Computer Networking_ the Data Link Layer (Unit 3)
Computer Networking_ the Data Link Layer (Unit 3)
3)
This report provides detailed answers to the assignment questions on the Data Link Layer in
computer networking. Drawing from fundamental networking principles and specifications, it
covers the various functions, protocols, and technologies that operate at this crucial layer of the
OSI model.
Framing
Framing involves breaking the continuous data stream from the Network Layer into manageable
frames for transmission over the network. Each frame typically includes a header and trailer that
delineate its boundaries [1] . This process helps in synchronization, allowing the receiver to
identify the start and end of each frame, making it easier to handle and interpret the transmitted
data [1] .
Addressing
The Data Link Layer adds addressing information to the frame, including source and destination
addresses, which are typically MAC (Media Access Control) addresses [1] . These hardware
addresses are crucial for identifying devices on the same network segment. The source address
indicates the sender, while the destination address ensures that the frame reaches the intended
recipient [1] .
Access Control
Access control regulates how multiple devices share access to the communication medium,
especially in shared network environments [1] . It prevents multiple devices from attempting to
transmit data simultaneously, which would cause collisions. Techniques like Carrier Sense
Multiple Access with Collision Detection (CSMA/CD) coordinate access to the communication
medium, particularly in Ethernet networks [1] .
Parity Check
The simplest error detection method involves adding a parity bit to ensure that the number of 1s
in the data is even (even parity) or odd (odd parity). If the received data doesn't match the
expected parity, an error is detected. However, parity checks can only detect odd numbers of
bit errors and cannot identify which specific bits are in error.
Checksum
Checksums involve summing up the bits of data in specific blocks and appending the sum as a
checksum value. The receiver recalculates the checksum based on the received data and
compares it with the received checksum. If they don't match, an error is detected. Checksums
are commonly used in Internet protocols like IP and TCP.
PPP Architecture
PPP consists of three main components [1] :
1. A method for encapsulating datagrams over serial links
2. A Link Control Protocol (LCP) for establishing, configuring, and testing connections
3. Network Control Protocols (NCPs) for establishing and configuring different network-layer
protocols
PPP Operation
1. Establishment Phase: Using LCP to establish and configure the link
2. Authentication Phase (optional): Using protocols like PAP or CHAP
3. Network Layer Protocol Phase: Configuring network-layer protocols using NCPs
4. Termination Phase: Closing the link when communication completes
PPP Authentication
PAP (Password Authentication Protocol): A simple protocol where credentials are sent in
plain text
CHAP (Challenge-Handshake Authentication Protocol): A more secure protocol using a
challenge-response mechanism
Both HDLC and PPP are crucial for establishing reliable point-to-point connections, with PPP
being more widely used in modern networks due to its flexibility and additional features like
authentication.
Core Issues
When multiple devices transmit simultaneously on a shared medium, their signals can interfere
with each other, leading to collisions and data corruption [2] . The channel allocation problem
involves finding ways to allow multiple devices to share the medium while minimizing collisions
and ensuring fair access.
ALOHA
Pure ALOHA
Description: Devices transmit data whenever they have data to send, without checking if the
channel is busy [2] . If a collision occurs (detected by lack of acknowledgment), devices wait
for a random time and then retransmit.
Analogy: People talking in a group without any order; anyone can speak whenever they
want [2] .
Advantages: Simple and easy to implement.
Disadvantages: High collision probability, especially under heavy load. Maximum theoretical
efficiency is only about 18%.
Applications: Early wireless networks and satellite communications.
Slotted ALOHA
Description: Time is divided into discrete slots, and devices can only transmit at the
beginning of a slot [2] . This reduces the chance of partial collisions.
Analogy: Group discussion organized into time slots; people can only start speaking at the
beginning of a slot [2] .
Advantages: Better efficiency than Pure ALOHA, with a theoretical maximum of about 37%.
Disadvantages: Still susceptible to collisions and requires slot synchronization.
Applications: Enhanced versions are used in cellular networks for control channel access.
Reservation
Description: In reservation-based protocols, devices explicitly request permission to transmit
before actually sending data [3] . The timeline is divided into intervals: a reservation interval
(fixed length) and a data transmission interval (variable length) [3] . During the reservation
interval, each device can place a reservation in its slot if it has data to send. After the
reservation phase, devices transmit their data in the order of their reservations.
Analogy: Similar to students raising their hands to ask the teacher for permission before
speaking [3] .
Advantages:
Eliminates collisions during data transmission
Efficient under high load conditions
Disadvantages:
Introduces overhead due to the reservation phase
Not efficient for bursty traffic patterns
Applications: Satellite networks with significant propagation delay and wireless networks
with quality of service requirements [3] .
Polling
Description: A central controller (master or polling station) queries devices one by one to
check if they have data to transmit [3] . Only the device being polled is allowed to transmit
during its turn. The controller performs two essential functions: selection (telling a device it
has been selected) and poll (asking if it has data to send) [3] .
Analogy: The teacher goes around the room, asking each student if they have something to
say [3] .
Advantages:
Simple and orderly process
No collisions during data transmission
The central controller can enforce priorities
Disadvantages:
Overhead due to polling messages
Potential single point of failure (the central controller)
High latency with many devices to poll
Applications: Bluetooth communication, industrial networks requiring predictability, and
legacy terminal-to-mainframe communications [3] .
Token Passing
Description: Devices pass a special token or permission to transmit in a predefined order,
typically in a logical ring [3] . Only the device holding the token is allowed to transmit. After
finishing transmission or if it has no data to send, the device passes the token to the next
device in the sequence [3] .
Analogy: Like a special object (talking stick) that students must hold to speak [3] .
Advantages:
No collisions during data transmission
Distributed approach without a central controller
Fair access for all devices
Disadvantages:
Token loss or duplication can disrupt the network
Overhead in token passing
Potential high latency with many devices
Applications: Token Ring networks, FDDI networks, and industrial systems requiring
deterministic performance [3] .
Controlled access methods provide more structured access to the communication channel
compared to random access methods. While they introduce some overhead, they can be more
efficient under high load conditions and offer more predictable performance. The choice among
these methods depends on specific network requirements.
10BASE-T
Speed: 10 Mbps
Media: Twisted-pair copper cable (Category 3 or higher)
Maximum segment length: 100 meters
Uses RJ-45 connectors and a star topology
100BASE-TX
Speed: 100 Mbps
Media: Twisted-pair copper cable (Category 5 or higher)
Maximum segment length: 100 meters
Uses two pairs of wires
The most common Fast Ethernet standard
100BASE-FX
Speed: 100 Mbps
Media: Multi-mode fiber optic cable
Maximum segment length: 412 meters (half-duplex), 2 kilometers (full-duplex)
Uses two fiber strands
1000BASE-T
Speed: 1 Gbps
Media: Twisted-pair copper cable (Category 5e or higher)
Maximum segment length: 100 meters
Uses all four pairs of wires
Most common gigabit standard for end-user connections
1000BASE-SX
Speed: 1 Gbps
Media: Multi-mode fiber optic cable
Maximum segment length: 220-550 meters depending on fiber type
Optimized for short distances
1000BASE-LX
Speed: 1 Gbps
Media: Single-mode or multi-mode fiber
Maximum segment length: Up to 5 kilometers for single-mode
Optimized for longer distances
10GBASE-T
Speed: 10 Gbps
Media: Twisted-pair copper cable (Category 6A or higher)
Maximum segment length: 100 meters
10GBASE-SR
Speed: 10 Gbps
Media: Multi-mode fiber
Maximum segment length: 26-400 meters depending on fiber type
For short-range data center connections
10GBASE-LR
Speed: 10 Gbps
Media: Single-mode fiber
Maximum segment length: Up to 10 kilometers
FDDI Architecture
1. Unit-3.pdf
2. https://www.sanfoundry.com/controlled-access-protocols-in-computer-network/
3. https://www.scaler.in/controlled-access-protocols/