0% found this document useful (0 votes)
17 views9 pages

Data Link Layer Overview

Uploaded by

swatigohite6
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views9 pages

Data Link Layer Overview

Uploaded by

swatigohite6
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

💣

DATA LINK LAYER OVERVIEW


Data link layer Need and Services
The data link layer in computer networking serves several crucial purposes:
1. **Physical Addressing:** It adds a header to the packet, including the source
and destination physical addresses (MAC addresses) for devices on the same
network.
2. **Error Detection and Correction:** It ensures data integrity by detecting
and sometimes correcting errors that may occur during transmission over the
physical medium.
3. **Flow Control:** It manages the flow of data between devices to prevent
overwhelming the receiver with too much data.
4. **Access Control:** It coordinates access to the physical medium,
determining when devices can transmit data to avoid collisions.
5. **Link Establishment and Termination:** It establishes, maintains, and
terminates connections between devices.
These services collectively ensure reliable and efficient communication
between devices within the same network.

Flow & Error control


Sure, here's an explanation of flow control and error control:
1. **Flow Control:** Flow control is a mechanism used to manage the flow of
data between devices in a network to ensure that a sender does not
overwhelm a receiver with data. It helps prevent data loss and buffer overflow
situations. There are two main types of flow control:
a. **Stop-and-Wait Flow Control:** In this simple method, after sending a
frame, the sender waits for an acknowledgment (ACK) from the receiver before
sending the next frame. This ensures that the sender does not send more data
than the receiver can handle.
b. **Sliding Window Flow Control:** This more sophisticated method allows
the sender to transmit multiple frames before receiving acknowledgments. The

DATA LINK LAYER OVERVIEW 1


sender maintains a "window" of frames that it can transmit without waiting for
acknowledgments. The receiver sends acknowledgments for received frames,
and the sender adjusts the window size dynamically based on these
acknowledgments and other factors.
2. **Error Control:** Error control is a mechanism used to ensure the integrity
of data transmitted over a network by detecting and sometimes correcting
errors that may occur during transmission. It involves techniques for error
detection and error correction. Common error control techniques include:
a. **Error Detection:** This involves adding redundant information, such as
checksums or CRC (Cyclic Redundancy Check) values, to transmitted data.
The receiver recalculates the checksum or CRC value upon receiving the data
and compares it to the received value. If they do not match, an error is
detected.
b. **Error Correction:** Some error control techniques, such as forward error
correction (FEC), allow the receiver to correct errors without the need for
retransmission. FEC adds redundancy to the transmitted data in such a way
that the receiver can correct errors using the redundant information. This is
particularly useful in situations where retransmission may not be feasible due
to time constraints or network conditions.
c. **Automatic Repeat reQuest (ARQ):** In ARQ protocols, the receiver sends
acknowledgments (ACKs) or negative acknowledgments (NAKs) to the sender
to indicate successful or failed frame reception, respectively. Upon receiving a
NAK or no acknowledgment within a timeout period, the sender retransmits the
frame. ARQ protocols can be further classified into different types, such as
Stop-and-Wait ARQ, Go-Back-N ARQ, and Selective Repeat ARQ, based on
their retransmission strategies and efficiency.
MAC sublayer and static and dynamic channel
allocation
The MAC (Media Access Control) sublayer is a component of the data link layer
(Layer 2) of the OSI model responsible for controlling access to the physical
transmission medium. Its main tasks include addressing frames with MAC
addresses, controlling access to the transmission medium to avoid collisions,
and managing the transmission of data frames between nodes in a network.

DATA LINK LAYER OVERVIEW 2


**Static Channel Allocation:**- In static channel allocation, the transmission
medium (such as a communication channel or frequency spectrum) is divided
into fixed portions, and each portion is allocated to a specific node or user in
the network.- This allocation is typically done in advance and remains constant
over time.- Examples of static channel allocation techniques include frequency
division multiple access (FDMA) and time division multiple access (TDMA).-
FDMA divides the frequency spectrum into distinct channels, with each
channel allocated to a specific user or node.- TDMA divides the transmission
medium into time slots, with each node assigned one or more time slots for
transmission.

**Dynamic Channel Allocation:**- In dynamic channel allocation, the


transmission medium is not divided into fixed portions. Instead, access to the
medium is granted dynamically based on demand and availability.- Dynamic
channel allocation techniques are often more efficient than static allocation
methods because they adapt to changing network conditions and traffic
patterns.- One common dynamic channel allocation technique is Carrier Sense
Multiple Access with Collision Detection (CSMA/CD). In CSMA/CD, nodes listen
to the medium before transmitting data. If the medium is busy, they wait for a
random period before attempting to transmit again. If collisions occur, nodes
detect them and initiate a collision recovery process.- Another dynamic
channel allocation technique is Carrier Sense Multiple Access with Collision
Avoidance (CSMA/CA). In CSMA/CA, nodes use a "listen-before-talk"
approach to avoid collisions. Before transmitting data, nodes listen to the
medium to check if it is busy. If the medium is clear, they transmit their data. If
the medium is busy, they wait for a random period before attempting to
transmit.

Dynamic channel allocation techniques are often preferred in dynamic and


variable traffic environments because they can adapt to changes in network
conditions, leading to better utilization of the available bandwidth and reduced
latency.

DATA LINK LAYER OVERVIEW 3


MAC for LAN & WAN
Media Access Control (MAC) protocols regulate the access of nodes to the
shared communication medium in both LANs (Local Area Networks) and WANs
(Wide Area Networks). The implementation and operation of MAC protocols
vary depending on the network architecture, technology, and requirements.
Let's delve into each in detail:

**LAN (Local Area Network):**

1. **Ethernet:** - Ethernet is one of the most common LAN technologies,


operating at the data link layer (Layer 2) of the OSI model. - The primary MAC
protocol used in Ethernet networks is CSMA/CD (Carrier Sense Multiple
Access with Collision Detection). - CSMA/CD works as follows: - Before
transmitting data, a node listens to the medium (the shared cable) to check if
it's idle. If the medium is busy, the node waits until it becomes idle. - Once
the medium is idle, the node starts transmitting its data frame. - While
transmitting, the node continues to listen to the medium. If it detects a collision
(i.e., another node transmitting at the same time), it stops transmitting and
sends a jam signal to alert other nodes of the collision. - After sending the
jam signal, the node waits for a random backoff period before attempting to
retransmit. - Ethernet networks typically use techniques like Ethernet
switches to segment the network and reduce collision domains, improving
overall network performance.

2. **Wi-Fi (Wireless LAN):** - Wi-Fi networks use MAC protocols tailored for
wireless communication, such as CSMA/CA (Carrier Sense Multiple Access
with Collision Avoidance). - CSMA/CA operates differently from CSMA/CD
due to the nature of wireless communication and the "hidden node" problem.
- In CSMA/CA: - Before transmitting, a node listens to the medium to check
for ongoing transmissions. If the medium is idle, the node waits for a random
backoff period before attempting to transmit. - If the medium becomes busy
during the backoff period, the node freezes its countdown until the medium
becomes idle again. - Once the countdown reaches zero and the medium is
idle, the node transmits its data frame. - Wi-Fi networks also utilize

DATA LINK LAYER OVERVIEW 4


techniques like RTS/CTS (Request to Send/Clear to Send) to mitigate collisions
and manage contention on the wireless medium

.
**WAN (Wide Area Network):**

1. **Point-to-Point Links:** - In WANs, point-to-point links are common,


where communication occurs between two endpoints. - MAC protocols for
point-to-point links often involve simple mechanisms for addressing and
framing data, such as HDLC (High-Level Data Link Control) or PPP (Point-to-
Point Protocol). - These protocols do not typically involve complex medium
access control mechanisms like CSMA/CD or CSMA/CA since the
communication medium is dedicated to the connected endpoints.

2. **Multi-Access WAN Technologies:** - WAN technologies like Frame Relay,


ATM (Asynchronous Transfer Mode), and MPLS (Multiprotocol Label
Switching) support multi-access connections, allowing multiple nodes to
connect to a shared network. - MAC protocols in multi-access WAN
technologies may involve virtual circuit establishment and management, where
each node is assigned a unique virtual circuit identifier to access the network.
- These protocols ensure proper routing and forwarding of data between
nodes connected to the WAN.

In summary, while LANs and WANs both use MAC protocols to control access
to the communication medium, the specific protocols and mechanisms vary
based on the network technology, topology, and requirements, whether it's
wired Ethernet, wireless Wi-Fi, point-to-point links, or multi-access WAN
technologies.
What is ALOHA explain in detail also explain pure,
slotted CSMA,CSMA/CD,CSMA/CA
Sure, let's delve into these networking protocols:
1. **ALOHA**: ALOHA is a simple communication protocol used in computer

DATA LINK LAYER OVERVIEW 5


networks. It allows multiple users to send data over a shared channel. There
are two types of ALOHA: Pure ALOHA and Slotted ALOHA.
- **Pure ALOHA**: In Pure ALOHA, a user can transmit data whenever they
have it, without checking if the channel is busy. If there's a collision (when two
or more users transmit at the same time), data packets are damaged and must
be retransmitted after a random time interval. Pure ALOHA is simple but
inefficient, as it has a high probability of collisions.
- **Slotted ALOHA**: Slotted ALOHA divides time into slots, with each slot
corresponding to the time it takes to transmit one data packet. Users can only
transmit at the beginning of a time slot. This reduces the chance of collisions,
as users are synchronized to the time slots, but it still suffers from
inefficiencies due to idle slots.
2. **CSMA (Carrier Sense Multiple Access)**: CSMA is a protocol used to
improve the efficiency of shared channel access by sensing the channel before
transmitting data. There are several variants:
- **Non-Persistent CSMA**: A station listens to the channel. If it's idle, it
transmits immediately. If it's busy, it waits for a random time and retries. -
**1-Persistent CSMA**: A station continuously listens to the channel. If it's idle,
it transmits. If it's busy, it continues to listen until it becomes idle, then
transmits immediately. - **p-Persistent CSMA**: A station listens to the
channel. If it's idle, it transmits with probability p. If the channel is busy, it waits
for the next slot and repeats the process.
3. **CSMA/CD (Carrier Sense Multiple Access with Collision Detection)**:
CSMA/CD is used in Ethernet networks to handle collisions. Before
transmitting, stations listen to the channel. If a collision is detected during
transmission, stations stop sending, wait for a random time, and retry.
CSMA/CD is employed in wired Ethernet networks.
4. **CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance)**:
CSMA/CA is used in wireless networks to avoid collisions since detecting
collisions in wireless networks is challenging due to the hidden terminal
problem. Before transmitting, stations listen to the channel. If the channel is
busy, they wait for a random backoff time. This helps avoid collisions and is
used in Wi-Fi networks.
Each of these protocols addresses the challenge of efficiently sharing a
communication channel among multiple users, with variations in how they
handle collisions and access contention.

DATA LINK LAYER OVERVIEW 6


Explain non persistent 1 persistent and p persistent in detail
Certainly! Let's delve into each of these variations of the Carrier Sense
Multiple Access (CSMA) protocol:
1. **Non-Persistent CSMA**: - In Non-Persistent CSMA, a station listens
to the channel before transmitting data. - If the channel is idle, the station
transmits immediately. - If the channel is busy, instead of continuously
listening, the station waits for a random period of time (backoff time) and
then listens again. - After waiting, if the channel is idle, the station
transmits. If it's still busy, the station repeats the process. - Non-
Persistent CSMA reduces the chance of collisions by introducing a random
backoff time, but it may lead to inefficiency if multiple stations wait for the
same period before attempting to transmit again.
2. **1-Persistent CSMA**: - In 1-Persistent CSMA, a station continuously
listens to the channel. - If the channel is idle, the station immediately
transmits its data. - If the channel is busy, the station keeps listening until
it becomes idle. - Once the channel becomes idle, the station immediately
transmits. - 1-Persistent CSMA is more aggressive than Non-Persistent
CSMA, as it doesn't introduce a random backoff time. It increases the
chances of collisions but may lead to higher throughput when the channel is
lightly loaded.
3. **p-Persistent CSMA**: - In p-Persistent CSMA, a station listens to the
channel before transmitting. - If the channel is idle, the station transmits
with probability p. - If the channel is busy, the station waits for the next
time slot and repeats the process. - If the channel is idle and the station
decides not to transmit (with probability 1-p), it waits for the next slot and
repeats the process. - p-Persistent CSMA allows for a trade-off between
the probability of transmission and the probability of collision. By adjusting
the value of p, the protocol can be optimized for different network
conditions.
These variations of CSMA aim to improve the efficiency of shared channel
access by sensing the channel before transmitting data, with each variation
employing a different strategy for contention resolution and collision
avoidance.

DATA LINK LAYER OVERVIEW 7


IEEE 802 standards for LAN & MAN & their
comparison.
The IEEE 802 standards cover various aspects of Local Area Networks (LANs)
and Metropolitan Area Networks (MANs). Here's an overview and a
comparison between some of the key standards:
1. **IEEE 802.3 Ethernet**: - Ethernet is the most widely used LAN
technology. - Defines the physical and data link layers for wired LANs. -
Uses CSMA/CD (Carrier Sense Multiple Access with Collision Detection) for
medium access control. - Common variants include 10BASE-T (Ethernet over
twisted pair cables), 100BASE-TX, and Gigabit Ethernet (1000BASE-T).
2. **IEEE 802.11 Wi-Fi**: - Defines wireless LAN standards. - Operates in the
physical and data link layers. - Provides wireless connectivity for devices
within a limited range. - Various standards within IEEE 802.11 include 802.11a,
802.11b, 802.11g, 802.11n, 802.11ac, and 802.11ax (Wi-Fi 6), each offering
different data rates, frequencies, and modulation techniques.
3. **IEEE 802.15 Personal Area Network (PAN)**: - Specifies standards for
wireless personal area networks. - Examples include Bluetooth and Zigbee. -
Designed for short-range communication between devices like smartphones,
laptops, and IoT devices.
4. **IEEE 802.16 WiMAX**: - Defines standards for broadband wireless
metropolitan area networks. - Offers high-speed wireless connectivity over
longer distances compared to Wi-Fi. - Suited for providing internet access in
urban and suburban areas.

Comparison:-

**Coverage**: IEEE 802.3 Ethernet and IEEE 802.11 Wi-Fi primarily focus on
LANs, while IEEE 802.16 WiMAX is designed for MANs.-

**Medium**: Ethernet uses wired connections, while Wi-Fi and WiMAX operate
wirelessly.-

DATA LINK LAYER OVERVIEW 8


**Range**: WiMAX typically offers longer range compared to Wi-Fi.-

**Speed**: Ethernet and WiMAX can provide higher data rates compared to
Wi-Fi, especially in certain configurations.-

**Applications**: Ethernet is commonly used in homes, offices, and data


centers, while Wi-Fi is ubiquitous for wireless connectivity. WiMAX is used for
providing broadband access in areas where wired infrastructure is limited.-

**Interference**: Wireless standards like Wi-Fi and WiMAX are more


susceptible to interference compared to Ethernet, which uses dedicated wired
connections.

Overall, each IEEE 802 standard serves specific use cases and environments,
providing options for wired and wireless networking tailored to different
requirements.

DATA LINK LAYER OVERVIEW 9

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy