Week 3 Ch4 Part 2 Data Link Layer
Week 3 Ch4 Part 2 Data Link Layer
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1
Chapter 4 Part 2 - Sections & Objectives
§ 4.3 Data Link Layer Protocols
• Describe the purpose and function of the data link layer in preparing
communication for transmission on specific media.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
4.3 Data Link Layer
Protocols
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
Data Link Layer Protocols
Purpose of the Data Link Layer
§ The Data Link Layer
• Prepares network data for the physical network
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
Purpose of the Data Link Layer
The Data Link Layer
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
Purpose of the Data Link Layer
The Data Link Layer (Cont.)
Layer 2
Data Link
Addresses
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
Purpose of the Data Link Layer
Data Link Sublayers
§ Data link layer is divided into two sublayers:
• Logical Link Control (LLC)
o Communicates with the network layer.
o Identifies which network layer protocol is
being used for the frame.
o Allows multiple Layer 3 protocols, such as
IPv4 and IPv6, to utilize the same network
interface and media.
• Media Access Control (MAC)
o Defines the media access processes
performed by the hardware.
o Provides data link layer addressing and
access to various network technologies.
o Communicates with Ethernet to send and
receive frames over copper or fiber-optic
cable.
o Communicates with wireless technologies
such as Wi-Fi and Bluetooth.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7
Purpose of the Data Link Layer
Media Access Control
§ As packets travel from
the source host to the
destination host, they
travel over different
physical networks.
§ Physical networks can
consist of different
types of physical media
such as copper wires,
optical fibers, and
wireless consisting of
electromagnetic
signals, radio and
microwave frequencies,
and satellite links.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
Purpose of the Data Link Layer
Providing Access to Media
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10
Topologies
Controlling Access to the Media
§ Media access control is the
equivalent of traffic rules that
regulate the entrance of motor
vehicles onto a roadway.
§ The absence of any media access
control would be the equivalent of
vehicles ignoring all other traffic
and entering the road without
regard to the other vehicles.
§ However, not all roads and
entrances are the same.
§ Traffic can enter the road by
merging, by waiting for its turn at a
Sharing the stop sign, or by obeying signal
Media lights.
§ A driver follows a different set of
rules for each type of entrance.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
Topologies
Physical and Logical Topologies
§ Physical topology
Refers to the
physical connections
and identifies how
end devices and
infrastructure
devices such as
routers, switches,
and wireless access
points are
interconnected.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
Topologies
Physical and Logical Topologies (Cont.)
§ Logical Topology
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
WAN Topologies
Common Physical WAN Topologies
§ Point-to-Point - Permanent
link between two endpoints.
§ Hub and Spoke - A central
site interconnects branch
sites using point-to-point
links.
§ Mesh - Provides high
availability, but requires that
every end system be
interconnected to every
other system.
Administrative and physical
costs can be significant.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14
WAN Topologies
Physical Point-to-Point Topology
§ Frames are
placed on the
media by the
node at one
end and taken
from the
media by the
node at the
other end of
the point-to-
point circuit.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
WAN Topologies
Logical Point-to-Point Topology
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17
Media Access Control
LAN Topologies
§ Physical LAN Topologies
§ Half and Full Duplex
§ Media Access Control Methods
§ Contention-Based Access
• CSMA/CD vs. CSMA/CA
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18
LAN Topologies
Physical LAN Topologies
§ Star - End devices are connected to a central intermediate device. Use Ethernet switches.
§ Extended Star - Additional Ethernet switches interconnect other star topologies.
§ Bus - Used in legacy networks. All end systems are chained to each other and terminated in
some form on each end. Switches are not required to interconnect the end devices.
Bus topologies using coax cables were used in legacy Ethernet networks because it was
inexpensive and easy to set up.
§ Ring - End systems are connected to
their respective neighbor forming a ring.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19
LAN Topologies
Half and Full Duplex
§ Half-Duplex Communication
• Both devices can transmit and receive on the
media but cannot do so simultaneously.
• Used in legacy bus topologies and with
Ethernet hubs.
• WLANs also operate in half-duplex.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20
LAN Topologies
Half and Full Duplex (Cont.)
§ Full-Duplex Communication
• Both devices can transmit and receive on the media
at the same time.
• Data link layer assumes that the media is available
for transmission for both nodes at any time.
• Ethernet switches operate in full-duplex mode by
default, but can operate in half-duplex if connecting
to a device such as an Ethernet hub.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 21
LAN Topologies
Media Access Control Methods
§ Contention-Based Access
• Nodes operate in half-
duplex.
• Compete for the use of
the medium.
• Only one device can send
at a time.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 22
LAN Topologies
Media Access Control Methods (Cont.)
§ Controlled Access
• Each node has its own
time to use the
medium.
• Legacy Token Ring
LANs are an example
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 23
LAN Topologies
Contention-based Access - CSMA/CD
§ Carrier Sense Multiple Access/Collision
Detection (CSMA/CD) process is used in
half-duplex Ethernet LANs.
• Diagrams show normal operation
• If two devices transmit at the same time, a
collision will occur.
1 • Both devices will detect the collision on the
network.
• Data sent by both devices will be corrupted
and will need to be resent.
2 3
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 24
LAN Topologies
Contention-based Access - CSMA/CA
§ CSMA/CA
• Uses a method to detect if the
media is clear.
• Does not detect collisions but
attempts to avoid them by
waiting before transmitting.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 25
Media Access Control
Data Link Frame
§ The Frame § LAN and WAN Frames
• Header • 802.11 Wireless Frame
• Data • PPP Frame
• Trailer • HDLC
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 26
Data Link Frame
The Frame
§ Each frame type
has three basic
parts:
• Header
• Data
• Trailer
§ Structure of the
frame and the
fields contained in
the header and
trailer depend on
Layer 3 protocol.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 27
Data Link Frame
Frame Fields
§ Frame start and stop
indicator flags - Identifies
the beginning and end limits
of the frame.
§ Addressing - Indicates the
source and destination
nodes.
§ Type - Identifies the Layer 3
protocol in the data field.
§ Control - Identifies special
flow control services such
as QoS.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 29
Data Link Frame
LAN and WAN Frames
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 30
Summary
§ Data Link Layer Protocols
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 31