Preview

Data Link Layer

Powerful Essays
Open Document
Open Document
2855 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Data Link Layer
Table of Contents

Part 1: General review of data link layer 2

a) Explain the working principles of the data link layer. 2

b) Is controlled access better than contention for media access control? Discuss. 2

c) Why is error detection important in this layer? What is being measured? 3

d) Identify three significant noises that can cause errors in data communication digital circuits. Briefly explain. 3

Part 2: General review of error correction 4

a) Why is cyclical redundancy check (CRC) most popular error checking scheme? 4

b) How is Hamming distance used in error correction? Explain. 4

c) Briefly explain how parity is used to find the location of single-bit errors in the forward error correction method? 5

Part 3: Demonstration of data link protocols 5

a) Explain the necessity of data link protocols? 5

b) Asynchronous communication is sometimes called start-stop transmission. Discuss with necessary diagram? 6

c) Explain the Ethernet protocols categories? 6

References 8

Part 1: General review of data link layer

Explain the working principles of the data link layer.

The data link layer sits between the physical layer and the network layer. It is responsible for sending and receiving messages to and from other computers. It is responsible for moving a message from one computer to next computer where the message needs to go. The data link layer performs the main functions and is divided into two sub layers. The first sublayer called logical link control (LLC) sublayer and the second sublayer called media access control (MAC) sublayer. The LLC sublayer software at the sending computer is responsible for transmitting the network layer Protocol Data Unit (PDU) with the data link layer. At the receiving computer the MAC sublayer software takes the data link layer PDU from the LLC sublayer and coverts into a stream of bits and also controls when the physical layer actually transmits the bits over the

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Being made up of various parts each layer has a unique function in the network. Additionally, each layer incorporates things to the data which is transmitted from one point to the other. The protocols which work on this layer are HDLC, PPP as well as the frame relay protocol. HDLC protocol means High-Level Data Link Control protocol. An additional protocol which works on layers of the OSI model is the Point-to-Point protocol (PPP) that is just like HDLS protocol. The frame relay protocol works at the data links layer of the OSI model (Cisco, 2008).…

    • 254 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    - access layer. It ensures that when you have all network devices have access to the network then you can work up.…

    • 688 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    A Parity bit is a single bit that is added to the data, during data transmission for error checking or data loss that may have occurred. The parity bit is either zero or one.…

    • 764 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 1 Assignment

    • 987 Words
    • 4 Pages

    Layer 3: The network layer...This layer handles the routing of the data (sending it in the right direction to the right destination on outgoing transmissions and receiving incoming transmissions at the packet level). The network layer does routing and…

    • 987 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    The next two faults categories, excluding the OMISSION faults, emulate specific programming errors common to kernel code according to earlier studies [Sullivan and Chillarege, 1991; Christmansson and Chillarege, 1996].…

    • 285 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IEEE802 standard series protocol, the data link layer includes a logical link control (LLC) sublayer and the media access control (MAC) sub-layer which is located between the MAC layer and the physical LLC, which allows adaptation to different LLC media access technology and physical media. MAC sublayer as a separate, they will not change the impact of the media access method and higher level protocols. MAC disassembly of data and media access management of two modules, the completion of the data frame encapsulation, re-opened send and receive functions. Ethernet frame encapsulation format as shown in Table 1, where the destination address, source address, length / type field and the data generated by the four layer protocol module when transmitting data frames, data encapsulation module automatically adding data to be transmitted in the first seven bytes of preamble and a delimiter byte and add at the end of the data transfer byte sent four cyclic redundancy check code, if the data length is less than 46 bytes , the data is automatically filled in order to achieve the minimum length required when receiving data frame, the data will be automatically discarded removable module preamble and delimiter two fields.…

    • 312 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Data Link: The protocol layer that transfers data between adjacent network nodes (The switches and MAC addresses)…

    • 648 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    OSI Model Key Terms Table

    • 552 Words
    • 3 Pages

    | This Layer is what makes up the Data Link Layer of the OSI mode.…

    • 552 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Mis 589 Unit 7

    • 943 Words
    • 4 Pages

    Each computer in the network has software that operates at each of the layers and performs the functions required by those layers. Each layer in the network uses a formal…

    • 943 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 7

    • 2452 Words
    • 10 Pages

    Encapsulation is an attribute of object design. It means that all of the object's data is contained and hidden in the object and access to it restricted to members of that class. A procedure is a type of encapsulation because it combines a series of computer instructions. Likewise, a complex data type, such as a record or class, relies on encapsulation.…

    • 2452 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    Chapter 4 Study Guide

    • 2291 Words
    • 10 Pages

    Identifies the segment of data and provides for identification of the Transport Layer Protocol to use…

    • 2291 Words
    • 10 Pages
    Satisfactory Essays
  • Better Essays

    2. Think about experiences you have had with noise or interference in the communication process. Write one example of interference in the context, one example of interference in the sender, one example of interference in the receiver, and one example of interference in the channel. These examples can be from four different real-life communication situations, but they need to be different from the examples in the textbook. Select one of these examples and indicate how you could reduce or eliminate the noise or interference.…

    • 1071 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Coding Theory Case Study

    • 1093 Words
    • 3 Pages

    The first two aspects, error detecting and error correcting can be studied together. When a digital message is transmitted, it is done so by a sequence of 0’s and 1’s which encodes a given message. These messages have the potential of being corrupted by noise. Once a message is written an error-detecting code can be written into the message so that any errors can be detected and corrected before the message reaches its final destination. One of the most common types of error- detecting code is called a parity check. A parity check is “the process that ensure accurate data transmission between nodes during communication. A parity bit is appende to the original data bits to create an even or odd bit number; the number of bits with one value. The source then transmits this data via a link, and bits are checked and verified at the destination. Data is considered accurate if the number of bits (even or odd) matches the number transmitted from the source.” (Janseen, 2014) An example could be the message 1101. We add a 0 or 1 to the end of…

    • 1093 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Lesson1 Short Answer

    • 813 Words
    • 2 Pages

    2. Think about experiences you have had with noise or interference in the communication process. Write one example of interference in the context, one example of interference in the sender, one example of interference in the receiver, and one example of interference in the channel. These examples can be from four different real-life communication situations, but they need to be different from the examples in the textbook. Select one of these examples and indicate how you could reduce or eliminate the noise or interference.…

    • 813 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Deception Theory

    • 1268 Words
    • 6 Pages

    List and define the three types of noise that can interfere with the transmission of a message.…

    • 1268 Words
    • 6 Pages
    Satisfactory Essays