SlideShare una empresa de Scribd logo
1 de 21
OSI Data Link Layer

Network Fundamentals – Chapter 7

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Public

1
Objectives


Explain the role of Data Link layer protocols in data transmission.



Describe how the Data Link layer prepares data for transmission
on network media.



Describe the different types of media access control methods.



Identify several common logical network topologies and describe
how the logical topology determines the media access control
method for that network.



Explain the purpose of encapsulating packets into frames to
facilitate media access.



Describe the Layer 2 frame structure and identify generic fields.



Explain the role of key frame header and trailer fields including
addressing, QoS, type of protocol and Frame Check Sequence.

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Public

2
Data Link Layer – Accessing the Media
 Describe the service the Data Link Layer provides as it
prepares communication for transmission on specific
media

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Public

3
Data Link Layer – Accessing the Media
 Describe why Data Link layer protocols are required to
control media access

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Public

4
Data Link Layer – Accessing the Media
 Describe the role of framing in preparing a packet for
transmission on a given media

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Public

5
Data Link Layer – Accessing the Media
 Describe the role the Data Link layer plays in linking the
software and hardware layers

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Public

6
Data Link Layer – Accessing the Media
 Identify several sources for the protocols and standards
used by the Data Link layer

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Public

7
Media Access Control Techniques
 Explain the necessity for controlling access to the
media

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Public

8
Media Access Control Techniques
 Identify two media access control methods for shared
media and the basic characteristics of each

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Public

9
Media Access Control Techniques
 Define Full Duplex and Half Duplex as it relates to
Media Access Control for non-shared media

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Public

10
Media Access Control Techniques
 Describe the purpose of a logical topology and identify
several common logical topologies

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Public

11
Media Access Control Techniques
 Contrast logical and physical topologies

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Public

12
Media Access Control Techniques
 Identify the characteristics of point-to-point topology
and describe the implications for media access when
using this topology

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Public

13
Media Access Control Techniques
 Identify the characteristics of multi-access topology and
describe the implications for media access when using
this topology

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Public

14
Media Access Control Techniques
 Identify the characteristics of ring topology and describe
the implications for media access when using this
topology

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Public

15
Media Access Control Addressing and
Framing Data
 Describe the purpose of encapsulating packets into
frames to facilitate the entry and exit of data on media

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Public

16
Media access control addressing and framing
data
 Describe the role of the frame header in the Data Link
layer and identify the fields commonly found in
protocols specifying the header structure

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Public

17
Media access control addressing and framing
data
 Describe the role of addressing in the Data Link layer
and identify cases where addresses are needed and
cases where addresses are not needed

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Public

18
Media access control addressing and framing
data
 Describe the importance of the trailer in the Data Link
layer and its implications for use on Ethernet, a "nonreliable" media

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Public

19
Summary

© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Public

20
© 2007 Cisco Systems, Inc. All rights reserved.

Cisco Public

21

Más contenido relacionado

Destacado

Exploration network chapter2
Exploration network chapter2Exploration network chapter2
Exploration network chapter2r82093403
 
Exploration network chapter4
Exploration network chapter4Exploration network chapter4
Exploration network chapter4r82093403
 
Addressing the Network – IPv4
Addressing the Network – IPv4Addressing the Network – IPv4
Addressing the Network – IPv4Sachii Dosti
 
CCNA Exploration 1 - Chapter 8
CCNA Exploration 1 - Chapter 8CCNA Exploration 1 - Chapter 8
CCNA Exploration 1 - Chapter 8Irsandi Hasan
 
Ciw going mobile
Ciw going mobileCiw going mobile
Ciw going mobiler82093403
 
Networking basics and basic cisco commands
Networking basics and basic cisco commandsNetworking basics and basic cisco commands
Networking basics and basic cisco commandsKrishna Mohan
 
Ethical hacking Chapter 2 - TCP/IP - Eric Vanderburg
Ethical hacking   Chapter 2 - TCP/IP - Eric VanderburgEthical hacking   Chapter 2 - TCP/IP - Eric Vanderburg
Ethical hacking Chapter 2 - TCP/IP - Eric VanderburgEric Vanderburg
 
Network and security concepts
Network and security conceptsNetwork and security concepts
Network and security conceptssonuagain
 
6 ccna (fundamentals of i pv4 addressing and routing)
6  ccna (fundamentals of i pv4 addressing and routing)6  ccna (fundamentals of i pv4 addressing and routing)
6 ccna (fundamentals of i pv4 addressing and routing)Ulaş Ural
 
Networking Chapter 7
Networking Chapter 7Networking Chapter 7
Networking Chapter 7mlrbrown
 
Networking Essentials Lesson 02 - Standards and OSI - Eric Vanderburg
Networking Essentials Lesson 02 - Standards and OSI - Eric VanderburgNetworking Essentials Lesson 02 - Standards and OSI - Eric Vanderburg
Networking Essentials Lesson 02 - Standards and OSI - Eric VanderburgEric Vanderburg
 
Basics about IP address, DNS and DHCP.
Basics about IP address, DNS and DHCP.Basics about IP address, DNS and DHCP.
Basics about IP address, DNS and DHCP.abhishek bhandare
 

Destacado (17)

Exploration network chapter2
Exploration network chapter2Exploration network chapter2
Exploration network chapter2
 
Exploration network chapter4
Exploration network chapter4Exploration network chapter4
Exploration network chapter4
 
Addressing the Network – IPv4
Addressing the Network – IPv4Addressing the Network – IPv4
Addressing the Network – IPv4
 
CCNA Exploration 1 - Chapter 8
CCNA Exploration 1 - Chapter 8CCNA Exploration 1 - Chapter 8
CCNA Exploration 1 - Chapter 8
 
Ciw going mobile
Ciw going mobileCiw going mobile
Ciw going mobile
 
Networking basics and basic cisco commands
Networking basics and basic cisco commandsNetworking basics and basic cisco commands
Networking basics and basic cisco commands
 
Ethical hacking Chapter 2 - TCP/IP - Eric Vanderburg
Ethical hacking   Chapter 2 - TCP/IP - Eric VanderburgEthical hacking   Chapter 2 - TCP/IP - Eric Vanderburg
Ethical hacking Chapter 2 - TCP/IP - Eric Vanderburg
 
Network and security concepts
Network and security conceptsNetwork and security concepts
Network and security concepts
 
6 ccna (fundamentals of i pv4 addressing and routing)
6  ccna (fundamentals of i pv4 addressing and routing)6  ccna (fundamentals of i pv4 addressing and routing)
6 ccna (fundamentals of i pv4 addressing and routing)
 
Networking Chapter 7
Networking Chapter 7Networking Chapter 7
Networking Chapter 7
 
TCP/IP Basics
TCP/IP BasicsTCP/IP Basics
TCP/IP Basics
 
Networking Essentials Lesson 02 - Standards and OSI - Eric Vanderburg
Networking Essentials Lesson 02 - Standards and OSI - Eric VanderburgNetworking Essentials Lesson 02 - Standards and OSI - Eric Vanderburg
Networking Essentials Lesson 02 - Standards and OSI - Eric Vanderburg
 
IPv6 theoryfinalx
IPv6 theoryfinalxIPv6 theoryfinalx
IPv6 theoryfinalx
 
Basics about IP address, DNS and DHCP.
Basics about IP address, DNS and DHCP.Basics about IP address, DNS and DHCP.
Basics about IP address, DNS and DHCP.
 
Ip address and subnetting
Ip address and subnettingIp address and subnetting
Ip address and subnetting
 
TCP/IP basics
TCP/IP basicsTCP/IP basics
TCP/IP basics
 
TCP/IP Basics
TCP/IP BasicsTCP/IP Basics
TCP/IP Basics
 

Similar a Exploration network chapter7

CCNA Exploration 1 - Chapter 7
CCNA Exploration 1 - Chapter 7CCNA Exploration 1 - Chapter 7
CCNA Exploration 1 - Chapter 7Irsandi Hasan
 
Exploration_Network_Chapter2.ppt
Exploration_Network_Chapter2.pptExploration_Network_Chapter2.ppt
Exploration_Network_Chapter2.pptssuser7c54e61
 
CCNA Exploration 1 - Chapter 2
CCNA Exploration 1 - Chapter 2CCNA Exploration 1 - Chapter 2
CCNA Exploration 1 - Chapter 2Irsandi Hasan
 
Class I_OSI Network Layer by CISCO.ppt
Class I_OSI Network Layer by CISCO.pptClass I_OSI Network Layer by CISCO.ppt
Class I_OSI Network Layer by CISCO.pptNukriTskvitaia
 
CCNA Discovery 1 - Chapter 3
CCNA Discovery 1 - Chapter 3CCNA Discovery 1 - Chapter 3
CCNA Discovery 1 - Chapter 3Irsandi Hasan
 
CCNA Exploration 1 - Chapter 5
CCNA Exploration 1 - Chapter 5CCNA Exploration 1 - Chapter 5
CCNA Exploration 1 - Chapter 5Irsandi Hasan
 
CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3Nil Menon
 
Exploration network
Exploration networkExploration network
Exploration networkchtiiara
 
CCNA Exploration 1 - Chapter 1
CCNA Exploration 1 - Chapter 1CCNA Exploration 1 - Chapter 1
CCNA Exploration 1 - Chapter 1Irsandi Hasan
 
CCNA Exploration 1 - Chapter 3
CCNA Exploration 1 - Chapter 3CCNA Exploration 1 - Chapter 3
CCNA Exploration 1 - Chapter 3Irsandi Hasan
 
Chapter 03 - Network Protocols and Communications
Chapter 03 - Network Protocols and CommunicationsChapter 03 - Network Protocols and Communications
Chapter 03 - Network Protocols and CommunicationsYaser Rahmati
 
CCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communicationsCCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communicationsVuz Dở Hơi
 
Chapter 3 : Network protocols and communications
Chapter 3 : Network protocols and communicationsChapter 3 : Network protocols and communications
Chapter 3 : Network protocols and communicationsteknetir
 
Exploration network chapter1
Exploration network chapter1Exploration network chapter1
Exploration network chapter1jdb1979
 
Exploration network chapter1
Exploration network chapter1Exploration network chapter1
Exploration network chapter1Ali Kamil
 
CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3Irsandi Hasan
 

Similar a Exploration network chapter7 (20)

CCNA Exploration 1 - Chapter 7
CCNA Exploration 1 - Chapter 7CCNA Exploration 1 - Chapter 7
CCNA Exploration 1 - Chapter 7
 
Data Link Layer
Data Link LayerData Link Layer
Data Link Layer
 
chapter_7
chapter_7chapter_7
chapter_7
 
Exploration network chapter7
Exploration network chapter7Exploration network chapter7
Exploration network chapter7
 
Exploration_Network_Chapter2.ppt
Exploration_Network_Chapter2.pptExploration_Network_Chapter2.ppt
Exploration_Network_Chapter2.ppt
 
Cisco network 1 1
Cisco network 1 1Cisco network 1 1
Cisco network 1 1
 
CCNA Exploration 1 - Chapter 2
CCNA Exploration 1 - Chapter 2CCNA Exploration 1 - Chapter 2
CCNA Exploration 1 - Chapter 2
 
Class I_OSI Network Layer by CISCO.ppt
Class I_OSI Network Layer by CISCO.pptClass I_OSI Network Layer by CISCO.ppt
Class I_OSI Network Layer by CISCO.ppt
 
CCNA Discovery 1 - Chapter 3
CCNA Discovery 1 - Chapter 3CCNA Discovery 1 - Chapter 3
CCNA Discovery 1 - Chapter 3
 
CCNA Exploration 1 - Chapter 5
CCNA Exploration 1 - Chapter 5CCNA Exploration 1 - Chapter 5
CCNA Exploration 1 - Chapter 5
 
CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3
 
Exploration network
Exploration networkExploration network
Exploration network
 
CCNA Exploration 1 - Chapter 1
CCNA Exploration 1 - Chapter 1CCNA Exploration 1 - Chapter 1
CCNA Exploration 1 - Chapter 1
 
CCNA Exploration 1 - Chapter 3
CCNA Exploration 1 - Chapter 3CCNA Exploration 1 - Chapter 3
CCNA Exploration 1 - Chapter 3
 
Chapter 03 - Network Protocols and Communications
Chapter 03 - Network Protocols and CommunicationsChapter 03 - Network Protocols and Communications
Chapter 03 - Network Protocols and Communications
 
CCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communicationsCCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communications
 
Chapter 3 : Network protocols and communications
Chapter 3 : Network protocols and communicationsChapter 3 : Network protocols and communications
Chapter 3 : Network protocols and communications
 
Exploration network chapter1
Exploration network chapter1Exploration network chapter1
Exploration network chapter1
 
Exploration network chapter1
Exploration network chapter1Exploration network chapter1
Exploration network chapter1
 
CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3
 

Más de r82093403

Más de r82093403 (19)

The lpic 2 exam prep
The lpic 2 exam prepThe lpic 2 exam prep
The lpic 2 exam prep
 
SCJP ch18
SCJP ch18SCJP ch18
SCJP ch18
 
SCJP ch17
SCJP ch17SCJP ch17
SCJP ch17
 
SCJP ch16
SCJP ch16SCJP ch16
SCJP ch16
 
SCJP ch15
SCJP ch15SCJP ch15
SCJP ch15
 
SCJP ch14
SCJP ch14SCJP ch14
SCJP ch14
 
SCJP ch12
SCJP ch12SCJP ch12
SCJP ch12
 
SCJP ch11
SCJP ch11SCJP ch11
SCJP ch11
 
SCJP ch10
SCJP ch10SCJP ch10
SCJP ch10
 
SCJP ch09
SCJP ch09SCJP ch09
SCJP ch09
 
SCJP ch08
SCJP ch08SCJP ch08
SCJP ch08
 
SCJP ch07
SCJP ch07SCJP ch07
SCJP ch07
 
SCJP ch06
SCJP ch06SCJP ch06
SCJP ch06
 
SCJP ch05
SCJP ch05SCJP ch05
SCJP ch05
 
SCJP ch04
SCJP ch04SCJP ch04
SCJP ch04
 
SCJP ch03
SCJP ch03SCJP ch03
SCJP ch03
 
SCJP ch02
SCJP ch02SCJP ch02
SCJP ch02
 
SCJP ch01
SCJP ch01SCJP ch01
SCJP ch01
 
SCJP ch13
SCJP ch13SCJP ch13
SCJP ch13
 

Último

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 

Último (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

Exploration network chapter7

  • 1. OSI Data Link Layer Network Fundamentals – Chapter 7 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 1
  • 2. Objectives  Explain the role of Data Link layer protocols in data transmission.  Describe how the Data Link layer prepares data for transmission on network media.  Describe the different types of media access control methods.  Identify several common logical network topologies and describe how the logical topology determines the media access control method for that network.  Explain the purpose of encapsulating packets into frames to facilitate media access.  Describe the Layer 2 frame structure and identify generic fields.  Explain the role of key frame header and trailer fields including addressing, QoS, type of protocol and Frame Check Sequence. © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 2
  • 3. Data Link Layer – Accessing the Media  Describe the service the Data Link Layer provides as it prepares communication for transmission on specific media © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 3
  • 4. Data Link Layer – Accessing the Media  Describe why Data Link layer protocols are required to control media access © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 4
  • 5. Data Link Layer – Accessing the Media  Describe the role of framing in preparing a packet for transmission on a given media © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 5
  • 6. Data Link Layer – Accessing the Media  Describe the role the Data Link layer plays in linking the software and hardware layers © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 6
  • 7. Data Link Layer – Accessing the Media  Identify several sources for the protocols and standards used by the Data Link layer © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 7
  • 8. Media Access Control Techniques  Explain the necessity for controlling access to the media © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 8
  • 9. Media Access Control Techniques  Identify two media access control methods for shared media and the basic characteristics of each © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 9
  • 10. Media Access Control Techniques  Define Full Duplex and Half Duplex as it relates to Media Access Control for non-shared media © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 10
  • 11. Media Access Control Techniques  Describe the purpose of a logical topology and identify several common logical topologies © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 11
  • 12. Media Access Control Techniques  Contrast logical and physical topologies © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 12
  • 13. Media Access Control Techniques  Identify the characteristics of point-to-point topology and describe the implications for media access when using this topology © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 13
  • 14. Media Access Control Techniques  Identify the characteristics of multi-access topology and describe the implications for media access when using this topology © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 14
  • 15. Media Access Control Techniques  Identify the characteristics of ring topology and describe the implications for media access when using this topology © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 15
  • 16. Media Access Control Addressing and Framing Data  Describe the purpose of encapsulating packets into frames to facilitate the entry and exit of data on media © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 16
  • 17. Media access control addressing and framing data  Describe the role of the frame header in the Data Link layer and identify the fields commonly found in protocols specifying the header structure © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 17
  • 18. Media access control addressing and framing data  Describe the role of addressing in the Data Link layer and identify cases where addresses are needed and cases where addresses are not needed © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 18
  • 19. Media access control addressing and framing data  Describe the importance of the trailer in the Data Link layer and its implications for use on Ethernet, a "nonreliable" media © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 19
  • 20. Summary © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 20
  • 21. © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 21