SlideShare ist ein Scribd-Unternehmen logo
1 von 28
Data Communications & Networking
                      Lecture-05


            Course Instructor : Sehrish Rafiq
            Department Of Computer Science
                     University Of Peshawar
Lecture overview
 OSI Model
 About OSI
 Interfaces between layers
 Organization of the layers
 Functions of physical layer
 Functions of Data Link Layer
OSI Model
 International standards Organization(ISO),1947,multi-national body.
 ISO is dedicated to worldwide agreement on international standards.
 An ISO standard that covers all aspects of network communications is the Open
  Systems Interconnection(OSI ) model.
 An open system is a model that allows two different systems to communicate,
  regardless of their underlying architecture.
 Vendor specific protocols close-off communication between unrelated systems.
 The purpose of the OSI model is to open communication between different
  systems without requiring changes to the logic of the underlying hardware and
  software.
OSI Model
 OSI is not a protocol, it is a model for understanding and designing a network
  architecture that is flexible, robust & interoperable.
 It is a layered framework for the design of network systems that allow for
  communication across all types of computer systems.
 It consists of seven separate but related layers, each of which defines a segment
  of the process of moving information across a network.
 Understanding the fundamentals of the OSI model provides a solid basis for the
  exploration of data communication.
OSI Model
Layered architecture
 Each layer defines a family of functions into discrete groups
  that became the layers.
 Each layer defines a family of functions distinct from those of
  the other layers.
 Comprehensive architecture.
 The OSI model allows complete transparency between
  otherwise incompatible systems.
Layered architecture
Peer-to-Peer Processes
 Within a single machine each layer calls upon the services of the layer just
    below it.
   Between machines, layer x on one machine communicates with layer x on
    another machine.
   This communication is goverened by an agreed upon series of rules and
    conventions called protocols.
   The process on each machine that communicate at a given layer are called peer-
    to-peer processes.
   Communication between machines is therefore a peer –to-peer process using
    the protocols appropriate to a given layer.
   Direct & indirect communication.
   Each layer in the sending machine adds its own information to the message it
    receives from the layer just above it and passes the whole package to the layer
    just below it.
Peer-to-Peer Processes
 This information is added in the form of headers & trailers(control
  data).
 Headers are added at layers 6,5,4,3 and 2.
 A trailer is only added at layer 2.
 No header or trailer is added at layer 7 and 1.
 At layer 1 the entire package is converted to a form that can be
  transferred to the receiving machine.
 At the receiving machine, the message is unwrapped layer by
  layer, with each process receiving and removing data meant for it.
Communication In OSI
Interfaces between layers
 The passing of the data and network information down through the
  layers of the sending machine and back up through the layers of the
  receiving machine is made possible by an interface between each pair
  of adjacent layers.

 Each interface defines what information and services a layer must
  provide for the layer above it.

 Well defined interfaces and layer functions provide modularity to a
  network.

 As long as a layer still provides the expected services to the layer above
  it,the specific implementation of its functions can be modified or
  replaced without requiring changes to the surrounding layers.
Organization of Layers

 User support layers




Network support layers
Organization of Layers continued…
 The Network support layers deal with the physical aspects of
  moving data from one device to another (such as electrical
  specifications, physical connections, physical addressing and
  transport timing and reliability).

 The user support layers allow interoperability among unrelated
  software systems.

 The transport layer ensures end-to-end reliable data transmission.
Organization of Layers continued…
 The data link layer ensures the reliable transmission on a single
  link.

 The application, presentation, session are implemented in
  software.

 Transport, network and data link are the combination of hardware
  and software.

 Physical layer is mostly hardware.
Functions of the layers
Physical Layer
Physical Layer
 The physical layer coordinates the functions required to
  transmit a bit stream over a physical medium.
 It deals with the mechanical and electrical specifications of
  the interface and transmission medium.
 It also defines the procedures and functions that physical
  devices and interfaces have to perform for transmission to
  occur.
Concerns of the physical layer
 Physical characteristics of interfaces and media
 The physical layer defines the characteristics of the interface between the
   devices and the transmission medium.
 It also defines the type of transmission medium.



 Representation of bits
 The physical layer data consist of a stream of bits without any interpretation.
 To be transmitted bits must be encoded int to signals-electrical or optical.
 The physical layer defines the type of encoding.
Physical layer continued…
 Data rate
 The transmission rate(the number of bits sent each second) is also defined by
  the physical layer.
 In other words the physical layer defines the duration of a bit, which is how
  long it lasts.


 Synchronization of bits
 The sender and the receiver must be synchronized at the bit level.
 In other words the sender and the receiver clocks must be synchronized.
Physical layer continued…
 Line configuration
 The physical layer is concerned with the connection of devices to the medium.
 Point-to-point configuration
 Multi-point


 Physical topology
 The physical topology defines how devices are connected to make a network.


 Transmission mode
 The physical layer also defines the direction of transmission between two
  devices.
Data Link Layer
 The data Link Layer transforms the physical layer, a raw
  transmission facility, to a reliable link and is responsible for node-
  to-node delivery.

 It makes the physical layer appear error free to the upper
  layer(network layer).
Data Link Layer
Responsibilities of the Data Link
              Layer
 Framing
 The data link layer divides the stream of bits received from the network
  layer in to manageable data units called frames.


 Physical addressing
 If frames are to be distributed to different systems on the network, the
  data link layer adds a header to the frame to define the physical address
  of the sender and receiver of the frame.
 If the frame is intended for the system outside the sender’s network, the
  receiver address is the address of the device that connects one network
  to the next.
Data Link Layer continued…
 Flow control
 If the rate at which the data are absorbed by the receiver is less than the
  rate produced in the sender, the data link layer imposes a flow control
  mechanism to prevent overwhelming the receiver.

 Error control
 The data link layer adds reliability to the physical layer by adding
  mechanisms to detect and retransmit damaged or lost frames.
 It also uses a mechanism to prevent duplication of frames.
 Error control is normally achieved through a trailer added to the end of
  the frame.
Data Link Layer continued…
 Access Control
 When two or more devices are connected to the same link,
  data link layer protocols are necessary to determine which
  device has control over the link at any given time.
Data Link Layer
Example of data link layer
Thanks!!!

Weitere ähnliche Inhalte

Was ist angesagt?

Network internet
Network internetNetwork internet
Network internet
Kumar
 
Computer Network
Computer NetworkComputer Network
Computer Network
Cma Mohd
 
Network Topologies
Network TopologiesNetwork Topologies
Network Topologies
dbrown1
 

Was ist angesagt? (20)

OSI Model
OSI ModelOSI Model
OSI Model
 
Computer network
Computer networkComputer network
Computer network
 
Introduction To Computer Networks
Introduction To Computer Networks Introduction To Computer Networks
Introduction To Computer Networks
 
Network Software, System Software, Hardware, Software, Firmware, App
Network Software, System Software, Hardware, Software, Firmware, AppNetwork Software, System Software, Hardware, Software, Firmware, App
Network Software, System Software, Hardware, Software, Firmware, App
 
Network Topology
Network Topology Network Topology
Network Topology
 
Osi model
Osi modelOsi model
Osi model
 
Hub, switch, router, bridge & and repeater
Hub, switch, router, bridge & and repeaterHub, switch, router, bridge & and repeater
Hub, switch, router, bridge & and repeater
 
Definition of computur netwoeks
Definition of computur netwoeksDefinition of computur netwoeks
Definition of computur netwoeks
 
Network Topology
Network TopologyNetwork Topology
Network Topology
 
Network internet
Network internetNetwork internet
Network internet
 
Class work 1
Class work 1Class work 1
Class work 1
 
Computer Network
Computer NetworkComputer Network
Computer Network
 
Class work4
Class work4Class work4
Class work4
 
Presentation on computer networking
Presentation on computer networkingPresentation on computer networking
Presentation on computer networking
 
Classification of computer networks
Classification of computer networksClassification of computer networks
Classification of computer networks
 
Data Communications and Computer Networks
Data Communications and Computer Networks Data Communications and Computer Networks
Data Communications and Computer Networks
 
Networking Cable
Networking CableNetworking Cable
Networking Cable
 
Classification of Computer
Classification of ComputerClassification of Computer
Classification of Computer
 
Network Topologies
Network TopologiesNetwork Topologies
Network Topologies
 
Network standards
Network standardsNetwork standards
Network standards
 

Ähnlich wie Lecture 05

OSI Reference Model-Lecture-2.pptx
OSI Reference Model-Lecture-2.pptxOSI Reference Model-Lecture-2.pptx
OSI Reference Model-Lecture-2.pptx
vishal choudhary
 
Osi model
Osi modelOsi model
Osi model
ufaq kk
 

Ähnlich wie Lecture 05 (20)

3. osi model
3. osi model3. osi model
3. osi model
 
OSI Model.It was created in 1983 by osi.
OSI Model.It was created in 1983 by osi.OSI Model.It was created in 1983 by osi.
OSI Model.It was created in 1983 by osi.
 
The Osi Model
The Osi ModelThe Osi Model
The Osi Model
 
seven layer OSI model
seven layer OSI modelseven layer OSI model
seven layer OSI model
 
THE OSI MODEL
THE OSI MODELTHE OSI MODEL
THE OSI MODEL
 
OSI Model of Networking
OSI Model of NetworkingOSI Model of Networking
OSI Model of Networking
 
OSI models
OSI modelsOSI models
OSI models
 
DCN _ unit 2.pptx
DCN _ unit 2.pptxDCN _ unit 2.pptx
DCN _ unit 2.pptx
 
Lecture 03
Lecture 03Lecture 03
Lecture 03
 
Unit 1 introduction
Unit 1 introductionUnit 1 introduction
Unit 1 introduction
 
OSI Reference Model-Lecture-2.pptx
OSI Reference Model-Lecture-2.pptxOSI Reference Model-Lecture-2.pptx
OSI Reference Model-Lecture-2.pptx
 
OSI MODEL
OSI MODELOSI MODEL
OSI MODEL
 
Lecture2
Lecture2Lecture2
Lecture2
 
OSI Network Reference Model
OSI Network Reference ModelOSI Network Reference Model
OSI Network Reference Model
 
Osi model
Osi modelOsi model
Osi model
 
Osi model 1
Osi model 1Osi model 1
Osi model 1
 
Osi model
Osi modelOsi model
Osi model
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
Lecture2
Lecture2Lecture2
Lecture2
 
OSI MODEL
    OSI MODEL    OSI MODEL
OSI MODEL
 

Mehr von Sehrish Rafiq

Data Communications and Networking Lecture 16
Data Communications and Networking Lecture 16Data Communications and Networking Lecture 16
Data Communications and Networking Lecture 16
Sehrish Rafiq
 

Mehr von Sehrish Rafiq (20)

Introduction to Computers Lecture # 13
Introduction to Computers Lecture # 13Introduction to Computers Lecture # 13
Introduction to Computers Lecture # 13
 
Introduction to Computers Lecture # 12
Introduction to Computers Lecture # 12Introduction to Computers Lecture # 12
Introduction to Computers Lecture # 12
 
Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11
 
Introduction to Computers Lecture # 10
Introduction to Computers Lecture # 10Introduction to Computers Lecture # 10
Introduction to Computers Lecture # 10
 
Introduction to Computers Lecture # 9
Introduction to Computers Lecture # 9Introduction to Computers Lecture # 9
Introduction to Computers Lecture # 9
 
Introduction to Computers Lecture # 8
Introduction to Computers Lecture # 8Introduction to Computers Lecture # 8
Introduction to Computers Lecture # 8
 
Introduction to Computers Lecture # 7
Introduction to Computers Lecture # 7Introduction to Computers Lecture # 7
Introduction to Computers Lecture # 7
 
Introduction to computers Lecture # 4
Introduction to computers Lecture # 4Introduction to computers Lecture # 4
Introduction to computers Lecture # 4
 
Introduction to Computers Lecture # 5
Introduction to Computers Lecture # 5Introduction to Computers Lecture # 5
Introduction to Computers Lecture # 5
 
Introduction to Computers Lecture # 3
Introduction to Computers Lecture # 3Introduction to Computers Lecture # 3
Introduction to Computers Lecture # 3
 
Introduction to Computers Lecture # 2
Introduction to Computers Lecture # 2Introduction to Computers Lecture # 2
Introduction to Computers Lecture # 2
 
Introduction to Computers Lecture # 1
Introduction to Computers Lecture # 1Introduction to Computers Lecture # 1
Introduction to Computers Lecture # 1
 
Data Communications and Networking Lecture 16
Data Communications and Networking Lecture 16Data Communications and Networking Lecture 16
Data Communications and Networking Lecture 16
 
Lecture 24
Lecture 24Lecture 24
Lecture 24
 
Lecture 18
Lecture 18Lecture 18
Lecture 18
 
Lecture 21
Lecture 21Lecture 21
Lecture 21
 
Lecture 13
Lecture 13Lecture 13
Lecture 13
 
Lecture 12
Lecture 12Lecture 12
Lecture 12
 
Lecture 11
Lecture 11Lecture 11
Lecture 11
 
Lecture 07
Lecture 07Lecture 07
Lecture 07
 

Kürzlich hochgeladen

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Kürzlich hochgeladen (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

Lecture 05

  • 1. Data Communications & Networking Lecture-05 Course Instructor : Sehrish Rafiq Department Of Computer Science University Of Peshawar
  • 2. Lecture overview  OSI Model  About OSI  Interfaces between layers  Organization of the layers  Functions of physical layer  Functions of Data Link Layer
  • 3. OSI Model  International standards Organization(ISO),1947,multi-national body.  ISO is dedicated to worldwide agreement on international standards.  An ISO standard that covers all aspects of network communications is the Open Systems Interconnection(OSI ) model.  An open system is a model that allows two different systems to communicate, regardless of their underlying architecture.  Vendor specific protocols close-off communication between unrelated systems.  The purpose of the OSI model is to open communication between different systems without requiring changes to the logic of the underlying hardware and software.
  • 4. OSI Model  OSI is not a protocol, it is a model for understanding and designing a network architecture that is flexible, robust & interoperable.  It is a layered framework for the design of network systems that allow for communication across all types of computer systems.  It consists of seven separate but related layers, each of which defines a segment of the process of moving information across a network.  Understanding the fundamentals of the OSI model provides a solid basis for the exploration of data communication.
  • 6. Layered architecture  Each layer defines a family of functions into discrete groups that became the layers.  Each layer defines a family of functions distinct from those of the other layers.  Comprehensive architecture.  The OSI model allows complete transparency between otherwise incompatible systems.
  • 8. Peer-to-Peer Processes  Within a single machine each layer calls upon the services of the layer just below it.  Between machines, layer x on one machine communicates with layer x on another machine.  This communication is goverened by an agreed upon series of rules and conventions called protocols.  The process on each machine that communicate at a given layer are called peer- to-peer processes.  Communication between machines is therefore a peer –to-peer process using the protocols appropriate to a given layer.  Direct & indirect communication.  Each layer in the sending machine adds its own information to the message it receives from the layer just above it and passes the whole package to the layer just below it.
  • 9. Peer-to-Peer Processes  This information is added in the form of headers & trailers(control data).  Headers are added at layers 6,5,4,3 and 2.  A trailer is only added at layer 2.  No header or trailer is added at layer 7 and 1.  At layer 1 the entire package is converted to a form that can be transferred to the receiving machine.  At the receiving machine, the message is unwrapped layer by layer, with each process receiving and removing data meant for it.
  • 11. Interfaces between layers  The passing of the data and network information down through the layers of the sending machine and back up through the layers of the receiving machine is made possible by an interface between each pair of adjacent layers.  Each interface defines what information and services a layer must provide for the layer above it.  Well defined interfaces and layer functions provide modularity to a network.  As long as a layer still provides the expected services to the layer above it,the specific implementation of its functions can be modified or replaced without requiring changes to the surrounding layers.
  • 12. Organization of Layers User support layers Network support layers
  • 13. Organization of Layers continued…  The Network support layers deal with the physical aspects of moving data from one device to another (such as electrical specifications, physical connections, physical addressing and transport timing and reliability).  The user support layers allow interoperability among unrelated software systems.  The transport layer ensures end-to-end reliable data transmission.
  • 14. Organization of Layers continued…  The data link layer ensures the reliable transmission on a single link.  The application, presentation, session are implemented in software.  Transport, network and data link are the combination of hardware and software.  Physical layer is mostly hardware.
  • 17. Physical Layer  The physical layer coordinates the functions required to transmit a bit stream over a physical medium.  It deals with the mechanical and electrical specifications of the interface and transmission medium.  It also defines the procedures and functions that physical devices and interfaces have to perform for transmission to occur.
  • 18. Concerns of the physical layer  Physical characteristics of interfaces and media  The physical layer defines the characteristics of the interface between the devices and the transmission medium.  It also defines the type of transmission medium.  Representation of bits  The physical layer data consist of a stream of bits without any interpretation.  To be transmitted bits must be encoded int to signals-electrical or optical.  The physical layer defines the type of encoding.
  • 19. Physical layer continued…  Data rate  The transmission rate(the number of bits sent each second) is also defined by the physical layer.  In other words the physical layer defines the duration of a bit, which is how long it lasts.  Synchronization of bits  The sender and the receiver must be synchronized at the bit level.  In other words the sender and the receiver clocks must be synchronized.
  • 20. Physical layer continued…  Line configuration  The physical layer is concerned with the connection of devices to the medium.  Point-to-point configuration  Multi-point  Physical topology  The physical topology defines how devices are connected to make a network.  Transmission mode  The physical layer also defines the direction of transmission between two devices.
  • 21. Data Link Layer  The data Link Layer transforms the physical layer, a raw transmission facility, to a reliable link and is responsible for node- to-node delivery.  It makes the physical layer appear error free to the upper layer(network layer).
  • 23. Responsibilities of the Data Link Layer  Framing  The data link layer divides the stream of bits received from the network layer in to manageable data units called frames.  Physical addressing  If frames are to be distributed to different systems on the network, the data link layer adds a header to the frame to define the physical address of the sender and receiver of the frame.  If the frame is intended for the system outside the sender’s network, the receiver address is the address of the device that connects one network to the next.
  • 24. Data Link Layer continued…  Flow control  If the rate at which the data are absorbed by the receiver is less than the rate produced in the sender, the data link layer imposes a flow control mechanism to prevent overwhelming the receiver.  Error control  The data link layer adds reliability to the physical layer by adding mechanisms to detect and retransmit damaged or lost frames.  It also uses a mechanism to prevent duplication of frames.  Error control is normally achieved through a trailer added to the end of the frame.
  • 25. Data Link Layer continued…  Access Control  When two or more devices are connected to the same link, data link layer protocols are necessary to determine which device has control over the link at any given time.
  • 27. Example of data link layer