SlideShare ist ein Scribd-Unternehmen logo
1 von 24
DATA LINK LAYER
IEEE STANDARDS FOR LAN
IEEE STANDARDS FOR LAN
 LLC
 LLC stands for logical link control. LLC is the upper sub layer of
the data link layer. It act as a interface between the media
access control sub layer and the network layer.LLC basic
function are flow control, error control, and framing.LLC also
provides SAP services in OSI model
 SAP
 Sap stands for Service Access Point. In data link protocol LLC
provides SAP services. A Service Access Point (SAP) is an
identifying label for network endpoints used in Open Systems
Interconnection (OSI) networking
IEEE STANDARDS FOR LAN
 MAC
The MAC layer is responsible for moving data packets to
and from one Network Interface Card (NIC) to another
across a shared channel
IEEE 802.3 MAC FRAME
 Function of the physical layer
 Encoding / Decoding of signals
 Preamble generation/removal (for bit level synchronization)
 Bit transmission / reception
 Include specification of the transmission / medium.
 Function of the medium access control (MAC) layer
 On transmission, assemble data into a frame with address and
error detection field
 On reception, dis assemble frame and perform address
recognition and error detection.
 Govern access to the LAN transmission medium
IEEE 802.3 MAC FRAME
 Function of the logical link control LLC
 Provide an interface to higher layer and perform flow and
error control.
10BASE5 IMPLEMENTATION
10BASE-T IMPLEMENTATION
STANDARD ETHERNET
 The original Ethernet was created in 1976 at
Xerox,s palo alto Research center (PARC). Since
then it has gone throw four generations.
WAN PROTOCOLS
 Leased lines two types of WAN encapsulation protocols
1) HDLC
2) PPP
 HDLC stands for High level data link control is a bit oriented
synchronous data link layer protocol. Developed by the
international organization for standards.
 HDLC main goal is to delivering data across the link without
any errors
 HDLC uses synchronous transmission.
HDLC PROTOCOLS
 HDLC need to determine if the data passed
the link without any errors
 HDLC discard the frame if error occurs
 To achieve this main goal HDLC defines
framing
PPP PROTOCOLS
 Comparing the basics PPP behaves much like HDLC.
 PPP does discard error frames that do not pass the FCS
checks.
 Additionally PPP uses a 2 byte protocol called Type Field
 Due to this 2 byte protocol called Type Field any vendor
that conforms to the PPP standard can communicate with
other vendor product.
 So when connecting a Cisco router to another vendors
router over a PPP serial link, PPP is the data link layer
protocol choice.
 This is why PPP has become the most popular and feature
rich of WAN data link layer protocol.
FRAME RELAY
 Frame relay network are multi-access networks, which
means that more then two devises can attached to the
network.
 For Frame relay service a leased line installed between
each router and a nearby frame relay switch, these links are
called Access Links
 instead of extending from one router to other each leased
lines are run from one router to a frame relay switch.
DIFFERENCE BETWEEN FRAME RELAY & PPP
 The difference between Frame relay and ppp
links is that the equipment in the Telco
actually examines the data frame sent by the
router .
 Frame relay defines its own data link header
and tailer .
 Each frame relay header hold an holds an
address field called a data link connection
identifier (DLCI)
IPV4 ADDRESSES
 If a devise want to communicate using
TCP/IP it needs an IP Address.
 An IP address consist of a 32 bit number
 An IPv4 address is a address that uniquely
and universally defines the connections of a
devise ( for example a computer and a
router) to the internet.
 168.1.1.1 is an IP address written in dotted
decimal
IPV4 ADDRESSES
 The actual Binary version is
168.1.1.1
 10101000 . 00000001 . 00010110 . 10101100
 Each decimal number in IP address is called an octet
 168. 1. 1. 1
 1st Octet 2nd Octet 3rd Octet 4th Octet
 1 Octet = 1 Byte = 8 bits
 4 Octets = 32 Bits IP address
 The address space (Range) of IPv4
 2^32 = 4,294,967,296.
CLASSFUL ADDRESSES
 In classful address, the address space is divided into five
classes: Class A, Class B, Class C, Class D and Class E.
 Range of IP Classes are
 Class A 0-127 1.0.0.0 to 126.0.0.0
 Class B 128-191 128.0.0.0 to 191.255.0.0
 Class C 192-223 192.0.0.0 to 223.255.255.0
 Class D 224-239 224.0.0.0 to 239.255.255.255
 Class E 240- 255 240.0.0.0 to
CLASSFUL ADDRESSES
 IP defines three different networks classes for addresses
used by individual hosts address called Uni cast addresses
 Uni cast IP addresses are
 Class A Uni Cast
 Class B Uni Cast
 Class C Uni Cast
 TCP/IP defines
 Class D Multicast
 Class E Experimental
IP ADDRESSES
 The organization in charge of universal IP
address assignment is the
 Internet corporation for assigned Network
Numbers ( ICANN )
 Administratively a central authority assigned
Class A, B and C networks to companies.
 Class A Large Networks
 Class B Medium Networks
 Class C Small Networks
IP ADDRESSES
 Network and Host Part in IP Addresses
 Classes in binary and dotted decimal notation.
PUBLIC AND PRIVATE ADDRESSES
 There are two types of addresses employed on the
Internet, public addresses and private addresses .
 Public IP Address
A public IP address is the address that is assigned to a
computing device to allow direct access over the Internet. A
web server, email server and any server device directly
accessible from the Internet are candidate for a public IP
address. A public IP address is globally unique, and can only be
assigned to a unique device.
 Private IP Address
A private IP address is the address space allocated by Inter
NIC to allow organizations to create their own private
network. The computers, tablets and Smartphone's sitting
behind your home, and the personal computers within an
SUBNETTING
 Creates multiple logical networks that exist
within a single Class A, B, or C network.
 If you do not subnet, you will only be able to
use one network from your Class A, B, or C
network, which is unrealistic
 Each data link on a network must have a
unique network ID, with every node on that
link being a member of the same network
BENEFITS OF SUBNETTING
1) Reduced network traffic
2) Optimized network performance
3) Simplified management
4) Facilitated spanning of large geographical
distances
CIDR
 Classless Interdomain Routing
 Improve address space utilization
 Routing scalability in the Internet
 For example, if an ISP owns network
172.16.0.0/16, then the ISP can offer
172.16.1.0/24, 172.16.2.0/24,and so on to
customers. Yet, when advertising to other
providers, the ISP only needs to advertise
172.16.0.0/16

Weitere ähnliche Inhalte

Was ist angesagt?

OPEN SHORTEST PATH FIRST (OSPF)
OPEN SHORTEST PATH FIRST (OSPF)OPEN SHORTEST PATH FIRST (OSPF)
OPEN SHORTEST PATH FIRST (OSPF)Ann Joseph
 
ASYNCHRONOUS TRANSFER MODE (ATM)
ASYNCHRONOUS TRANSFER MODE (ATM)ASYNCHRONOUS TRANSFER MODE (ATM)
ASYNCHRONOUS TRANSFER MODE (ATM)ZillayHuma Mehmood
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layerNaiyan Noor
 
Ch 19 Network-layer protocols Section 1
Ch 19  Network-layer protocols Section 1Ch 19  Network-layer protocols Section 1
Ch 19 Network-layer protocols Section 1Hossam El-Deen Osama
 
Fundamental of Quality of Service(QoS)
Fundamental of Quality of Service(QoS) Fundamental of Quality of Service(QoS)
Fundamental of Quality of Service(QoS) Reza Farahani
 
OSI and TCPIP Model
OSI and TCPIP ModelOSI and TCPIP Model
OSI and TCPIP ModelTapan Khilar
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)ArunChokkalingam
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSDr. SELVAGANESAN S
 
Unit 3 Network Layer PPT
Unit 3 Network Layer PPTUnit 3 Network Layer PPT
Unit 3 Network Layer PPTKalpanaC14
 
Ch 18 intro to network layer - section 1
Ch 18   intro to network layer - section 1Ch 18   intro to network layer - section 1
Ch 18 intro to network layer - section 1Hossam El-Deen Osama
 
Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer Dr. SELVAGANESAN S
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Chandra Meena
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networksguesta81d4b
 
Multicast Routing Protocols
Multicast Routing ProtocolsMulticast Routing Protocols
Multicast Routing ProtocolsRam Dutt Shukla
 
IEEE 802 Standard for Computer Networks
IEEE 802 Standard for Computer NetworksIEEE 802 Standard for Computer Networks
IEEE 802 Standard for Computer NetworksPradeep Kumar TS
 

Was ist angesagt? (20)

OPEN SHORTEST PATH FIRST (OSPF)
OPEN SHORTEST PATH FIRST (OSPF)OPEN SHORTEST PATH FIRST (OSPF)
OPEN SHORTEST PATH FIRST (OSPF)
 
ASYNCHRONOUS TRANSFER MODE (ATM)
ASYNCHRONOUS TRANSFER MODE (ATM)ASYNCHRONOUS TRANSFER MODE (ATM)
ASYNCHRONOUS TRANSFER MODE (ATM)
 
Data link layer
Data link layerData link layer
Data link layer
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
 
Ch 19 Network-layer protocols Section 1
Ch 19  Network-layer protocols Section 1Ch 19  Network-layer protocols Section 1
Ch 19 Network-layer protocols Section 1
 
Fundamental of Quality of Service(QoS)
Fundamental of Quality of Service(QoS) Fundamental of Quality of Service(QoS)
Fundamental of Quality of Service(QoS)
 
OSI and TCPIP Model
OSI and TCPIP ModelOSI and TCPIP Model
OSI and TCPIP Model
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)
 
Network layer
Network layerNetwork layer
Network layer
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
 
Unit 3 Network Layer PPT
Unit 3 Network Layer PPTUnit 3 Network Layer PPT
Unit 3 Network Layer PPT
 
Ch 18 intro to network layer - section 1
Ch 18   intro to network layer - section 1Ch 18   intro to network layer - section 1
Ch 18 intro to network layer - section 1
 
Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer
 
Data link layer
Data link layerData link layer
Data link layer
 
GO BACK N PROTOCOL
GO BACK N PROTOCOLGO BACK N PROTOCOL
GO BACK N PROTOCOL
 
Data Link Layer
Data Link LayerData Link Layer
Data Link Layer
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
 
Multicast Routing Protocols
Multicast Routing ProtocolsMulticast Routing Protocols
Multicast Routing Protocols
 
IEEE 802 Standard for Computer Networks
IEEE 802 Standard for Computer NetworksIEEE 802 Standard for Computer Networks
IEEE 802 Standard for Computer Networks
 

Ähnlich wie Data link layer

Networking
NetworkingNetworking
NetworkingRashmi
 
Report on ip addresses
Report on ip addressesReport on ip addresses
Report on ip addressesAmandeep Kaur
 
5 configuring TCP/IP
5 configuring TCP/IP5 configuring TCP/IP
5 configuring TCP/IPHameda Hurmat
 
Internet protocols
Internet protocolsInternet protocols
Internet protocolsRohit Saini
 
Computer networking (nnm)
Computer networking (nnm)Computer networking (nnm)
Computer networking (nnm)nnmaurya
 
Lecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notesLecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notesSerious_SamSoul
 
Automation and Robotics 20ME51I_Week_3_Practicals.pdf
Automation and Robotics 20ME51I_Week_3_Practicals.pdfAutomation and Robotics 20ME51I_Week_3_Practicals.pdf
Automation and Robotics 20ME51I_Week_3_Practicals.pdfGandhibabu8
 
Automation Networking By Shivam Singh
Automation Networking By Shivam SinghAutomation Networking By Shivam Singh
Automation Networking By Shivam SinghShivam Singh
 
Session 2 Tp 2
Session 2 Tp 2Session 2 Tp 2
Session 2 Tp 2githe26200
 
Concept of networking
Concept of networkingConcept of networking
Concept of networkingsumit dimri
 
Free CCNA workbook by networkers home pdf
Free CCNA workbook by networkers home pdfFree CCNA workbook by networkers home pdf
Free CCNA workbook by networkers home pdfNetworkershome
 

Ähnlich wie Data link layer (20)

Networking
NetworkingNetworking
Networking
 
Digital network lecturer2
Digital network  lecturer2Digital network  lecturer2
Digital network lecturer2
 
Hardware9
Hardware9Hardware9
Hardware9
 
Ccna1v3 Mod09
Ccna1v3 Mod09Ccna1v3 Mod09
Ccna1v3 Mod09
 
Internetworking
InternetworkingInternetworking
Internetworking
 
IP Address
IP AddressIP Address
IP Address
 
Report on ip addresses
Report on ip addressesReport on ip addresses
Report on ip addresses
 
5 configuring TCP/IP
5 configuring TCP/IP5 configuring TCP/IP
5 configuring TCP/IP
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
 
Internet protocols
Internet protocolsInternet protocols
Internet protocols
 
Linux Internals - Interview essentials 2.0
Linux Internals - Interview essentials 2.0Linux Internals - Interview essentials 2.0
Linux Internals - Interview essentials 2.0
 
Computer networking (nnm)
Computer networking (nnm)Computer networking (nnm)
Computer networking (nnm)
 
OSI model.pptx
OSI model.pptxOSI model.pptx
OSI model.pptx
 
Lecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notesLecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notes
 
Automation and Robotics 20ME51I_Week_3_Practicals.pdf
Automation and Robotics 20ME51I_Week_3_Practicals.pdfAutomation and Robotics 20ME51I_Week_3_Practicals.pdf
Automation and Robotics 20ME51I_Week_3_Practicals.pdf
 
Automation Networking By Shivam Singh
Automation Networking By Shivam SinghAutomation Networking By Shivam Singh
Automation Networking By Shivam Singh
 
CCNA
CCNACCNA
CCNA
 
Session 2 Tp 2
Session 2 Tp 2Session 2 Tp 2
Session 2 Tp 2
 
Concept of networking
Concept of networkingConcept of networking
Concept of networking
 
Free CCNA workbook by networkers home pdf
Free CCNA workbook by networkers home pdfFree CCNA workbook by networkers home pdf
Free CCNA workbook by networkers home pdf
 

Kürzlich hochgeladen

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Kürzlich hochgeladen (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

Data link layer

  • 3. IEEE STANDARDS FOR LAN  LLC  LLC stands for logical link control. LLC is the upper sub layer of the data link layer. It act as a interface between the media access control sub layer and the network layer.LLC basic function are flow control, error control, and framing.LLC also provides SAP services in OSI model  SAP  Sap stands for Service Access Point. In data link protocol LLC provides SAP services. A Service Access Point (SAP) is an identifying label for network endpoints used in Open Systems Interconnection (OSI) networking
  • 4. IEEE STANDARDS FOR LAN  MAC The MAC layer is responsible for moving data packets to and from one Network Interface Card (NIC) to another across a shared channel
  • 5. IEEE 802.3 MAC FRAME  Function of the physical layer  Encoding / Decoding of signals  Preamble generation/removal (for bit level synchronization)  Bit transmission / reception  Include specification of the transmission / medium.  Function of the medium access control (MAC) layer  On transmission, assemble data into a frame with address and error detection field  On reception, dis assemble frame and perform address recognition and error detection.  Govern access to the LAN transmission medium
  • 6. IEEE 802.3 MAC FRAME  Function of the logical link control LLC  Provide an interface to higher layer and perform flow and error control.
  • 9. STANDARD ETHERNET  The original Ethernet was created in 1976 at Xerox,s palo alto Research center (PARC). Since then it has gone throw four generations.
  • 10. WAN PROTOCOLS  Leased lines two types of WAN encapsulation protocols 1) HDLC 2) PPP  HDLC stands for High level data link control is a bit oriented synchronous data link layer protocol. Developed by the international organization for standards.  HDLC main goal is to delivering data across the link without any errors  HDLC uses synchronous transmission.
  • 11. HDLC PROTOCOLS  HDLC need to determine if the data passed the link without any errors  HDLC discard the frame if error occurs  To achieve this main goal HDLC defines framing
  • 12. PPP PROTOCOLS  Comparing the basics PPP behaves much like HDLC.  PPP does discard error frames that do not pass the FCS checks.  Additionally PPP uses a 2 byte protocol called Type Field  Due to this 2 byte protocol called Type Field any vendor that conforms to the PPP standard can communicate with other vendor product.  So when connecting a Cisco router to another vendors router over a PPP serial link, PPP is the data link layer protocol choice.  This is why PPP has become the most popular and feature rich of WAN data link layer protocol.
  • 13. FRAME RELAY  Frame relay network are multi-access networks, which means that more then two devises can attached to the network.  For Frame relay service a leased line installed between each router and a nearby frame relay switch, these links are called Access Links  instead of extending from one router to other each leased lines are run from one router to a frame relay switch.
  • 14. DIFFERENCE BETWEEN FRAME RELAY & PPP  The difference between Frame relay and ppp links is that the equipment in the Telco actually examines the data frame sent by the router .  Frame relay defines its own data link header and tailer .  Each frame relay header hold an holds an address field called a data link connection identifier (DLCI)
  • 15. IPV4 ADDRESSES  If a devise want to communicate using TCP/IP it needs an IP Address.  An IP address consist of a 32 bit number  An IPv4 address is a address that uniquely and universally defines the connections of a devise ( for example a computer and a router) to the internet.  168.1.1.1 is an IP address written in dotted decimal
  • 16. IPV4 ADDRESSES  The actual Binary version is 168.1.1.1  10101000 . 00000001 . 00010110 . 10101100  Each decimal number in IP address is called an octet  168. 1. 1. 1  1st Octet 2nd Octet 3rd Octet 4th Octet  1 Octet = 1 Byte = 8 bits  4 Octets = 32 Bits IP address  The address space (Range) of IPv4  2^32 = 4,294,967,296.
  • 17. CLASSFUL ADDRESSES  In classful address, the address space is divided into five classes: Class A, Class B, Class C, Class D and Class E.  Range of IP Classes are  Class A 0-127 1.0.0.0 to 126.0.0.0  Class B 128-191 128.0.0.0 to 191.255.0.0  Class C 192-223 192.0.0.0 to 223.255.255.0  Class D 224-239 224.0.0.0 to 239.255.255.255  Class E 240- 255 240.0.0.0 to
  • 18. CLASSFUL ADDRESSES  IP defines three different networks classes for addresses used by individual hosts address called Uni cast addresses  Uni cast IP addresses are  Class A Uni Cast  Class B Uni Cast  Class C Uni Cast  TCP/IP defines  Class D Multicast  Class E Experimental
  • 19. IP ADDRESSES  The organization in charge of universal IP address assignment is the  Internet corporation for assigned Network Numbers ( ICANN )  Administratively a central authority assigned Class A, B and C networks to companies.  Class A Large Networks  Class B Medium Networks  Class C Small Networks
  • 20. IP ADDRESSES  Network and Host Part in IP Addresses  Classes in binary and dotted decimal notation.
  • 21. PUBLIC AND PRIVATE ADDRESSES  There are two types of addresses employed on the Internet, public addresses and private addresses .  Public IP Address A public IP address is the address that is assigned to a computing device to allow direct access over the Internet. A web server, email server and any server device directly accessible from the Internet are candidate for a public IP address. A public IP address is globally unique, and can only be assigned to a unique device.  Private IP Address A private IP address is the address space allocated by Inter NIC to allow organizations to create their own private network. The computers, tablets and Smartphone's sitting behind your home, and the personal computers within an
  • 22. SUBNETTING  Creates multiple logical networks that exist within a single Class A, B, or C network.  If you do not subnet, you will only be able to use one network from your Class A, B, or C network, which is unrealistic  Each data link on a network must have a unique network ID, with every node on that link being a member of the same network
  • 23. BENEFITS OF SUBNETTING 1) Reduced network traffic 2) Optimized network performance 3) Simplified management 4) Facilitated spanning of large geographical distances
  • 24. CIDR  Classless Interdomain Routing  Improve address space utilization  Routing scalability in the Internet  For example, if an ISP owns network 172.16.0.0/16, then the ISP can offer 172.16.1.0/24, 172.16.2.0/24,and so on to customers. Yet, when advertising to other providers, the ISP only needs to advertise 172.16.0.0/16