ProductsLogo
LogoStudy Documents
LogoAI Grader
LogoAI Answer
LogoAI Code Checker
LogoPlagiarism Checker
LogoAI Paraphraser
LogoAI Quiz
LogoAI Detector
PricingBlogAbout Us
logo

Data Link Layer and Transport Layer: Functions and Importance in Networking and Cloud Computing

Verified

Added on  2023/04/25

|15
|3115
|65
AI Summary
The data link layer is responsible for managing data packets between the physical and network layers. It handles encoding, framing, error detection and correction, link configuration control, packet synchronization, packet identification, and carrier sense and media access. Its functions include maintaining bit rate, passing data in and out from the network layer, transforming data packets into data bits for transmission, error checking, link configuration control, framing packets, packet synchronization, packet identification, and carrier sense and media access. The transport layer is responsible for delivering packets from host to client applications. It uses ports to identify applications and has protocols like UDP and TCP for data transfer. Its functions include data handling and packaging, data transfer, connection establishment, addressing/multiplexing, packet fragmentation, and flow control. Cloud computing involves users and providers where resources are provided and maintained by providers over the internet. It offers flexibility, scalability, and cost savings. Different types of services in cloud computing include software-as-a-service (SaaS), platform-as-a-service (PaaS), and infrastructure-as-a-service (IaaS).

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Data link layer
This is the second layer in the OSI model and governs the transfer of data
between two nodes on same network. The data is transferred on basis of
Physical ID of the devices. As per OSI standard, the layer itself is sandwiched
between Physical layer and Network Layer. Physical layer deals with the
underlying medium of the network. Network layer manages the routing of data
across networks. Data link layer manages data packet between these two
layers.
The data link layer is used for the encoding, unraveling and predictable
relationship of data bits. Data bundles are handled by this layer. The layer itself
is divided into two sublayers. The data link layer's first sublayer is the Media
Access control (MAC) layer. It holds a 48 bit ID which is used for unique
identification of a node with in a network. The MAC layer allows the data link
layer to identify itself on the same network. All data packets routed on
network are directed based on this MAC address.
The data link layer's second sublayer is the logical link control. It manages two
way communication of data stream from higher layers.
Some important functions of Data link layer are given below:

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Maintain bit rate - bits should be passed on at rates not to overwhelm the
receiver. This is done by making use of suitable buffers and use of
acknowledgments between communicating parties.
Data link layer is to pass on the data in and out from network layer. The bit
by bit data received at the input must be framed as a data packet and
transferred to the upper layers.
Data link layer transforms data packet in to data bits. These data bits are
then encoded in physical layer for transmission of the data. Reverse is also
done when getting the data from physical layer. The bit stream is converted
into data packet and forwarded.
Keep track of any errors in bit values by making using of CRC bits in data
packets and perform CRC checks. Due to noise in physical channels, some
bits received might be in error. The various parity and redundancy bits are
used to identify single bit or burst errors. The measures are then taken
accordingly to correct the error or request retransmission of packet.
Link Configuration Control: The layer must also handle the mode of
transmission. Some network media may support full duplex mode, others
may only support half duplex or simplex modes of transmission. Not all
channels full two way communication. This must be taken care of by the
layer and data must only be transmitted when media is available for
transmission.
Document Page
Framing of packet must also be done by the layer adding the MAC address in
the header for other devices to recognize and accept the packet at the
matching node. This might need use of ARP from higher layers to resolve
MAC addresses of receiving stations. This is done by sending broadcast
messages on network and processing an ARP reply received by the node
responsible for providing the MAC id.
Packet Synchronization: The packets must be framed with synchronization
bits on each side to allow the receiving terminals detect start and end of the
packet on media. This is important for physical media to be able to recognize
the frame boundaries.
Packet Identification: Data Link layer also needs to decode the packets
received on its input and match the destination MAC address in the packet
with its own MAC address. The packet should be buffered and processed if
the address matches and forwarded to upper layers for further processing.
Carrier Sense and Media Access: Physical layer only converts the signals into
streams of bits. It makes no decision based on values of those bits. It’s up to
the data link layer to make sense out of it. The layer must decide if the
carrier is occupied or free at any given moment before it starts transmission.
There are two methodologies used for carrier access, one is based on
transmission and waiting for collision to occur called as CSMA/CD (Carrier
sense Multiple Access/ Collision Detection) and other one senses carrier
Document Page
before transmission and tries to avoid collision, called as CSMA/CA (Carrier
Sense Multiple Access/Collision Avoidance).
CSMA/CD is usually preferred for Wired Networks, where each node
transmits the data and senses the media at the same time. If there is
transmission by more than one node at the same time, both the nodes cease
to transmit data, wait for random amount of time and transmit again.
CSMA/CA is usually preferred for wireless networks, since two nodes might
not be in range of each other but in range of third device. In such a case
collision will be hard to detect by transmitting stations. So transmitting
stations first send a request to reserve a channel before transmission. Only if
the channel is free, the node starts transmission. And relinquishes the
channel after it is done transmitting.
All these functions are carried out by the data link layer for every single
packet that passes through the layer either upstream or downstream. This
way the layer keeps the node connected in a network.

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Transport Layer
Transport layer is middle layer of the OSI model. The fourth layer sandwiched
between Network layer on downstream and Session layer on Upstream. The
purpose of the layer is delivery of packets from Host application to client
application. The TCP uses port/ socket number to identify the applications on
each host. This is coordination with session layer allows for distribution of data
packets received at the client end from multiple sources to correct application
at the receiver machine. The Layer has two protocols for data transfer that are
currently in use under TCP/IP model. No protocol as such is specified in the OSI
model.
Ports
The UDP and TCP uses the model of ports for communication. There can be
many services executing on a single host i.e. web browsers, email etc. Every
service that is being executed on the host has a pot assigned. A port is a 16-bit
integer i.e. from 1 to 65535.
Each TCP and UDP link must have a source and a destination port allocated.
Whenever a certain service being executed on a host it starts listens to a port
i.e. it notifies the operating system on the host that it needs to collect data
guided to that specific port.
Document Page
Specific famous ports are kept for particular services e.g. web server runs on
port 80, file transfer protocol (FTP) runs on port 21, email server runs on port
25 etc. while certain ports are kept for confidential applications.
The source IP address from Network layer and port number from Transport
layer together are identified as a socket address. This port number is part of
the TCP and UDP protocol headers that are prefixed to data packets received
from session layer. There are two port numbers in each, one for destination
and another for the source.
Data protocols:
User Datagram Protocol (UDP):
(udp-tcp, n.d.)
This is a fast but non-reliable and connectionless protocol. The best effort is
made to relay data to the required network node but there is no guarantee
that packet will reach without being dropped on the route. This is preferred for
services where time is more important than accuracy like in video streams,
Document Page
audio calls etc. There is no means to perform retransmission of lost packets or
track lost packets. The packet header and the original data packet are
encapsulated in an IP Packet and transmitted. If the packet reaches the
destination IP, the port numbers are looked up and data payload is forwarded
to appropriate service.
Transmission Control Protocol (TCP):
(tcp-headers-and-udp-headers-explained, n.d.)
This is more refined, consistent and connection-oriented protocol. It has
several mechanism to track delivery of the data packets from one node to
another. In case of packet loss, the recovery mechanism allows for
retransmission of lost packet and reconstruct the original data bunch at the
receiver end. There is mechanism to break down larger packets into smaller
fragments, make quality of service requests for packets to be forwarded over

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
other packets by bypassing the queue. The mechanism is more complex than
UDP and requires more resources over network.
Functions of Transport Layer:
Data Handling and Packaging: Transport Layer also lays out rules by which
applications are able to send data to it from higher layers. This received data
packet is then packaged into TCP or UDP packets to be sent to the destination
node’s Transport Layer. The destination software unpacks the data, removes
the TCP/UDP headers and gives it to the application on the destination
machine
Data Transfer: Conceptually, the responsibility of transmission of entire data
package and its integrity being maintained until it reaches the destination, is
on a transmitting device. Following the division of functions of task among
layers, this is done by having the transport layer responsible for sending the
data packets to the underlying network-layer protocol such that all data can be
received by the other machine truthfully.
Connection Establishment: Transport Layer proposed a set of defined rules
that devices must follow to negotiate and establish a connection with each
other so as to transfer data, in case of TCP protocol. Once connection is
established, TCP supports managing of connections and handling errors in
transmission or reception that may result due to network issues. When both
Document Page
devices are done with data exchange, a special sequence of packets is
exchanged to terminate the connection at both ends.
Addressing/Multiplexing: Transport layer must also provide means to
differentiate between different applications sharing same IP address on a
machine. Therefore, an important function is multiplexing the data received
from higher layers in the stack and package them so they can be sent out using
the underlying network-layer protocol with unique packet identifiers. The
reverse process must be supported when de-multiplexing the received packets
so that they reach their intended application processes.
These features allow for service level packet delivery in a network owing to
correct functioning of Transport layer.
Packet Fragmentation: Transport layer also holds responsibility of
fragmentation of larger data packets into convenient small sizes packets as per
the capacity of the receiver station. This is called fragmentation of the data.
Each fragmented data packet has its own fragmentation bit set and a unique
sequence number. This helps reconstruction of the original data packet at the
receiver’s transport layer. This feature helps transport layer achieve a better
flow control while keeping the connection alive and not timing out.
Flow Control: The transport layer using TCP protocol also helps to do flow
control or data rate control between the two nodes. Each node engaged in
communication advertises its buffer size or receiver’s window size. Only the
Document Page
data bytes advertised by the receiver can be transmitted by the sender at a
given time and then it must wait for acknowledgement till next packet can be
sent again.

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Cloud computing
Cloud Computing is a very vast field. Space it encompasses several
technologies where internet lies at the heart of it. Ability of devices to connect
to each other over a network broadens the scope of things that can be done,
from where they can be done and how they can be done. Mainly the cloud
computing is divided into users and providers. Uses of the people who make
use of services or the Infrastructures or both of them combined in different
combinations. Providers other people make available those services or
Infrastructures to the people asking for it.
In cloud computing resources are located at a location which is not known or
may not be known to the end user, and might even be irrelevant to the user.
The physical devices and software services are hosted and maintained by a
provider over the internet. This abstraction of services is called cloud.
As a minimum the hardware infrastructure is always provided and maintained
by the provider. Over the top of it the provider may agree to provide certain
software or other services like backup and maintenance of the operating
environment depending upon the user’s requirement. Customer benefits by
not having to deal with technical task of maintaining and servicing the
hardware. That allows users to pay for the services only when he is using it
seems them the licensing costs for software and services.
Document Page
The biggest advantage of cloud computing is its flexibility and availability. The
user can always scale the infrastructure as per its current needs and scale
down when the peak is over. The user need not maintain the entire
infrastructure all the time, this gives a big cost saving.
Some users are still not convinced about security of their data being on the
cloud. Many organizations still want to hold data in their own server rather
than hosting it on third party machines. With new advances in networking
Technologies this risk is reducing and more businesses are now relying on
cloud storage for their data warehouses.
Concept of cloud computing is based upon Technology called virtualization
which allows for more than one operating systems to be running on same
hardware machine. The underlying software makes it appear like each guest
operating system is having Direct Access to the hardware and has total control
of it, in reality the hardware is shared among several guest operating systems.
Depending upon type of virtualizations we can have Type 1 bare metal
architecture or type 2 hosted architecture. Under Type 1 Virtualization, the
Hypervisor layer is the main layer and all other operating systems are guests. In
Type -2, the native operating system runs directly on hardware and a
virtualization service runs on top of it. The guests then talk to this layer instead
of host OS.
Document Page
Types of Services offered:
There are three types of services being offered under Cloud Computing. They
are differentiated based upon the amount of control over software and the
hardware being offered to the end user.
Software-as-a-Service (SaaS)
User need not install any software on its own in the software and interface to
interact with the services provided by the host user can just login to his
account and use the facility. In this model the user gets no option to choose
the infrastructure of the hardware on which the services are running. They are
dictated by the host only. This limits the amount of freedom you have about
the quality of service you get from a particular provider. However it reduces
the cost of obtaining a license and limits the amount to the time you use that
particular service. Google Docs are an example of this type of Cloud Service

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Platform-as-a-service (PaaS)
Another Cloud Service model is platform as a service where a developer hosts
his application with the required set of hardware. The services are offered to
customers by means of API. The developer may not be concerned with the
maintenance of hardware or its availability and bandwidth. He can focus on is
idea and the software services they want to host. The developer has the
freedom to choose the amount of hardware and the type of hardware it needs
for services to run efficiently. This is very beneficial model for the startups who
cannot have their own infrastructure but wants to deploy the services for the
customers. Facebook Based apps are an example of these kinds of services
where Facebook allows developers to use the platform to provide the services.
Infrastructure –as-a-Service (IaaS)
Infrastructure-as-a-service is the extreme end of the cloud computing model
are the provider only maintains the hardware the amount of hardware that
type the combination is all decided by the user gets to control the operating
environment the services being offered and other configurations this is mostly
suitable for large organizations with their specialized software’s. This model
also provides flexibility to configure security features backups and other things
by the user himself. The user also gets to control the networking elements of
the cloud to some extent and hence limit the guest using the facility.
Document Page
Present scenario:
With availability of mobile internet at high speed and ever increasing ability of
mobile devices for communication has made cloud-based services popular. A
mobile device could act like a client where user can use all the services hosted
on cloud from anywhere giving ever more freedom and efficiency to work.
Bibliography
Academy, C. N. (n.d.). Cisco Networking Academy's Introduction to Basic Switching Concepts and
Configuration. Retrieved from http://www.ciscopress.com:
http://www.ciscopress.com/articles/article.asp?p=2181836&seqNum=4
Čandrlić, G. (2013). Cloud Computing – Types of Cloud. Retrieved from https://www.globaldots.com:
https://www.globaldots.com/cloud-computing-types-of-cloud/
Different Types of Cloud Computing Services. (n.d.). Retrieved from
https://www.cloudcomputingserviceshub.com:
https://www.cloudcomputingserviceshub.com/different-types-of-cloud-computing-services/
Engineering, T. (n.d.). TCP_Congestion_Control_Comparison.pdf. Retrieved from
https://www.tetcos.com:
https://www.tetcos.com/downloads/TCP_Congestion_Control_Comparison.pdf
Forouzan, B. A. (n.d.). Data Communications and Networking. In B. A. Forouzan, Data
Communications and Networking. McGraw-Hill.
tcp-headers-and-udp-headers-explained. (n.d.). Retrieved from https://www.lifewire.com:
https://www.lifewire.com/tcp-headers-and-udp-headers-explained-817970
udp-tcp. (n.d.). Retrieved from https://www.tutorialsweb.com:
https://www.tutorialsweb.com/networking/tcp-ip/udp-tcp.htm
1 out of 15
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]