27
Search | Glossary Course Index: 7 Data Link Layer Select CCNA Exploration - Network Fundamentals 7 Data Link Layer 7.0 Chapter Introduction 7.0.1 Chapter Introduction Page 1: To support our communication, the OSI model divides the functions of a data network into layers. To recap: The Application layer provides the interface to the user. The Transport layer is responsible for dividing and managing communications between the processes running in the two end systems. The Network layer protocols organize our communication data so that it can travel across internetworks from the originating host to a destination host. For Network layer packets to be transported from source host to destination host, they must traverse different physical networks. These physical networks can consist of different types of physical media such as copper wires, microwaves, optical fibers, and satellite links. Network layer packets do not have a way to directly access these different media. It is the role of the OSI Data Link layer to prepare Network layer packets for transmission and to control access to the physical media. This chapter introduces the general functions of the Data Link layer and the protocols associated with it. Learning Objectives Upon completion of this chapter, you will be able to: Explain the role of Data Link layer protocols in data transmission. Describe how the Data Link layer prepares data for transmission on network media. Describe the different types of media access control methods. Identify several common logical network topologies and describe how the logical topology determines the media access control method for that network. Explain the purpose of encapsulating packets into frames to facilitate media access. Describe the Layer 2 frame structure and identify generic fields. Explain the role of key frame header and trailer fields, including addressing, QoS, type of protocol, and Frame Check Sequence. 7.1 Data Link Layer - Accessing the Media 7.1.1 Data Link Layer - Supporting & Connecting to Upper Layer Services Page 1: The Data Link layer provides a means for exchanging data over a common local media. 2/12/2011 CISCO Accessible Theme ev-iip.netacad.net/virtuoso/…/main.html… 1/27

CISCO-7 Data Link Layer

Embed Size (px)

Citation preview

Page 1: CISCO-7 Data Link Layer

Search | Glossary

Course Index:

7 Data Link Layer Select

CCNA Exploration - Network Fundamentals7 Data Link Layer7.0 Chapter Introduction7.0.1 Chapter Introduction

Page 1:To support our communication, the OSI model divides the functions of a data network into layers.

To recap:

The Application layer provides the interface to the user.The Transport layer is responsible for dividing and managing communications between theprocesses running in the two end systems.The Network layer protocols organize our communication data so that it can travel acrossinternetworks from the originating host to a destination host.

For Network layer packets to be transported from source host to destination host, they must traversedifferent physical networks. These physical networks can consist of different types of physical mediasuch as copper wires, microwaves, optical fibers, and satellite links. Network layer packets do not havea way to directly access these different media.

It is the role of the OSI Data Link layer to prepare Network layer packets for transmission and to controlaccess to the physical media.

This chapter introduces the general functions of the Data Link layer and the protocols associated with it.

Learning Objectives

Upon completion of this chapter, you will be able to:

Explain the role of Data Link layer protocols in data transmission.Describe how the Data Link layer prepares data for transmission on network media.Describe the different types of media access control methods.Identify several common logical network topologies and describe how the logical topologydetermines the media access control method for that network.Explain the purpose of encapsulating packets into frames to facilitate media access.Describe the Layer 2 frame structure and identify generic fields.Explain the role of key frame header and trailer fields, including addressing, QoS, type ofprotocol, and Frame Check Sequence.

7.1 Data Link Layer - Accessing the Media7.1.1 Data Link Layer - Supporting & Connecting to Upper Layer Services

Page 1:The Data Link layer provides a means for exchanging data over a common local media.

2/12/2011 CISCO Accessible Theme

ev-iip.netacad.net/virtuoso/…/main.html… 1/27

Page 2: CISCO-7 Data Link Layer

The Data Link layer performs two basic services:

Allows the upper layers to access the media using techniques such as framingControls how data is placed onto the media and is received from the media using techniquessuch as media access control and error detection

As with each of the OSI layers, there are terms specific to this layer:

Frame - The Data Link layer PDU

Node - The Layer 2 notation for network devices connected to a common medium

Media/medium (physical)* - The physical means for the transfer of information between two nodes

Network (physical)** - Two or more nodes connected to a common medium

The Data Link layer is responsible for the exchange of frames between nodes over the media of aphysical network.

* It is important to understand the meaning of the words medium and media within the context of thischapter. Here, these words refer to the material that actually carries the signals representing thetransmitted data. Media is the physical copper cable, optical fiber, or atmosphere through which thesignals travel. In this chapter media does not refer to content programming such as audio, animation,television, and video as used when referring to digital content and multimedia.

** A physical network is different from a logical network. Logical networks are defined at the Networklayer by the arrangement of the hierarchical addressing scheme. Physical networks represent theinterconnection of devices on a common media. Sometimes, a physical network is also referred to as anetwork segment.

Page 2:Upper Layer Access to Media

As we have discussed, a network model allows each layer to function with minimal concern for the rolesof the other layers. The Data Link layer relieves the upper layers from the responsibility of putting dataon the network and receiving data from the network. This layer provides services to support thecommunication processes for each medium over which data is to be transmitted.

In any given exchange of Network layer packets, there may be numerous Data Link layer and mediatransitions. At each hop along the path, an intermediary device - usually a router - accepts frames froma medium, decapsulates the frame, and then forwards the packet in a new frame appropriate to themedium of that segment of the physical network.

Imagine a data conversation between two distant hosts, such as a PC in Paris with an Internet server inJapan. Although the two hosts may be communicating with their peer Network layer protocols (IP forexample), it is likely that numerous Data Link layer protocols are being used to transport the IP packetsover various types of LANs and WANs. This packet exchange between two hosts requires a diversity ofprotocols that must exist at the Data Link layer. Each transition at a router could require a different DataLink layer protocol for transport on a new medium.

Notice in the figure that each link between devices uses a different medium. Between the PC and therouter may be an Ethernet link. The routers are connected through a satellite link, and the laptop isconnected through a wireless link to the last router. In this example, as an IP packet travels from the PC

2/12/2011 CISCO Accessible Theme

ev-iip.netacad.net/virtuoso/…/main.html… 2/27

Page 3: CISCO-7 Data Link Layer

to the laptop, it will be encapsulated into Ethernet frame, decapsulated, processed, and thenencapsulated into a new data link frame to cross the satellite link. For the final link, the packet will use awireless data link frame from the router to the laptop.

The Data Link layer effectively insulates the communication processes at the higher layers from themedia transitions that may occur end-to-end. A packet is received from and directed to an upper layerprotocol, in this case IPv4 or IPv6, that does not need to be aware of which media the communicationwill use.

Without the Data Link layer, a Network layer protocol, such as IP, would have to make provisions forconnecting to every type of media that could exist along a delivery path. Moreover, IP would have toadapt every time a new network technology or medium was developed. This process would hamperprotocol and network media innovation and development. This is a key reason for using a layeredapproach to networking.

The range of Data Link layer services has to include all of the currently used types of media and themethods for accessing them. Because of the number of communication services provided by the DataLink layer, it is difficult to generalize their role and provide examples of a generic set of services. Forthat reason, please note that any given protocol may or may not support all these Data Link layerservices.

Internetworking Basics - http://www.cisco.com/en/US/docs/internetworking/technology/handbook/Intro-to-Internet.html

MTU - http://www.tcpipguide.com/free/t_IPDatagramSizeMaximumTransmissionUnitMTUFragmentat.htm

7.1.2 Data Link Layer - Controlling Transfer across Local Media

Page 1:Layer 2 protocols specify the encapsulation of a packet into a frame and the techniques for getting theencapsulated packet on and off each medium. The technique used for getting the frame on and offmedia is called the media access control method. For the data to be transferred across a number ofdifferent media, different media access control methods may be required during the course of a singlecommunication.

Each network environment that packets encounter as they travel from a local host to a remote host canhave different characteristics. For example, one network environment may consist of many hostscontending to access the network medium on an ad hoc basis. Another environment may consist of adirect connection between only two devices over which data flows sequentially as bits in an orderly way.

The media access control methods described by the Data Link layer protocols define theprocesses by which network devices can access the network media and transmit frames indiverse network environments.

A node that is an end device uses an adapter to make the connection to the network. For example, toconnect to a LAN, the device would use the appropriate Network Interface Card (NIC) to connect to theLAN media. The adapter manages the framing and media access control.

At intermediary devices such as a router, where the media type could change for each connectednetwork, different physical interfaces on the router are used to encapsulate the packet into theappropriate frame, and a suitable media access control method is used to access each link. The routerin the figure has an Ethernet interface to connect to the LAN and a serial interface to connect to theWAN. As the router processes frames, it will use Data Link layer services to receive the frame from onemedium, decapsulate it to the Layer 3 PDU, re-encapsulate the PDU into a new frame, and place the

2/12/2011 CISCO Accessible Theme

ev-iip.netacad.net/virtuoso/…/main.html… 3/27

Page 4: CISCO-7 Data Link Layer

frame on the medium of the next link of the network.

7.1.3 Data Link Layer - Creating a Frame

Page 1:The description of a frame is a key element of each Data Link layer protocol. Data Link layer protocolsrequire control information to enable the protocols to function. Control information may tell:

Which nodes are in communication with each otherWhen communication between individual nodes begins and when it endsWhich errors occurred while the nodes communicatedWhich nodes will communicate next

The Data Link layer prepares a packet for transport across the local media by encapsulating it with aheader and a trailer to create a frame.

Unlike the other PDUs that have been discussed in this course, the Data Link layer frame includes:

Data - The packet from the Network layerHeader - Contains control information, such as addressing, and is located at the beginning of thePDUTrailer - Contains control information added to the end of the PDU

These frame elements will be discussed in more detail later in this chapter.

Page 2:Formatting Data for Transmission

When data travels on the media, it is converted into a stream of bits, or 1s and 0s. If a node is receivinglong streams of bits, how does it determine where a frame starts and stops or which bits represent theaddress?

Framing breaks the stream into decipherable groupings, with control information inserted in the headerand trailer as values in different fields. This format gives the physical signals a structure that can bereceived by nodes and decoded into packets at the destination.

Typical field types include:

Start and stop indicator fields - The beginning and end limits of the frameNaming or addressing fieldsType field - The type of PDU contained in the frameControl - Flow control servicesA data field -The frame payload (Network layer packet)

Fields at the end of the frame form the trailer. These fields are used for error detection and mark theend of the frame.

Not all protocols include all of these fields. The standards for a specific Data Link protocol define theactual frame format. Examples of frame formats will be discussed at the end of this chapter.

2/12/2011 CISCO Accessible Theme

ev-iip.netacad.net/virtuoso/…/main.html… 4/27

Page 5: CISCO-7 Data Link Layer

7.1.4 Data Link Layer - Connecting Upper Layer Services to the Media

Page 1:The Data Link layer exists as a connecting layer between the software processes of the layers above itand the Physical layer below it. As such, it prepares the Network layer packets for transmission acrosssome form of media, be it copper, fiber, or the atmosphere.

In many cases, the Data Link layer is embodied as a physical entity, such as an Ethernet networkinterface card (NIC), which inserts into the system bus of a computer and makes the connectionbetween running software processes on the computer and physical media. The NIC is not solely aphysical entity, however. Software associated with the NIC enables the NIC to perform its intermediaryfunctions of preparing data for transmission and encoding the data as signals to be sent on theassociated media.

Page 2:Data Link Sublayers

To support a wide variety of network functions, the Data Link layer is often divided into two sublayers:an upper sublayer and an lower sublayer.

The upper sublayer defines the software processes that provide services to the Network layerprotocols.The lower sublayer defines the media access processes performed by the hardware.

Separating the Data Link layer into sublayers allows for one type of frame defined by the upper layer toaccess different types of media defined by the lower layer. Such is the case in many LAN technologies,including Ethernet.

The two common LAN sublayers are:

Logical Link Control

Logical Link Control (LLC) places information in the frame that identifies which Network layer protocol isbeing used for the frame. This information allows multiple Layer 3 protocols, such as IP and IPX, toutilize the same network interface and media.

Media Access Control

Media Access Control (MAC) provides Data Link layer addressing and delimiting of data according tothe physical signaling requirements of the medium and the type of Data Link layer protocol in use.

7.1.5 Data Link Layer - Standards

Page 1:Unlike the protocols of the upper layers of the TCP/IP suite, Data Link layer protocols are generally notdefined by Request for Comments (RFCs). Although the Internet Engineering Task Force (IETF)maintains the functional protocols and services for the TCP/IP protocol suite in the upper layers, theIETF does not define the functions and operation of that model's Network access layer. The TCP/IPNetwork Access layer is the equivalent of the OSI Data Link and Physical layers. These two layer will bediscussed in separate chapters for closer examination..

2/12/2011 CISCO Accessible Theme

ev-iip.netacad.net/virtuoso/…/main.html… 5/27

Page 6: CISCO-7 Data Link Layer

The functional protocols and services at the Data Link layer are described by engineering organizations(such as IEEE, ANSI, and ITU) and communications companies. Engineering organizations set publicand open standards and protocols. Communications companies may set and use proprietary protocolsto take advantage of new advances in technology or market opportunities.

Data Link layer services and specifications are defined by multiple standards based on a variety oftechnologies and media to which the protocols are applied. Some of these standards integrate bothLayer 2 and Layer 1 services.

Engineering organizations that define open standards and protocols that apply to the Data Link layerinclude:

International Organization for Standardization (ISO)Institute of Electrical and Electronics Engineers (IEEE)American National Standards Institute (ANSI)International Telecommunication Union (ITU)

Unlike the upper layer protocols, which are implemented mostly in software such as the host operatingsystem or specific applications, Data Link layer processes occur both in software and hardware. Theprotocols at this layer are implemented within the electronics of the network adapters with which thedevice connects to the physical network.

For example, a device implementing the Data Link layer on a computer would be the network interfacecard (NIC). For a laptop, a wireless PCMCIA adapter is commonly used. Each of these adapters is thehardware that complies with the Layer 2 standards and protocols.

http://www.iso.org

http://www.ieee.org

http://www.ansi.org

http://www.itu.int

7.2 Media Access Control Techniques7.2.1 Placing Data on the Media

Page 1:Regulating the placement of data frames onto the media is known as media access control.Among the different implementations of the Data Link layer protocols, there are different methods ofcontrolling access to the media. These media access control techniques define if and how the nodesshare the media.

Media access control is the equivalent of traffic rules that regulate the entrance of motor vehicles onto aroadway. The absence of any media access control would be the equivalent of vehicles ignoring allother traffic and entering the road without regard to the other vehicles.

However, not all roads and entrances are the same. Traffic can enter the road by merging, by waitingfor its turn at a stop sign, or by obeying signal lights. A driver follows a different set of rules for eachtype of entrance.

In the same way, there are different ways to regulate the placing of frames onto the media. Theprotocols at the Data Link layer define the rules for access to different media. Some media access

2/12/2011 CISCO Accessible Theme

ev-iip.netacad.net/virtuoso/…/main.html… 6/27

Page 7: CISCO-7 Data Link Layer

control methods use highly-controlled processes to ensure that frames are safely placed on the media.These methods are defined by sophisticated protocols, which require mechanisms that introduceoverhead onto the network.

The method of media access control used depends on:

Media sharing - If and how the nodes share the mediaTopology - How the connection between the nodes appears to the Data Link layer

7.2.2 Media Access Control for Shared Media

Page 1:Some network topologies share a common medium with multiple nodes. At any one time, there may be anumber of devices attempting to send and receive data using the network media. There are rules thatgovern how these devices share the media.

There are two basic media access control methods for shared media:

Controlled - Each node has its own time to use the mediumContention-based - All nodes compete for the use of the medium

Click the tabs in the figure to see the differences in the two methods.

Controlled Access for Shared Media

When using the controlled access method, network devices take turns, in sequence, to access themedium. This method is also known as scheduled access or deterministic. If a device does not need toaccess the medium, the opportunity to use the medium passes to the next device in line. When onedevice places a frame on the media, no other device can do so until the frame has arrived at thedestination and has been processed by the destination.

Although controlled access is well-ordered and provides predictable throughput, deterministic methodscan be inefficient because a device has to wait for its turn before it can use the medium.

Contention-based Access for Shared Media

Also referred to as non-deterministic, contention-based methods allow any device to try to access themedium whenever it has data to send. To prevent complete chaos on the media, these methods use aCarrier Sense Multiple Access (CSMA) process to first detect if the media is carrying a signal. If a carriersignal on the media from another node is detected, it means that another device is transmitting. Whenthe device attempting to transmit sees that the media is busy, it will wait and try again after a short timeperiod. If no carrier signal is detected, the device transmits its data. Ethernet and wireless networks usecontention-based media access control.

It is possible that the CSMA process will fail and two devices will transmit at the same time. This is calleda data collision. If this occurs, the data sent by both devices will be corrupted and will need to be resent.

Contention-based media access control methods do not have the overhead of controlled accessmethods. A mechanism for tracking whose turn it is to access the media is not required. However, thecontention-based systems do not scale well under heavy media use. As use and the number of nodesincreases, the probability of successful media access without a collision decreases. Additionally, Therecovery mechanisms required to correct errors due to these collisions further diminishes thethroughput.

2/12/2011 CISCO Accessible Theme

ev-iip.netacad.net/virtuoso/…/main.html… 7/27

Page 8: CISCO-7 Data Link Layer

CSMA is usually implemented in conjunction with a method for resolving the media contention. The twocommonly used methods are:

CSMA/Collision Detection

In CSMA/Collision Detection (CSMA/CD), the device monitors the media for the presence of a datasignal. If a data signal is absent, indicating that the media is free, the device transmits the data. Ifsignals are then detected that show another device was transmitting at the same time, all devices stopsending and try again later. Traditional forms of Ethernet use this method.

CSMA/Collision Avoidance

In CSMA/Collision Avoidance (CSMA/CA), the device examines the media for the presence of a datasignal. If the media is free, the device sends a notification across the media of its intent to use it. Thedevice then sends the data. This method is used by 802.11 wireless networking technologies.

Note : CSMA/CD will be covered in more detail in Chapter 9.

7.2.3 Media Access Control for Non-Shared Media

Page 1:Media access control protocols for non-shared media require little or no control before placing framesonto the media. These protocols have simpler rules and procedures for media access control. Such isthe case for point-to-point topologies.

In point-to-point topologies, the media interconnects just two nodes. In this arrangement, the nodes donot have to share the media with other hosts or determine if a frame is destined for that node.Therefore, Data Link layer protocols have little to do for controlling non-shared media access.

Full Duplex and Half Duplex

In point-to-point connections, the Data Link layer has to consider whether the communication is half-duplex or full-duplex.

Click the tabs in the figure to see the differences in the two methods.

Half-duplex communication means that the devices can both transmit and receive on the media butcannot do so simultaneously. Ethernet has established arbitration rules for resolving conflicts arisingfrom instances when more than one station attempts to transmit at the same time.

In full-duplex communication, both devices can transmit and receive on the media at the same time. TheData Link layer assumes that the media is available for transmission for both nodes at any time.Therefore, there is no media arbitration necessary in the Data Link layer.

The details of a specific media access control technique can only be examined by studying a specificprotocol. Within this course, we will study traditional Ethernet, which uses CSMA/CD. Other techniqueswill be covered in later courses.

7.2.4 Logical Topology vs Physical Topology

2/12/2011 CISCO Accessible Theme

ev-iip.netacad.net/virtuoso/…/main.html… 8/27

Page 9: CISCO-7 Data Link Layer

Page 1:The topology of a network is the arrangement or relationship of the network devices and theinterconnections between them. Network topologies can be viewed at the physical level and the logicallevel.

The physical topology is an arrangement of the nodes and the physical connections between them. Therepresentation of how the media is used to interconnect the devices is the physical topology. These willbe covered in later chapters of this course.

A logical topology is the way a network transfers frames from one node to the next. This arrangementconsists of virtual connections between the nodes of a network independent of their physical layout.These logical signal paths are defined by Data Link layer protocols. The Data Link layer "sees" thelogical topology of a network when controlling data access to the media. It is the logical topology thatinfluences the type of network framing and media access control used.

The physical or cabled topology of a network will most likely not be the same as the logicaltopology.

Logical topology of a network is closely related to the mechanism used to manage network access.Access methods provide the procedures to manage network access so that all stations have access.When several entities share the same media, some mechanism must be in place to control access.Access methods are applied to networks to regulate this media access. Access methods will bediscussed in more detail later.

Logical and physical topologies typically used in networks are:

Point-to-PointMulti-AccessRing

The logical implementations of these topologies and their associated media access control methods areconsidered in the following sections.

7.2.5 Point-to-Point Topology

Page 1:A point-to-point topology connects two nodes directly together, as shown in the figure. In data networkswith point-to-point topologies, the media access control protocol can be very simple. All frames on themedia can only travel to or from the two nodes. The frames are placed on the media by the node at oneend and taken off the media by the node at the other end of the point-to-point circuit.

In point-to-point networks, if data can only flow in one direction at a time, it is operating as ahalf-duplex link. If data can successfully flow across the link from each node simultaneously,it is a full-duplex link.

Data Link layer protocols could provide more sophisticated media access control processes for logicalpoint-to-point topologies, but this would only add unnecessary protocol overhead.

Page 2:Logical Point-to-Point Networks

2/12/2011 CISCO Accessible Theme

ev-iip.netacad.net/virtuoso/…/main.html… 9/27

Page 10: CISCO-7 Data Link Layer

The end nodes communicating in a point-to-point network can be physically connected via a number ofintermediate devices. However the use of physical devices in the network does not affect the logicaltopology. As shown in the figure, the source and destination node may be indirectly connected to eachother over some geographical distance. In some cases, the logical connection between nodes formswhat is called a virtual circuit. A virtual circuit is a logical connection created within a network betweentwo network devices. The two nodes on either end of the virtual circuit exchange the frames with eachother. This occurs even if the frames are directed through intermediary devices. Virtual circuits areimportant logical communication constructs used by some Layer 2 technologies.

The media access method used by the Data Link protocol is determined by the logical point-to-pointtopology, not the physical topology. This means that the logical point-to-point connection between twonodes may not necessarily be between two physical nodes at each end of a single physical link.

7.2.6 Multi-Access Topology

Page 1:A logical multi-access topology enables a number of nodes to communicate by using the same sharedmedia. Data from only one node can be placed on the medium at any one time. Every node sees all theframes that are on the medium, but only the node to which the frame is addressed processes thecontents of the frame.

Having many nodes share access to the medium requires a Data Link media access control method toregulate the transmission of data and thereby reduce collisions between different signals.

The media access control methods used by logical multi-access topologies are typically CSMA/CD orCSMA/CA. However, token passing methods can also be used.

A number of media access control techniques are available for this type of logical topology. The DataLink layer protocol specifies the media access control method that will provide the appropriate balancebetween frame control, frame protection, and network overhead.

Play the animation to see how nodes access the media in a multi-access topology.

7.2.6 - Multi-Access TopologyThe animation depicts how nodes access the media in a multi-access topology. Multiple PC's, A, B, C,D, and E, share a common bus-style media. As the animation progresses, the nodes access the mediaas follows.

PC A text bubbles: - I need to transmit to E. - I check for other transmissions. - No other transmissions are detected. - Transmitting. The animation shows the frame successfully arriving at PC E.

PC B text bubbles: - I need to transmit to D. - I check for other transmissions. - Transmission detected. I'll wait. - No other transmissions are detected. - Transmitting. The animation shows the frame successfully arriving at PC D.

2/12/2011 CISCO Accessible Theme

ev-iip.netacad.net/virtuoso/…/main.html… 10/27

Page 11: CISCO-7 Data Link Layer

7.2.7 Ring Topology

Page 1:In a logical ring topology, each node in turn receives a frame. If the frame is not addressed to the node,the node passes the frame to the next node. This allows a ring to use a controlled media access controltechnique called token passing.

Nodes in a logical ring topology remove the frame from the ring, examine the address, and send it on ifit is not addressed for that node. In a ring, all nodes around the ring- between the source anddestination node examine the frame.

There are multiple media access control techniques that could be used with a logical ring, depending onthe level of control required. For example, only one frame at a time is usually carried by the media. Ifthere is no data being transmitted, a signal (known as a token) may be placed on the media and a nodecan only place a data frame on the media when it has the token.

Remember that the Data Link layer "sees" a logical ring topology. The actual physical cabling topologycould be another topology.

Play the animation to see how nodes access the media in a logical ring topology.

7.2.7 - Ring TopologyThe animation depicts how nodes access the media in a logical ring topology. Multiple PC's, A, B, C,and D, are arranged with the media in a ring formation. PC A transmits a frame that travels around thering as it is passed from PC A to PC B to PC C and then to PC D. As the animation progresses, thenodes access the media as follows.

PC A text bubble: - I need to transmit to D.

PC B text bubbles: - Is this frame for me? - No.

PC C text bubbles: - Is this frame for me? - No.

PC D text bubbles: - Is this frame for me? - Yes.

7.3 Media Access Control Addressing and Framing Data7.3.1 Data Link Layer Protocols - The Frame

Page 1:Remember that although there are many different Data Link layer protocols that describe Data Linklayer frames, each frame type has three basic parts:

HeaderDataTrailer

All Data Link layer protocols encapsulate the Layer 3 PDU within the data field of the frame. However,

2/12/2011 CISCO Accessible Theme

ev-iip.netacad.net/virtuoso/…/main.html… 11/27

Page 12: CISCO-7 Data Link Layer

the structure of the frame and the fields contained in the header and trailer vary according to theprotocol.

The Data Link layer protocol describes the features required for the transport of packets acrossdifferent media. These features of the protocol are integrated into the encapsulation of the frame. Whenthe frame arrives at its destination and the Data Link protocol takes the frame off the media, the framinginformation is read and discarded.

There is no one frame structure that meets the needs of all data transportation across all types ofmedia. As shown in the figure, depending on the environment, the amount of control information neededin the frame varies to match the media access control requirements of the media and logical topology.

7.3.1 - Data Link Layer Protocols - The FrameThe diagram depicts Data Link Layer protocol characteristics in a fragile environment and in a protectedenvironment.

Fragile environment: The diagram show two routers, each one connected to a satellite dish that iscommunicating with a satellite. A rain cloud above the satellite indicates bad weather to illustrate afragile environment where a higher potential exists for data transmission errors. In a fragile environment,more controls are needed to ensure delivery. The header and trailer fields are larger because morecontrol information is needed. Greater effort is needed to ensure delivery, resulting in higher overheadand slower transmission rates.

Protected environment: The diagram shows three PC's communicating on a wired media illustrating amore stable environment. In a protected environment, the frame arrives at its destination. Fewercontrols are needed, resulting in smaller fields and smaller frames. Less effort is needed to ensuredelivery, resulting in lower overhead and faster transmission rates.

7.3.2 Framing - Role of the Header

Page 1:As shown in the figure, the frame header contains the control information specified by the Data Linklayer protocol for the specific logical topology and media used.

Frame control information is unique to each type of protocol. It is used by the Layer 2 protocol toprovide features demanded by the communication environment.

Typical frame header fields include:

Start Frame field - Indicates the beginning of the frameSource and Destination address fields - Indicates the source and destination nodes on the mediaPriority/Quality of Service field - Indicates a particular type of communication service forprocessingType field - Indicates the upper layer service contained in the frameLogical connection control field - Used to establish a logical connection between nodesPhysical link control field - Used to establish the media linkFlow control field - Used to start and stop traffic over the mediaCongestion control field - Indicates congestion in the media

The field names above are nonspecific fields listed as examples. Different Data Link layer protocols mayuse different fields from those mentioned. Because the purposes and functions of Data Link layerprotocols are related to the specific topologies and media, each protocol has to be examined to gain adetailed understanding of its frame structure. As protocols are discussed in this course, moreinformation about the frame structure will be explained.

2/12/2011 CISCO Accessible Theme

ev-iip.netacad.net/virtuoso/…/main.html… 12/27

Page 13: CISCO-7 Data Link Layer

7.3.2 - Framing - Role of the HeaderThe diagram depicts a simple frame structure with a focus on the frame header role. The followingcomponents are shown from left to right.

Header: - Start frame field - Tells other devices on the network that a frame is coming along the medium. - Address field - Stores the source and destination data-link addresses. - Type/Length field - Optional field used by some protocols to state either what type of data is coming orpossible the length of the frame. Data FCS Stop Frame

7.3.3 Addressing - Where the Frame Goes

Page 1:The data Link layer provides addressing that is used in transporting the frame across the shared localmedia. Device addresses at this layer are referred to as physical addresses. Data Link layer addressingis contained within the frame header and specifies the frame destination node on the local network. Theframe header may also contain the source address of the frame.

Unlike Layer 3 logical addresses that are hierarchical, physical addresses do not indicate on whatnetwork the device is located. If the device is moved to another network or subnet, it will still functionwith the same Layer 2 physical address.

Because the frame is only used to transport data between nodes across the local media, the Data Linklayer address is only used for local delivery. Addresses at this layer have no meaning beyond the localnetwork. Compare this to Layer 3, where addresses in the packet header are carried from source hostto destination host regardless of the number of network hops along the route.

If the packet in the frame must pass onto another network segment, the intermediate device - a router -will decapsulate the original frame, create a new frame for the packet, and send it onto the newsegment. The new frame will use source and destination addressing as necessary to transport thepacket across the new media.

Addressing Requirements

The need for Data Link layer addressing at this layer depends on the logical topology.

Point-to-point topologies, with just two interconnected nodes, do not require addressing. Once on themedium, the frame has only one place it can go.

Because ring and multi-access topologies can connect many nodes on a common medium, addressingis required for these typologies. When a frame reaches each node in the topology, the node examinesthe destination address in the header to determine if it is the destination of the frame.

7.3.3 - Addressing - Where the Frame GoesThe diagram depicts addressing factors for a logical point-to-point topology and a logical multi-accesstopology.

Logical Multi-Access Topology: The diagram shows multiple PC's sharing a common bus-style media. A multi-access frame has manypossible destinations. Data Link Layer addresses are required.

2/12/2011 CISCO Accessible Theme

ev-iip.netacad.net/virtuoso/…/main.html… 13/27

Page 14: CISCO-7 Data Link Layer

Logical Point-to-Point Topology: The diagram shows two routers connected to a network cloud via serial WAN links. A point-to-pointframe has only one possible destination. Data Link Layer addresses are not required.

7.3.4 Framing - Role of the Trailer

Page 1:Data Link layer protocols add a trailer to the end of each frame. The trailer is used to determine if theframe arrived without error. This process is called error detection. Note that this is different from errorcorrection. Error detection is accomplished by placing a logical or mathematical summary of the bits thatcomprise the frame in the trailer.

Frame Check Sequence

The Frame Check Sequence (FCS) field is used to determine if errors occurred in the transmission andreception of the frame. Error detection is added at the Data Link layer because this is where data istransferred across the media. The media is a potentially unsafe environment for data. The signals onthe media could be subject to interference, distortion, or loss that would substantially change the bitvalues that those signals represent. The error detection mechanism provided by the use of the FCSfield discovers most errors caused on the media.

To ensure that the content of the received frame at the destination matches that of the frame that leftthe source node, a transmitting node creates a logical summary of the contents of the frame. This isknown as the cyclic redundancy check (CRC) value. This value is placed in the Frame Check Sequence(FCS) field of the frame to represent the contents of the frame.

When the frame arrives at the destination node, the receiving node calculates its own logical summary,or CRC, of the frame. The receiving node compares the two CRC values. If the two values are thesame, the frame is considered to have arrived as transmitted. If the CRC value in the FCS differs fromthe CRC calculated at the receiving node, the frame is discarded.

There is always the small possibility that a frame with a good CRC result is actually corrupt. Errors inbits may cancel each other out when the CRC is calculated. Upper layer protocols would then berequired to detect and correct this data loss.

The protocol used in the Data Link layer, will determine if error correction will take place. The FCS isused to detect the error, but not every protocol will support correcting the error.

7.3.4 - Framing - Role of the TrailerThe diagram depicts a simple frame structure focusing on the frame trailer. The following componentsare shown from left to right.

Start Frame Address Type/Length Data Trailer - FCS field - The Frame Check Sequence is used for error checking. The source calculates a numberbased on the frame's data and places that number in the FCS field. The destination then recalculatesthe data to check whether the FCS matches. If they do not match, the destination deletes the frame. - Stop Frame field - Also called the Frame Trailer. An optional field that is used when the length of theframe is not specified in the Type/Length field. It indicates the end of the frame when transmitted.

7.3.5 Data Link Layer Protocols - The Frame

2/12/2011 CISCO Accessible Theme

ev-iip.netacad.net/virtuoso/…/main.html… 14/27

Page 15: CISCO-7 Data Link Layer

Page 1:In a TCP/IP network, all OSI Layer 2 protocols work with the Internet Protocol at OSI Layer 3. However,the actual Layer 2 protocol used depends on the logical topology of the network and the implementationof the Physical layer. Given the wide range of physical media used across the range of topologies innetworking, there are a correspondingly high number of Layer 2 protocols in use.

Protocols that will be covered in CCNA courses include:

EthernetPoint-to-Point Protocol (PPP)High-Level Data Link Control (HDLC)Frame RelayAsynchronous Transfer Mode (ATM)

Each protocol performs media access control for specified Layer 2 logical topologies. This means that anumber of different network devices can act as nodes that operate at the Data Link layer whenimplementing these protocols. These devices include the network adapter or network interface cards(NICs) on computers as well as the interfaces on routers and Layer 2 switches.

The Layer 2 protocol used for a particular network topology is determined by the technology used toimplement that topology. The technology is, in turn, determined by the size of the network - in terms ofthe number of hosts and the geographic scope - and the services to be provided over the network.

LAN Technology

A Local Area Network typically uses a high bandwidth technology that is capable of supporting largenumbers of hosts. A LAN's relatively small geographic area (a single building or a multi-buildingcampus) and its high density of users make this technology cost effective.

WAN Technology

However, using a high bandwidth technology is usually not cost-effective for Wide Area Networks thatcover large geographic areas (cities or multiple cities, for example). The cost of the long distancephysical links and the technology used to carry the signals over those distances typically results in lowerbandwidth capacity.

Difference in bandwidth normally results in the use of different protocols for LANs and WANs.

7.3.5 - Data Link Layer Protocols - The FrameThe animation depicts examples of changing Data Link Layer protocols as a packet traverses variouslinks in a network.

As the animation progresses, the following occurs.

Step 1. Wireless PC1 sends an 8 0 2 dot 11 wireless frame to wireless router R1. Step 2. The wireless router sends a PPP frame to router R2 over a point-to-point WAN link. Step 3. Router R2 sends an HDLC frame to router R3 over a point-to-point WAN link. Step 4. Router R3 sends a Frame Relay frame to router R4 over a WAN link through a Frame Relaycloud. Step 5. Router R4 sends an Ethernet frame to switch S1 on a LAN, which then sends the Ethernet frameto wired PC2.

Page 2:

2/12/2011 CISCO Accessible Theme

ev-iip.netacad.net/virtuoso/…/main.html… 15/27

Page 16: CISCO-7 Data Link Layer

Ethernet Protocol for LANs

Ethernet is a family of networking technologies that are defined in the IEEE 802.2 and 802.3 standards.Ethernet standards define both the Layer 2 protocols and the Layer 1 technologies. Ethernet is themost widely used LAN technology and supports data bandwidths of 10, 100, 1000, or 10,000 Mbps.

The basic frame format and the IEEE sublayers of OSI Layers 1 and 2 remain consistent across allforms of Ethernet. However, the methods for detecting and placing data on the media vary with differentimplementations.

Ethernet provides unacknowledged connectionless service over a shared media using CSMA/CD as themedia access methods. Shared media requires that the Ethernet frame header use a Data Link layeraddress to identify the source and destination nodes. As with most LAN protocols, this address isreferred to as the MAC address of the node. An Ethernet MAC address is 48 bits and is generallyrepresented in hexadecimal format.

The Ethernet frame has many fields, as shown in the figure. At the Data Link layer, the frame structureis nearly identical for all speeds of Ethernet. However, at the Physical layer, different versions ofEthernet place the bits onto the media differently.

Ethernet II is the Ethernet frame format used in TCP/IP networks.

Ethernet is such an important part of data networking, we have devoted a chapter to it. We also use it inexamples throughout this series of courses.

7.3.5 - Data Link Layer Protocols - The FrameThe diagram depicts an Ethernet frame, the most common Data Link Layer protocol for LAN's. AnEthernet frame's field names and sizes are shown in the following sequence, with information describingeach.

Preamble: 8 bytes. Used for synchronization. Also contains a delimiter to mark the end of the timinginformation. Destination Address: 6 bytes. 48-bit MAC address for the destination node. Source Address: 6 bytes. 48-bit MAC address for the source node. Type: 2 bytes. Indicates which upper layer protocol receives the data after the Ethernet process iscomplete. Data (or payload): 46 to 1500 bytes. This is the PDU, typically an IPv4 packet, that is to be transportedover the media. Frame Check Sequence (FCS): 4 bytes. Used to check for damaged frames.

Page 3:Point-to-Point Protocol for WANs

Point-to-Point Protocol (PPP) is a protocol used to deliver frames between two nodes. Unlike many DataLink layer protocols that are defined by electrical engineering organizations, the PPP standard isdefined by RFCs. PPP was developed as a WAN protocol and remains the protocol of choice toimplement many serial WANs. PPP can be used on various physical media, including twisted pair, fiberoptic lines, and satellite transmission, as well as for virtual connections.

PPP uses a layered architecture. To accommodate the different types of media, PPP establishes logicalconnections, called sessions, between two nodes. The PPP session hides the underlying physical mediafrom the upper PPP protocol. These sessions also provide PPP with a method for encapsulating multipleprotocols over a point-to-point link. Each protocol encapsulated over the link establishes its own PPPsession.

2/12/2011 CISCO Accessible Theme

ev-iip.netacad.net/virtuoso/…/main.html… 16/27

Page 17: CISCO-7 Data Link Layer

PPP also allows the two nodes to negotiate options within the PPP session. This includes authentication,compression, and multilink (the use of multiple physical connections).

See the figure for the basic fields in a PPP frame.

PPP protocol: http://www.ietf.org/rfc/rfc1661.txt?number=1661

PPP Vendor Extensions: http://www.ietf.org/rfc/rfc2153.txt?number=2153

7.3.5 - Data Link Layer Protocols - The FrameThe diagram depicts a Point-to-Point Protocol (PPP) frame, a common Data Link Layer protocol forWAN's. Field names and sizes are shown in the following sequence, with information describing each.

Flag: 1 byte. Indicates the beginning or end of a frame. The flag consists of the binary sequence01111110. Address: 1 byte. Contains the standard PPP broadcast address. PPP does not assign individual stationaddresses. Control: 1 byte. Contains the binary sequence 00000011, which calls for transmission of user data in anunsequenced frame. Protocol: 2 bytes. Identifies the protocol encapsulated in the data field of the frame. The most up-to-date values of the protocol field are specified in the most recent Assigned Numbers Request ForComments (RFC). Data: Variable number of bytes. Zero or more bytes that contain the datagram for the protocol specifiedin the protocol field. Frame Check Sequence (FCS): 2 or 4 bytes. Normally, 16 bits (2 bytes). By prior agreement,consenting PPP implementations can use a 32-bit (4-byte) FCS for improved error detection.

Page 4:Wireless Protocol for LANs

802.11 is an extension of the IEEE 802 standards. It uses the same 802.2 LLC and 48-bit addressingscheme as other 802 LANs, However there are many differences at the MAC sublayer and Physicallayer. In a wireless environment, the environment requires special considerations. There is no definablephysical connectivity; therefore, external factors may interfere with data transfer and it is difficult tocontrol access. To meet these challenges, wireless standards have additional controls.

The Standard IEEE 802.11, commonly referred to as Wi-Fi, is a contention-based system using aCarrier Sense Multiple Access/Collision Avoidance (CSMA/CA) media access process. CSMA/CAspecifies a random backoff procedure for all nodes that are waiting to transmit. The most likelyopportunity for medium contention is just after the medium becomes available. Making the nodes backoff for a random period greatly reduces the likelihood of a collision.

802.11 networks also use Data Link acknowledgements to confirm that a frame is received successfully.If the sending station does not detect the acknowledgement frame, either because the original dataframe or the acknowledgment was not received intact, the frame is retransmitted. This explicitacknowledgement overcomes interference and other radio-related problems.

Other services supported by 802.11 are authentication, association (connectivity to a wireless device),and privacy (encryption).

An 802.11 frame is shown in the figure. It contains these fields:

Protocol Version field - Version of 802.11 frame in use

Type and Subtype fields - Identifies one of three functions and sub functions of the frame: control,

2/12/2011 CISCO Accessible Theme

ev-iip.netacad.net/virtuoso/…/main.html… 17/27

Page 18: CISCO-7 Data Link Layer

data, and management

To DS field - Set to 1 in data frames destined for the distribution system (devices in the wirelessstructure)

From DS field - Set to 1 in data frames exiting the distribution system

More Fragments field - Set to 1 for frames that have another fragment

Retry field - Set to 1 if the frame is a retransmission of an earlier frame

Power Management field - Set to 1 to indicate that a node will be in power-save mode

More Data field - Set to 1 to indicate to a node in power-save mode that more frames are buffered forthat node

Wired Equivalent Privacy (WEP) field - Set to 1 if the frame contains WEP encrypted information forsecurity

Order field - Set to 1 in a data type frame that uses Strictly Ordered service class (does not needreordering)

Duration/ID field - Depending on the type of frame, represents either the time, in microseconds,required to transmit the frame or an association identity (AID) for the station that transmitted the frame

Destination Address (DA) field - MAC address of the final destination node in the network

Source Address (SA) field - MAC address of the node the initiated the frame

Receiver Address (RA) field - MAC address that identifies the wireless device that is the immediaterecipient of the frame

Transmitter Address (TA) field - MAC address that identifies the wireless device that transmitted theframe

Sequence Number field - Indicates the sequence number assigned to the frame; retransmittedframes are identified by duplicate sequence numbers

Fragment Number field - Indicates the number for each fragment of a frame

Frame Body field - Contains the information being transported; for data frames, typically an IP packet

FCS field - Contains a 32-bit cyclic redundancy check (CRC) of the frame

7.3.5 - Data Link Layer Protocols - The FrameThe diagram depicts an 8 0 2 dot 11 Wireless Protocol frame, a commonly used Data Link Layerprotocol for wireless LAN's. An 8 0 2 dot 11 frame contains these fields: Frame Control Field: (2 bytes) - Protocol Version - Type - Subtype - To DS - From DS - More Fragments - Retry - Power Management

2/12/2011 CISCO Accessible Theme

ev-iip.netacad.net/virtuoso/…/main.html… 18/27

Page 19: CISCO-7 Data Link Layer

- More Data - Wired Equivalent Privacy (WEP) - Order Duration/ID (2 bytes) Destination Address (DA) (6 bytes) Source Address (SA) (6 bytes) Receiver Address (RA) (6 bytes) Sequence Control (2 bytes) - Fragment Number - Sequence Number Transmitter Address (TA) (6 bytes) Frame Body (0-2312 bytes) FCS field (4 bytes)

7.4 Putting it All Together7.4.1 Follow Data Through an Internetwork

Page 1:The figure on the next page presents a simple data transfer between two hosts across an internetwork.We highlight the function of each layer during the communication. For this example we will depict anHTTP request between a client and a server.

To focus on the data transfer process, we are omitting many elements that may occur in a realtransaction. In each step we are only bringing attention to the major elements. Many parts of theheaders are ignored, for example.

We are assuming that all routing tables are converged and ARP tables are complete. Additionally, weare assuming that a TCP session is already established between the client and server. We will alsoassume that the DNS lookup for the WWW server is already cached at the client.

In the WAN connection between the two routers, we are assuming that PPP has already established aphysical circuit and has established a PPP session.

On the next page, you can step through this communication. We encourage you to read eachexplanation carefully and study the operation of the layers for each device.

7.4.1 - Follow Data Through an InternetworkThe diagram depicts a simple data transfer between two hosts across an internetwork.

Network Topology: A user at a client PC, the requesting host, is sending a request to a server, the receiving host. Theclient PC is connected to router B. Router B is connected to router A via a WAN link. Router A isconnected to the server.

Page 2:

7.4.1 - Follow Data Through an InternetworkThe diagram depicts the steps involved in an HTTP request between a client and a server. Network Topology: This example shows an HTTP request between a client and a server. The topology isthe same as diagram 1 with the addition of the O S I model. The appropriate layer of the O S I model ishighlighted, from top to bottom, as the request from the client to the server is processed. This processis explained further through a series of steps.

2/12/2011 CISCO Accessible Theme

ev-iip.netacad.net/virtuoso/…/main.html… 19/27

Page 20: CISCO-7 Data Link Layer

Step 1. A user on a LAN wants to access a web page stored on a server that is located on a remotenetwork. The user starts by activating a link on a web page. Step 2. The browser initiates an HTTP Get request. The Application Layer adds the Layer 7 header toidentify the application and data type. Step 3. The Transport Layer identifies the upper layer service as a World Wide Web (WWW) client. TheTransport Layer then associates this service with TCP and assigns the port numbers. It uses arandomly selected source port that is associated with this established session (12345). The destinationport (80) is associated with a WWW service. Step 4. TCP also sends an acknowledgement number that tells the WWW server the sequence numberof the next TCP segment that it expects to receive. The sequence number indicates where this segmentis placed in the series of related segments. Flags are also set as appropriate to establish a session. Step 5. At the Network Layer, an IP packet is constructed to identify the source and destination hosts.For the destination address, the client host uses the IP address associated with the WWW server hostname that is cached in the host table. It uses its own IPv4 address as the source address. The NetworkLayer also identifies the upper layer protocol encapsulated in this packet as a TCP segment. Step 6. The Data Link Layer refers to the Address Resolution Protocol (ARP) cache to determine theMAC address that is associated with the interface of router B, which is specified as the default gateway.It then uses this address to build an Ethernet frame to transport the IPv4 packet across the local media.The MAC address of the laptop is used as the source MAC address, and the MAC address of the FA0/0interface of router B is used as the destination MAC address in the frame. Step 7. The frame also indicates the upper layer protocol of IPv4 with a value of 0800 (hex) in the Typefield. The frame begins with the Preamble and ends with a cyclic redundancy check (CRC) in the FrameCheck Sequence at the end of the frame for the error detection. It then uses CSMA/CD to control theplacing of the frame onto the media. Step 8. The Physical Layer begins encoding the frame onto the media, bit by bit. The segment betweenrouter B and the source host is a 10 Base-T segment; therefore, the bits are encoded using theManchester Differential encoding. Router B buffers the bits as they are received. Step 9. Router B examines the bits in the preamble looking for the two consecutive 1 bits that indicatethat the synching process is completed and the beginning of the frame. Router B then begins bufferingthe bits as part of the reconstructed frame. When the entire frame is received, Router B generates aCRC of the frame. It then compares this to the FCS at the end of the frame to determine that the framewas received intact. When the frame is confirmed as a good frame, the destination MAC address in theframe is compared to the MAC address of the interface (FA0/0). Because it matches, the headers areremoved, and the packet is pushed up to the Network Layer. Step 10. At the Network Layer, the destination IPv4 address of the packet is compared against theroutes in the routing table. A match is found that is associated with the next-hop out interface S0/0/0.The packet inside router B is then passed to the circuitry for the S0/0/0 interface. Step 11. Router B creates a PPP frame to transport the packet across the WAN. In the PPP header, aflag of 01111110 binary is added to indicate the start of the frame. Following that, an address field of11111111 is added, which is equivalent to a broadcast (it means "send to all stations"). Because PPP ispoint-to-point and is used as a direct link between two nodes, this field has no real meaning. Step 12. Also included is a Protocol field with a value of 0021 (hex) to indicate that an IPv4 packet isencapsulated. The frame trailer ends with a CRC in the FCS for error detection. A Flag value of01111110 binary indicates the end of a PPP frame. Step 13. With the circuit and PPP session already established between the routers, the Physical Layerbegins encoding the frame onto the WAN media, bit by bit. The receiving router (router A) buffers thebits as they are received. This type of bit representation and encoding is dependent on the type of WANtechnology being used. Step 14. Router A examines the bits in the flag to identify the beginning of the frame. Router A thenbegins buffering the bits as part of the reconstructed frame. When the entire frame is received, asindicated by the flag in the trailer, router A generates a CRC of the frame. It then compares this to theFCS at the end of the frame to determine that the frame was received intact. When the frame isconfirmed as a good frame, the headers are removed, and the packet is pushed up to the NetworkLayer of router A. Step 15. At the Network Layer, the destination IPv4 address of the packet is compared against theroutes in the routing table. A match is found that is directly connected to interface FA0/0. The packetinside router A is then passed to the circuitry for the FA0/0 interface.

2/12/2011 CISCO Accessible Theme

ev-iip.netacad.net/virtuoso/…/main.html… 20/27

Page 21: CISCO-7 Data Link Layer

Step 16. The Data Link Layer refers to the ARP cache of router A to determine the MAC address that isassociated with the interface of the Web Server. It then uses this MAC address to build an Ethernetframe to transport the IPv4 packet across the local media to the server. The MAC address of the FA0/0interface of router A is used as the source MAC address, and the MAC address of the server is used asthe destination MAC address in the frame. The frame also indicates the upper layer protocol of IPv4 witha value of 0800 (hex) in the Type field. The frame begins with the Preamble and ends with a CRC in theFCS at the end of the frame for the error detection. It then uses CSMA/CD to control the placing of theframe onto the media. Step 17. The Physical Layer begins encoding the frame onto the media, bit by bit. The segmentbetween router A and the server is a 100 Base-T segment; therefore, the bits are encoded using 4B/5Bencoding. The server buffers the bits as they are received. Step 18. Router B examines the bits in the preamble, looking for the two consecutive 1 bits that indicatethat the synching process is completed and the beginning of the frame. The server then beginsbuffering the bits as part of the reconstructed frame. When it has received the entire frame, the servergenerates a CRC of the frame. It then compares this to the FCS at the end of the frame to determinethat the frame was received intact. Step 19. When the frame is confirmed as a good frame, the destination MAC address in the frame iscompared to the MAC address of the NIC in the server. Because it matches, the headers are removedand the packet is pushed up to the Network Layer. Step 20. At the Network Layer, the destination IPv4 address of the packet is examined to identify thedestination host. Because this address matches its own IPv4 address, the packet is processed by theserver. The Network Layer identifies the upper layer protocol as TCP and directs the containedsegment to the TCP service at the Transport Layer. Step 21. At the Transport Layer of the server, the TCP segment is examined to determine the sessionto which the data contained in the segment belongs. This is done by examining the source anddestination ports. The unique source and destination port identifies an existing session to the webserver service. The sequence number is used to place this segment in the proper order to be sentupward to the Application Layer. Step 22. At the Application Layer, the HTTP Get request is delivered to the Web Server service (httpd).The service can then formulate a response to the request.

Page 3:In this activity, you can examine in further detail the step-by-step animation on the previous page.

7.4.1 - Follow Data Through an InternetworkLink to Packet Tracer Exploration: Packet Tracing Across an Internetwork

In this activity, you can examine in further detail the step-by-step animation on the previous page.

7.5 Labs and Activities7.5.1 Investigating Layer 2 Frame Headers

Page 1:In this activity, you can explore some of the most common Layer 2 encapsulations.

Click the Packet Tracer icon to launch the Packet Tracer activity.

7.5.1 Investigating Layer 2 Frame HeadersLink to Packet Tracer Exploration: Investigate the Layer 2 Frame Headers

In this activity, you can explore some of the most common Layer 2 encapsulations.

2/12/2011 CISCO Accessible Theme

ev-iip.netacad.net/virtuoso/…/main.html… 21/27

Page 22: CISCO-7 Data Link Layer

7.5.2 Lab - Frame Examination

Page 1:In this lab, you will use Wireshark to capture and analyze Ethernet II frame header fields.

Click the Lab icon to for more information.

7.5.2 Lab - Frame ExaminationLink to Hands-on Lab: Frame Examination

In this lab, you use Wireshark to capture and analyze Ethernet II frame header fields.

7.6 Chapter Summary7.6.1 Summary and Review

Page 1:The OSI Data Link layer prepares Network layer packets for placement onto the physical media thattransports data.

The wide range of data communications media requires a correspondingly wide range of Data Linkprotocols to control data access to these media.

Media access can be orderly and controlled or it can be contention-based. The logical topology andphysical medium help determine the media access method.

The Data Link layer prepares the data for placement on the media by encapsulating the Layer 3 packetinto a frame.

A frame has header and trailer fields that include Data Link source and destination addresses, QoS,type of protocol, and Frame Check Sequence values.

7.6.1 - Summary and ReviewIn this chapter, you learned to: - Explain the role of Data Link Layer protocols in data transmission. - Describe how the Data Link Layer prepares data for transmission on network media. - Describe the different types of media access control methods. - Identify several common logical network topologies, and describe how the logical topology determinesthe media access control method for that network. - Explain the purpose of encapsulating packets into frames to facilitate media access. - Describe the Layer 2 frame structure and identify generic fields. - Explain the role of key frame header and trailer fields, including addressing, Q o S, type of protocol,and Frame Check Sequence.

Page 2:

7.6.1 - Summary and ReviewThis is a review and is not a quiz. Questions and answers are provided. Question 1: How does the Data Link Layer prepare packets for transmission? Answer: The Data Link Layer prepares a packet for transport across the local media by encapsulating itwith a header and a trailer to create a frame.

2/12/2011 CISCO Accessible Theme

ev-iip.netacad.net/virtuoso/…/main.html… 22/27

Page 23: CISCO-7 Data Link Layer

Question 2: Describe four general Data Link Layer media access methods. Suggest datacommunications environments in which these access methods may be appropriately implemented. Answer: Media access control methods for shared media: Controlled - Each node has its own time to use the medium; a ring topology. -Contention-based - All nodes compete for the use of the medium; a bus topology. Media access control in point-to-point connections: Half duplex - A node can only transmit or receive at one time; a long-distance, low-bandwidth link. Full duplex - A node can both transmit and receive at the same time; a long-distance, high-bandwidthlink.

Question 3: Compare and contrast the logical point-to-point and logical multi-access topologies. Answer: A logical point-to-point topology connects two nodes directly together. In data networks withpoint-to-point topologies, the media access control protocol can be very simple. All frames on the mediacan only travel to or from the two nodes. The frames are placed on the media by the node at one endand taken off the media by the node at the other end. In point-to-point networks, if data can only flow inone direction at a time, it is operating as a half-duplex link. If data can successfully flow across the linkfrom each node simultaneously, it is a full-duplex service.

A logical multi-access topology enables a number of nodes to communicate by using the same sharedmedia. Data from only one node can be placed on the medium at any one time. Every node sees all theframes that are on the medium, but only the node to which the frame is addressed processes thecontents of the frame. Having many nodes share access to the medium requires a Data Link mediaaccess control method to regulate the transmission of data and thereby reduce collisions betweendifferent signals.

Question 4: Describe the features of a logical ring topology. Answer: In a logical ring topology, each node in turn receives a frame. If the frame is not addressed to anode, the node passes the frame to the next node. This allows a ring to use a controlled media accesscontrol technique called token passing.

The media usually carries only one frame at a time. If there is no data being transmitted, a signal(known as a token) can be placed on the media. A node can place a data frame on the media only whenit has the token.

Question 5: Name five Layer 2 protocols. Answer: - Point-to-Point Protocol (PPP) - Ethernet - High-Level Data Link Control (HDLC) - Frame Relay - Asynchronous Transfer Mode (ATM)

Question 6: How do Data Link Layer addresses differ from Network Layer addresses? Answer: Unlike Layer 3 logical addresses that are hierarchical, physical addresses do not indicate onwhich network the device is located. If the device is moved to another network or subnet, it still functionswith the same Layer 2 physical address.

Because the frame is only used to transport data between nodes across the local media, the Data LinkLayer address is only used for local delivery. Addresses at this layer have no meaning beyond the localnetwork. Compare this to Layer 3, where addresses in the packet header are carried from source hostto destination host, regardless of the number of network hops along the route.

Question 7: What are the possible header field types in Data Link frames? Answer: Typical frame header fields include: - Start Frame field - Indicates the beginning of the frame. - Source and Destination address fields - Indicates the source and destination nodes on the media.

2/12/2011 CISCO Accessible Theme

ev-iip.netacad.net/virtuoso/…/main.html… 23/27

Page 24: CISCO-7 Data Link Layer

- Priority/Quality of Service field - Indicates a particular type of communication service for processing. - Type field - Indicates the upper layer service contained in the frame. - Logical connection control field - Establishes a logical connection between nodes. - Physical link control field - Establishes the media link. - Flow control field - Starts and stops traffic over the media. - Congestion control field - Indicates congestion in the media.

Question 8: Give the purpose of the Frame Check Sequence field in a Data Link frame trailer. Answer: The media is a potentially unsafe environment for data. The signals on the media could besubject to interference, distortion, or loss that would substantially change the bit values that thosesignals represent. To ensure that the content of the received frame at the destination matches that ofthe frame that left the source node, a transmitting node creates a logical summary of the contents of theframe. This is known as the Frame Check Sequence (FCS) and is placed in the trailer to represent thecontents of the frame. When the frame arrives at the destination node, the receiving node calculates itsown logical summary, or FCS, of the frame. The receiving node compares the two FCS values. If the twovalues are the same, the frame is considered to have arrived as transmitted. If the FCS values differ,the frame is discarded. There is always the small possibility that a frame with a good FCS result isactually corrupt. Errors in bits can cancel each other out when the FCS is calculated. Upper layerprotocols would then be required to detect and correct this data loss.

Page 3:In this activity, you will continue to build a more complex model of the Exploration lab network.

Click the Packet Tracer icon to launch the Packet Tracer activity.

7.6.1 - Summary and ReviewLink to Packet Tracer Exploration: Skills Integration Challenge: Data Link Layer Issues

In this activity, you continue to build a more complex model of the Exploration lab network.

Page 4:To Learn MoreReflection Questions

How did the widespread adoption of the OSI model change the development of network technologies?How does today's data communications environment differ from that of twenty years ago because of theadoption of the model?

Discuss and compare Carrier Sense Multi-Access Data Link media access protocol features andoperation with those of deterministic media access protocols.

Discuss and consider the issues that the developers of a new physical data communications mediumhave to resolve to ensure interoperability with the existing upper layer TCP/IP protocols.

7.6.1 - Summary and ReviewThe diagram depicts a collage of people using computers and networks.

7.7 Chapter Quiz7.7.1 Chapter Quiz

Page 1:

2/12/2011 CISCO Accessible Theme

ev-iip.netacad.net/virtuoso/…/main.html… 24/27

Page 25: CISCO-7 Data Link Layer

7.7.1 - Chapter Quiz1. Which frame field is created by a source node and used by a destination node to ensure that atransmitted data signal has not been altered by interference, distortion, or signal loss? A. Transport Layer error check field B. Frame Check Sequence field C. User Datagram Protocol field D. Error correction E. Flow control field

2. Which Data Link Layer addressing scheme is used in a point-to-point logical topology? A. IPv4 addressing B. IPv6 addressing C. Ring addressing D. Multilayer addressing E. Layer 2 addressing not required for this topology

3. What do network hosts use Data Link Layer addresses for? A. Remote delivery B. Local and remote delivery C. Local delivery D. Remote delivery using routers

4. Which three basic parts are common to all frame types supported by the Data Link Layer? (Choosethree.) A. header B. type field C. MTU size D. data E. trailer F. CRC value

5. What are two characteristics of the controlled media access method? (Choose two.) A. It is known as a deterministic access method. B. There are no collisions when this type of method is in use. C. Any station can transmit at any time. D. Bandwidth is more efficiently utilized than in a contention-based access method. E. Stations must determine if the media is carrying a signal before they can transmit.

6. Which of the following are sublayers of the Data Link Layer? A. ACL, LMC B. MAC, LAC C. MAC, LLC D. O S I, LLC

7. Which two of the following are Data Link Layer encapsulation details? (Choose two.) A. A header and trailer are added. B. Data is converted into packets. C. Packets are packaged into frames. D. Frames are divided into segments. E. Packets are changed into bits for Internet travel.

8. What is achieved by the encapsulation process at the Data Link Layer? A. Packets are put into frames. B. Data is packaged into a packet. C. Packets are divided into segments. D. Data is converted for Internet transmission.

2/12/2011 CISCO Accessible Theme

ev-iip.netacad.net/virtuoso/…/main.html… 25/27

Page 26: CISCO-7 Data Link Layer

9. Match the characteristic to the associated media access control method. (Not all characteristics areused.) Characteristics: Deterministic Ethernet Physical ring topology No collisions Non-deterministic Only one station can transmit at a time Stations can transmit at any time Token passing More efficient use of bandwidth

Media access control methods: Controlled access Contention-based access

10. Match the characteristic to the topology type. (Not all characteristics are used.) Characteristics: Connects two nodes directly CSMA/CD Deterministic Logical virtual circuit Frame header not required Token passing Shared media

Topology types: Point-to-Point Multi-access Ring

Go To Next Go To Previous Scroll To Top

All contents copyright © 2007-2009 Cisco Systems, Inc. All | Translated by the Cisco Networking Academy. About

2/12/2011 CISCO Accessible Theme

ev-iip.netacad.net/virtuoso/…/main.html… 26/27

Page 27: CISCO-7 Data Link Layer

2/12/2011 CISCO Accessible Theme

ev-iip.netacad.net/virtuoso/…/main.html… 27/27