0% found this document useful (0 votes)
3 views3 pages

Data Link Layer

The data link layer is the second layer of the OSI model, responsible for framing, error detection and correction, flow control, and managing access to the physical network medium. It ensures reliable data transmission between directly connected nodes and employs techniques like parity checks, CRC, and Hamming code for error management. Additionally, it includes MAC protocols such as ALOHA and CSMA/CD to efficiently manage data transmission and reduce collisions.

Uploaded by

Ahmad ullah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views3 pages

Data Link Layer

The data link layer is the second layer of the OSI model, responsible for framing, error detection and correction, flow control, and managing access to the physical network medium. It ensures reliable data transmission between directly connected nodes and employs techniques like parity checks, CRC, and Hamming code for error management. Additionally, it includes MAC protocols such as ALOHA and CSMA/CD to efficiently manage data transmission and reduce collisions.

Uploaded by

Ahmad ullah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Data Link Layer: The data link layer is the second layer in the Open Systems Interconnection

(OSI) model, responsible for transforming raw data into frames and managing the physical
link between two directly connected nodes.

●​ It's concerned with local delivery of frames between nodes on the same network
segment, not inter-network routing or global addressing, which are handled by
higher layers.

●​ It provides the functional and procedural means to transfer data between network
entities and may also provide the means to detect and possibly correct errors that
can occur in the physical layer.

Services Provided:

●​ Framing:

The data link layer encapsulates data into frames by adding headers and trailers, which
include information like destination and source addresses, and error-checking fields.

●​ Error Detection and Correction:

It implements mechanisms to detect and, in some cases, correct errors that may occur
during transmission, ensuring reliable data delivery.

●​ Flow Control:

The data link layer manages the flow of data to prevent the sender from overwhelming the
receiver, ensuring efficient and reliable communication.

●​ Medium Access Control (MAC):

It manages access to the shared physical network medium, arbitrating between multiple
devices trying to transmit data, like Ethernet's MAC protocol.

●​ Addressing:

It uses physical (MAC) addresses to identify network devices on the same network segment,
enabling proper frame delivery.

●​ Link Management:

The data link layer manages the establishment, maintenance, and termination of
connections between network nodes.

●​ Data Rate Control:

It regulates the rate at which data is transmitted over the physical link, ensuring
compatibility and efficient communication.
At the data link layer, error detection and correction ensure data integrity during
transmission. Techniques include Parity (detects single-bit errors), CRC (detects multiple-bit
errors), and Hamming code (detects and corrects single-bit errors).

Error Detection and Correction at the Data Link Layer

●​ Purpose:

The data link layer is responsible for ensuring reliable transmission of data between two
directly connected nodes. Error detection and correction techniques are crucial for
identifying and potentially fixing errors that may occur during transmission.

●​ Error Detection:

This involves checking whether any errors have occurred during transmission.

●​ Error Correction:

This goes a step further by not only detecting errors but also identifying the location of the
errors, allowing for their correction.

Common Error Detection and Correction Techniques

●​ Parity Check:

●​ How it works: A parity bit is added to each data block, making the total
number of 1s either even (even parity) or odd (odd parity). The receiver
checks the parity of the received data block; if it doesn't match the expected
parity, an error is detected.

●​ Limitations: Parity checks can only detect single-bit errors and cannot correct
them.

●​ Cyclic Redundancy Check (CRC):

●​ How it works: CRC uses a mathematical algorithm (polynomial division) to


generate a checksum (a short code) based on the data block. The checksum is
appended to the data block and sent along with the data. The receiver
performs the same calculation and compares the calculated checksum with
the received checksum to detect errors.

●​ Advantages: CRC is more robust than parity checks and can detect a wider
range of errors, including burst errors.

●​ Hamming Code:

●​ How it works: Hamming codes add redundant bits (parity bits) to the data
block to enable both error detection and correction. The receiver can use the
parity bits to identify the location of the error and correct it.
●​ Advantages: Hamming codes can detect and correct single-bit errors.

●​ Medium Access Control (MAC):

●​ MAC protocols are mechanisms that allow multiple users or transmitters to


access a shared medium or channel.

●​ They are crucial for both wired and wireless networks, enabling efficient and
reliable data transmission.

●​ MAC protocols are implemented in the data link layer of the OSI model.

●​ ALOHA:

●​ ALOHA is a simple, random access protocol where nodes transmit data


packets whenever they have data to send, without prior coordination.

●​ If multiple nodes transmit simultaneously, a collision occurs, and the affected


packets are lost.

●​ ALOHA is simple to implement but can be inefficient, especially in high-traffic


environments.

●​ Slotted ALOHA: A variation of ALOHA where transmissions are synchronized


into time slots, reducing the probability of collisions.

●​ CSMA (Carrier Sense Multiple Access):

●​ CSMA is a protocol where nodes listen to the channel before transmitting,


ensuring it's free.

●​ If the channel is busy, the node defers its transmission until the channel
becomes idle.

●​ This helps to reduce collisions compared to ALOHA.

●​ CSMA/CD (Carrier Sense Multiple Access with Collision Detection):

●​ CSMA/CD is an extension of CSMA that includes collision detection.

●​ If a collision occurs during transmission, the nodes detect it and stop


transmitting.

●​ After a collision, nodes wait a random amount of time before attempting to


retransmit, reducing the likelihood of further collisions.

●​ CSMA/CD is commonly used in wired Ethernet networks

You might also like