0% found this document useful (0 votes)
12 views34 pages

ITN Module 6

Module 6 of the Introduction to Networks course focuses on the Data Link Layer, detailing its purpose, topologies, and frame structure. It covers key concepts such as media access control, the functions of the LLC and MAC sublayers, and various network topologies including point-to-point and hub-and-spoke. The module also includes interactive activities and assessments to reinforce learning and gauge understanding.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views34 pages

ITN Module 6

Module 6 of the Introduction to Networks course focuses on the Data Link Layer, detailing its purpose, topologies, and frame structure. It covers key concepts such as media access control, the functions of the LLC and MAC sublayers, and various network topologies including point-to-point and hub-and-spoke. The module also includes interactive activities and assessments to reinforce learning and gauge understanding.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 34

Module 6: Data Link Layer

Instructor Materials

Introduction to Networks v7.0


(ITN)
Instructor Materials – Module 6 Planning Guide
This PowerPoint deck is divided in two parts:
• Instructor Planning Guide
• Information to help you become familiar with the module
• Teaching aids
• Instructor Class Presentation
• Optional slides that you can use in the classroom
• Begins on slide # 9
Note: Remove the Planning Guide from this presentation before sharing with anyone.
For additional help and resources go to the Instructor Home Page and Course
Resources for this course. You also can visit the professional development site on
netacad.com, the official Cisco Networking Academy Facebook page, or Instructor
Only FB group.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
What to Expect in this Module
 To facilitate learning, the following features within the GUI may be included in this module:
Feature Description

Animations Expose learners to new skills and concepts.


Expose learners to new skills and concepts.
Videos
Check Your Per topic online quiz to help learners gauge content understanding.
Understanding(CYU)

Interactive Activities A variety of formats to help learners gauge content understanding.


Small simulations that expose learners to Cisco command line to practice
Syntax Checker configuration skills.
Simulation and modeling activities designed to explore, acquire, reinforce, and
PT Activity expand skills.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
What to Expect in this Module (Cont.)
 To facilitate learning, the following features may be included in this module:

Feature Description
Hands-On Labs Labs designed for working with physical equipment.
Class Activities These are found on the Instructor Resources page. Class Activities are
designed to facilitate learning, class discussion, and collaboration.
Self-assessments that integrate concepts and skills learned throughout the
Module Quizzes series of topics presented in the module.
Module Summary Briefly recaps module content.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
Check Your Understanding

• Check Your Understanding activities are designed to let students quickly determine if they
understand the content and can proceed, or if they need to review.
• Check Your Understanding activities do not affect student grades.

• There are no separate slides for these activities in the PPT. They are listed in the notes area of the
slide that appears before these activities.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
Module 6: Activities
What activities are associated with this module?

Page # Activity Type Activity Name Optional?

6.1.5 Check Your Understanding Purpose of the Data Link Layer Recommended

6.2.9 Check Your Understanding Topologies Recommended

6.3.5 Check Your Understanding Data Link Frame Recommended

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
Module 6: Best Practices
Prior to teaching Module 6, the instructor should:
• Review the activities and assessments for this module.
• Try to include as many questions as possible to keep students engaged during classroom
presentation.
Topic 6.1
• Ask the students or have a class discussion
• Discuss the functions of the data link layer.
• What would be the consequences on upper layer protocols if there was no data link layer?
Topic 6.2
• Ask the students or have a class discussion
• What type of logical topology do they use on their home network?
• Why is CSMA/CA more appropriate than CSMA/CD for wireless networks?
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
Module 6: Best Practices (Cont.)

Topic 6.3
• Ask the students or have a class discussion
• Discuss the function of the six frame fields.
• What is the Layer 2 address of their personal computer or laptop?

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
Module 6: Data Link Layer
Introduction to Networks v7.0
(ITN)
Module Objectives
Module Title: Data Link Layer

Module Objective: Explain how media access control in the data link layer supports
communication across networks.

Topic Title Topic Objective


Purpose of the Data Link Layer Describe the purpose and function of the data link layer
in preparing communication for transmission on specific
media.

Topologies Compare the characteristics of media access control


methods on WAN and LAN topologies.

Data Link Frame Describe the characteristics and functions of the data
link frame.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
6.1 Purpose of the Data Link
Layer

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
Purpose of the Data Link Layer
The Data Link Layer
• The Data Link layer is responsible for
communications between end-device
network interface cards.
• It allows upper layer protocols to access
the physical layer media and
encapsulates Layer 3 packets (IPv4
and IPv6) into Layer 2 Frames.
• It also performs error detection and
rejects corrupts frames.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
Purpose of the Data Link Layer
IEEE 802 LAN/MAN Data Link Sublayers
IEEE 802 LAN/MAN standards are specific to
the type of network (Ethernet, WLAN, WPAN,
etc).

The Data Link Layer consists of two


sublayers. Logical Link Control (LLC) and
Media Access Control (MAC).
• The LLC sublayer communicates
between the networking software at the
upper layers and the device hardware at
the lower layers.
• The MAC sublayer is responsible for
data encapsulation and media access
control.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
Purpose of the Data Link Layer
IEEE 802 LAN/MAN Data Link Sublayers
IEEE 802 LAN/MAN standards are specific to
the type of network (Ethernet, WLAN, WPAN,
etc).

The Data Link Layer consists of two


sublayers. Logical Link Control (LLC) and
Media Access Control (MAC).
• The LLC sublayer communicates
between the networking software at the
upper layers and the device hardware at
the lower layers.
• The MAC sublayer is responsible for
data encapsulation and media access
control.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
Purpose of the Data Link Layer
Providing Access to Media
Packets exchanged between nodes may experience numerous data
link layers and media transitions.

At each hop along the path, a router performs four basic Layer 2
functions:
• Accepts a frame from the network medium.
• De-encapsulates the frame to expose the encapsulated packet.
• Re-encapsulates the packet into a new frame.
• Forwards the new frame on the medium of the next network segment.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
Purpose of the Data Link Layer
Data Link Layer Standards
Data link layer protocols are
defined by engineering
organizations:
• Institute for Electrical and
Electronic Engineers (IEEE).
• International Telecommunications
Union (ITU).
• International Organizations for
Standardization (ISO).
• American National Standards
Institute (ANSI).

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
6.2 Topologies

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
Topologies
Physical and Logical Topologies

The topology of a network is the arrangement and relationship of the network


devices and the interconnections between them.

There are two types of topologies used when describing networks:


• Physical topology – shows physical connections and how devices are
interconnected.
• Logical topology – identifies the virtual connections between devices
using device interfaces and IP addressing schemes.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
Topologies
WAN Topologies

There are three common physical WAN topologies:


• Point-to-point – the simplest and most common WAN topology. Consists of
a permanent link between two endpoints.
• Hub and spoke – similar to a star topology where a central site
interconnects branch sites through point-to-point links.
• Mesh – provides high availability but requires every end system to be
connected to every other end system.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
Topologies
Point-to-Point WAN Topology

• Physical point-to-point topologies directly connect two nodes.


• The nodes may not share the media with other hosts.
• Because all frames on the media can only travel to or from the two
nodes, Point-to-Point WAN protocols can be very simple.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
Topologies
LAN Topologies
End devices on LANs are typically
interconnected using a star or extended
star topology. Star and extended star
topologies are easy to install, very scalable
and easy to troubleshoot.

Early Ethernet and Legacy Token Ring


technologies provide two additional
topologies:
• Bus – All end systems chained
together and terminated on each end.
• Ring – Each end system is connected
to its respective neighbors to form a
ring.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
Topologies
Half and Full Duplex Communication

Half-duplex communication
• Only allows one device to send or receive at a time on a shared medium.
• Used on WLANs and legacy bus topologies with Ethernet hubs.

Full-duplex communication
• Allows both devices to simultaneously transmit and receive on a shared medium.
• Ethernet switches operate in full-duplex mode.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
Topologies
Access Control Methods

Contention-based access
All nodes operating in half-duplex, competing for use of the medium. Examples are:
• Carrier sense multiple access with collision detection (CSMA/CD) as used on legacy
bus-topology Ethernet.
• Carrier sense multiple access with collision avoidance (CSMA/CA) as used on
Wireless LANs.

Controlled access
• Deterministic access where each node has its own time on the medium.
• Used on legacy networks such as Token Ring and ARCNET.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
Topologies
Contention-Based Access – CSMA/CD

CSMA/CD
• Used by legacy Ethernet LANs.
• Operates in half-duplex mode where only one device sends or receives at a time.
• Uses a collision detection process to govern when a device can send and what
happens if multiple devices send at the same time.

CSMA/CD collision detection process:


• Devices transmitting simultaneously will result in a signal collision on the shared
media.
• Devices detect the collision.
• Devices wait a random period of time and retransmit data.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
Topologies
Contention-Based Access – CSMA/CA

CSMA/CA
• Used by IEEE 802.11 WLANs.
• Operates in half-duplex mode where only one device sends or receives at a time.
• Uses a collision avoidance process to govern when a device can send and what
happens if multiple devices send at the same time.

CSMA/CA collision avoidance process:


• When transmitting, devices also include the time duration needed for the
transmission.
• Other devices on the shared medium receive the time duration information and know
how long the medium will be unavailable.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
6.3 Data Link Frame

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
Data Link Frame
The Frame
Data is encapsulated by the data link layer with a header and a trailer to form a frame.
A data link frame has three parts:
• Header
• Data
• Trailer
The fields of the header and trailer vary according to data link layer protocol.

The amount of control information carried with in the frame varies according to access
control information and logical topology.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
Data Link Frame
Frame Fields

Field Description
Frame Start and Stop Identifies beginning and end of frame
Addressing Indicates source and destination nodes
Type Identifies encapsulated Layer 3 protocol
Control Identifies flow control services
Data Contains the frame payload
Error Detection Used for determine transmission errors

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
Data Link Frame
Layer 2 Addresses
• Also referred to as a physical address.
• Contained in the frame header.
• Used only for local delivery of a frame on the link.
• Updated by each device that forwards the frame.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
Data Link Frame
LAN and WAN Frames

The logical topology and physical media determine the data link
protocol used:
• Ethernet
• 802.11 Wireless
• Point-to-Point (PPP)
• High-Level Data Link Control (HDLC)
• Frame-Relay

Each protocol performs media access control for specified logical


topologies.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
6.4 Module Practice and Quiz

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
Module Practice and Quiz
What did I learn in this module?
• The data link layer of the OSI model (Layer 2) prepares network data for the physical network.
• The data link layer is responsible for network interface card (NIC) to network interface card
communications.
• The IEEE 802 LAN/MAN data link layer consists of the following two sublayers: LLC and MAC.
• The two types of topologies used in LAN and WAN networks are physical and logical.
• Three common types of physical WAN topologies are: point-to-point, hub and spoke, and mesh.
• Half-duplex communications exchange data in one direction at a time. Full-duplex sends and
receives data simultaneously.
• In contention-based multi-access networks, all nodes are operating in half-duplex.
• Examples of contention-based access methods include: CSMA/CD for bus-topology Ethernet
LANs and CSMA/CA for WLANs.
• The data link frame has three basic parts: header, data, and trailer.
• Frame fields include: frame start and stop indicator flags, addressing, type, control, data, and error
detection.
• Data link addresses are also known as physical addresses.
• Data link addresses are only used for link local delivery of frames.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
Module 6: Data Link Layer
New Terms and Commands
• Logical Link Control (LLC) • Cyclic Redundancy Check (CRC)
• Medial Access Control (MAC) • Contention-based access
• Institute of Electrical and Electronic • Controlled access
Engineers (IEEE)
• International Telecommunications Union
(ITU)
• International Organization for
Standardization (ISO)
• American National Standards Institute
(ANSI)
• Physical Topology
• Logical Topology
• Half-duplex
• Full-duplex
• CSMA/CD
• CSMA/CA
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33

You might also like