0% found this document useful (0 votes)
9 views

CN Lecture 12 - Data Link Layer - 15 March 2023

Uploaded by

Swapna Gupta
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views

CN Lecture 12 - Data Link Layer - 15 March 2023

Uploaded by

Swapna Gupta
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 23

DR.

APJ ABDUL KALAM TECHNICAL UNIVERSITY

B.Tech CS

COMPUTER NETWORKS
KCS603

Lecture 12
Data Link Layer
Data Link Layer
 Layer 2 of OSI Model

 Services
 Framing
 Error control
 Flow control
 Addressing & Medium access control
 Synchronization
 Multiple Access

Source @ Forouzen, TMH


Data Link Layer: Services
• Data Link Layer adds the reliability to the physical layer be adding
mechanisms :
 To detect and retransmit damaged, duplicate or lost frames

 In case of multiple devices are connected, which device has control

 If the receiving rate is slower, then flow of data is managed

Source @ Forouzen, TMH


Data Link Layer: Sub - Layers
 Data Link layer is divided into two sublayers:
 LLC Network Layer
 Responsible for error control Logical Link Control (LLC)
 Responsible for flow control Medium Access Control (MAC)
 MAC Physical Layer

 Responsible for multiple access resolutions

Source @ Forouzen, TMH


Unit – II
• Link layer:
– Framing, Error Detection and Correction,
– Flow control (Elementary Data Link Protocols, Sliding Window protocols).

• Medium Access Control and Local Area Networks:


– Channel allocation,
– Multiple access protocols, LAN standards,
– Link layer switches & bridges
(learning bridge and spanning tree algorithms).

Source @ Forouzen, TMH


Unit – II
• Link layer:
– Framing, Error Detection and Correction,
– Flow control (Elementary Data Link Protocols, Sliding Window protocols).

• Medium Access Control and Local Area Networks:


– Channel allocation,
– Multiple access protocols, LAN standards,
– Link layer switches & bridges
(learning bridge and spanning tree algorithms).

Source @ Forouzen, TMH


Multiple Access
 MAC ensures ease of transfer of data packets between two computer terminals.

 MAC tries for Non-collision approach i.e. A collision takes place when two or
more terminals transmit data simultaneously.
 In broadcast networks, single channel is shared by several stations.

 This channel can be allocated to only one transmitting user at a


time.

Source @ Forouzen, TMH


Channel Allocation Problem

 How the Channel can be allocated to


multiple users?
 Channel Allocation is a process in
which a single channel is divided and
allotted to multiple users in order to
carry user specific tasks.

Source @ Forouzen, TMH


Channel Allocation Schemes
 Static Channel Allocation or Fixed Channel Allocation
• Fixed portion of the frequency channel is allotted to each user.
• For N users, the bandwidth is divided into N channels

 Dynamic Channel Allocation


• Frequency bands are not permanently assigned to the users.
• This allocation scheme optimizes bandwidth usage
and results is faster transmissions.

Source @ Forouzen, TMH


Multiple Access Protocols

Source @ Forouzen, TMH


1. Channelization Protocols
• When a channel is divided into multiple users.
Reason : There is no conflict and collision in data transfer.

• Channelization is a multiple access method in which the available bandwidth


of a link is shared in time, frequency, or through code, between the different
stations.
1. Frequency Division Multiple Access (FDMA)
2. Time Division Multiple Access (TDMA)
3. Code Division Multiple Access (CDMA)
Channelization Protocols: FDMA
1. Frequency Division Multiple Access (FDMA)
• Here, FDMA splits its available radio frequency (RF) channel into multiple
sub-channels (smaller).
– For instance, an FM channel that’s 13 kHz wide in narrowband that carried just one
conversation previously gets split into two 6.5 kHz sub-channels, both able to carry separate
conversations.
– One can also establish a telephone-style conversation if they use one channel for receiving
and one channel for transmitting signals.

Multiple frequency
bands to multiple
users at same time

Source @ Forouzen, TMH


Channelization Protocols: TDMA
2. Time Division Multiple Access (TDMA)
• Here, TDMA splits its available time into time slots with same radio
frequency (RF) channel
– For instance, if the primary channel splits into four time slots, then each of them will take a
quarter of the original time to transmit the intended data and information.
– Say, an FM channel that’s 13 kHz wide assigns to User 1 for time t1 , User 2 for time t2, and
so on.

Same frequency band


to multiple users at
different time slots

Source @ Forouzen, TMH


Channelization Protocols: CDMA
3. Code Division Multiple Access (CDMA)
• CDMA doesn’t split the original RF channel into two or more time slots or
sub-channels but assigns a unique code to each of them.
– Unlike the FDMA method, CDMA has the very same frequency of transmission in every
slot. Also, unlike the TDMA method, CDMA transmits individual slots simultaneously.
– CDMA splits the primary RF channel into four code slots. Here, each slot can carry separate
conversations. It is because the receiver is only capable of reconstructing info sets from a
transmitter that has the very same code.

Multiple Codes to
multiple users at
same time

Source @ Forouzen, TMH


Multiple Access Protocols

Source @ Forouzen, TMH


2. Controlled Access Methods
• In controlled access, the stations consult one another to find
which station has the right to send.
• A station cannot send the data unless it has been authorized by
other stations.
• Three types of Controlled Access protocols:
1. Reservation
2. Polling
3. Token passing
Controlled Access: Reservation
1. Reservation

• In this method, a station needs to make a reservation before sending data.


• If N stations are there, N reservation slots must be there.
– Figure shows a scenario with five stations with a five-slot reservation
frame. Here, in the first interval station-1 is the only station with a
reservation time; and in second interval, station 1,3,4 are the only stations
with reservations and.

Advantage:
There are no possible collisions
As, all stations agree on which station is next to transmit.
Controlled Access: Polling
2. Polling
• This works with the topologies in which one station acts
as primary; and others as secondary stations.
• Role of primary station:
– Controls data transfer
– Gives control to secondary stations to transmit data or use channel
– Primary node is initiators of the session
Advantage:
There are no possible collisions
As, all stations agree on which station is next to transmit.
Controlled Access: Token Passing
3. Token Passing
• When stations in the network are organized in a ring
a special packet called a token circulates
• Role of token:
– Controls data transfer
– Gives control to a stations to transmit data or use channel
Concern Area:
• Time Duration
• Damaged / duplicate token
• Priority stations
References
• Chapter 12, Data Communication and Networking, Behrouz A Forouzan. 4th
Edition, McGraw Hill

• Difference Between FDMA, TDMA, and CDMA (byjus.com)


https://byjus.com/gate/difference-between-fdma-tdma-and-cdma/

• Controlled Access Protocols - Reservation, Polling & Token Passing - Studytonight


https://www.studytonight.com/post/controlled-access-protocols-reservation-polling-
token-passing
Multiple Access Protocols

Source @ Forouzen, TMH


Summary
Outcome of the lecture
If you want to make a solution of channel
 Services by Data Link Layer allocation, what you will suggest?
 Discuss role of Layer 2
 Differentiate MAC and LLC
 What is channel allocation and what is issue in it
 Static and dynamic channel allocation
 Why is channelization required? If you are making your own network,
 Discuss FDMA, TDMA, CDMA. which scheme you prefer?
 Differentiate Reservation and Polling scheme.
 Discuss the working of Token Passing.
THANK YOU

You might also like