0% found this document useful (0 votes)
121 views97 pages

DCN - 3 - Introduction To Data Link Layer

The document discusses addressing and communication at different layers in TCP/IP, with a focus on the physical and data link layers. It provides details on: - The four levels of addresses used in TCP/IP - physical, logical, port, and specific. - How communication occurs physically between devices at the physical layer by transmitting signals. - How the data link layer establishes communication between nodes by organizing data into frames and addressing devices using MAC addresses. It also provides services like error checking to the network layer.

Uploaded by

Shiza Sahoo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
121 views97 pages

DCN - 3 - Introduction To Data Link Layer

The document discusses addressing and communication at different layers in TCP/IP, with a focus on the physical and data link layers. It provides details on: - The four levels of addresses used in TCP/IP - physical, logical, port, and specific. - How communication occurs physically between devices at the physical layer by transmitting signals. - How the data link layer establishes communication between nodes by organizing data into frames and addressing devices using MAC addresses. It also provides services like error checking to the network layer.

Uploaded by

Shiza Sahoo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 97

•Layer 2 and MAC address

Related Chapter _9,13,24


•CLO-2
• Implement four addressing schemes used at
different layers of TCP/IP
Addresing
Figure in in TCP/IP
-2 Addresses in TCP/IP
• We already know that
– Another concept related to protocol layering in the Internet, addressing.
– Four levels of addresses are used in an internet employing the TCP/IP protocols: physical, logical, port, and specific.
Relationship of layers and addresses in TCP/IP
•Layers in the TCP/IP Protocol Suite
•TCP/IP Protocol Stack

Provide application program


HTTP, Telnet, FTP
Application layer network interfaces
TFTP, Ping

Transport layer Establish terminal to terminal


TCP/UDP
connection
Addressing and route selecting
Network layer IP

Data link layer Ethernet, 802.3, PPP Physical media access

Physical layer Interfaces, wires Binary data flow transmission


Communication at the physical layer
 Revision is as under:
 Figure shows a scenario in which a scientist working in a
research company, Sky Research, needs to order a book
from an online bookseller, Scientific Books.
 We can think of five different levels of communication
between Alice (the computer on which our scientist is
working ) , and Bob (the computer that provides online
service ).
 Communication at application, transport, network, or data-
link is logical.
 Communication at the physical layer is physical.
Communication at the physical layer
 For simplicity, we have shown only
 host-to-router
 router-to-router
 and router-to-host
 but the switches are also involved in the physical communication.

 Although Alice and Bob need to exchange data, communication at


the physical layer means exchanging signals.

 Data need to be transmitted and received, but the media have to


change data to signals. Both data and the signals that represent
them can be either analog or digital in form.
•Physical layer

Note

The physical layer is responsible for movements of


individual bits from one hop (node) to the next.
•Physical layer

To be transmitted,
data must be transformed to electromagnetic signals.

•11
•Physical Layer
 The physical layer defines the means of transmitting raw bits rather than
logical data packets over a physical link connecting network nodes.

 The bit stream may be grouped into code words or symbols and
converted to a physical signal that is transmitted over a hardware
transmission medium.

 The physical layer provides an electrical, mechanical, and procedural interface


to the transmission medium.

 The shapes and properties of the electrical connectors, the


frequencies to broadcast on, the modulation scheme to use and
similar low-level parameters, are specified here.
•Limitations of Physical Layer

• Cannot organize streams of bits.

• Cannot name or identify computers.

• Cannot communicate with the upper-level layers.

• Cannot decide which computer will transmit binary data.


• Detail of Physical Layer
…………………………………………………Later………
Introduction to Data-Link Layer
Introduction to Data-Link Layer
• TCP/IP protocol suite does not define any protocol in the
data-link layer or physical layer.

• These two layers are territories of networks that when


connected make up the Internet. These networks (wired or
wireless) provide services to the upper three layers of the
TCP/IP suite.

• Hence we can safely say that there are several standard


protocols in the market today.
9.1 INTRODUCTION
• The Internet is a combination of networks
glued together by connecting devices (routers or
switches).

• If a packet is to travel from a host to another host, it


needs to pass through these networks.
9.1 INTRODUCTION
• Figure shows the same scenario discussed earlier ,
(but now we are interested in communication at the
data-link layer).
1.Communication at the data-link layer is made up of
five separate logical connections between the data-
link layers in the path.
9.1 INTRODUCTION
2. The data-link layer at Alice’s computer
communicates with the data-link layer at router
R2.
3. The data-link layer at router R2 communicates with
the data-link layer at router R4, and so on.

4. Data-link layer at router R7 communicates with the


data-link layer at Bob’s computer.
9.1 INTRODUCTION
5. Only one data-link layer is involved at the source or the
destination, but two data-link layers are involved at each
router.
6. The reason is that Alice’s and Bob’s computers are each
connected to a single network, but each router takes input
from one network and sends output to another network.
7. Note
– Although switches are also involved in the data-link-layer
communication, for simplicity we have not shown them in the
figure.
9.1.1 Nodes and Links
• Communication at the data-link layer is node-to-node.
• A data unit from one point in the Internet needs to pass
through many networks (LANs and WANs) to reach another
point.
• Theses LANs and WANs are connected by routers.
• It is customary to refer to the two end hosts and the
routers as nodes and the networks in between as links.
• Figure 9.2 is a simple representation of links and nodes
when the path of the data unit is only six nodes.
9.1.1 Nodes and Links
• First node is the source host and the last node is the destination host.
• Other four nodes are four routers.
• First, Third, and Fifth links represent three LANs.
• Second and the fourth links represent two WANs.
9.1.2 Services
• Data-link layer is located between the physical and
the network layers.
• Datalink layer provides services to the network
layer; it receives services from the physical layer.
Note

The data link layer is responsible for moving


frames from one hop (node) to the next.
9.1.2 Services
 The main tasks of the data link layer are:
 Transfer data from the network layer of one machine to
the network layer of another machine using hop by hop
transmission over single links (single segments).
 Convert the raw bit stream of the physical layer into
groups of bits (“frames”) and vice versa

Datagram
Frame
Electrical and
Optical signals
9.1.2 Services
Relationship between packets and frames.
9.1.2 Services
• Provide service interface to the network layer
• Access control
• Resolve how multiple nodes share the same data channel
• Framing
– A packet at the data-link layer is normally called a frame.
– Layer 2 uses framing to organize or group the bits.
– Determines how the bits of the physical layer are grouped into
frames (framing).
• Physical addressing (MAC address)
• Layer 2 uses an addressing process to identify computers.
9.1.2 Services
• Flow control
• pacing between adjacent sending and receiving nodes
• Constrain sender from overwhelming receiver
• Regulating data flow
• Slow receivers not swamped by fast senders
• Error control
• Dealing with transmission errors
• Adding error detection/correction bits
• Detect error, correct error
• errors caused by signal attenuation, noise
• receiver detects presence of errors:

Data Link Layer

• Home Work-3.1 :
– Why we are having error checking at Transport Layer
(End to end ) when error checking is also there at Data
link Layer (Hop to hop) ?

•Networks: Data Link Layer •30


End to End
ACK/NAK

1 2 3 4 5

Data Data Data Data

Hop to Hop

Data Data Data Data


1 2 3 4 5
ACK/ ACK/ ACK/ ACK/
NAK NAK NAK NAK
•Hop-by-Hop Transport

Argon Neon

•The actual path


•followed by data

Data Link Hop


Single Segment
•Data Link Layer
• Datagram transferred by different link protocols over
different links:
 e.g., Ethernet (802.3) on first link, frame relay on
intermediate links, WiFi (802.11) on last link

• Each link protocol provides different services


•Hop-to-hop delivery for data link layer

•Example device:
•Ethernet switch/hub
•WiFi access point
•9.1.3 Two Categories of Links
• Although two nodes are physically connected by a transmission
medium such as cable or air, we need to remember that the data-link
layer controls how the medium is used.

• We can have a data-link layer that uses the whole capacity of the
medium; we can also have a data-link layer that uses only part of
the capacity of the link.

• In other words, we can have a point-to-point link or a broadcast link.

•35
•9.1.3 Two Categories of Links
• In a point-to-point link, the link is dedicated to the two
devices.
– For example, when two friends use the traditional home phones to
chat, they are using a point-to-point link.

• In a broadcast link, the link is shared between several pairs


of devices.
– For example , when the same two friends use their cellular phones,
they are using a broadcast link (the air is shared among many cell
phone users).

•36
•9.1.4 Two Sub layers
• To better understand the functionality of and the
services provided by the link layer, we can divide
the data-link layer into two sub layers:
– Data link control (DLC)
– Media Access control (MAC).

• Both SubLayers (DLC and MAC sublayers) will be discussed later.


•Note for LAN
• This is not unusual because, as we will see later, LAN
protocols actually use the same strategy.

• Data link control (DLC) sub layer deals with all issues
common to both point-to-point and broadcast links.

• Media access control (MAC) sub layer deals only with


issues specific to broadcast links.

•Networks: Data Link Layer •38


Sub Layers of Data Link Layer in different
LAN standards
1. In IEEE 802 LANs:
– the data link layer is described in two sub layers:
1. Media access control (MAC)
2. Logical link control (LLC)
2. In ITU-T G.hn standard
– It provides a way to create a high-speed (up to 1 Gigabit/s) LAN for the
transmission of video, audio and data using existing home wiring (power lines,
phone lines and coaxial cables)
– the data link layer is divided into three sub-layers
1. Application protocol convergence
2. Logical link control
3. and media access control
•9.2 LINK-LAYER ADDRESSING
• We will discuss IP addresses as the identifiers at the
network layer that define the exact points in the Internet
where the source and destination hosts are connected.

• But only IP Address is not


sufficient………????

•40
•Why IP address is not sufficient ?
• In a connectionless internetwork (such as the Internet),
we cannot make a datagram reach its destination using
only IP addresses. The two reasons are :

1. Each datagram in the Internet, from the same source


host to the same destination host, may take a different
path.
• The source and destination IP addresses define the two ends but
cannot define which links the datagram should pass through

•41
•Why IP address is not sufficient ?
2. IP addresses in a datagram should not be changed.
• If the destination IP address in a datagram changes,
the packet never reaches its destination .
• Further if the source IP address in a datagram
changes, the destination host or a router can never
communicate with the source if a response needs to
be sent back or an error needs to be reported back to
the source (sometimes in some Protocols).

•Networks: Data Link Layer •42


•Why IP address is not sufficient ?
• We need another addressing mechanism in a connectionless
internetwork: the link-layer addresses of the two nodes.

• Different names of a link-layer address


– Link address
– Physical address
– MAC address.
– Some more

•Networks: Data Link Layer •43


•LAN Address (more)
• MAC address allocation administered by IEEE
manufacturer buys portion of MAC address space (to assure
uniqueness)
• Analogy:
– MAC address: like Social Security Number
– IP address: like postal address

•5-44
•MAC Address vs. IP Address
• MAC addresses
– Hard-coded in read-only memory when adaptor is built
– Like a social security number
– Flat name space of 48 bits (e.g., 00-0E-9B-6E-49-76)
– Portable, and can stay the same as the host moves (can move LAN card from one LAN to
another )
– Used to get packet between interfaces on same network
• IP addresses
– Configured, or learned dynamically
– Like a postal mailing address
– Hierarchical (not portable ) name space of 32 bits (e.g., 12.178.66.9) and depends on IP
subnet to which node is attached
– Not portable, and depends on where the host is attached
– Used to get a packet to destination IP subnet
•MAC Address vs. IP Address
• One can think of IP addressing as supporting the
software implementation and MAC addresses as
supporting the hardware implementation of the network
stack.

• The MAC address generally remains fixed and follows


the network device, but the IP address changes as the
network device moves from one network to another.

•46
•MAC Address vs. IP Address
• IP networks maintain a mapping (association) between
the IP address of a device and its MAC address.
– This mapping is known as the ARP cache or ARP table.
– ARP, the Address Resolution Protocol, supports the logic for
obtaining this mapping and keeping the cache up to date.

• DHCP also usually relies on MAC addresses to manage the


unique assignment of IP addresses to devices.

•Networks: Data Link Layer •47


•Three Types of addresses
• Some link-layer protocols define three types of
addresses:
– Unicast Address
– Multicast Address
– Broadcast Address

•48
•Three Types of addresses
• Unicast Address
– Each host or each interface of a router is assigned a
unicast address.
– Unicasting means one-to-one communication.
– A frame with a unicast address destination is destined
only for one entity in the link.

•Networks: Data Link Layer •49


•Three Types of addresses
• Multicast Address
– Some link-layer protocols define multicast addresses.
Multicasting means one-to-many communication.
However, the jurisdiction is local (inside the link).
• Broadcast Address
– Some link-layer protocols define a broadcast address.
Broadcasting means one-to-all communication. A frame
with a destination broadcast address is sent to all entities
in the link

•Networks: Data Link Layer •50


IP addresses and link-layer addresses in a small internet

• Since a link is controlled at the data-link layer, the addresses


need to belong to the data-link layer.

• When a datagram passes from the network layer to the data-


link layer, the datagram will be encapsulated in a frame and
two data-link addresses are added to the frame header.

• These two addresses are changed every time the frame moves
from one link to another

•Networks: Data Link Layer •51


•IP addresses and link-layer addresses in a small internet

•Networks: Data Link Layer •52


•IP addresses and link-layer addresses in a small internet

• In the internet in Figure , we have


– Three links
– Two routers.
– Two hosts: Alice (source) and Bob (destination).
• For each host, Two addresses are shown,
– IP addresses (N)
– link-layer addresses (L).
• Note
– A router has as many pairs of addresses as the number of links the
router is connected to.

•Networks: Data Link Layer •53


•IP addresses and link-layer addresses in a small internet

• We have shown three frames, one in each link.


• Each frame carries the same datagram with the same
source and destination addresses (N1 and N8), but the
link-layer addresses of the frame change from link to
link.
– In link 1, the link-layer addresses are L1 and L2.
– In link 2, they are L4 and L5.
– In link 3, they are L7 and L8.

•Networks: Data Link Layer •54


•IP addresses and link-layer addresses in a small internet

• Design of datagrams and frames:


• IP addresses and the link-layer addresses are not in the same
order.
– The datagrams and frames are designed in this way, and we
follow the design.
– For IP addresses
• source address comes before the destination address
– For link-layer addresses
• destination address comes before the source.

•Networks: Data Link Layer •55


MAC ADDRESSING
• MAC addresses uniquely identify a computer on the LAN.
• MAC is an essential component required for network protocols
like TCP/IP to function.
• Computer operating systems and broadband routers support
viewing and sometimes changing MAC addresses.
• Some ISPs track their customers by MAC address.

•Networks: Data Link Layer •57


•MAC (Media Access Control ) address
• Every computer has a unique way of identifying itself :
– MAC address or physical address.
• A (MAC address) is a unique identifier assigned to network
interfaces for communications on the physical network segment.
• MAC addresses are used as a network address for most IEEE 802
network technologies, including Ethernet and WiFi
• Physical address is located on the Network Interface Card (NIC).
•MAC (Media Access Control ) address and How ?
• MAC addresses are 12-digit (48-bit) hexadecimal
numbers(0-9, plus A-F, capitalized).
• MAC addresses are written in hexadecimal, so each octet
goes from 0 (00) to 255 (FF), for a total of
281474976710656 (~281.5 trillion) possible combinations.
This is more than 56,000 MAC addresses for each person
on the planet…………….(How ….?????)
•MAC (Media Access Control ) address
• This address assignment policy (using flat
addressing) will inevitably lead to some wastage -
but even so, there are likely to be enough addresses
for ever computer, piece of networking equipment
and a large number of household/office devices
(heating systems, ovens, washing machines, fridges,
drinks dispensers, security alarms, video
recorders, ...) which could in the future be internet
enabled!!!
•MAC address
• One Convention :
– The standard (IEEE 802) format for printing MAC-48 addresses in human-friendly
form is six groups of two hexadecimal digits, separated by hyphens (-) or colons
(:), in transmission order
– (e.g. 01-23-45-67-89-ab   or   01:23:45:67:89:ab ).
• MM:MM:MM:SS:SS:SS
• MM-MM-MM-SS-SS-SS
• Another convention
– It used by networking equipment uses three groups of four hexadecimal digits
separated by dots (.) (e.g. 0123.4567.89ab ), again in transmission order
– MMM.MMM.SSS.SSS

• 0000.0c12.3456 .
•MAC address format
• MAC addresses are sometimes referred to as
burned-in addresses (BIAs) .

• MAC addresses are burned into read-only memory


(ROM) and are copied into random-access memory
(RAM) when the NIC initializes.
•MAC address format

The first six hexadecimal


The remaining six
digits, which are administered
hexadecimal digits comprise
by the IEEE, identify the
the interface serial number.
manufacturer or vendor.
•Example
• MAC address is composed of 48 bits. The vendor ID of Huawei products is
0x00e0fc.

24 bits 24 bits

Vender Code Serial Number

00e0.fc01.2345 00e0.fc01.2345

Rom

Ram
•Example
• Who is manufacturer of , 00:A0:C9:14:C8:29 ?

• Answer:
– The prefix 00A0C9 indicates the manufacturer is Intel
Corporation

•Networks: Data Link Layer •65


•Windows 8 - Finding the IP Number and MAC Address of a
Network Card
1. Press the Windows Start key to open the Start screen.
2. Type cmd and press Enter to launch the command prompt.
3. Type ipconfig /all at the command prompt to check the network card settings.
•Windows 8 - Finding the IP Number and MAC
Address of a Network Card
4. The IP number and MAC address are listed under the
appropriate adapter as Physical Address and IPv4 Address
•Using MAC addresses

Data A D Data A D Data A D Data A D

Destination Address
Source Address
•Technologies Using MAC-48 Identifier

• Technologies using MAC-48 identifier format:


– Ethernet
– 802.11 wireless networks
– Bluetooth
– IEEE 802.5 token ring
– most other IEEE 802 networks
– Fiber Distributed Data Interface (FDDI)
– Asynchronous Transfer Mode (ATM), switched
virtual connections only
– Many more……
•Ethernet MAC Address
• Each computer network interface card is allocated a
globally unique 6 byte address when the factory
manufactures the card (stored in a PROM). This is the
normal source address used by an interface.

• A computer sends all packets which it creates with its


own hardware source address, and receives all packets
which match its hardware address or the broadcast
address.
•Note

•The least significant bit of the first byte


defines the type of address.
If the bit is 0, the address is unicast;
otherwise, it is multicast.
•Note

•The broadcast destination address is a


special case of the multicast address in
which all bits are 1s.
•Ethernet Addresses
• Addresses can either be universally administered addresses or locally
administered addresses. A universally administered address is uniquely
assigned to a device by its manufacturer.
• The first three octets (in transmission order) identify the organization that
issued the identifier and are known as the Organizationally Unique Identifier
(OUI)
• A locally administered address is assigned to a device by a network
administrator, overriding the burned-in address.
• Locally administered addresses do not contain OUIs.
– The user-defined address that you assign to the adapter is called a locally administered
address
– The Locally Administered Address allows you to replace the MAC address originally
assigned to the adapter with a user-defined address..

Changing the Locally Administered Address

• When using the DLC protocol, it might be necessary to change


or override the network address of the network adapter.

• For example, some configurations of mainframe software require


that the network addresses of devices follow a set format.
•Ethernet Addresses
•Ethernet Addresses

• The least significant bit of the first byte defines the type of address.
• If the bit is 0, the address is unicast;
• otherwise, it is multicast.
• The broadcast destination address is a special case of the multicast
address in which all bits are 1s.

• This 48-bit address space contains potentially 2 48 or 281,474,976,710,656 possible


MAC addresses.
•Example
•Define the type of the following destination addresses:
•a. 4A:30:10:21:10:1A b. 47:20:1B:2E:08:EE
•c. FF:FF:FF:FF:FF:FF
•Solution

•a. This is a unicast address because A in binary is 1010.


•b. This is a multicast address because 7 in binary is 0111.
•c. This is a broadcast address because all digits are F’s.
•Hexadecimal to Binary Converter
•(f)16 = (1111)2

Example 9.1
• Unicast Address
– Each host or each interface of a router is assigned a unicast address.
Unicasting means one-to-one communication. A frame with a unicast
address destination is destined only for one entity in the link.

• The unicast link-layer addresses in the most common LAN,


Ethernet, are 48 bits (six bytes) that are presented as 12
hexadecimal digits separated by colons; for example, the
following is a link-layer address of a computer.
– A3:34:45:11:92:F1

Example 9.2
• Multicast Address
– Some link-layer protocols define multicast addresses. Multicasting
means one-to-many communication. However, the jurisdiction is local
(inside the link).

• The multicast link-layer addresses in the most common LAN,


Ethernet, are 48 bits (six bytes) that are presented as 12
hexadecimal digits separated by colons. The second digit,
however, needs to be an even number in hexadecimal. The
following shows a multicast address:
– A2:34:45:11:92:F1

Example 9.3
• Broadcast Address
– Some link-layer protocols define a broadcast address.
Broadcasting means one-to-all communication. A frame with
a destination broadcast address is sent to all entities in the
link.
• the broadcast link-layer addresses in the most common
LAN, Ethernet, are 48 bits, all 1s, that are presented as
12 hexadecimal digits separated by colons. The following
shows a broadcast address
– FF:FF:FF:FF:FF:FF
•Standard networking protocols
(communications standards)

•81
•Standard networking protocols
(communications standards)

The committee that addresses LAN standards is called the


IEEE 802 Committee. •82
Thus, IEEE LAN protocols always start with the number 802.
•Important
• “Ethernet” is a particular protocol published by this
committee as their “802.3” protocol.

– Ethernet (802.3) is the world’s #1 standard wired-LAN


protocol
– There are other protocols besides Ethernet, but it is
dominant

• Most PCs’ NICs support 10/100/1000 Mbps Ethernet.


•Wireless networking
• Wireless fidelity (wi-fi) – a means of linking computers into a
wireless local area network (WLAN)

• Also referred to as 802.11

• Wi-Fi has evolved through various standards, the most common


of which have been:
– 802.11b, with 11 Mbps bandwidth
– 802.11g, with 54 Mbps bandwidth
– 802.11n, with 100 - 200 Mbps bandwidth
•Local Area Network (LAN)
• The data link layer, also sometimes just called the link layer, is where many wired
and wireless local area networking (LAN) technologies primarily function.
• For example,
– Token Ring (Introduced by IBM in 1984, it was then standardized with
protocol IEEE 802.5 and was fairly successful, particularly in corporate
environments, but gradually eclipsed by the later versions of Ethernet.
– FDDI (Fiber Distributed Data Interface )
– Ethernet ((IEEE 802.3)
• (identified by the RJ-45 connectors )
• Ethernet has largely replaced competing wired LAN technologies such as token ring, FDDI and
ARCNET.
– and 802.11 (802.11 and 802.11x refers to a family of specifications developed
by the IEEE for wireless LAN (WLAN) technology

Data Link Layer

• Home Work 3.2 :


– Search different trends in WiFi for upcoming IoT ?

•Networks: Data Link Layer •86


•IEEE LAN Standard
• Data Link Layer Sublayers:
– This split is based on the
architecture used in the IEEE
802 Project (which is the
IEEE working group
responsible for creating the
standards that define many
networking technologies
including many except
FDDI).
– By separating LLC and MAC
functions, interoperability
of different network
technologies is made easier
•Communication between Layers of TCP/IP Model and Data
Encapsulation

Host A PDU

Upper layer Application


data layer
Upper layer Segment
TCP header Transport layer
data

Upper layer
IP header
data Network layer Packet

Upper layer
LLC header FCS
data
Data link layer Frame
Upper layer
MAC header FCS
data

Physical layer Bit


0101110101001000010
•Data De-encapsulation

Host B

Application
Upper layer data
layer
Transport
TCP Upper layer data
layer
er
head
Network TCP+ upper layer data
IP
layer der
hea
IP+TCP+ upper layer data
Data link LLC
der
hea
layer
LLC header+ IP+TCP+ upper layer data
C
MA
Physical der
hea
layer 0101110101001000010
•Two Sub-layers WHY ?

1. LLC sublayer
• Refers to the functions required for the establishment and
control of logical links between local devices on a network.

• It provides services to the network layer above it and hides the


rest of the details of the data link layer to allow different
technologies to work seamlessly with the higher layers.

• Most local area networking technologies use the IEEE 802.2


LLC protocol.

• LLC Transitions up to the network layer.


•Two Sub-layers WHY ?
2. MAC sublayer
• This refers to the procedures used by devices to control access
to the network medium.
• Since many networks use a shared medium (such as a single
network cable, or a series of cables that are electrically
connected into a single virtual medium) it is necessary to have
rules for managing the medium to avoid conflicts.
• For example.
– Ethernet uses the CSMA/CD method of media access control
– Token Ring uses token passing.
(Both will be studied later)
• MAC: Transitions down to media.
•Data Link Layer Address
• MAC layer is responsible for moving packets from one
Network Interface card NIC to another across the shared
channel.

• The MAC sublayer uses MAC protocols to ensure that signals


sent from different stations across the same channel don't
collide.

• Different protocols are used for different shared networks,


such as Ethernets, Token Rings, Token Buses, and WANs.
•Protocols of Data Link Layer
• The most common WAN data-link protocols are:
– HDLC (High-Level Data Link Control)
– PPP (Point-to-Point Protocol )
– Frame Relay
– ATM (Asynchronous Transfer Mode)

• We may discuss ………..??????


•LLC- PDU and LLC- Header
• LLC serves to communicate upward to Network layer, independent
of the specific LAN technology used and Upper layer.

• The IEEE 802.2 sublayer adds some control information to the


message created by the upper layer (typically, the network layer) and
passed to the LLC for transmission to the next hop node.

• Resulting packet is generally referred to as LLC Protocol


Data Unit (PDU) and the additional field added by the LLC
sublayer for the so-called LLC HEADER.
•LLC Header
• LLC Header consist of three fields, namely
• D-SAP (Destination Service Access Point)Field
• S-SAP (Source Service Access Point) Field
• Control Field
• S-SAP
• is an 8-bit long field that represents the logical address of the network layer entity
that has created the message.
• D-SAP
• is an 8-bit long field that represents the logical addresses of the network layer
entity intended to receive the message.
• Control field
• may be either 8 or 16 bit long and, besides defining the packet format, its used to
carry some further control information for auxiliary services, such as flow control.
•LLC

Packet

Packet LLC PDU

Packet Frame

• PDU: Protocol data unit


• D-SAP: Destination service access point
• S-SAP: Source service access point
•Thanks

You might also like