Fact-checked by Grok 2 weeks ago

Data link

A data link is a means of connecting one location to another for the purpose of transmitting and receiving digital information. It encompasses the communications channel, the interface, and the protocols used to form data into frames or packets for reliable transfer between directly connected nodes. In the Open Systems Interconnection (OSI) reference model, the data link layer (layer 2) provides the functional and procedural means to manage this transfer between adjacent network entities, detecting and possibly correcting errors that occur in the physical layer. It facilitates node-to-node delivery of data over a single communication channel, ensuring reliable and efficient communication between devices, such as those on a local area network (LAN). This layer receives data units from the network layer above and transforms them into frames suitable for transmission across the physical medium below, handling tasks like framing, synchronization, and medium access control. Key functions of the data link layer include where implemented) to maintain , flow control to manage the rate of data transmission and prevent overwhelming the receiver, and addressing to identify specific devices. It supports both connection-oriented and connectionless modes of operation, allowing for the establishment, maintenance, and release of data-link connections when needed. In shared network environments, the layer employs protocols for to resolve contention among multiple devices attempting to transmit simultaneously, such as through carrier sense multiple access with collision detection (CSMA/CD). In the standards family, which implements aspects of the data link for LANs and metropolitan area networks (MANs), the layer is divided into two sublayers: the (LLC) sublayer, which provides and flow/error control services to the network layer, and the (MAC) sublayer, which manages access to the physical and handles framing specific to the network type. Prominent protocols operating at this layer include for wired LANs, which uses MAC addresses for device identification and supports frame transmission up to 1500 bytes in standard frames; for wireless networks, incorporating additional security and contention resolution mechanisms; (PPP) for direct connections like dial-up or serial links; and (HDLC) for synchronous data transfer in wide area networks. These protocols ensure interoperability across diverse physical media, from twisted-pair copper to and radio waves, forming the foundation for reliable local and point-to-point networking.

Overview

Definition

In the Open Systems Interconnection (OSI) model, the data link layer is defined as the second layer (Layer 2), which provides the functional and procedural means to transfer data between adjacent network nodes in a multipoint or point-to-point data communications network. This layer is responsible for the node-to-node delivery of data frames between directly connected devices, ensuring that data is reliably exchanged across a single physical link. Unlike the physical layer (Layer 1), which deals with the raw transmission of individual bits over a physical medium without regard to their meaning or structure, the data link layer organizes these bits into structured frames, adding necessary headers and trailers to enable proper interpretation and delivery. Key characteristics of the include providing reliability over potentially unreliable physical media by incorporating mechanisms for on a hop-by-hop basis, rather than end-to-end. It employs addressing through Media Access Control () addresses, which are unique hardware identifiers assigned to network interfaces, to specify the source and destination of frames within a local . This hop-by-hop approach allows the data link layer to manage transmission errors and retransmissions locally between directly connected nodes, abstracting the complexities of the physical medium from higher layers. The basic components of a data link include (transmitting ), the (receiving ), the physical medium (such as or ) connecting them, and the rules governing exchange, , and processes. These elements work together to establish a logical that supports efficient and ordered transfer, forming the foundation for higher-layer networking functions.

Historical Development

The concept of the data link layer emerged in the 1960s through projects like the , funded by the U.S. Department of Defense's Advanced Research Projects Agency (), where data links provided the foundational mechanisms for reliable across early network nodes. The 's initial deployment in 1969 connected four host computers, enabling the transmission of data packets over telephone lines between institutions such as UCLA and the Stanford Research Institute, marking the first operational packet-switched network that relied on data link protocols for error-free delivery between adjacent nodes. In the 1970s, efforts toward standardization accelerated with the development of (HDLC) by the (ISO), proposed as a bit-oriented synchronous to unify transmission procedures across diverse systems. HDLC, evolving from IBM's Synchronous Data Link Control (SDLC) and formalized in ISO standards like ISO 3309 in 1979, became a for bit-synchronous communication in both point-to-point and multipoint configurations, influencing subsequent protocols for reliable link-level operations. The 1980s and 1990s saw significant advancements tailored to local and wide area networks, including the rise of standardized as in 1983, which defined with (CSMA/CD) for shared-medium LANs operating at 10 Mbps. Complementing this, the (PPP) emerged in the late 1980s as a successor to the (SLIP), with 1134 published in 1989 and the full standard in 1661 by 1994, enabling robust serial connections for WANs with features like authentication and multilink support. From the 2000s onward, data link technologies integrated with wireless and high-speed wired standards, such as (Wi-Fi), which saw amendments like 802.11g in 2003 for 54 Mbps operation at 2.4 GHz, driving widespread adoption in consumer and enterprise networks. Concurrently, (10GBASE) was ratified under IEEE 802.3ae in 2002, extending Ethernet's scalability to fiber-optic backbones at 10 Gbps for data centers and metropolitan networks. Later developments include 400 Gigabit Ethernet under IEEE 802.3bs in 2017, supporting ultra-high-speed links up to 400 Gbps over for data centers, as well as () ratified in 2020 for improved efficiency in dense environments and () published in 2025, enabling multi-gigabit wireless speeds across 2.4, 5, and 6 GHz bands. These evolutions were bolstered by regulatory bodies like the Telecommunication Standardization Sector () and the IEEE, which developed complementary standards—such as ITU-T's X-series for data networks and IEEE's 802 family—to ensure global interoperability and harmonized link-layer behaviors across infrastructures.

Functions

Framing and Synchronization

In the data link layer, framing involves encapsulating packets from the into structured suitable for transmission over a physical medium. This process adds a header containing addressing and control information, the consisting of the original network layer data, and a trailer typically including a for integrity verification. The header enables the receiver to identify the destination and manage frame handling, while the trailer supports basic checking, as detailed further in the error detection section. This encapsulation ensures reliable delivery across the link by delineating the boundaries of each unit of data. A generic data link frame structure typically includes start and end flags to mark the frame boundaries, a length field to indicate the payload size, and sequence numbers to maintain order in multi-frame transmissions. For instance, the start flag is often a specific bit pattern like 01111110 in bit-oriented protocols, followed by the header, , and end flag, with the trailer appended last. This format allows for variable-length payloads, accommodating up to the (MTU) limits defined by the underlying technology, such as 1500 bytes in standard Ethernet frames per specifications. Sequence numbers help in reassembling frames correctly, especially in scenarios involving retransmissions. Synchronization techniques are essential to distinguish control information from payload data and maintain timing during transmission. In synchronous protocols like (HDLC), is employed: after every five consecutive 1s in the data, a 0 is inserted by the sender to prevent accidental flag emulation, and the receiver removes it upon detection. This method, standardized in ISO/IEC 13239, ensures transparent data transmission without misinterpreting payload bits as delimiters. For asynchronous links, character stuffing (or byte stuffing) is used, where an precedes any data byte matching the flag or escape pattern, as seen in protocols operating over octet-oriented channels. These approaches address key challenges, such as reliably separating data from control signals in noisy environments and handling variable payloads without exceeding link MTU constraints, thereby preventing frame fragmentation or loss.

Error Detection and Control

Transmission errors at the data link layer primarily originate from noise, interference, or signal distortion occurring on the physical medium, which can alter bits during propagation and lead to corrupted frames. These impairments introduce random bit flips or burst errors, necessitating robust mechanisms to ensure data integrity without relying on higher-layer interventions. Error detection techniques append redundant bits to the data for verification. The simplest method employs parity bits, where an additional bit is added to achieve even or odd parity across the data block; this detects odd numbers of bit errors, such as single-bit flips, but fails for even-numbered errors. For enhanced reliability, Cyclic Redundancy Check (CRC) uses polynomial division over the data treated as a large binary number. A common implementation is CRC-32, defined by the polynomial x^{32} + x^{26} + x^{23} + x^{22} + x^{16} + x^{12} + x^{11} + x^{10} + x^{8} + x^{7} + x^{5} + x^{4} + x^{2} + x + 1, which generates a 32-bit checksum appended to the frame (typically in the trailer for post-framing integrity checks). This approach detects all burst errors up to 32 bits in length and multiple independent errors with high probability. Upon detecting an error, control strategies trigger recovery. Automatic Repeat reQuest (ARQ) protocols rely on acknowledgments (ACKs) from the receiver to confirm successful reception, prompting retransmission of erroneous frames. In Stop-and-Wait ARQ, the sender transmits one frame and awaits an ACK before sending the next, minimizing complexity but reducing efficiency due to idle waiting periods. Go-Back-N ARQ improves throughput by allowing the sender to transmit up to N unacknowledged frames in a window; if an error occurs, all frames from the errored one onward are retransmitted, requiring the receiver to discard out-of-order arrivals. These methods ensure reliable delivery at the cost of potential delays. For scenarios where retransmissions are undesirable, such as real-time links, enables direct correction without feedback. Hamming codes exemplify this by organizing parity bits to identify and fix single-bit errors through syndrome calculation. In the (7,4) Hamming code, 4 data bits are augmented with 3 parity bits across 7 positions (parity at powers of 2: 1, 2, 4), where each parity bit checks a unique subset of positions via a parity-check matrix; the syndrome reveals the error position for correction. Key trade-offs in these mechanisms balance detection accuracy against overhead. Parity bits introduce minimal (1-bit) redundancy but offer limited protection, while provides superior burst error detection up to the degree at the expense of 32 bits per , impacting efficiency in high-error environments. ARQ and FEC further trade and complexity for reliability, with ARQ suiting variable channels and FEC favoring low-latency applications. Flow control in the data link layer ensures efficient data transmission by regulating the rate at which frames are sent and received, preventing buffer overflows and optimizing link utilization. A key mechanism is the , which allows a sender to transmit multiple frames without waiting for individual acknowledgments, up to a predefined window size W that represents the number of unacknowledged frames permitted. In this approach, each frame is assigned a sequence number modulo some value, and the receiver sends cumulative acknowledgments to advance the window, enabling pipelined transmission over unreliable links. Receivers can advertise available space through window scaling options, dynamically adjusting W to match capacity and avoid congestion. Link management encompasses the processes of establishing, maintaining, and terminating data link connections to ensure reliable communication. Establishment typically involves a using control packets, such as in the (), where the Link Control Protocol (LCP) negotiates configuration options like maximum receive unit (MRU) and via Configure-Request, Configure-Ack, Configure-Nak, and Configure-Reject packets during the Link Establishment phase. Once established, maintenance is achieved through periodic packets or echo requests to monitor link quality and detect failures, with LCP providing ongoing configuration integrity checks. Teardown occurs via Terminate-Request and Terminate-Ack packets, triggered by errors, timeouts (default restart timer of 3 seconds), or administrative actions, closing the link gracefully. Congestion avoidance at the mitigates overload by signaling backpressure to upstream devices, particularly in full-duplex environments. In Ethernet, IEEE 802.3x defines pause frames as a flow mechanism, where a receiving device detects buffer congestion and transmits a MAC frame with a pause_time (in slot times) to instruct the sender to halt transmission for the specified duration, preventing loss without higher-layer intervention. These frames use a destination (01-80-C2-00-00-01) and 0x0001, and can be extended or canceled by subsequent pause frames, applying symmetrically in switch-to-switch links or asymmetrically for end stations. This link-level approach operates at speeds like 10/100/1000 Mb/s but is not intended for end-to-end congestion . Data link operations distinguish between half-duplex and full-duplex modes, impacting management strategies. In half-duplex shared media, (CSMA/CD) manages access by having stations listen before transmitting and detect collisions, backing off exponentially if conflicts occur, as specified in for shared collision domains. Full-duplex mode, enabled by dedicated point-to-point links and switching, eliminates collisions by allowing simultaneous send and receive without CSMA/CD, simplifying management and doubling effective throughput in modern Ethernet implementations. Key performance metrics for evaluating flow and link management include throughput and goodput, which quantify data transfer efficiency. Throughput measures the total rate of bits transmitted per second across the , encompassing all data including protocol overhead and retransmissions due to errors. , in contrast, represents the rate of useful data successfully delivered after deducting overhead (e.g., Ethernet headers) and accounting for losses, always lower than throughput and critical for assessing actual application performance in the presence of data inefficiencies.

Types

A point-to-point link establishes a direct, dedicated communication path between exactly two nodes, utilizing an exclusive that precludes interference or contention from additional devices. This configuration ensures that the entire is reserved for the communicating pair, whether over wired like cables or leased lines, or mediums in certain implementations. The primary advantages of point-to-point links include simplified design, as there is no need for mechanisms to manage shared resources; enhanced reliability through consistent, uncontended access to ; and standard support for full-duplex operation, which permits simultaneous transmission and reception of data in both directions without collision risks. These attributes make point-to-point links particularly suitable for applications requiring predictable performance and security, such as private data transfers between sites. Representative examples include the standard, which facilitates short-distance up to 15 meters at speeds of 20 kbps, commonly used for connecting computers to peripherals. In telephony, T1 lines provide dedicated point-to-point connectivity at 1.544 Mbps in , while E1 lines offer 2.048 Mbps in and other regions, both aggregating multiple voice or data channels over copper or fiber. Point-to-point links operate in either synchronous or asynchronous modes. Synchronous configurations, such as (Synchronous Optical Networking), employ a shared to align data transmission, enabling high-speed, precise multiplexing of bit streams over for backbone networks. In contrast, asynchronous setups, exemplified by (Universal Asynchronous Receiver-Transmitter), use start and stop bits to frame data without a common clock, suiting simpler, lower-speed serial interfaces. The (PPP) is well-suited for encapsulating data over such links due to its support for various . Common use cases encompass (WAN) connections, including legacy dial-up modems that establish temporary point-to-point sessions over telephone lines for remote access, and modern fiber optic point-to-point deployments that deliver high-bandwidth, private links between data centers or branch offices. Multipoint links refer to data link configurations where three or more nodes share a common , necessitating coordinated access mechanisms to prevent simultaneous transmissions that could lead to collisions. Unlike point-to-point links, these setups treat the medium as a broadcast accessible by multiple stations, enabling efficient sharing but requiring arbitration to maintain orderly communication. Common implementations include bus topologies, where all devices connect to a single backbone cable acting as a shared multipoint medium, and ring topologies, which form a closed loop of serial point-to-point connections that logically create a shared circulating path for data. Access methods in multipoint links primarily rely on protocols that regulate medium usage to avoid conflicts. , as exemplified in the IEEE 802.5 standard, involves a special control frame (token) that circulates the ring; a station seizes the token to transmit, appending its data frame before releasing a new token only after the frame returns, ensuring deterministic access without collisions. In contrast, (CSMA) variants, such as CSMA/CD used in Ethernet networks, allow stations to sense the medium for idleness before transmitting; if a collision is detected during transmission, stations issue a jam signal and employ a truncated binary algorithm to retry after random delays. Star topologies implemented with hubs (legacy multiport repeaters) also function as multipoint equivalents by centralizing connections to create a shared , while wireless ad-hoc networks extend this concept to radio-based shared media. Key challenges in multipoint links include collision detection and the hidden terminal problem, particularly in wireless environments where nodes may not detect each other's transmissions due to signal range limitations, leading to interference at the intended receiver. To mitigate the hidden terminal issue, the IEEE 802.11 standard incorporates the Request-to-Send/Clear-to-Send (RTS/CTS) mechanism, a four-way handshake where the sender broadcasts an RTS frame to reserve the medium, the receiver responds with CTS to acknowledge and silence nearby nodes, and transmission proceeds only upon mutual confirmation, reducing collision probability through virtual carrier sensing. Bandwidth sharing in these links contrasts deterministic approaches like Time Division Multiple Access (TDMA), which allocates fixed time slots to nodes for guaranteed access, with statistical multiplexing, which dynamically assigns resources based on traffic demand to achieve higher efficiency in variable-load scenarios.

Protocols

Data link layer protocols establish reliable communication over physical links by defining frame structures, error handling, and control mechanisms. Synchronous protocols, such as (HDLC), operate on a bit-oriented basis, using flags for framing to delineate data boundaries in continuous bit streams. HDLC supports (ARQ) for error recovery, enabling retransmission of corrupted frames in connection-oriented modes. A key derivative, Synchronous Data Link Control (SDLC), was developed by for its , adapting HDLC principles for proprietary environments while maintaining bit-oriented synchronization. Asynchronous protocols, in contrast, employ byte-oriented framing to accommodate variable-speed links without strict clocking. The (PPP), standardized by the IETF, uses character stuffing for transparency and includes the Link Control Protocol (LCP) to negotiate parameters like maximum receive unit and authentication methods, such as (CHAP). PPP's predecessor, (SLIP), provided basic IP encapsulation over serial lines but lacked negotiation and error detection features, limiting its robustness. In protocol stack integration, the (LLC) sublayer, defined in , enables multiplexing of multiple network protocols over a single (MAC) sublayer by assigning service access points for demultiplexing incoming frames. This separation allows upper-layer protocols to interact uniformly with diverse MAC implementations, such as those in local area networks. Standardization efforts are led by bodies like the IETF for wide-area network (WAN) protocols, exemplified by RFC 1661 for , which outlines encapsulation and link establishment procedures. The ITU-T standardizes protocols like Link Access Procedure, Balanced (LAPB) for X.25 networks, providing balanced mode operations for error-free frame delivery in packet-switched environments. The evolution of these protocols has shifted from bit-synchronous designs, like early HDLC variants requiring precise clock alignment, to byte-oriented approaches in protocols such as PPP, offering greater flexibility for integration with IP-based networks through simpler asynchronous handling and extensible options.

Common Implementations

Ethernet, standardized as IEEE 802.3, serves as a foundational wired data link technology for local area networks (LANs). Its frame format begins with an 8-byte preamble consisting of seven alternating 1s and 0s followed by a start frame delimiter (SFD) byte of 10101011, enabling receiver synchronization. This is followed by 6-byte destination and source MAC addresses, a 2-byte length or type field indicating payload size or upper-layer protocol, the variable-length data payload (up to 1500 bytes in standard frames), and a 4-byte frame check sequence (FCS) using CRC-32 for error detection. Speeds have evolved from the original 10 Mbps in 1983 to modern variants reaching 800 Gbps (as of 2025). Originally employing carrier sense multiple access with collision detection (CSMA/CD) for half-duplex shared media, Ethernet now predominantly uses full-duplex operation over switched networks, eliminating collisions and enabling simultaneous bidirectional transmission. Wi-Fi, governed by the family of standards, provides wireless data link connectivity in personal and enterprise environments. The (MAC) layer defines three primary frame types: data frames for payload transmission, control frames such as acknowledgments and request-to-send/clear-to-send for coordination, and management frames for , , and beaconing to maintain . Contention-based access occurs through the (DCF), which implements with collision avoidance (CSMA/CA), where stations listen before transmitting and use after detected collisions via missing acknowledgments. (QoS) enhancements in IEEE 802.11e introduce the hybrid coordination function (HCF) with enhanced distributed access (EDCA), prioritizing traffic classes like voice and video through adjustable contention parameters. Bluetooth, originally formalized in IEEE 802.15.1 but now managed by the Bluetooth SIG (Core Specification 6.2 as of November 2025), enables short-range wireless personal area networks (PANs) with low power consumption. It organizes devices into a topology, where one master coordinates up to seven active slaves using time-division duplexing on the 2.4 GHz ISM band. To mitigate interference, Bluetooth employs adaptive (FHSS), pseudorandomly selecting from 79 channels at 1 MHz spacing and hopping up to 1600 times per second (in Classic mode). Link types include asynchronous connection-less () for Classic mode supporting up to ~2 Mbps effective and synchronous connection-oriented (/eSCO) for voice links at 64 kbps with reserved bandwidth; Low Energy (LE) mode supports data rates up to 2 Mbps. Fiber Channel, an ANSI-standardized protocol for high-speed storage area networks (SANs), operates at the to interconnect servers, storage devices, and switches. Earlier generations use 8b/10b encoding to ensure DC balance and ; later generations employ 64b/66b or PAM4 encoding, transmitting serialized data over optic or media at rates from 1 Gbps to 128 Gbps in the latest generations. The FC-4 layer provides mapping for upper-layer protocols such as for block storage or for networking, encapsulating them into frames for reliable delivery. Common implementations like Ethernet exhibit low , typically under 1 ms in switched environments, facilitating real-time applications. Scalability is enhanced by tagging, which partitions networks into up to 4096 virtual , supporting thousands of nodes while maintaining isolation and traffic prioritization.

Applications

Terrestrial Networking

In terrestrial networking, the facilitates reliable communication in ground-based wired and short-range wireless environments, such as local area networks () in office settings. Ethernet serves as a primary for applications, enabling efficient among connected devices by providing high-speed, collision-free transmission through full-duplex operations. Switches perform bridging functions at the , isolating network segments to reduce and enhance performance by forwarding frames only to intended ports based on MAC addresses. For (WAN) extensions in carrier environments, (MPLS) operates over (SONET) and Synchronous Digital Hierarchy (SDH) infrastructures, allowing efficient transport of data link frames across long distances. MPLS employs label switching at what is often termed Layer 2.5, where labels are attached to packets at the edge and swapped hop-by-hop to forward traffic without relying on headers, thus optimizing bandwidth in core networks. In home networking scenarios, (DSL) modems utilize (PPPoE) for user authentication, encapsulating frames within Ethernet to establish secure sessions with service providers via attributes. Powerline adapters, standardized under , enable data link communication over existing electrical wiring, transmitting broadband signals through home circuits to connect devices without additional cabling while supporting multimedia and smart energy applications. Security in terrestrial data links is bolstered by standards like , which implements port-based to authenticate devices before granting access, restricting unauthorized traffic at the physical level. Complementing this, MACsec () provides hop-by-hop link encryption, securing Ethernet frames with cryptographic integrity and confidentiality to protect against and tampering in fixed infrastructures. Scalability of data link technologies in terrestrial setups ranges from small workgroups using switches, which deliver 1 Gbps speeds for basic office connectivity with minimal latency, to large-scale data centers employing for low-latency clustering. supports high-bandwidth, lossless interconnects in clustered environments, achieving sub-microsecond latencies essential for tasks.

Aviation and Aerospace

In aviation, data link technologies enable critical communications between aircraft and ground stations, as well as among aircraft, in environments demanding high reliability and minimal voice interference. The Aircraft Communications Addressing and Reporting System (), introduced in 1978 by Aeronautical Radio, Incorporated (), serves as a foundational digital data link for transmitting short text messages using VHF (around 130 MHz), (2-30 MHz), and satellite links. ACARS supports automated position reporting through integration with Automatic Dependent Surveillance-Contract (ADS-C) and facilitates maintenance data exchange, such as engine performance logs and fault diagnostics, thereby reducing pilot workload and enhancing operational efficiency. Controller-Pilot Data Link Communications (CPDLC) builds on infrastructure to provide structured, text-based exchanges between air traffic controllers and pilots, alleviating voice radio congestion in high-density . Operating over IP-based (ATN) protocols via VHF data link Mode 2 or satellite, CPDLC adheres to 622 standards, which define convergence functions for bit-oriented air traffic services on networks. This system enables clearances, requests, and acknowledgments, such as altitude changes or route amendments, with predefined message sets that minimize miscommunication errors. Automatic Dependent Surveillance-Broadcast (ADS-B) enhances by broadcasting position, velocity, and identification data derived from GNSS. Utilizing a 1090 MHz extended squitter on Mode S transponders, ADS-B integrates seamlessly with existing systems, allowing continuous transmission without and supporting collision avoidance through direct -to- links. This 1090ES implementation meets FAA performance requirements under Technical Standard Order TSO-C166b, enabling to track more precisely in non-radar areas. In applications, particularly satellite-to-ground links, the Consultative Committee for Space Data Systems (CCSDS) protocols address unique issues like Doppler shifts and long delays. CCSDS 401.0-B recommends and systems that accommodate Doppler shifts up to ±4 MHz in Ka-band (26-32 GHz) links, using coherent turnaround frequency ratios and stable oscillators (Allan deviation per specified curves) to maintain signal lock during high-velocity passes. These protocols, including PCM/PSK/PM with subcarrier options, ensure reliable and ranging over distances causing delays of seconds to minutes, as seen in deep space missions, by prioritizing phase stability and bandwidth efficiency. Aviation and aerospace data links face stringent challenges, including achieving 99.999% availability to support safety-critical operations and latencies under 1 second for time-sensitive updates. and links are susceptible to interference from phenomena like ionospheric disturbances and obstructions, which can degrade signal-to-noise ratios and require robust error control mechanisms for continuity. In space environments, additional hurdles involve compensating for extreme Doppler rates (up to 50 kHz/s in ) and propagation delays exceeding 500 ms one-way, necessitating adaptive and high oscillator stability to prevent .

Wireless and Mobile Systems

In and systems, data links operate over dynamic channels prone to , , and mobility-induced disruptions, necessitating robust framing, error correction, and mechanisms to maintain reliable . In cellular networks such as and , the air interface relies on the (PDCP) and (RLC) layers at the data link sublayer for these functions. The PDCP layer in handles header compression using Robust Header Compression (ROHC), ciphering, and integrity protection of user plane and data, while passing PDUs to the RLC layer. The RLC layer supports transfer of upper-layer PDUs, segmentation and reassembly for efficient transmission over variable radio conditions, and error correction via (ARQ) in acknowledged mode (AM) to retransmit lost segments, ensuring reliable delivery in the presence of packet errors. In , the PDCP layer extends these capabilities with support for dual and split bearers, associating each PDCP entity with up to two RLC entities for improved robustness during , while the RLC layer maintains similar segmentation, reassembly, and ARQ functions tailored to NR's flexible . Handover procedures in these systems enable seamless transitions between base stations as mobile devices move, minimizing data interruption. In 5G NR, Dual Active Protocol Stack (DAPS) handover allows the user equipment (UE) to maintain the source base station connection post-handover command, enabling continued uplink transmission from the source and downlink reception until the target link is established, which reduces interruption time to near zero for supported bearers. This contrasts with traditional break-before-make handovers in LTE, where the UE detaches from the source eNodeB before attaching to the target, relying on PDCP status reporting and RLC re-establishment to recover lost packets. WiMAX, based on the IEEE 802.16 standard, addresses broadband wireless access in mobile environments through (OFDM) in the to mitigate multipath and inter-symbol , dividing the into subcarriers for robust signal over non-line-of-sight paths. At the MAC layer, WiMAX employs connection-oriented scheduling to provision (QoS), classifying traffic into service classes such as unsolicited grant service (UGS) for constant applications and real-time polling service (rtPS) for variable rate streams, with the dynamically allocating bandwidth via (OFDMA) maps to meet and throughput guarantees. For low-power (IoT) applications, builds on the standard to form mesh topologies that extend range and reliability in sensor networks through , where devices act as routers to data while conserving energy. The uses with Collision Avoidance (CSMA-CA) in unslotted mode for low-duty-cycle operations, where nodes perform assessments and random backoffs before transmitting, minimizing collisions and enabling battery lives of years in dense deployments. Mobility management in these systems incorporates association procedures to handle device transitions. In Wi-Fi (IEEE 802.11), initial association establishes a link between a station and access point via authentication and association request/response frames, while reassociation allows a mobile station to transfer its existing association to a new access point without full re-authentication, supporting fast roaming and maintaining context like security keys. In cellular systems, paging mechanisms enhance idle-mode power saving by allowing UEs to enter discontinuous reception (DRX) cycles, monitoring the paging channel only during assigned occasions to detect incoming calls or data, with the network broadcasting paging messages across tracking areas to locate idle UEs without continuous attachment. Interference handling in mobile wireless data links employs frequency reuse patterns and advanced to optimize spectrum efficiency. In 5G mmWave bands, massive directs narrow beams toward users using precoding matrices, suppressing inter-user and inter-cell while enabling dense frequency reuse factors close to 1 in urban deployments. This directional transmission, combined with coordinated multipoint (CoMP) techniques, mitigates and blockage in high-mobility scenarios, achieving up to 10-20 reduction compared to antennas.

References

  1. [1]
    Data Link Layer
    The goal of the data link layer is to provide reliable, efficient communication between adjacent machines connected by a single communication channel.
  2. [2]
    [PDF] The OSI Model: Understanding the Seven Layers of Computer ...
    Layer 2 – The Data Link Layer. Layer 2 of the OSI model provides the following functions: • Allows a device to access the network to send and receive messages. ...
  3. [3]
    [PDF] Data Link Protocols
    Adaptor receives datagram from net layer & creates frame. 2. If adapter senses channel idle, it starts to transmit frame. If it senses channel.
  4. [4]
    IEEE 802-2024 - IEEE SA
    Mar 21, 2025 · It describes the reference models for the IEEE 802 standards and explains the relationship of these standards to the higher layer protocols; it ...
  5. [5]
    IEEE 802.3-2022 - IEEE SA
    Jul 29, 2022 · This amendment to IEEE Std 802.3 defines the Time Synchronization Service Interface (TSSI) to indicate when the Start Frame Delimiter (SFD) ...
  6. [6]
    [PDF] ECE 333: Introduction to Communication Networks Fall 2002 ...
    Examples of Data Link Protocols. • HDLC (and related protocols). • IEEE 802.2. • PPP. 10. HDLC (High level Data Link Control). IBM developed a DLL protocol ...
  7. [7]
    IEEE Std 802-2001
    Feb 7, 2002 · The IEEE 802 Standards encompass the functionality of the lowest two layers of the. OSI/RM (i.e., Physical layer and Data Link layer) and the ...
  8. [8]
    OSI Model Reference Chart - Cisco Learning Network
    The data link layer provides error-free transfer of data frames from one node to another over the physical layer, allowing layers above it to assume virtually ...
  9. [9]
    [IT430] Class 4: OSI Protocol Stack, PCAP Analysis I
    Link: The link layer is responsible for transmission of data frames between two nodes connected by a physical medium. That said, this layer provides node-to ...
  10. [10]
    OSI Model Examples - Cisco Learning Network
    Mar 5, 2020 · Layer 2, Data Link layer. Structures the data into a format appropriate for the transmission medium. Adds physical addresses such as media ...<|control11|><|separator|>
  11. [11]
    [PDF] ISO/IEC 7498-1 - Ecma International
    Jun 15, 1996 · 7.5. Network Layer. 7.6. Data Link Layer. 7.7. Physical Layer...... ISO ... A sublayer is defined as a grouping of functions in a layer which may ...
  12. [12]
    A Brief History of the Internet - Internet Society
    Thus, by the end of 1969, four host computers were connected together into the initial ARPANET, and the budding Internet was off the ground. Even at this early ...
  13. [13]
    High-Level Data Link Control (HDLC) - UAL
    Sep 12, 2016 · The current standard for HDLC is ISO 13239. HDLC was developed from the Synchronous Data Link Control (SDLC) standard proposed in the 1970s.Missing: development 1973
  14. [14]
    [PDF] HDLC Protocol Overview - GL Communications Inc.
    • HDLC is an ISO Standard developed from the Synchronous Data Link Control (SDLC) standard proposed by IBM. • Operates at the data link layer. • Used on both ...Missing: 1973 | Show results with:1973<|separator|>
  15. [15]
    Ethernet is Still Going Strong After 50 Years - IEEE Spectrum
    To provide computer companies with a framework for the technology, in June 1983 Ethernet was adopted as a standard by the IEEE 802 Local Area Network Standards ...
  16. [16]
    PPP Overview, History and Benefits - The TCP/IP Guide!
    The history of PPP goes back to the late 1980s, when SLIP was the de facto standard for serial IP implementations.
  17. [17]
    25 Years of Wi-Fi - Broadcom Inc.
    Jun 20, 2024 · In 1999, Wi-Fi was only capable of supporting up to 11 megabits per second based on the IEEE 802.11b standard. Now in its seventh generation, Wi ...
  18. [18]
    Ethernet Through the Years: Celebrating the Technology's 50th Year ...
    1983. The first draft of the IEEE 802.3 Standard, what would be 10Base5, is published. Also known as Thicknet, this is the first commercially available variant ...
  19. [19]
    Part 1: ICT Standards Development Organizations and Their Work
    ITU-T Study Group 15 is responsible for the development of standards on optical transport network, access network, home network and power utility network ...
  20. [20]
    RFC 1662: PPP in HDLC-like Framing
    This specification provides for framing over both bit-oriented and octet-oriented synchronous links, and asynchronous links with 8 bits of data and no parity.
  21. [21]
    2.3 Framing - Computer Networks: A Systems Approach
    Bit stuffing in the HDLC protocol works as follows. On the sending side, any time five consecutive 1s have been transmitted from the body of the message (i.e., ...
  22. [22]
    [PDF] Ethernet MTU and TCP MSS Adjustment Concept for PPPoE ... - Cisco
    The maximum MTU of an interface will depend on the hardware platform, but the IEEE 802.3 standards require a minimum MTU of 1500 bytes. PPPoE needs ...
  23. [23]
    What is HDLC and what is its role in networking? - TechTarget
    Jun 4, 2021 · HDLC (High-level Data Link Control) is a group of protocols or rules for transmitting data between network points (sometimes called nodes).Missing: 1973 | Show results with:1973
  24. [24]
    Transmission Error - an overview | ScienceDirect Topics
    Transmission errors in data communication systems can arise from electrostatic interference, attenuation, distortion, transmission loss, and impulses from ...Missing: authoritative | Show results with:authoritative
  25. [25]
    The application of parity checks to an arithmetic control
    Nov 17, 1970 · Most of today's equipment uses parity bits for detection of data transfer errors between units and within units.Missing: original concept
  26. [26]
    [PDF] 32-Bit Cyclic Redundancy Codes for Internet Applications
    The IEEE 802.3 standard adopts the CRC polynomial: x32+x26+x23+x22+x16+x12+x11+x10+x8+x7+x5+x4+x2+x+1 (this is irreducible, but not primitive).
  27. [27]
    Automatic Repeat Request - an overview | ScienceDirect Topics
    Since there is no waiting time, the Go-Back- N ARQ protocol is more efficient than the stop-and-wait ARQ. The window advances as an ACK for each earlier packet ...
  28. [28]
    [PDF] The Bell System Technical Journal - Zoo | Yale University
    April, 1950. The Bell System Technical Journal. Vol. xx~. Copyright, 1950,American Telephone and Telegraph Company. Error Detecting and Error Correcting Codes.Missing: forward data link layer
  29. [29]
    RFC 3366 - Advice to link designers on link Automatic Repeat ...
    This document provides advice to the designers of digital communication equipment and link-layer protocols employing link-layer Automatic Repeat reQuest (ARQ) ...Missing: paper | Show results with:paper
  30. [30]
    On acknowledgement schemes of sliding window flow control
    Insufficient relevant content. The provided URL (https://ieeexplore.ieee.org/document/46512) points to a page titled "On acknowledgement schemes of sliding window flow control," but no full text or detailed content is accessible without a subscription or login. No specific information about sliding window flow control, window size, or acknowledgments can be extracted.
  31. [31]
  32. [32]
    [PDF] IEEE 802.3x and Asymmetrical Flow Control
    The purpose of 802.3x Flow Control is to allow switches to be built that have limited memory, yet don't have to resort to dropping frames as a congestion ...Missing: avoidance | Show results with:avoidance
  33. [33]
    802.3-2022 - IEEE Standard for Ethernet
    Jul 29, 2022 · The Carrier Sense Multiple Access with Collision Detection (CSMA/CD) MAC protocol specifies shared medium (half duplex) operation, as well as ...
  34. [34]
    Bandwidth, Throughput, and Goodput > Latency, delay ... - Cisco Press
    Aug 5, 2024 · Goodput will always be less than throughput because every data packet contains fields of overhead. For example, Ethernet has a 20-byte header ...
  35. [35]
    What is Point-to-Point | Glossary | PS Lightwave
    Point-to-point data transmissions occur between a single transmitter and a single receiver, and can be wired or wireless.<|control11|><|separator|>
  36. [36]
    What is a Point to Point Network? - APC Solutions
    Point-to-point networks are used to connect two locations together via a private, dedicated line. This allows companies to transfer data between multiple ...
  37. [37]
    What is point-to-point networking? All you need to know - Meter
    Oct 2, 2024 · Point-to-point networking is what gives businesses a fast, secure, and private link between two locations. It can be done whether you're ...
  38. [38]
    Point-to-Point (P2P) Connectivity: What You Need to Know
    Point-to-point (P2P) connections securely connect two locations using a Layer 2 data connection, building a closed network, not using the public internet.
  39. [39]
    What is full-duplex? - TechTarget
    Oct 21, 2021 · Full-duplex data transmission means that data can be transmitted in both directions on a signal carrier at the same time.
  40. [40]
    What's the maximum serial cable length? - Opengear Customer Portal
    Jul 17, 2017 · The RS-232 standard specifies this as 15 metres (50 feet). However this is a conservative figure accounting for high serial speeds over high capacitance ...
  41. [41]
  42. [42]
    A Brief Overview of SONET Technology - Cisco
    Jun 14, 2005 · SONET defines optical signals and a synchronous frame structure for multiplexed digital traffic. It is a set of standards that define the rates and formats for ...
  43. [43]
    Understanding UART | Rohde & Schwarz
    UART stands for universal asynchronous receiver / transmitter and defines a protocol, or set of rules, for exchanging serial data between two devices.What Is Uart? · Timing And Synchronization... · Uart Frame Format
  44. [44]
    What is PPP (Point-to-Point Protocol) and How Does it Work?
    Feb 1, 2022 · However, the most popular use of PPP was during the days of dial-up modems throughout the mid- to late 1990s. Customers would install PPP client ...<|separator|>
  45. [45]
    Wide Area Networks - WAN - howtonetwork.com
    Dial-up connections can usually offer transmission rates up to 54Kbps and in special conditions even up to 320Kbps if you use data compression. This technology ...<|control11|><|separator|>
  46. [46]
    Connecting Your Locations with a Point-to-Point Fiber Optic Network
    Apr 4, 2024 · Point-to-point fiber optic network: Discover why it's a logical move to connect different locations for dramatically faster communications.
  47. [47]
    Networking Topology
    The ring topology is a physical, closed loop consisting of point-to-point links. In the diagram, you can see how each node on the ring acts as a repeater. It ...
  48. [48]
    [PDF] Analysis of end-to-end performance of LAN systems - Calhoun
    TOKEN RING (IEEE 802.5) SYSTEMS. 1. Overview. A token ring LAN is made up of a set of stations serially connected by a transmission medium. All information is ...
  49. [49]
    TechFest - Ethernet Technical Summary - Chapter 3 - Emory CS
    With CSMA/CD two or more stations share a common transmission medium. To transmit a frame, a station must wait for an idle period on the medium when no other ...
  50. [50]
    Carrier Sense Multiple Access with Collision Detection (CSMA/CD ...
    Oct 16, 2006 · CSMA/CD is the media access control (MAC) protocol specified in IEEE Std 802.3, which is Carrier Sense Multiple Access with Collision Detection.
  51. [51]
    [PDF] Wireless Networks - Rutgers University
    Hidden and exposed station problems arise only for CSMA-type protocols. ... Hidden station issues were considered and the MACA RTS/CTS protocol proposed in.<|control11|><|separator|>
  52. [52]
    MMDS Background - IEEE 802
    Mar 3, 2000 · – Statistical Multiplexing over the air. – ... – FDMA -- Best suited to large pipe fixed bandwidth service. – TDMA -- Best suited to Dynamic ...
  53. [53]
    ISO/IEC 13239:2002 - Information technology
    ISO/IEC 13239:2002 specifies frame structures, procedures, and the Exchange Identification (XID) frame for data communication using HDLC procedures.
  54. [54]
    SDLC, HDLC and LLC, LAPB
    Although a subset of HDLC, SDLC was developed by IBM before HDLC, and was the first link layer protocol based on synchronous, bit-oriented operation. IBM ...
  55. [55]
    Difference between Serial Line Internet Protocol (SLIP) and Point-to ...
    Jul 11, 2025 · SLIP is a Predecessor protocol of PPP. PPP is a Successor protocol of SLIP. Encloses, SLIP encloses the Internet Protocol (IP) packet. PPP ...
  56. [56]
    The Structure and Coding of Logical Link Control (LLC) Addresses
    The standards for local area networks (LANs) are generally comprised of the physical layer, the medium access control (MAC) sublayer, and the logical link.
  57. [57]
    Configuring LAPB and X.25 [Cisco IOS Software Releases 11.0]
    Mar 21, 1989 · The X.25 specifications include LAPB as the data link layer protocol and X.25 as the network layer protocol, or packet layer protocol (PLP) as ...
  58. [58]
    Configure and Verify Ethernet 10/100/1000Mb Half/Full Duplex Auto ...
    This document provides a general description of auto-negotiation and explains the procedure to configure and verify auto-negotiation on Catalyst switches.Missing: file | Show results with:file
  59. [59]
    Troubleshoot LAN Switching Environments - Cisco
    Dec 2, 2022 · This document describes common LAN switch features and how to troubleshoot any LAN switching problems.
  60. [60]
    RFC 5654 - Requirements of an MPLS Transport Profile
    Dec 20, 2018 · This document specifies the requirements of an MPLS Transport Profile (MPLS-TP). This document is a product of a joint effort of the International ...
  61. [61]
    IEEE 1901-2020 - IEEE SA
    IEEE 1901-2020 defines PHY/MAC for broadband powerline communication, used for LANs, Smart Energy, and IoT, and other media, with security and interoperability.Missing: adapters wiring
  62. [62]
    IEEE 802.1X-2020
    Feb 28, 2020 · Port-based network access control allows a network administrator to restrict the use of IEEE 802(R) LAN service access points (ports) to ...
  63. [63]
    IEEE 802.1AE-2018
    Dec 26, 2018 · How all or part of a network can be secured transparently to peer protocol entities that use the MAC Service provided by IEEE 802® LANs to ...<|separator|>
  64. [64]
    Cisco Business 110 Series Unmanaged Switches Data Sheet
    These affordable plug-and-play switches are ideal for small offices, workgroups, departments, and growing offices with limited IT know-how and support.
  65. [65]
    InfiniBand - A low-latency, high-bandwidth interconnect
    Jun 27, 2023 · As a mature and field-proven technology, InfiniBand is used in thousands of data centers for both HPC and AI clusters that efficiently scale up ...
  66. [66]
    [PDF] Current Communication Radio Systems for Data Link
    The first version of air–ground communication based on digital messages, called ACARS, was introduced in 1978 by ARINC. It aimed to improve the integrity of ...
  67. [67]
    [PDF] 90-117 - Advisory Circular - Federal Aviation Administration
    Oct 3, 2017 · Aircraft Communications Addressing and Reporting System (ACARS). ACARS is a digital data link system for transmission of short messages ...Missing: UHF | Show results with:UHF
  68. [68]
    [PDF] Advisory Circular - Federal Aviation Administration
    Aug 16, 1999 · (ARINC) Specification 622 defines an ACARS convergence function, which allows bit-oriented applications to be supported by the ACARS network ...
  69. [69]
    ARINC 622 - ATS Data Link Applications over ACARS Air-Ground ...
    Aug 23, 2017 · This document specifies processes that enhance the functionality of the ACARS system in order to meet the special communications requirements of Air Traffic ...
  70. [70]
    [PDF] Roadmap for Data Link - Federal Aviation Administration
    Jul 31, 2006 · Data link is expected to improve the use of spectrum and reduce voice channel congestion. Data link allows the controller and pilot to move ...
  71. [71]
    [PDF] FAA AC 90-114C (ADS-B Operations) - Advisory Circular
    Jan 14, 2025 · The 1090 MHz frequency is associated with current Mode A, C, and S ... Mode S supports an ADS-B service known as 1090ES. D.21 Non ...
  72. [72]
  73. [73]
    RFC 9450 - Reliable and Available Wireless (RAW) Use Cases
    Jan 11, 2024 · ... 99.999%, which is higher than that required for regular commercial data links. ... latency requirements could be the "WXGRAPH" service ...
  74. [74]
    Specification # 36.323 - 3GPP
    Reference: 36.323. Title: Evolved Universal Terrestrial Radio Access (E-UTRA); Packet Data Convergence Protocol (PDCP) specification.
  75. [75]
    Specification # 36.322 - 3GPP
    Aug 27, 2019 · Reference: 36.322. Title: Evolved Universal Terrestrial Radio Access (E-UTRA); Radio Link Control (RLC) protocol specification.
  76. [76]
    Specification # 38.323 - 3GPP
    Mar 22, 2017 · 38.323. Title: NR; Packet Data Convergence Protocol (PDCP) specification. Status: Under change control. Type: Technical specification (TS).
  77. [77]
    Specification # 38.322 - 3GPP
    Mar 22, 2017 · 38.322. Title: NR; Radio Link Control (RLC) protocol specification. Status: Under change control. Type: Technical specification (TS). Initial ...Missing: handover | Show results with:handover
  78. [78]
    IEEE 802.16-2017 - IEEE SA
    Mar 2, 2018 · This standard specifies the air interface, including the medium access control layer (MAC) and physical layer (PHY), of combined fixed and mobile point-to- ...