2.
0 Network Access
Part III
Module Objectives
Module Title: Data Link Layer
Module Objective: Explain how media access control in the data link layer supports
communication across networks.
Topic Title Topic Objective
Purpose of the Data Link Layer Describe the purpose and function of the data link layer
in preparing communication for transmission on specific
media.
Topologies Compare the characteristics of media access control
methods on WAN and LAN topologies.
Data Link Frame Describe the characteristics and functions of the data
link frame.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
2.3.1 Purpose of the Data Link
Layer
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
Purpose of the Data Link Layer
The Data Link Layer
The data link layer of the OSI model
(Layer 2) is responsible for:
• Allowing the upper layers to access the
media
• Accepting Layer 3 packets and
packaging them into frames
• Preparing network data for the physical
network
• Controlling how data is placed and
received on the media
• Exchanging frames between nodes
over a physical network media, such as
UTP or fiber-optic
• Receiving and directing packets to an
upper layer protocol
• Performing error detection
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
Purpose of the Data Link Layer
The Data Link Layer
• The Data Link layer is responsible for
communications between end-device
network interface cards.
• It allows upper layer protocols to access
the physical layer media and
encapsulates Layer 3 packets (IPv4 and
IPv6) into Layer 2 Frames.
• It also performs error detection and
rejects corrupts frames.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
Purpose of the Data Link Layer
IEEE 802 LAN/MAN Data Link Sublayers
IEEE 802 LAN/MAN standards are specific to the type
of network (Ethernet, WLAN, WPAN, etc).
Data link layer is divided into two sublayers :
• Logical Link Control (LLC)
• Communicates with the network layer.
• Identifies which network layer protocol is being used for the
frame.
• Allows multiple Layer 3 protocols, such as IPv4 and IPv6,
to utilize the same network interface and media.
• Media Access Control (MAC)
• Defines the media access processes performed by the
hardware.
• Provides data link layer addressing and access to various
network technologies.
• Communicates with Ethernet to send and receive frames
over copper or fiber-optic cable.
• Communicates with wireless technologies such as Wi-Fi
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
and Bluetooth.
Purpose of the Data Link Layer
Providing Access to Media
At each hop along the path, a router:
• Accepts a frame from a medium
• De-encapsulates the frame
• Re-encapsulates the packet into a new frame
• Forwards the new frame appropriate to the medium of that segment
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
Purpose of the Data Link Layer
Data Link Layer Standards
Data link layer protocols are
defined by engineering
organizations:
• Institute for Electrical and
Electronic Engineers (IEEE).
• International Telecommunications
Union (ITU).
• International Organizations for
Standardization (ISO).
• American National Standards
Institute (ANSI).
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
2.3.2 Physical and Logical Topologies
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
Topologies
Physical and Logical Topologies
Physical topology - Refers to
the physical connections and
identifies how end devices and
infrastructure devices such as
routers, switches, and wireless
access points are
interconnected.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
Topologies
Physical and Logical Topologies
Logical Topology: Refers to the
way a network transfers frames
from one node to the next.
These logical signal paths are
defined by data link layer
protocols.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
Topologies
WAN Topologies
There are three common physical WAN
topologies:
• Point-to-point –Consists of a permanent
link between two endpoints.
• Hub and spoke – A central site
interconnects branch sites through point-
to-point links.
• Mesh – provides high availability but
requires every end system to be
connected to every other end system.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
Topologies
Point-to-Point WAN Topology
• Physical point-to-point topologies directly connect two nodes.
• The nodes may not share the media with other hosts.
• Because all frames on the media can only travel to or from the two nodes,
Point-to-Point WAN protocols can be very simple.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
Topologies
LAN Topologies
▪ Star - End devices are connected to a central
intermediate device. Use Ethernet switches.
▪ Extended Star - Additional Ethernet switches
interconnect other star topologies.
▪ Bus - Used in legacy networks. All end systems
are chained to each other and terminated in some
form on each end. Switches are not required to
interconnect the end devices. Bus topologies
using coax cables were used in legacy Ethernet
networks because it was inexpensive and easy to
set up.
▪ Ring - End systems are connected to their
respective neighbor forming a ring. Unlike the bus
topology, the ring does not need to be terminated.
Ring topologies were used in legacy Fiber
Distributed Data Interface (FDDI) and Token Ring
networks. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
Topologies
Half and Full Duplex Communication
Half-duplex communication
• Only allows one device to send or receive at a time on a shared medium.
• Used on WLANs and legacy bus topologies with Ethernet hubs.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
Topologies
Half and Full Duplex Communication
Full-duplex communication
• Allows both devices to simultaneously transmit and receive on a shared
medium.
• Ethernet switches operate in full-duplex mode.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
Topologies
Access Control Methods
Contention-based access
• Nodes operate in half-duplex.
• Compete for the use of the
medium.
• Only one device can send at a time.
• Examples are:
1. Carrier sense multiple access with
collision detection (CSMA/CD)
2. Carrier sense multiple access with
collision avoidance (CSMA/CA)
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
Topologies
Access Control Methods
Controlled access
• Each node has its own time to use
the medium.
• Used on legacy networks such as
Token Ring and ARCNET.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
Topologies
Contention-Based Access – CSMA/CD
Carrier Sense Multiple Access/Collision
Detection (CSMA/CD) process is used in half-
duplex Ethernet LANs.
• If two devices transmit at the same time, a
collision will occur.
• Both devices will detect the collision on the
network.
• Data sent by both devices will be corrupted
and will need to be resent.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
Topologies
Contention-Based Access – CSMA/CA
Carrier sense multiple access with
collision avoidance (CSMA/CA) as
used on Wireless LANs
• Uses a method to detect if the media
is clear.
• Does not detect collisions but
attempts to avoid them by waiting
before transmitting.
.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
Topologies
Contention-Based Access – CSMA/CD
CSMA/CD
• Used by legacy Ethernet LANs.
• Operates in half-duplex mode where only one device sends or receives at a time.
• Uses a collision detection process to govern when a device can send and what
happens if multiple devices send at the same time.
CSMA/CD collision detection process:
• Devices transmitting simultaneously will result in a signal collision on the shared
media.
• Devices detect the collision.
• Devices wait a random period of time and retransmit data.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
Topologies
Contention-Based Access – CSMA/CA
CSMA/CA
• Used by IEEE 802.11 WLANs.
• Operates in half-duplex mode where only one device sends or receives at a time.
• Uses a collision avoidance process to govern when a device can send and what
happens if multiple devices send at the same time.
CSMA/CA collision avoidance process:
• When transmitting, devices also include the time duration needed for the
transmission.
• Other devices on the shared medium receive the time duration information and know
how long the medium will be unavailable.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
Quiz!
What identifier is used at the data link layer to uniquely identify an Ethernet device?
A. TCP Port Number
B. IP Address
C. MAC Address
D. UDP Port Number
What is true concerning physical and logical topologies?
E. Logical topologies refer to how a network transfers data between devices
F. The logical topology is always the same as the physical topology
G. Physical topologies display the IP addressing scheme of each network
H. Physical topologies are concerned with how a network transfers frames
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
Quiz!
What method is used to manage contention-based access on a wireless network?
A. CSMA/CA
B. CSMA/CD
C. Token Passing
D. Priority Ordering
A technician has been asked to develop a physical topology for a network that provides a
high level of redundancy. Which physical topology requires that every node is attached to
every other node on the network?
E. Star
F. Ring
G. Mesh
H. Bus
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
Quiz!
Which statement describes the half-duplex mode of data transmission?
A. Data that is transmitted over the network flows in one direction at a time
B. Data that is transmitted over the network flows in one direction to many different
destinations simultaneously.
C. Data that is transmitted over the network flows in both directions at the same time.
D. Data that is transmitted over the network can only flow in one direction.
What type of physical topology can be created by connecting all Ethernet cables to a
central device?
E. Mesh
F. Bus
G. Star
H. Ring
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
Quiz!
What attribute of a NIC would place it at the data link layer of the OSI model?
A. RJ-45
B. TCP/IP Protocol Stack
C. MAC Address
D. IP Address
Which data link layer media access control method does Ethernet use with legacy Et
E. Determinism
F. Token Passing
G. Turn Taking
H. CSMA/CD
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27