Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
4 views7 pages

Data Link Layer

The document provides an overview of the Data Link Layer, detailing its two sublayers: Logical Link Control (LLC) and Media Access Control (MAC), along with the Ethernet technology that facilitates communication in local area networks. It outlines the advantages and disadvantages of Ethernet, explains how it operates, and describes the role of switches in managing network traffic. Additionally, it discusses VLANs as a solution to the limitations of link-layer switches, enhancing network management, security, and efficiency.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views7 pages

Data Link Layer

The document provides an overview of the Data Link Layer, detailing its two sublayers: Logical Link Control (LLC) and Media Access Control (MAC), along with the Ethernet technology that facilitates communication in local area networks. It outlines the advantages and disadvantages of Ethernet, explains how it operates, and describes the role of switches in managing network traffic. Additionally, it discusses VLANs as a solution to the limitations of link-layer switches, enhancing network management, security, and efficiency.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

Data Link Layer

Sub Layers of Data Link Layer:

1.​ Logical Link Control (LLC) Sublayer:


○​ Responsible for managing communication between the network layer
and the data link layer.
○​ Provides error checking and control, as well as flow control.
○​ Allows multiple network protocols to operate over the same physical
medium.
2.​ Media Access Control (MAC) Sublayer:
○​ Manages protocol access to the physical network medium.
○​ Determines how devices on the network communicate and access the
shared medium.
○​ Handles addressing and the framing of data packets

Ethernet: Ethernet is the traditional technology for connecting devices in a wired


local area network (LAN) or wide area network. It enables devices to communicate
with each other via a protocol, which is a set of rules or common network
language.
Advantages of Ethernet
Ethernet has many benefits for users, which is why it grew so popular. Here are
some of the common benefits of Ethernet:

●​ Relatively low cost.


●​ Generally resistant to noise.
●​ Good data transfer quality.
●​ Speed.
●​ Reliability.
●​ Data security, as common firewalls can be used.
Disadvantages of Ethernet
Despite its widespread use, Ethernet does have its share of disadvantages, such as
the following:

●​ Intended for smaller, shorter-distance networks.


●​ Limited mobility.
●​ Use of longer cables can create cross-talk.
●​ Doesn't work well with real-time or interactive applications.
●​ Speeds decrease with increased traffic.

How it works: Ethernet is a widely used networking technology that facilitates


communication between devices in a local area network (LAN). Here’s a
simplified explanation of how it works:
1. Basic Structure

●​ Frames: Data is transmitted in units called frames, which contain source and
destination MAC (Media Access Control) addresses, as well as
error-checking information.
●​ Medium: Ethernet can use various physical media, including twisted pair
cables (like Cat5e or Cat6), fiber optics, or coaxial cables.

2. Communication Process

●​ Sending Data: When a device wants to send data, it creates an Ethernet


frame containing the necessary information and data payload.
●​ Addressing: Each device on the network has a unique MAC address. The
sender’s MAC address is included in the frame, along with the recipient's
MAC address.
●​ Collision Detection: Ethernet uses a protocol called Carrier Sense Multiple
Access with Collision Detection (CSMA/CD). This means that before a
device transmits data, it "listens" to the network to check if it’s clear. If two
devices transmit simultaneously, a collision occurs, and both devices will
stop, wait a random amount of time, and try again.

3. Receiving Data

●​ Frame Reception: When a device receives a frame, it checks the destination


MAC address. If it matches its own, the device processes the data; if not, it
ignores the frame.
●​ Error Checking: Each frame includes a Frame Check Sequence (FCS) for
error detection. If the frame is corrupted, it will be discarded.

4. Switches and Hubs

●​ Hubs: In a basic setup, a hub broadcasts incoming frames to all devices.


This can lead to collisions and inefficiencies.
●​ Switches: More commonly, networks use switches that intelligently send
frames only to the intended recipient, reducing collisions and improving
efficiency.

Ethernet Technology:

IEEE 802.3: This is the main set of standards governing Ethernet technology. It
includes various specifications for different speeds and media types.
Common Types:

●​ 10BASE-T: 10 Mbps over twisted pair cable.


●​ 100BASE-TX (Fast Ethernet): 100 Mbps, also over twisted pair.
●​ 1000BASE-T (Gigabit Ethernet): 1 Gbps over twisted pair.
●​ 10GBASE-T: 10 Gbps over twisted pair.
●​ 100BASE-FX: Fast Ethernet over fiber optics.
●​ 1000BASE-SX/LX: Gigabit Ethernet over fiber optics.
Switch: Forwarding and filtering are two fundamental processes that switches
use to manage network traffic:
●​ Forwarding: This is the process of sending incoming frames to the
appropriate output port based on the destination MAC address. When a
switch receives a frame, it examines the MAC address and forwards the
frame only to the port connected to the destination device.
How forwarding works:
MAC Address Learning: When a switch receives a frame, it reads the source
MAC address and associates it with the port on which the frame was received. This
information is stored in a MAC address table (also known as a forwarding table or
content-addressable memory).

Forwarding Frames: For every incoming frame, the switch checks the destination
MAC address against its MAC address table:

o​ If the address is found: The switch forwards the frame only to the
corresponding port.
o​ If the address is not found: The switch floods the frame to all ports
(except the port it was received on), allowing the destination device to
respond and allowing the switch to learn the destination address for
future frames.

●​ Filtering: This refers to the process of blocking frames from being


forwarded to certain ports. A switch filters out frames destined for MAC
addresses that are not part of the connected network or for which there is no
valid entry in the switch's MAC address table. Filtering helps to prevent
unnecessary traffic from congesting the network.

Properties of Link-Layer Switching:


1.​ Transparent Operation:
o​ Switches operate at Layer 2 of the OSI model and are typically
transparent to devices on the network. They do not modify the frames
being transmitted.
2.​ Reduced Collision Domains:
o​ Each switch port represents a separate collision domain, which
reduces the likelihood of collisions and increases overall network
performance.
3.​ High Throughput:
o​ Switches can handle multiple simultaneous connections and provide
high throughput, making them suitable for high-traffic environments.
4.​ Full-Duplex Communication:
o​ Switches support full-duplex communication, allowing simultaneous
sending and receiving of frames on each port, further improving
performance.
5.​ Support for VLANs:
o​ Many switches can implement VLANs, allowing network
segmentation for better traffic management and security.
6.​ Quality of Service (QoS):
o​ Some switches support QoS features, enabling prioritization of certain
types of traffic (e.g., voice, video) to ensure performance and
reliability.

Drawbacks of Link Layer Switches


1.​ Broadcast Traffic:
o​ Issue: Switches forward broadcast frames to all devices on the same
network segment, which can lead to excessive traffic, reduced
network performance, and congestion.
2.​ Limited Scalability:
o​ Issue: As the number of devices increases, the amount of broadcast
and multicast traffic can overwhelm the network, making it less
efficient.
3.​ Security Concerns:
o​ Issue: All devices within the same broadcast domain can
communicate freely, potentially leading to security vulnerabilities, as
unauthorized devices may gain access to sensitive data.
4.​ Network Management:
o​ Issue: Managing a large flat network can be complex, making it
difficult to enforce policies or control traffic flows effectively.
5.​ Physical Limitations:
o​ Issue: Traditional switches operate within a single physical network,
limiting their ability to separate different types of traffic or user
groups.

VLAN: A Virtual Local Area Network (VLAN) is a logical grouping of devices


within a larger physical network that allows for better management, security, and
efficiency. VLANs enable network administrators to segment networks into
smaller, isolated sections, even if the devices are physically connected to the same
switch.
VLAN for solving the drawbacks of Link Layer switch:

Reduced Broadcast Domains:

●​ Solution: VLANs create separate logical networks within the same physical
switch. This segmentation reduces the size of broadcast domains, limiting
broadcast traffic and enhancing overall performance.0

●​ https://www.pynetlabs.com/what-is-collision-domain/#:~:text=If%20more%
20than%20one%20device,to%20the%20same%20collision%20domain.

Improved Scalability:

●​ Solution: By dividing the network into VLANs, organizations can manage


growth more effectively. Each VLAN can grow independently, reducing the
risk of broadcast storms.

Enhanced Security:

●​ Solution: VLANs can isolate sensitive data and resources. By grouping


users based on roles or departments, organizations can restrict access to only
those who need it, improving security.

Simplified Network Management:

●​ Solution: VLANs allow for easier implementation of network policies. For


example, Quality of Service (QoS) settings can be applied to specific
VLANs to prioritize traffic for critical applications.

Flexibility and Efficiency:


●​ Solution: VLANs enable the dynamic grouping of devices, regardless of
their physical location. This flexibility allows for more efficient use of
network resources and simplifies the reconfiguration of network segments.

You might also like