Data Link Layer
Data Link Layer
LAYER
Presented by Group 3
Rafer, Alleia
Elimos, Remark
Gutierrez, John Patrick
Ignacio, Arcel Maean
Lunar, Kim Angelo
Padrigon, Noel Jr.
Preyra, Aaron
AGENDA
INTRODUCTION ERROR CONTROL
TOPICS COVERED
AGENDA
ERROR CONTROL IN TRANSMISSION EFFICIENCY
PRACTICE
IMPLICATIONS FOR CYBER
DATA LINK PROTOCOLS
SECURITY
ASYNCHRONOUS SUMMARY
TRANSMISSION
SYNCHRONOUS
TRANSMISSION
TOPICS COVERED
INTRODUCTION
set of rules
PROTOCOL
Media access control refers to the
need to control when computers
transmit. With point-to-point full-
duplex configurations, media
access control is unnecessary
because there are only two
computers on the circuit, and full-
duplex permits either computer to
transmit at any time.
Media access control becomes important
when several computers share the same
communication circuit, such as a point-
to-point configuration with a half-
duplex configuration that requires
computers to take turns or a multipoint
configuration in which several computers
share the same circuit. Here, it is critical
to ensure that no two computers attempt
to transmit data at the same time—but if
they do, there must be a way to recover
from the problem.
There are two fundamental
approaches to Media Access Control:
CONTENTION
CONTROLLED ACCESS
CONTENTION
ALOHA PROTOCOL
CSMA PROTOCOL
ALOHA PROTOCOL
a simple communication protocol where each source in
the network transmits data whenever it has a frame to
be transmitted.
If the frame is transmitted successfully, the next frame
will be transmitted. If the transmission is failed, the
source will send the same frame again.
Slotted Aloha is an improvement to the original Aloha
protocol, where discrete time slots were introduced to
increase the maximum throughput while reducing
collisions.
CSMA(Carrier Sense Multiple Access) PROTOCOL
2 Modification:
1. CSMA w/ Collision Detection(CSMA/CD) - stopping a
transmission as soon as a collision is detected.
2. CSMA w/ Collision Avoidance(CSMA/CA) - delaying the
transmission by a random interval if the channel is
sensed busy.
CONTROLLED
ACCESS
CONTROLLED ACCESS
With controlled access, one device controls the circuit and
determines which clients can transmit at what time. In
addition, the stations seek information from one another to
find which station has the right to send. It allows only one
node to send at a time, to avoid collision of messages on
shared medium.
1. ACCESS
RESERVATION REQUEST
RESERVATION
THUS,
THERE ARE SEVERAL TYPES OF POLLING:
ROLL-CALL POLLING HUB POLLING/
The controller works consecutively TOKEN PASSING
through a list of clients, first One device starts the poll and
polling client 1, then client 2, and so passes it to the next computer on
on, until all are polled. the multipoint circuit, which sends
Roll-call polling can be modified to its message and passes the poll to
select clients in priority so that the next. That computer then
some get polled more often than passes the poll to the next, and so
others. For example, one could on, until it reaches the first
increase the priority of client 1 by computer, which restarts the
using a polling sequence such as 1, process again.
2, 3, 1, 4, 5, 1, 6, 7, 1, 8, 9.
ROLL- CALL
POLLING
The polling requires one of the nodes to
be designated as a Master node (Primary
station).
In particular, the master node first sends
a message to node 1, saying that it (node
1) can transmit up to some maximum
number of frames.
After node 1 transmits some frames, the
master node tells node 2 it (node 2) can
transmit up to the maximum number of
frames.
ROLL- CALL
POLLING
RELATIVE
PERFORMANCE
RELATIVE RESPONSE
TIMES
ERROR
CONTROL
ERROR CONTROL
ERROR CONTROL IS THE TECHNIQUE OF DETECTING AND
CORRECTING BLOCKS OF DATA DURING COMMUNICATION.
TWO TYPES OF ERROR
SUCH AS A MISTAKE IN
SUCH AS THOSE THAT
TYPING A NUMBER, OCCUR DURING
USUALLY ARE CONTROLLED TRANSMISSION, ARE
THROUGH THE CONTROLLED BY THE
APPLICATION PROGRAM NETWORK HARDWARE
AND SOFTWARE
TWO CATEGORIES OF
NETWORK ERRORS
CORRUPTED LOST DATA
DATA
THIS IS WHERE DATA HAVE BEEN THIS WHERE THE DATA
CHANGED ACCIDENTALLY DELETED
NETWORK SHOULD BE
DESIGNED TO:
1 2 3
PREVENT DETECT CORRECT
INTER-EXCHANGE CARRIERS (IXCS) THAT PROVIDE DATA
TRANSMISSION CIRCUITS PROVIDE STATISTICAL
MEASURES SPECIFYING TYPICAL ERROR RATES AND THE
PATTERN OF ERRORS THAT CAN BE EXPECTED ON THE
CIRCUITS THEY LEASE. FOR EXAMPLE, THE ERROR RATE
MIGHT BE STATED AS 1 IN 500,000, MEANING THERE IS 1
BIT IN ERROR FOR EVERY 500,000 BITS TRANSMITTED
ERROR RATE
THE ERROR RATE IS THE NUMBER OF BIT ERRORS
PER UNIT TIME.
ERROR BURST
THE ERROR BURST ARE ERRORS THAT ARE NOT
UNIFORMLY DISTRIBUTED IN TIME
SOURCES OF
ERRORS
6 Attenuation
7 Intermodulation noise
LINE NOISE
LINE NOISE AND DISTORTION CAN CAUSE DATA
COMMUNICATION ERRORS. IN THIS CASE, NOISE IS
UNDESIRABLE ELECTRICAL SIGNALS. NOISE IS
INTRODUCED BY EQUIPMENT OR NATURAL
DISTURBANCES, AND IT DEGRADES THE PERFORMANCE
OF A COMMUNICATION CIRCUIT.
WHITE NOISE OR
GAUSIAN NOISE
IT IS CAUSED BY THE THERMAL AGITATION OF ELECTRONS
AND THEREFORE IS INESCAPABLE. EVEN IF THE EQUIPMENT
WERE PERFECT AND THE WIRES WERE PERFECTLY
INSULATED FROM ANY AND ALL EXTERNAL INTERFERENCE,
THERE STILL WOULD BE SOME WHITE NOISE. WHITE NOISE
USUALLY IS NOT A PROBLEM UNLESS IT BECOMES SO
STRONG THAT IT OBLITERATES THE TRANSMISSION
IMPULSE NOISE
IT IS THE PRIMARY SOURCE OF ERRORS IN DATA
COMMUNICATIONS. IT IS HEARD AS A CLICK OR A
∕
CRACKLING NOISE AND CAN LAST AS LONG AS 1 100
OF A SECOND. SUCH A CLICK DOES NOT REALLY AFFECT
VOICE COMMUNICATIONS, BUT IT CAN OBLITERATE A
GROUP OF DATA, CAUSING A BURST ERROR.
ATTENUATION
IT IS THE LOSS OF POWER A SIGNAL SUFFERS AS IT TRAVELS
FROM THE TRANSMITTING COMPUTER TO THE RECEIVING
COMPUTER . SOME POWER IS ABSORBED BY THE MEDIUM OR IS
LOST BEFORE IT REACHES THE RECEIVER. AS THE MEDIUM
ABSORBS POWER, THE SIGNAL BECOMES WEAKER, AND THE
RECEIVING EQUIPMENT HAS LESS AND LESS CHANCE OF
CORRECTLY INTERPRETING THE DATA.
INTERMODULATION
NOISE
IT IS A SPECIAL TYPE OF CROSS-TALK. THE SIGNALS
FROM TWO CIRCUITS COMBINE TO FORM A NEW
SIGNAL THAT FALLS INTO A FREQUENCY BAND
RESERVED FOR ANOTHER SIGNAL.
ERROR
PREVENTION
TECHNIQUES TO
PREVENT ERRORS
01 02 03 04 05
HAVING
REPEATERS
CHANGING
MOVING MULTIPLEXING TUNING OF
OR
SHIELDING CABLES TECHNIQUE EQUIPMENTS AMPLIFIER
SHIELDING
1 2 3
PARITY CHECKING CHECKSUM CYCLIC REDUNDANCY
CHECKING (CRC)
PARITY CHECKING
REDUNDANT BITS - ARE SOME EXTRA BINARY BITS THAT ARE NOT PART OF
THE ORIGINAL DATA, BUT THEY ARE GENERATED & ADDED TO THE ORIGINAL
DATA BIT. ALL THIS IS DONE TO ENSURE THAT THE DATA BITS DON'T GET
DAMAGED AND IF THEY DO, WE CAN RECOVER THEM.
P1 = 1 , 0, O ODD P1 = 1
P2 = 1, 1, 0 EVEN P2 = 0 P1 + P2 + P4 = 2 NO ERROR
P4 = 0, 1, 0 ODD P4 = 1
HOW ERROR FORWARD CORRECTION WORKS
P1 = 1 , 0, 1 P1 = 1 ODD
P2 = 1, 1, 1 P2 = 0 ODD P1 + P2 + P4 = 3 ERROR!
P4 = 0, 1, 1 P4 = 1 ODD
HOW ERROR FORWARD CORRECTION WORKS
SOLUTION:
P1 D3 D5 D7 P2 D3 D6 D7 P4 D5 D6 D7
A
1 1 0 1 = ODD 0 1 1 1 = ODD 1 0 1 1 = ODD
HOW ERROR FORWARD CORRECTION WORKS
P1 D3 D5 D7 P2 D3 D6 D7 P4 D5 D6 D7
A
1 1 0 1 = ODD 0 1 1 1 = ODD 1 0 1 1 = ODD
P1 = 1 P2 = 1 P4 = 1
THE START BIT AND STOP BIT ARE THE OPPOSITE OF EACH OTHER. TYPICALLY, THE
START BIT IS A 0 AND THE STOP BIT IS A 1. THERE IS NO FIXED DISTANCE BETWEEN
CHARACTERS BECAUSE THE TERMINAL TRANSMITS THE CHARACTER AS SOON AS IT IS
TYPED, WHICH VARIES WITH THE SPEED OF THE TYPIST. THE RECOGNITION OF THE
START AND STOP OF EACH MESSAGE (CALLED SYNCHRONIZATION) TAKES PLACE FOR
EACH INDIVIDUAL CHARACTER BECAUSE THE START BIT IS A SIGNAL THAT TELLS THE
RECEIVER TO START SAMPLING THE INCOMING BITS OF A CHARACTER SO THE DATA
BITS CAN BE INTERPRETED INTO THEIR PROPER CHARACTER STRUCTURE. A STOP BIT
INFORMS THE RECEIVER THAT THE CHARACTER HAS BEEN RECEIVED AND RESETS IT
FOR RECOGNITION OF THE NEXT START BIT.
ASYNCHRONOUS TRANSMISSION
WHEN THE SENDER IS WAITING FOR THE USER TO TYPE THE NEXT CHARACTER, NO
DATA ARE SENT; THE COMMUNICATION CIRCUIT IS IDLE. THIS IDLE TIME REALLY IS
ARTIFICIAL—SOME SIGNAL ALWAYS MUST BE SENT DOWN THE CIRCUIT. FOR
EXAMPLE, SUPPOSE THAT WE ARE USING A UNIPOLAR DIGITAL SIGNALING
TECHNIQUE WHERE +5 VOLTS INDICATES A 1 AND 0 VOLTS INDICATES A 0 (SEE
CHAPTER 3). EVEN IF WE SEND 0 VOLTS, WE ARE STILL SENDING A SIGNAL, A 0 IN
THIS CASE. ASYNCHRONOUS TRANSMISSION DEFINES THE IDLE SIGNAL (THE
SIGNAL THAT IS SENT DOWN THE CIRCUIT WHEN NO DATA ARE BEING
TRANSMITTED) AS THE SAME AS THE STOP BIT. WHEN THE SENDER FINISHES
TRANSMITTING A LETTER AND IS WAITING FOR MORE DATA TO SEND, IT SENDS A
CONTINUOUS SERIES OF STOP BITS.
ASYNCHRONOUS TRANSMISSION
SYNCHRONOUS
TRANSMISSION
CHARACTERS AND WE ARE USING AN 8-BIT CODE, THEN THERE ARE 100 × 8 =
SO WHY ARE THE STANDARD SIZES OF ETHERNET FRAMES ABOUT 1,500 BYTES?
BECAUSE ETHERNET WAS STANDARDIZED MANY YEARS AGO, WHEN ERRORS WERE
MORE COMMON. JUMBO AND SUPER JUMBO FRAME SIZES EMERGED FROM HIGHER
SPEED, HIGHLY ERROR-FREE FIBER-OPTIC NETWORKS.
SLEUTHING FOR THE RIGHT FRAME SIZE
THE IDEAL FRAME SIZE DEPENDS ON THE SPECIFIC APPLICATION AND THE PATTERN
OF MESSAGES IT GENERATES. FOR STANDARD COMMERCIAL, THE IDEAL FRAME SIZE
APPEARED TO BE BETWEEN 4,000 AND 8,000 BYTES. UNFORTUNATELY, NOT ALL
NETWORK SOFTWARE PACKAGES ENABLE NETWORK MANAGERS TO FINE-TUNE FRAME
SIZES IN THIS WAY.
IMPLICATIONS FOR
CYBER SECURITY
SOURCES AND PREVENTION OF ERROR ERRORS OCCUR IN ALL NETWORKS. ERRORS TEND TO OCCUR IN
GROUPS (OR BURSTS) RATHER THAN 1 BIT AT A TIME. THE PRIMARY SOURCES OF ERRORS ARE IMPULSE NOISES
(E.G., LIGHTNING), CROSS-TALK, ECHO, AND ATTENUATION. ERRORS CAN BE PREVENTED (OR AT LEAST
REDUCED) BY SHIELDING THE CABLES; MOVING CABLES AWAY FROM SOURCES OF NOISE AND POWER
SOURCES; USING REPEATERS (AND, TO A LESSER EXTENT, AMPLIFIERS); AND IMPROVING THE QUALITY OF THE
EQUIPMENT, MEDIA, AND THEIR CONNECTIONS.
ERROR DETECTION AND CORRECTION ALL ERROR-DETECTION SCHEMES ATTACH ADDITIONAL ERROR DETECTION
DATA, BASED ON A MATHEMATICAL CALCULATION, TO THE USER’S MESSAGE. THE RECEIVER PERFORMS THE SAME
CALCULATION ON INCOMING MESSAGES, AND IF THE RESULTS OF THIS CALCULATION DO NOT MATCH THE
ERROR-DETECTION DATA ON THE INCOMING MESSAGE, AN ERROR HAS OCCURRED. PARITY, CHECKSUM, AND CRC
ARE THE MOST COMMON ERROR-DETECTION SCHEMES. THE MOST COMMON ERROR-CORRECTION TECHNIQUE IS
SIMPLY TO ASK THE SENDER TO RETRANSMIT THE MESSAGE UNTIL IT IS RECEIVED WITHOUT ERROR. A DIFFERENT
APPROACH, FORWARD ERROR CORRECTION, INCLUDES SUFFICIENT INFORMATION TO ALLOW THE RECEIVER TO
CORRECT THE ERROR IN MOST CASES WITHOUT ASKING FOR A RETRANSMISSION.
MESSAGE DELINEATION MESSAGE DELINEATION MEANS TO INDICATE THE START AND END OF A MESSAGE.
ASYNCHRONOUS TRANSMISSION USES START AND STOP BITS ON EACH LETTER TO MARK WHERE THEY BEGIN AND
END. SYNCHRONOUS TECHNIQUES (E.G., SDLC, HDLC, ETHERNET, PPP) GROUP BLOCKS OF DATA TOGETHER INTO
FRAMES THAT USE SPECIAL CHARACTERS OR BIT PATTERNS TO MARK THE START AND END OF ENTIRE MESSAGES.
TRANSMISSION EFFICIENCY AND THROUGHPUT EVERY PROTOCOL ADDS ADDITIONAL BITS TO THE
USER’S MESSAGE BEFORE SENDING IT (E.G., FOR ERROR DETECTION). THESE BITS ARE CALLED
OVERHEAD BITS BECAUSE THEY ADD NO VALUE TO THE USER; THEY SIMPLY ENSURE CORRECT DATA
TRANSFER. THE EFFICIENCY OF A TRANSMISSION PROTOCOL IS THE NUMBER OF INFORMATION BITS
SENT BY THE USER DIVIDED BY THE TOTAL NUMBER OF BITS TRANSFERRED (INFORMATION BITS PLUS
OVERHEAD BITS). SYNCHRONOUS TRANSMISSION PRO VIDES GREATER EFFICIENCY THAN DOES
ASYNCHRONOUS TRANSMISSION. IN GENERAL, PROTOCOLS WITH LARGER FRAME SIZES PROVIDE
GREATER EFFICIENCY THAN DO THOSE WITH SMALL FRAME SIZES. THE DRAWBACK TO LARGE FRAME
SIZES IS THAT THEY ARE MORE LIKELY TO BE AFFECTED BY ERRORS AND THUS REQUIRE MORE RETRANS
MISSION. SMALL FRAME SIZES ARE THEREFORE BETTER SUITED TO ERROR-PRONE CIRCUITS, AND LARGE
FRAMES TO ERROR-FREE CIRCUITS