SEMESTER 1 Chapter 5

advertisement
SEMESTER 1 Chapter 7
Data Link Layer
V 4.0
7.1.1
What are the 2 basic
services the Data Link layer
provides?
List and define the 4
specific terms associated
with the Data Link layer?
7.1.1.2 What happens the frame as
moves from source to
destination?
7.1.2
Define Media Access
Control.
7.1.3
What can the control
information tell you?
List and define the three
elements of a Data Link
Layer Frame.
7.1.3.2 List and define the 5 typical
field types.
7.1.4
What is the most common
physical device that is used
for the Data Link Layer?
7.1.4.2 Describe the two sublayers
of the Data Link Layer.
Allows the upper layers to access the media
using techniques such as framing
Controls how data is placed onto the media
and is received from the media using
techniques such as media access control and
error detection
Frame - The Data Link layer PDU
Node - The Layer 2 notation for network
devices connected to a common medium
Media/medium (physical)* - The physical
means for the transfer of information between
two nodes
Network (physical)** - Two or more nodes
connected to a common medium
It changes based on the medium used
The technique used for getting the frame on
and off media
Which nodes are in communication with each
other
When communication between individual
nodes begins and when it ends
Which errors occurred while the nodes
communicated
Which nodes will communicate next
Data - The packet from the Network layer
Header - Contains control information, such
addressing, and is located at the beginning of
the PDU
Trailer - Contains control information added to
the end of the PDU
Start and stop indicator fields - The beginning
and end limits of the frame
Naming or addressing fields
Type field - The type of PDU contained in the
frame
Quality - control fields
A data field -The frame payload (Network layer
packet)
NIC
The upper sublayer defines the software
processes that provide services to the Network
layer protocols.
The lower sublayer defines the media access
processes performed by the hardware.
Frames the network layer packet
Identifies the network layer protocol
Addresses the frame
Marks the beginning and ending of each frame
7.1.5
7.2.1
7.2.2
7.2.3
7.2.4
7.2.5
What are the two functions
of the Logical Link Control?
What are the two functions
of the Media Access
Control?
What are the 4
International Organization for Standardization
organizations that define the (ISO)
Data Link standards?
Institute of Electrical and Electronics Engineers
(IEEE)
American National Standards Institute (ANSI)
International Telecommunication Union (ITU)
What analogy is made with
traffic rules that regulate the entrance of motor
the media access control?
vehicles onto a roadway
What does the method that Media sharing - If and how the nodes share
media access control uses
the media
depend on?
Topology - How the connection between the
nodes appears to the Data Link layer
What are the two basic
Controlled - Each node has its own time to use
media access control
the medium
methods for shared media? Contention-based - All nodes compete for the
use of the medium
What are two examples of
Token Ring
controlled media access?
FDDI
What are two examples of
Ethernet
contention-based media
Wireless
access?
Why can controlled media
Device has to wait its turn to access the media
access be inefficient?
What is CSMA?
Carrier Sense Multiple access
What is a data collision?
When two devices transmit at the same time
What is CSMA/CD?
Carrier Sense Multiple access with Collision
Detection
What is CSMA/CA?
Carrier Sense Multiple Access with Collision
Avoidance
Define Half-Duplex.
devices can both transmit and receive on the
media but cannot do so simultaneously
Define Full-Duplex.
Both devices can transmit and receive on the
media at the same time.
Define physical topology.
arrangement of the nodes and the physical
connections between them
Define logical topology.
the way a network transfers frames from one
node to the next
What logical and physical
Point-to-Point
topologies are typically used Multi-Access
in networks?
Ring
Define point-to-point
connects two nodes directly together
topology.
7.2.5.2 Define virtual circuit.
7.2.6
7.2.7
7.3.1
7.3.2
7.3.3
7.3.4
Which type of topology is
used to determine the
media access control?
Define logical multi-access
topology.
What are the three types of
media access control can
be used in a multi-access
topology?
How does a data flow in a
ring network?
What are the three basic
parts of a data link layer
frame?
What are the typical fields in
the frame header?
Which part the network
(WAN/LAN) is the data link
address used in delivering?
What is the difference
between Data Link Address
and Logical Address?
Does a point-to-point link
need a data link address?
Define error detection.
Define Frame Check
Sequence.
How could the CRC be
correct and the frame
a logical connection created within a network
between two network devices
logical point-to-point topology
enables a number of nodes to communicate by
using the same shared media
CSMA/CD, CSMA/CA, or token passing
From node to node until it reaches the
destination.
Header
Data
Trailer
Start Frame field - Indicates the beginning of
the frame
Source and Destination address fields Indicates the source and destination nodes on
the media
Priority/Quality of Service field - Indicates a
particular type of communication service for
processing
Type field - Indicates the upper layer service
contained in the frame
Logical connection control field - Used to
establish a logical connection between nodes
Physical link control field - Used to establish
the media link
Flow control field - Used to start and stop
traffic over the media
Congestion control field - Indicates congestion
in the media
LAN
Data Link address only defines the machine it
is not logically assigned
No it only has one place to go
accomplished by placing a logical or
mathematical summary of the bits that
comprise the frame in the trailer
used to determine if errors occurred in the
transmission and reception of the frame
The error bits could cancel each other out
7.3.5
7.3.5.2
7.3.5.3
7.3.5.4
7.4.1.2
contain errors?
Do all protocols support
using the FCS to determine
errors?
What Layer 2 protocols will
we study in this course?
Which usually performs at a
higher bandwidth, LAN or
WAN?
What do Ethernet standards
define?
What is the data link
address?
How is the data link address
expressed?
What type of architecture
does PPP use?
What are options available
to use with PPP?
What is the standard used
for wireless LANs?
What services are
supported by 802.11?
Examine each of the
processes and take notes.
Develop questions on any
step you do not understand.
No
Ethernet
Point-to-Point Protocol (PPP)
High-Level Data Link Control (HDLC)
Frame Relay
Asynchronous Transfer Mode (ATM)
LAN
Layer 2 Protocols and Layer 1 technologies
MAC address
48 bit
Hexadecimal
Layered architecture
Authentication, compression, and multilink (the
use of multiple physical connections).
802.11
authentication, association (connectivity to a
wireless device), and privacy (encryption)
* The Layer 2 protocol used for a particular network topology is determined by
- the technology used to implement that topology.
- the size of the network –
- the number of hosts
- the geographic scope
- the services to be provided over the network.
* The Data Link layer provides a means for exchanging data over a common local media.
 The Data Link layer performs two basic services:
– Allows the upper layers to access the media using techniques such as framing
– Controls how data is placed onto the media and is received from the media using
techniques such as media access control and error detection
* Layer 2 protocols specify the encapsulation of a packet into a frame and the techniques for
getting the encapsulated packet on and off each medium.
 The technique used for getting the frame on and off media is called the media access
control method.
* Make sure you know all the interaction of IP addresses and MAC address.
* There are 2 media access control methods for shared media.
 Controlled
o This method is also known as scheduled access or deterministic
o deterministic methods can be inefficient because a device has to wait for its turn
before it can use the medium
o For example: Token passing

Contention-based
o Also referred to as non-deterministic methods
o Contention-based media access control methods do not have the overhead of
controlled access methods.
o The two commonly used methods are: Carrier Sense Multiple Access/Collision
Detection (CSMA/CD) and CSMA/Collision Avoidance (CSMA/CA)
 CSMA/CD: Wired Ethernet network
 CSMA/CA: Wireless Ethernet network
* Token Ring:
 This allows a ring to use a controlled media access control technique called token passing
 If there is no data being transmitted, a signal (known as a token) may be placed on the
media and a node can only place a data frame on the media when it has the token.
 When using the controlled access method, network devices take turns, in sequence, to
access the medium.
* The topology of a network is the arrangement or relationship of the network devices and the
interconnections between them.
 The physical topology is an arrangement of the nodes and the physical connections
between them.
o The representation of how the media is used to interconnect the devices is the
physical topology.
 A logical topology is the way a network transfers frames from one node to the next. This
arrangement consists of virtual connections between the nodes of a network independent
of their physical layout.
* Regulating the placement of data frames onto the media is known as “media access control”.
 These media access control techniques define if and how the nodes share the media.
o For example: Traffic can enter the road by merging, by waiting for its turn at a
stop sign, or by obeying signal lights. A driver follows a different set of rules for
each type of entrance.
* The method of media access control used depends:
 Media sharing
– If and how the nodes share the media
• Shared or non-shared
 Topology
– How the connection between the nodes appears to the Data Link layer
• Point-to-point (Simple protocol and the media interconnects just two nodes)
• Multi-access (CSMA/CD; CSMA/CA)
• Ring (Token Ring)
* An Ethernet MAC address is 48 bits and is generally represented in hexadecimal format.
* Preamble---The alternating pattern of ones and zeros tells receiving stations that a frame is
coming (Ethernet or IEEE 802.3). It is used for timing synchronization.
* Trailer: Data Link layer protocols add trailer to the end of each frame.
 The trailer is used to determine if the frame arrived without error.
 This process is called error detection.
* Layer 2 addresses vs. layer 3 address.
 The data Link layer provides addressing that is used in transporting the frame across the
shared local media.
 Unlike Layer 3 logical addresses that are hierarchical, physical addresses do not indicate
on what network the device is located.
 Device addresses at this layer are referred to as physical addresses.
 If the device is moved to another network or subnet, it will still function with the same
Layer 2 physical address.
* The Data Link layer is often divided into two sublayers.
 Logical Link Control (The upper sublayer)
– defines the software processes that provide services to the Network layer
protocols.
 Media Access Control (The lower sublayer)
– defines the media access processes performed by the hardware.
* Make sure you understand what is CRC and the process of CRC calculation.
 Frame Check Sequence
– This is the cyclic redundancy check (CRC) value.
– This value is placed in the FCS field of the frame to represent the contents of the
frame.

When the frame arrives at the destination node, the receiving node calculates its own
logical summary, or CRC, of the frame.
– The receiving node compares the two CRC values. If the two values are the same,
the frame is considered to have arrived as transmitted.
– If the CRC value in the FCS differs from the CRC calculated at the receiving
node, the frame is discarded
* If the device is moved to another network or subnet,
– Layer 2 address will still function with the same Layer 2 physical address.
– Layer 3 address must be reassigned.
–
Download