1 / 44

Chapter 5

Chapter 5. Data Link Layer. O BJECTIVES. Understand the concept of the hop-to-hop delivery compared to host-to-host delivery and application-to-application delivery. Understand the concept of access method and define different access methods used in LANs and WANs.

rowena
Télécharger la présentation

Chapter 5

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Chapter 5 Data Link Layer

  2. OBJECTIVES Understand the concept of the hop-to-hop delivery compared to host-to-host delivery and application-to-application delivery. Understand the concept of access method and define different access methods used in LANs and WANs. Understand the addressing mechanism used in the data link layer and how network layer addresses are mapped to data layer addresses. Understand how error control is handled at the data link layer. Understand the functions of the data link layer. After reading this chapter, the reader should be able to:

  3. 5.1 DUTIES OF THE DATA LINK LAYER

  4. Figure 5-1 Data link layer in the Internet model

  5. Figure 5-2 Data-link layer duties

  6. 5.2 HOP-TO-HOP DELIVERY

  7. Figure 5-3 Hop-to-hop delivery

  8. 5.3 PACKETIZING

  9. 5.4 ADDRESSING

  10. Technical Focus:Addresses in Local Area Networks The physical address for most computers on local area networks is imprinted on the network card that is installed in the computer. If the user or network manager changes the network card (because of a failure, for example), the physical address of the computer is changed. In most cases, changing the network card requires reconfiguration of the computer.

  11. Figure 5-4 ARP operation

  12. 5.5 ERROR CONTROL

  13. Note: Data can be corrupted during transmission. For reliable communication, errors must be prevented, or detected and corrected.

  14. Note: In a single-bit error, only 1 bit in the data unit has changed.

  15. Figure 5-5 Single-bit error

  16. Note: A burst error means that two or more bits in the data unit have changed.

  17. Figure 5-6 Burst error of length five

  18. Note: Error detection uses the concept of redundancy, which means adding extra bits for detecting errors at the destination.

  19. Figure 5-7 Redundancy

  20. Figure 5-8 Detection methods

  21. Note: In vertical redundancy check (VRC), a parity bit is added to every data unit so that the total number of 1s becomes even.

  22. Figure 5-9 Even parity VRC concept

  23. Figure 5-10 LRC

  24. Note: In longitudinal redundancy check (LRC), a block of bits is divided into rows and a redundant row of bits is added to the whole block.

  25. Figure 5-11 CRC

  26. Figure 5-12 Stop and wait ARQ

  27. The sending device keeps a copy of the last frame transmitteduntil it receives an acknowledgment for that frame. Both data frames and ACK frames are numbered 0 and 1 alternately. A data 0 frame is acknowledged by an ACK 1 frame. If an error is discovered in a data frame, a negative acknowledgment (NAK) frame is returned. If an expected acknowledgment is not received within an allotted time period, the sender assumes that the last data frame was lost in transit and sends it again. Technical Focus:Procedure for Stop-And-Wait ARQ

  28. Figure 5-13 Sliding-window ARQ

  29. The sending device keeps copies of all transmitted frames until they have been acknowledged. In addition to ACK frames, a receiver can return a NAK frame if the data have been received damaged. The NAK frame tells the sender to retransmit a damaged frame. Like stop-and-wait ARQ, the sending device in sliding-window ARQ is equipped with a timer to enable it to handle lost acknowledgments. Technical Focus:Procedure for Sliding-Window ARQ

  30. 5.6 FLOW CONTROL

  31. Note: Flow control refers to a set of procedures used to restrict the amount of data the sender can send before waiting for acknowledgment.

  32. 5.1 MEDIUM ACCESS CONTROL

  33. Figure 5-14 Medium access methods

  34. Figure 5-15 Select

  35. Figure 5-16 Poll

  36. Note: The poll/select method is mostly used in time-sharing systems when a central computer is used to control other computers.

  37. Figure 5-17 Token passing network

  38. Note: Token passing is used mostly by local area networks (LANs). We discuss LANs in Chapter 9.

  39. Note: CSMA/CD is used in the Ethernet LAN discussed in Chapter 9.

  40. Note: CSMA/CA is used in the wireless LANs discussed in Chapter 10.

  41. 5.8 DATA LINK PROTOCOLS

  42. Note: A data link protocol is a set of specifications used to implement the data link layer.

  43. Note: In a character-oriented protocol, the frame is interpreted as a series of characters. In a bit-oriented protocol, the frame or packet is interpreted as a series of bits.

  44. Note: All bit-oriented protocols are relatedto high-level data link control(HDLC), a bit-oriented protocol.

More Related