Which layer is responsible for data flow between the source and destination?

Another issue that arises in the Data link layer (and most of the higher layers as well) is how to keep a fast transmitter from “drowning” a slow receiver in data. Some traffic regulation mechanism must be employed in order to let the transmitter know how much buffer space the receiver has at the moment. Frequently, flow regulation and error handling are integrated for convenience.

If the line can be used to transmit data in both directions, this introduces a new complication for the Data link layer software. The problem is that the acknowledgment frames for A to B traffic compete for use of the line with data frames for the B to A traffic. A clever solution in the form of piggybacking has been devised.

Read moreNavigate Down

View chapterPurchase book

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780124045576500112

OSI Model and Then Some

In Next Generation SSH2 Implementation, 2009

The data link layer takes the packet from the network layer and breaks it into frames. The header in this layer provides the source and destination MAC addresses. It is the data link layer that will convert the data into binary digits such as 1 and 0 and then prepare them for the physical layer. This layer has to be aware of what type of network interface card (NIC) is being used in order to prepare the packet in a certain way. A frame prepared for Ethernet format would not be understood by a network set up with Token Ring. Thus, this layer takes the network interface into consideration before con-verting the packet. Cyclic redundancy Checking (CRC) is another feature found in the data link layer that provides the ability to detect if a received frame was damaged. This checking feature is normally done by the LAN switch or WAN frame relay switch.

Layer 2 devices that operate at this level are switches and bridges. They work by guiding the traffic to a destination based on the MAC address. The MAC address is a unique series of numbers and letter used to identify a certain network card. They are sometimes referred to as the physical address because this address is hard coded into the network card. A switch can direct traffic to the correct computer only if it's aware of what port the computer's network card is attached. This is done by the computer presenting the MAC address from its network card to the switch when it first comes online.

There are a variety of protocols that work at this layer. Some are used by hosts and others by network devices such as switches. STP (Spanning tree protocol) and RSTP (Rapid spanning tree protocol) are examples of protocols used by switches in this layer. They provide the ability to make sure there is only one layer 2 path to get to a destination. PPP (Point-to-point protocol) and L2TP (Layer 2 Tunneling protocol) are used by hosts. PPP provides the ability for a host to make a connection with a remote side using a modem. L2TP allows a host to connect to a remote side using a secure connection.

Read moreNavigate Down

View chapterPurchase book

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9781597492836000027

The OSI Model and Networking Protocols

Naomi J. Alpern, Robert J. Shimonski, in Eleventh Hour Network+, 2010

The data link layer is responsible for maintaining the data link between two hosts or nodes. Its characteristics and functions are as follows:

Defines and manages the ordering of bits to and from data segments called packets

Management of frames, which contains data arranged in an organized manner, which provides for an orderly and consistent method of sending data bits across the medium

Responsible for flow control, which is the process of managing the timing of sending and receiving data so that it doesn't exceed the capacity of the physical connection

Responsible for error notification, including receiving and managing error messaging related to physical delivery of packets

Network devices that operate at this layer include Layer 2 switches (switching hubs) and bridges.

The data link layer is divided into two sublayers:

Logical Link Control (LLC) sublayer provides the logic for the data link. Thus, it controls the synchronization, flow control, and error checking functions of the data link layer.

Media Access Control (MAC) sublayer provides control for accessing the transmission medium. It is responsible for moving data packets from one network interface card (NIC) to another, across a shared transmission medium. Physical addressing is handled at the MAC sublayer. MAC is also handled at this layer. This refers to the method used to allocate network access to computers and prevent them from transmitting at the same time, causing data collisions. Common MAC methods include Carrier Sense Multiple Access/Collision Detection (CSMA/CD), used by Ethernet networks, Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA), used by AppleTalk networks, and token passing, used by Token Ring and Fiber Distributed Data Interface (FDDI) networks.

EXAM WARNING

A MAC address consists of six hexadecimal numbers. The highest possible hexadecimal number is FF:FF:FF:FF:FF:FF, which is a broadcast address. The first three bytes contain a manufacturer code and the last three bytes contain a unique station ID. You can view the MAC address on most systems with the following commands.

Windows ME, 9x: winipcfg (navigate the graphical user interface (GUI) to find the MAC address)

Windows NT, XP, Vista, 2000, 2003, 2008: ipconfig/all

Linux: ifconfig -a

Read moreNavigate Down

View chapterPurchase book

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9781597494281000060

Packet-Switched Networks

Jean Walrand, Pravin Varaiya, in High-Performance Communication Networks (Second Edition), 2000

3.1.5 Layer 3: Network Layer

The data link layer implements a packet link between computers attached to a common link. As we explained in our discussion of store-and-forward packet switching (see section 2.6.2), when computers are connected by a collection of point-to-point links, they must figure out where to send the packets that they receive: whether to send them out over another link and, if so, which one. (See Figure 3.6.) This function–finding the path the packets must follow–is called routing. Routing is one of the main functions of the network layer. The network layer appends unique network addresses of the source and destination computers. An important addressing scheme in packet-switched networks is that used by the Internet. Circuit-switched networks, like the telephone network, use different addressing schemes.

Which layer is responsible for data flow between the source and destination?

FIGURE 3.6. The network layer delivers packets between any two computers attached to the same network. That layer implements store-and-forward transmissions along successive links from the source to the destination.

Thus, the network layer uses the transmission over point-to-point links provided by the data link layer to transmit packets between any two computers attached in a network.

What layer is responsible for transferring data between the source and destination computers?

The transport layer. The transport layer is responsible for transferring data across a network and provides error-checking mechanisms and data flow controls. It determines how much data to send, where it gets sent and at what rate. TCP within the TCP/IP suite is the best-known example of the transport layer.

Which layer is responsible for data flow?

The transport layer is responsible for taking data and breaking it up into smaller chunks. When data is transferred across a network, it is not transferred as one packet. To make transfers more efficient and faster, the transport layer breaks data into smaller segments.

What layers gets data from a source network to the destination network?

Network layer: Handles the routing and sending of data between different networks. The most important protocols at this layer are IP and ICMP.

Which layer is responsible for source to destination delivery in a network model?

Introduction to Network Layer Network Layer is the third layer of the OSI Model. It's responsible for source-to-destination or host-to-host delivery of packets across multiple networks.