Data Link Layer
Data Link Layer
Data Link Layer
The data link layer is the second layer from the bottom in the OSI (Open System
Interconnection) network architecture model. It is responsible for the node-to-node
delivery of data. Its major role is to ensure error-free transmission of information.
DLL is also responsible for encoding, decoding, and organizing the outgoing and
incoming data.
This is considered the most complex layer of the OSI model as it hides all the
underlying complexities of the hardware from the other above layers. In this
article, we will discuss Data Link Layer in Detail along with its functions, and sub-
layers.
Framing
The packet received from the Network layer is known as a frame in the Data link
layer. At the sender’s side, DLL receives packets from the Network layer and
divides them into small frames, then, sends each frame bit-by-bit to the physical
layer. It also attaches some special bits (for error control and addressing) at the
header and end of the frame. At the receiver’s end, DLL takes bits from the
Physical layer organizes them into the frame, and sends them to the Network
layer.
Addressing
The data link layer encapsulates the source and destination’s MAC address/
physical address in the header of each frame to ensure node-to-node delivery.
MAC address is the unique hardware address that is assigned to the device while
manufacturing.
Error Control
Data can get corrupted due to various reasons like noise, attenuation, etc. So, it is
the responsibility of the data link layer, to detect the error in the transmitted data
and correct it using error detection and correction techniques respectively. DLL
adds error detection bits into the frame’s header, so that receiver can check
received data is correct or not. It adds reliability to phyiscal layer by adding
mechansims to detect and retransmit damaged or lost frames.
Flow Control
If the receiver’s receiving speed is lower than the sender’s sending speed, then this
can lead to an overflow in the receiver’s buffer and some frames may get lost. So,
it’s the responsibility of DLL to synchronize the sender’s and receiver’s speeds and
establish flow control between them.
Access Control
When multiple devices share the same communication channel there is a high
probability of collision, so it’s the responsibility of DLL to check which device has
control over the channel and CSMA/CD and CSMA/CA can be used to avoid
collisions and loss of frames in the channel.
As seen in the above diagram, four users are attempting to access the
same channel. To accommodate the four users without interfering with one
another, we utilize FDMA to split the channel into four frequency bands.
While we use F-TDMA for fixed allocation of time slots to users, we use D-
TDMA to assign time slots to users based on the traffic demand of the
channel.
From the figure, we see that the same channel-1 is reused to send data to
three different users because a reuse distance separates them.
By using a highly directional beam, we can minimize interference and
improve the quality of communication for users in the network. Additionally,
the MIMO system can increase the network’s capacity by allowing multiple
users to communicate simultaneously without affecting each other’s
signals.
This protocol provides us with some merits:
it helps us to optimize the use of power and minimize the wastage of
energy
we are able to save the channel bandwidth and utilize it more
effectively
it helps us reduce interference to near zero
we can control and regulate the energy we radiate to the receiver
A wired Local Area Network (LAN) is a type of network that uses physical cables to connect
devices within a relatively small geographic area, such as a home, office, or campus. Here's a
detailed look at how wired LANs work, including their components, types, and advantages.
1. Ethernet LAN:
o Description: The most common type of wired LAN, Ethernet LANs use Ethernet
protocols and cabling. They support speeds ranging from 10 Mbps (10BASE-T)
to 100 Gbps (100GBASE-T) or more.
o Standards: Common Ethernet standards include 10BASE-T (10 Mbps),
100BASE-TX (100 Mbps), 1000BASE-T (1 Gbps), and 10GBASE-T (10 Gbps).
2. Token Ring LAN (Less common today):
o Description: Token Ring networks use a token-passing protocol where a token
circulates around the network, and a device can only send data if it possesses the
token.
o Standards: The most common standard was IEEE 802.5, but Token Ring
networks are largely obsolete in favor of Ethernet.
1. Flexibility:
o Wired networks lack the mobility and flexibility of wireless networks. Devices
need to be physically connected with cables, which can limit movement and
requires more setup.
2. Installation Complexity:
o Installing a wired LAN involves running cables through walls, ceilings, or floors,
which can be complex and disruptive, especially in existing buildings.
3. Scalability:
o Expanding a wired LAN may require additional cabling and hardware, which can
be more cumbersome compared to adding new devices to a wireless network.