmit frames faster than the receiver can accept
them.
Flow control deals with throttling the speed of the sender to match that of the receiver.
Two Approaches:
• The data link layer adds reliability to the physical layer by adding mechanisms to detect and
retransmit damaged or lost frames. It also uses a mechanism to recognize duplicate frames.
• Error control is normally achieved through a trailer added to the end of the frame. It contains
the error detection and error correction bits.
In error correction, we need to know the exact number of bits that are corrupted and, more
importantly, their location in the message
• Error detection uses the concept of redundancy, which means adding extra bits for detecting
errors at the destination
• Hamming Codes
• The Hamming distance between two words (of the same size) is the number of
differences between the corresponding bits.
• We show the Hamming distance between two words x and y as d(x, y).
• The Hamming distance can easily be found if wc apply the XOR operation ( ) on the
two words and count the number of 1’s in the result.
• For example, if the codeword 00000 is sent and 01101 is received, 3 bits are in error
and the Hamming distance between the two is d(00000, 01101) = 3.
• In other words, if the Hamming distance between the sent and the received codeword
is not zero, the codeword has been corrupted during transmission.
• When two or more devices are connected to the same link, data link layer
protocols are necessary to determine which device has control over the link at
any given time.