Fact-checked by Grok 2 weeks ago

Data link layer

The Data Link Layer, designated as Layer 2 in the Open Systems Interconnection (OSI) reference model defined by ISO/IEC 7498-1, provides the functional and procedural means to transfer data between adjacent network entities and to detect and possibly correct errors that may occur in the Physical Layer. This layer ensures node-to-node delivery of data within a local network segment by organizing bits into structured frames, managing access to the shared physical medium, and implementing mechanisms for flow control and reliable transit. Key functions of the Data Link Layer include framing, where data packets from the upper are encapsulated with headers and trailers containing synchronization bits and -checking codes; physical addressing using Media Access Control () addresses to identify devices on the local network; and detection and recovery through techniques such as cyclic redundancy checks () and acknowledgments. In the standards for local area networks (LANs), the Data Link Layer is subdivided into two sublayers: the (LLC) sublayer, which provides a uniform interface to the Network Layer, handles multiplexing of protocols, and manages and control; and the MAC sublayer, which deals with medium , framing specific to the physical , and or avoidance in shared environments. Common protocols operating at the Data Link Layer include Ethernet (IEEE 802.3) for wired LANs, which uses carrier-sense multiple access with collision detection (CSMA/CD); Point-to-Point Protocol (PPP) for direct connections like dial-up or serial links; and High-Level Data Link Control (HDLC) for synchronous frame transmission with built-in error handling. Wireless protocols such as the MAC sublayer of IEEE 802.11 (Wi-Fi) extend these functions to handle contention in radio frequency environments. These elements collectively enable error-free, ordered delivery of data frames across physical links, forming the foundation for higher-layer networking operations.

Overview and Role

Definition and Scope

The data link layer, designated as layer 2 in the Open Systems Interconnection (OSI) reference model, is responsible for the node-to-node delivery of data frames across a physical medium connecting adjacent network nodes. This layer ensures the transfer of data units called frames between directly connected devices, organizing raw bits from the into structured frames suitable for transmission. Its scope is confined to communications within a single local , supporting point-to-point or point-to-multipoint interactions without extending to end-to-end delivery across multiple networks, which is managed by higher layers such as the network layer. In contrast to the , which handles the raw transmission of individual bits over a medium, the data link layer focuses on the logical framing, synchronization, and addressing of data to enable reliable local transfers. The concept of the data link layer was formalized in the OSI reference model, originally published as ISO 7498 in 1984 and revised as ISO/IEC 7498-1 in 1994, to provide a standardized framework for open systems interconnection amid diverse networking technologies. This development built upon foundational ideas from the 1970s project, where early packet-switching implementations introduced link-level protocols for handling data exchange between hosts and interface message processors. The layer often incorporates sublayers, such as and media access control, to partition its functions.

Position in OSI Model

The data link layer occupies the second position in the seven-layer Open Systems Interconnection (OSI) reference model, serving as an intermediary between the below it and the network layer above it. This placement enables it to abstract the complexities of the while providing structured, reliable communication services to higher layers. As defined in the OSI basic reference model, the data link layer "provides the functional and procedural means to transfer data between network entities and might provide the means to detect and possibly correct errors that may occur in the ." It thus ensures that data exchange across a single physical link is dependable before engaging in broader handled by the network layer. The data link layer interfaces with adjacent layers through well-defined service primitives at service access points, promoting modularity and independence in the OSI architecture. It receives services from the physical layer (layer 1) via physical service access points, where raw bit streams are delivered for framing or extracted from incoming signals. In turn, it provides services to the network layer (layer 3) primarily via logical link control (LLC) service access points, allowing the network layer to initiate and manage frame transfers without direct involvement in physical signaling. These interfaces facilitate a clear separation of concerns, with the data link layer relying on the physical layer for bit-level transmission and reception while exposing higher-level abstractions to the network layer. At this layer, the (PDU) is known as a , which encapsulates packets by appending headers for addressing and control, along with trailers for error checking. In the downward data flow, a packet is passed to the data link layer, which constructs the frame by adding these elements and then submits the complete frame to the as a serialized bit stream. Conversely, in the upward flow, the supplies a continuous bit stream to the data link layer, which identifies frame boundaries, validates , strips the headers and trailers, and delivers the reconstituted packet to the . This encapsulation and decapsulation process is essential for maintaining across the local link. By focusing on node-to-node , the data link layer establishes critical prerequisites for higher layers, particularly ensuring error-free and sequentially ordered over the local physical prior to any or relaying in the network layer. This reliability prevents of physical transmission errors to upper layers, enabling the network layer to concentrate on end-to-end path selection and global addressing without local concerns.

Core Functions

Node-to-Node

The data link layer facilitates node-to-node delivery by establishing logical links between directly connected nodes sharing the same physical medium, enabling the reliable transfer of data units known as frames across local network segments. This process involves synchronizing the transmission and reception of frames to ensure proper timing and bit-level alignment, as well as sequencing them to maintain the original order of data from higher layers. Through these mechanisms, the layer transforms the unreliable bit stream from the physical layer into structured, ordered frame exchanges suitable for local communication. To achieve reliability on potentially error-prone local links, the data link layer employs acknowledgments to confirm successful frame receipt and retransmissions to recover from lost or corrupted frames, thereby ensuring delivery without loss or duplication while preserving sequence integrity. These features provide the network layer above with a dependable service over the shared medium, isolating it from physical layer variations such as noise or signal degradation. The data link layer supports two primary types of delivery services: connectionless and connection-oriented. In connectionless mode, frames are sent without prior setup or acknowledgments, offering an unreliable but simple datagram service ideal for broadcast media like Ethernet where multiple nodes share the link and efficiency is prioritized over individual reliability. Conversely, connection-oriented mode establishes a virtual circuit-like link before data transfer, incorporating acknowledgments and sequencing for reliable delivery, which is used in scenarios requiring guaranteed frame order and completeness, such as point-to-point links in HDLC protocols. Node-to-node delivery operates in either half-duplex or full-duplex modes depending on the medium's capabilities. In half-duplex operation, nodes share the bidirectionally but not simultaneously, requiring carrier sensing to detect if the medium is before transmitting and basic collision avoidance to manage potential overlaps when multiple nodes attempt access. Full-duplex mode, in contrast, supports simultaneous transmission and reception on separate channels, eliminating collisions and doubling effective throughput without the need for carrier sensing. Framing prepares the data units from layer for this delivery process by encapsulating them into delimited frames with headers and trailers.

Framing and Addressing

The data link layer performs framing by encapsulating packets from the network layer into discrete suitable for transmission over the physical medium. This process involves adding a header with , such as addressing and frame type indicators, and a trailer typically containing a for integrity verification. The resulting structure enables the receiver to identify the start and end of the data unit, ensuring reliable node-to-node delivery on local networks. To delineate frame boundaries in a continuous bit stream, the data link layer employs methods like flag delimiting and bit stuffing. In bit-oriented protocols, such as those based on High-Level Data Link Control (HDLC), frames are bounded by a unique flag sequence of 01111110 (0x7E in hexadecimal); to prevent this pattern from appearing in the payload, the sender inserts a zero bit after every five consecutive ones in the data field, a process known as bit stuffing, which the receiver reverses upon detection. Character-oriented framing, less common in modern systems, uses special byte sequences (e.g., STX and ETX) for delimiting, with octet stuffing to escape control characters in the data. These techniques allow variable-length payloads while maintaining synchronization without relying on fixed timing. Addressing in the data link layer provides unique identification of nodes within a local , facilitating targeted frame delivery. Media Access Control (MAC) addresses serve this purpose, typically as 48-bit (6-octet) values in networks, where the first three octets represent the (OUI) assigned by the IEEE, and the last three are vendor-specific for individual devices. These addresses support communication to a single destination (least significant bit of the first octet is 0), to a group (least significant bit is 1, with specific ranges reserved), and broadcast to all nodes (all bits set to 1, e.g., FF:FF:FF:FF:FF:FF). Some standards, such as for low-rate wireless networks, extend to 64-bit MAC addresses to accommodate larger address spaces. A typical frame structure in data link protocols includes a preamble of alternating 1s and 0s (7 bytes) for , followed by a 1-byte start frame delimiter (SFD, usually 10101011) to signal the header's beginning. The header then contains the 6-byte destination , 6-byte source , a 2-byte or type field indicating size or upper-layer protocol, the variable-length data field (padded if necessary to meet minimum size), and a 4-byte (FCS) using a (CRC-32) polynomial for error detection. Frame formats have evolved from fixed-length designs in early specialized systems, such as 53-byte cells in (ATM) for constant-bit-rate services, to predominantly variable-length frames in local area networks like Ethernet. The original Ethernet specification, standardized as , adopted variable lengths from 64 to 1518 bytes to support diverse application payloads efficiently, with later amendments allowing for larger frames such as 1522 bytes for VLAN-tagged frames and non-standard jumbo frames up to 9000 bytes or more in high-speed environments. This shift enhanced flexibility and utilization in shared-media networks.

Sublayers

The (LLC) sublayer forms the upper portion of the data link layer in the family of standards, serving as a standardized between protocols and the underlying Media Access Control () sublayer. Defined in IEEE Std 802.2, it enables multiple protocols—such as and IPX—to operate over a single type, promoting across diverse () technologies without requiring separate implementations for each protocol. Developed in the early by the IEEE Project 802 committee, the LLC was created to address the need for a uniform upper mechanism amid the proliferation of LAN standards like Ethernet (802.3) and (802.5), facilitating the coexistence of heterogeneous protocols on shared media. This design choice supported multi-protocol environments, exemplified by encapsulating both (IP) datagrams and IPX packets over Ethernet using LLC headers for identification. Key functions of the LLC include , which routes incoming Protocol Data Units (PDUs) to the appropriate protocol via Service Access Points (SAPs); flow control to manage data transmission rates; and optional error recovery mechanisms, particularly for connection-oriented operations. The sublayer supports three service types: Type 1 provides unacknowledged connectionless service for simple delivery; Type 2 offers -oriented service with reliable sequencing, acknowledgments, and retransmission; and Type 3 delivers acknowledged connectionless service, confirming receipt without establishing a persistent . These services are invoked through logical interfaces, allowing higher layers to request datalink functionality independently of the physical medium. The LLC PDU structure consists of a 3-byte header (or extended with Subnetwork Access Protocol for broader protocol identification) followed by an optional information field. The header includes the Destination (DSAP) and Source (SSAP) fields—each 8 bits—to specify the target and originating protocols, respectively, and a field (8 or 16 bits) for sequencing, supervision, and unnumbered operations. In practice, the DSAP/SSAP pair often uses a global value (e.g., 0xAA for SNAP extension) to extend addressing space, enabling the EtherType field to identify protocols like (0x0800). This compact format ensures efficient multiplexing while maintaining compatibility across networks. The LLC interacts with the MAC sublayer to encapsulate these PDUs into frames for transmission, completing the service.

Media Access Control (MAC)

The Media Access Control (MAC) sublayer, the lower component of the IEEE 802 data link layer, is responsible for managing access to the shared physical transmission medium among multiple nodes, ensuring orderly frame transmission while minimizing collisions in multi-access environments. It provides a control abstraction over the physical layer, handling medium-dependent operations such as determining transmission timing to avoid simultaneous access by multiple devices. This role is critical in local area networks (LANs) where nodes share a common channel, as the MAC sublayer coordinates transmission to maintain efficiency and reliability at the hardware level. Key functions of the MAC sublayer include MAC address management, where each network interface is assigned a unique 48-bit identifier () for local frame delivery and identification, formatted as six octets in hexadecimal notation and administered by the IEEE. It also performs encapsulation, adding headers with source and destination , type, and control fields to LLC protocol data units before transmission, and decapsulation, stripping these headers upon reception to pass data upward. These processes are medium-specific; for example, in half-duplex wired Ethernet networks under , the MAC employs with (CSMA/CD), where devices listen to the medium before transmitting and abort upon detecting collisions, retransmitting after a backoff period to resolve conflicts. However, modern Ethernet networks typically operate in full-duplex mode over point-to-point switched links, which eliminates collisions and the need for CSMA/CD. In wireless environments like , CSMA/CA (Collision Avoidance) is used instead, relying on request-to-send (RTS) and clear-to-send (CTS) handshakes to preemptively avoid collisions due to the inability to detect them during transmission in radio media. Other variations in the family include in , where a circulating grants transmission rights sequentially, and polling in certain standards to centrally manage access. The standards define the sublayer across various , with specifying CSMA/CD for Ethernet at speeds from 1 Mb/s to 800 Gb/s, enabling shared half-duplex operation on bus or topologies. These protocols balance in multi-access scenarios, where throughput —measured as the ratio of successfully transmitted data to total —can reach up to 90% under low load in CSMA/CD but degrades with increasing contention due to collision overhead. , the time from frame arrival to transmission, is influenced by access delays; for instance, in CSMA/CA, analytical models show average delays increasing from milliseconds at low traffic to seconds under saturation, highlighting the between collision avoidance and access overhead in dense networks. Such aspects underscore the MAC's role in optimizing shared medium utilization without delving into upper-layer handled by the LLC sublayer.

Services and Mechanisms

Error Detection and Correction

The data link layer employs mechanisms to ensure reliable node-to-node data transfer over potentially noisy , identifying and mitigating bit errors introduced during transmission. These techniques add to frames, allowing the receiver to detect inconsistencies or reconstruct corrupted data without relying on higher-layer retransmissions. Detection focuses on verifying frame integrity, while correction either repairs errors on-the-fly via (FEC) or requests retransmissions through (ARQ) protocols. Error detection methods include parity bits, checksums, and cyclic redundancy checks (CRC). A parity bit appends a single bit to make the total number of 1s in a data unit even or odd, detecting single-bit errors but vulnerable to even-numbered errors. Checksums sum the data bits (often in 16-bit words) and append the one's complement of the sum, enabling detection of multiple errors through modular arithmetic verification at the receiver. CRC, introduced by Peterson and Brown, treats the frame as a polynomial over GF(2) and appends a remainder from division by a fixed generator polynomial, offering superior burst error detection up to the degree of the polynomial. For example, CRC-32 uses the generator polynomial G(x) = x^{32} + x^{26} + x^{23} + x^{22} + x^{16} + x^{12} + x^{11} + x^{10} + x^8 + x^7 + x^5 + x^4 + x^2 + x + 1, detecting all single- and double-bit errors and most longer bursts. The computation involves shifting the message polynomial M(x) left by 32 bits (multiplying by x^{32}) and dividing by G(x), yielding the remainder as the CRC value: \text{CRC} = \left( M(x) \cdot x^{32} \right) \mod G(x) The frame check sequence (FCS) integrates these detection methods into the frame trailer, typically as a 32-bit field in protocols like , computed over the entire frame excluding the FCS itself using . This placement allows the receiver to recompute the FCS via XOR-based polynomial division or table lookup and compare it against the received value; a mismatch indicates errors, prompting frame discard. The FCS ensures end-to-end frame integrity within the local link, supporting reliable handover to the network layer. For error correction, FEC embeds sufficient redundancy to repair errors without feedback, contrasting with ARQ's retransmission approach. , developed by in 1950, add bits to correct single-bit errors in with minimum d = 3, with m bits enabling single-error correction for codewords of length n = 2^m - 1 (including bits). , introduced by and in 1960, operate over finite fields to correct up to t = \lfloor (d-1)/2 \rfloor symbol errors, where d = n - k + 1 for code length n and dimension k; they excel in burst correction for applications like wireless links. ARQ protocols, conversely, detect errors via the FCS and request retransmissions: stop-and-wait sends one frame, awaits acknowledgment (), and retransmits on negative acknowledgment (NAK) or timeout, ensuring reliability but at low throughput. Go-back-N extends this by allowing N unacknowledged frames before pausing, retransmitting from the erroneous frame onward upon error, balancing efficiency and simplicity. Modern FEC advancements address wireless challenges, such as in New Radio (NR), where low-density parity-check (LDPC) codes per TS 38.212 provide near-Shannon-limit performance. LDPC codes achieve bit error rates (BER) below $10^{-5} at signal-to-noise ratios close to theoretical limits, improving over prior by 1-2 dB in high-rate scenarios and reducing undetected errors in fading channels.

Flow and Congestion Control

The data link layer employs flow control mechanisms to regulate the transmission rate between adjacent nodes, ensuring the receiver's buffer capacity is not exceeded by the sender's output. This is achieved through techniques such as sliding protocols, which permit the sender to transmit up to a predefined window size W of unacknowledged frames before awaiting confirmation, thereby balancing sender and receiver speeds. Rate-based control further complements this by dynamically adjusting transmission rates based on from the receiver, preventing local buffer overflows in point-to-point or shared media environments. A foundational for flow control is the stop-and-wait protocol, where the sender transmits a single and pauses until receiving an acknowledgment (ACK), incorporating automatic repeat request (ARQ) for reliability. The efficiency of stop-and-wait ARQ is given by \eta = \frac{1}{1 + 2a}, where a = \frac{t_p}{t_t} represents the ratio of time t_p to transmission time t_t, highlighting its limitations in high-latency links due to idle periods. To address these inefficiencies, selective repeat ARQ extends the sliding window approach by allowing only erroneous or lost to be retransmitted, significantly improving throughput in error-prone channels while maintaining order. Congestion control at the data link layer focuses on local adaptations to avert overload on single-hop links, distinct from global strategies in higher layers. Detection occurs through metrics like thresholds or increased transmission delays, triggering responses such as backpressure signaling, where upstream devices are notified to halt transmission via pause frames in Ethernet (IEEE 802.3x). Priority queuing in switches further mitigates congestion by assigning higher precedence to critical traffic, ensuring equitable resource allocation without propagating issues beyond the immediate link. Unlike flow and congestion control, which operate end-to-end across multi-hop networks with awareness of overall path conditions, data link layer mechanisms are confined to single-hop interactions, lacking visibility into broader network dynamics. This hop-by-hop focus enables rapid local responses but requires integration with upper-layer controls for comprehensive reliability.

Media Access and Protocols

Access Control Methods

Access control methods in the data link layer manage how multiple nodes share a common communication medium, preventing data collisions and ensuring efficient transmission in multi-access environments. These techniques are essential for networks where nodes contend for , such as local area networks (LANs) and wireless systems. Broadly, they fall into contention-based approaches, which allow probabilistic access and resolve conflicts reactively; contention-free methods, which provide deterministic scheduling to guarantee access; and hybrid variants that combine elements of both for improved performance in diverse scenarios. Contention-based methods, rooted in protocols, enable nodes to transmit when the medium appears idle, with mechanisms to detect or avoid collisions. The foundational protocol, introduced in 1970, allows unslotted transmissions, achieving a maximum throughput of approximately 18.4% due to frequent overlaps, as derived from the formula S = G e^{-2G}, where G is the average number of transmission attempts per packet time and the peak occurs at G = 0.5. , refined in , synchronizes transmissions into discrete time slots to reduce collisions, yielding a higher maximum throughput of $1/e \approx 36.8\% via S = G e^{-G} at G = 1. Building on these, with (CSMA/CD) improves efficiency by having nodes listen before transmitting and abort upon detecting a collision, sending a jam signal to clear the channel; this was pivotal in early Ethernet implementations, where throughput approaches 1 as propagation delay decreases relative to packet size. In settings, where is challenging due to signal , with Collision Avoidance (CSMA/CA) employs Request-to-Send (RTS) and Clear-to-Send (CTS) handshakes to reserve the channel, mitigating the hidden terminal problem and enhancing reliability in networks. For instance, under non-persistent CSMA, throughput can exceed 80% for low loads, as analyzed in early models accounting for carrier sensing delays. Contention-free methods eliminate collisions by pre-allocating access, ideal for deterministic environments requiring bounded , such as industrial networks. Token passing, exemplified by the IEEE 802.5 standard, circulates a special token frame among nodes; only the token holder transmits, ensuring fair and ordered access with no contention overhead, though it incurs token rotation delays that limit scalability in networks with up to 250 nodes. (TDMA) divides the medium into fixed time slots assigned to nodes, often coordinated via a central scheduler, providing guaranteed and low ; polling, a related variant, involves a master node sequentially querying slaves for data, as used in master-slave topologies to achieve near-100% utilization under light loads but with polling overhead increasing proportionally to the number of nodes. Hybrid methods integrate contention resolution with scheduling to balance efficiency and fairness, particularly in modern wireless systems. In IEEE 802.11e, Enhanced Distributed Channel Access (EDCA) extends CSMA/CA with priority-based contention windows and interframe spaces for four access categories (voice, video, best effort, background), allowing higher-priority traffic to access the medium sooner via shorter backoff times, thus improving QoS without fully eliminating contention. This adaptation achieves up to 2-3 times better delay performance for traffic compared to 802.11 under saturation. Emerging networks highlight ongoing challenges in contention-based access, particularly scalability. LoRaWAN, a low-power wide-area , relies on variants for uplink transmissions, but in dense deployments with thousands of devices, collision rates soar due to uncoordinated access, limiting effective throughput to below 10% and exacerbating energy waste from retries; proposed slotted overlays synchronize transmissions to boost capacity by 50-100% while addressing these issues.

Example Protocols

The data link layer utilizes a range of s adapted to diverse transmission media, from wired LANs to wireless personal networks and cellular systems. These protocols implement framing, addressing, and to ensure reliable node-to-node delivery, often building on the (LLC) and media (MAC) sublayers for modularity. In wired environments, Ethernet, defined by the standard, serves as a foundational for s using with (CSMA/CD) in its original form, though modern implementations rely on full-duplex switched connections. Its frame format includes an 8-byte preamble and start frame delimiter for synchronization, 6-byte destination and source MAC addresses, a 2-byte length/type field, up to 1500 bytes of payload (extendable via jumbo frames), and a 4-byte using CRC-32 for error detection; virtual (VLAN) support is added through tagging, which inserts a 4-byte header ( protocol identifier and control information) immediately after the source address to enable and prioritization. The (PPP), specified in RFC 1661, provides a versatile method for establishing direct connections over serial or other point-to-point links, commonly used in WANs and DSL access. It proceeds through phases controlled by the Link Control Protocol (LCP), which handles link establishment, option negotiation, authentication (e.g., or CHAP), and termination, followed by Network Control Protocols (NCPs) such as Control Protocol (IPCP) to configure and enable specific network-layer protocols over the link. For wireless media, the family, collectively known as , enables high-speed local area networking with with collision avoidance (CSMA/CA) for medium access. The 802.11ax (Wi-Fi 6), ratified in 2019 and widely deployed by 2025, incorporates multi-user multiple-input multiple-output (MU-MIMO) to support downlink and uplink spatial streams to multiple clients simultaneously, alongside (OFDMA) for finer resource allocation in high-density scenarios. The 802.11be (Wi-Fi 7), ratified in 2024, further enhances performance with multi-link operation (MLO) allowing simultaneous use of multiple bands and 4096-QAM modulation for theoretical speeds up to 46 Gbps. Bluetooth, governed by specifications from the , facilitates low-power, short-range communications in personal area networks (PANs) using adaptive over the 2.4 GHz band. Devices form piconets—a basic where one master coordinates up to seven active slaves—enabling scatternets for extended connectivity through overlapping piconets. Among other notable protocols, (HDLC), standardized by ISO/IEC 13239, operates as a bit-oriented synchronous protocol suitable for reliable point-to-point or multipoint links. Frames are delimited by a unique 8-bit flag sequence (0x7E or 01111110 in ), with transparency maintained through : a zero bit is inserted by the transmitter after any sequence of five consecutive ones in the , , or fields (excluding flags), and discarded by the receiver to avoid detection. In cellular systems, the New Radio (NR) layer, detailed in TS 38.321, manages dynamic scheduling of shared radio resources by the gNB across time-frequency blocks, prioritizing based on quality-of-service needs. It integrates (HARQ) for combining with retransmissions across multiple processes to minimize , and coordinates with the for , enabling directive signal focusing to enhance coverage and throughput in millimeter-wave bands.
ProtocolMedium TypeAccess MethodMax Speed (Theoretical)
EthernetWired (LAN)CSMA/CD (legacy); switched full-duplex400 Gbps (IEEE 802.3ck, 2022)
PPPWired (serial/point-to-point)Deterministic (point-to-point)Line-rate dependent (up to 10 Gbps in modern fiber links)
Wi-Fi (802.11ax)Wireless (WLAN)CSMA/CA with OFDMA9.6 Gbps (8x8 MU-MIMO)
BluetoothWireless (PAN)TDMA with frequency hopping2 Mbps (Bluetooth 5.x)
HDLCWired/wireless (synchronous)Bit-synchronous with flagsUp to 100 Mbps (implementation-dependent)
5G NR MACWireless (cellular)OFDMA with scheduling20 Gbps downlink (sub-6 GHz/mmWave)

Integration with Other Models

Relation to TCP/IP Model

In the TCP/IP model, the OSI Data Link Layer (Layer 2) maps primarily to the , also known as the Network Access Layer, which encompasses the functions of both the OSI Data Link and Physical Layers in a more integrated manner. This layer in TCP/IP is responsible for the transmission of data over , including framing, addressing, and error detection, but without the strict separation seen in OSI. The TCP/IP model's approach reflects its practical origins, grouping physical transmission and link-level reliability into a single layer to simplify across diverse . Key protocols illustrate the bridging role of the TCP/IP Link Layer with higher layers. The Address Resolution Protocol (ARP), defined in 1982, operates at this layer to resolve Internet Protocol (IP) addresses from the Internet Layer into link-layer addresses, such as Ethernet MAC addresses, enabling direct communication on local networks. For IPv6, the Neighbor Discovery Protocol (NDP) serves a similar function, replacing ARP by using ICMPv6 messages to perform address resolution, router discovery, and neighbor unreachability detection within the Link Layer. These protocols highlight how the TCP/IP Link Layer facilitates the transition between network-layer logical addressing and physical-layer transmission. Unlike the OSI model, which divides the Data Link Layer into Logical Link Control (LLC) and Media Access Control (MAC) sublayers for standardized multiplexing and access control, the TCP/IP model lacks such formal sublayers. Instead, it relies on specific link technologies like Ethernet () or Wi-Fi () to implement these functions directly, allowing flexibility but reducing theoretical uniformity. This pragmatic design avoids the overhead of OSI's modular structure, prioritizing in real-world deployments. Historically, the TCP/IP suite emerged in the mid-1970s through DARPA-funded research for the , predating the OSI model's development by the (ISO) in the early 1980s. While OSI provided a comprehensive reference framework that influenced protocol design, TCP/IP's earlier adoption and evolution shaped modern internetworking, with its becoming the de facto standard for access. The frames Protocol Data Units (PDUs) from the for transmission over physical media.

Modern Extensions and Applications

In recent years, advancements in wireless technologies have extended data link layer functionalities to support higher efficiency and lower latency in dense environments. (IEEE 802.11ax) introduces (OFDMA) at the layer, enabling simultaneous resource allocation to multiple stations for improved and reduced contention overhead, achieving up to four times the throughput per station compared to IEEE 802.11ac. Building on this, (IEEE 802.11be) enhances OFDMA with wider 320 MHz channels and 4K-QAM modulation, delivering system-level throughputs exceeding 30 Gbps while minimizing latency through multi-link operations. Similarly, in New Radio (NR), the layer employs dynamic scheduling and grant-free access to support Ultra-Reliable Low-Latency Communication (URLLC), achieving end-to-end latencies below 1 ms with reliability targets of 99.999%. These mechanisms punctually multiplex URLLC traffic within enhanced (eMBB) slices, using semi-persistent scheduling to preemptively allocate resources and ensure deterministic performance. Security enhancements at the data link layer have addressed evolving threats through standardized protocols. MACsec, defined in , provides hop-by-hop confidentiality and integrity for Ethernet frames using AES-GCM with 128- or 256-bit keys, operating transparently between adjacent nodes without impacting higher-layer protocols. This link-layer security mitigates and man-in-the-middle attacks in wired infrastructures, with extensions in cg-2017 supporting Ethernet Data Encryption devices for provider networks. Post-2020 developments have begun integrating into network protocols, including explorations of quantum-resistant algorithms for in link-layer security to counter future quantum threats, as outlined in architectures for quantum-resistant networks. Emerging applications demonstrate the adaptability of data link layer principles across diverse domains. (SDN) via enables programmable behaviors by decoupling control from data planes, allowing dynamic flow rules at Layer 2 for traffic engineering and in enterprise networks. In automotive systems, 1000BASE-T1 Ethernet (IEEE 802.3bp) supports gigabit speeds over single twisted-pair cabling, facilitating high-bandwidth and with electromagnetic compatibility tailored for vehicular environments. For IoT deployments, leverages the and PHY layers to enable low-power, mesh topologies with carrier-sense multiple access with collision avoidance (CSMA/CA), supporting reliable data exchange among battery-constrained devices in smart homes and industrial monitoring. Future trends point toward intelligent augmentation of data link operations. Integration of AI-driven techniques, such as optimization in Wi-Fi 6's OFDMA scheduling, allows adaptive based on real-time traffic patterns, reducing collisions and enhancing throughput in dynamic scenarios. In settings, these extensions achieve ultra-high reliability metrics, such as 99.999% packet delivery success rates, critical for time-sensitive and control systems under stringent URLLC requirements.

References

  1. [1]
    [PDF] ISO/IEC 7498-l - iTeh Standards
    Fourthly, elements of layer operation are described including connections, transmission of data, and error functions. Then, routing aspects are introduced and.
  2. [2]
    [PDF] OSI Layer 2 - Data Link
    The data link layer provides reliable data transit, handling physical addressing, network topology, error notification, frame sequencing, and flow control.
  3. [3]
    What is the data link layer in the OSI model? - TechTarget
    Mar 31, 2025 · The data link layer is the protocol layer in a program that handles how data moves in and out of a physical link in a network.
  4. [4]
    The Structure and Coding of Logical Link Control (LLC) Addresses
    The standards for local area networks (LANs) are generally comprised of the physical layer, the medium access control (MAC) sublayer, and the logical link.
  5. [5]
    What is Layer 2 of The OSI Model: Data Link Layer? - Infoblox
    Learn more about how Layer 2 of The OSI Model: Data Link Layer transfers data between network entities and corrects errors that occur in the physical layer.
  6. [6]
    TCP/IP Protocol Architecture Model - Oracle Help Center
    The data-link layer also provides error control and “framing.” Examples of data-link layer protocols are Ethernet IEEE 802.2 framing and Point-to-Point Protocol ...
  7. [7]
    Which Network Protocols Does The Data Link Layer Use? - TUALCOM
    Oct 12, 2023 · Which Network Protocols Does The Data Link Layer Use? · Ethernet (IEEE 802.3) · Wi-Fi (IEEE 802.11) · Token Ring (IEEE 802.5) · Frame Relay · HDLC ( ...
  8. [8]
    What Is a Data Link Layer? - Coursera
    Oct 28, 2025 · A data link layer (layer 2) sits between the physical and network layers in the OSI model. This layer can receive and transmit information to and from both ...
  9. [9]
    What Is the OSI Model? - 7 OSI Layers Explained - Amazon AWS
    The data link layer refers to the technologies used to connect two machines across a network where the physical layer already exists. It manages data frames, ...
  10. [10]
    Why Does the OSI Reference Model Matter? - CWNP
    Apr 29, 2014 · In a simplified explanation, the Data Link layer converts packets into frames for the Physical layer, and the Physical layer transmits these ...
  11. [11]
    OSI: The Internet That Wasn't - IEEE Spectrum
    Jul 29, 2013 · Then, on 1 January 1983, ARPA stopped supporting the ARPANET host protocol, thus forcing its contractors to adopt TCP/IP if they wanted to ...
  12. [12]
    IEEE 802.3-2022 - IEEE SA
    Jul 29, 2022 · New Link Layer Discovery Protocol (LLDP) TLVs are defined for negotiating system level energy-efficiency parameters. Learn More About 802.3 ...
  13. [13]
    Standard Group MAC Addresses: A Tutorial Guide
    In OSI terminology, the MAC and LLC sublayers are considered to be sublayers of the OSI Data Link layer.
  14. [14]
    RFC 894 - A Standard for the Transmission of IP Datagrams over ...
    Frame Format IP datagrams are transmitted in standard Ethernet frames. The type field of the Ethernet frame must contain the value hexadecimal 0800. The ...
  15. [15]
    IEEE 802.2-1985 - IEEE SA
    IEEE 802.2-1985 is a standard for local area networks, defining the Logical Link Control (LLC) sublayer, which is part of the Data Link Layer.
  16. [16]
    RFC 1042 - Standard for the transmission of IP datagrams over IEEE ...
    This RFC specifies a standard method of encapsulating the Internet Protocol (IP) [1] datagrams and Address Resolution Protocol (ARP) [2] requests and replies ...Missing: PDU | Show results with:PDU
  17. [17]
    Milestones:Origin of the IEEE 802 Family of Networking Standards ...
    The necessity to standardize computer Local Area Networks (LANs) resulted in the IEEE Computer Society sponsoring LAN Standard Project 802 in 1980. Four 802 ...
  18. [18]
    Logical Link Control - an overview | ScienceDirect Topics
    The IEEE 802.2 standard defines three LLC protocol types: Type 1, Type 2, and Type 3. Type 1 (Class I LLC): Unacknowledged connectionless service providing ...Introduction to Logical Link... · Functions and Services...<|control11|><|separator|>
  19. [19]
    IEEE 802.2c-1997 - IEEE SA
    The functions, features, protocol, and services of the Logical Link Control (LLC) sublayer, which constitutes the top sublayer in the data link layer of the ISO ...
  20. [20]
    IEEE 802-2024 - IEEE SA
    Mar 21, 2025 · ... 802.3 Clause 4 Media Access Control (MAC) operating in half-duplex ... IEEE 802(R) point-to-point full duplex links. This is achieved by a ...
  21. [21]
    802.3-2022 - IEEE Standard for Ethernet
    Jul 29, 2022 · The Carrier Sense Multiple Access with Collision Detection (CSMA/CD) MAC protocol specifies shared medium (half duplex) operation, as well as ...
  22. [22]
    IEEE 802.11-2020: Collision Avoidance in Wireless Networks
    Feb 1, 2023 · IEEE 802.11 WLANs have methods, like CSMA/CA, to ensure only a single device in the RF region transmits data at a time to avoid collisions.
  23. [23]
    Performance analysis of IEEE 802.11 CSMA/CA medium access ...
    We derive the throughput and average delay of the MAC part of IEEE 802.11 to demonstrate the efficiency of the CA (collision avoidance) mechanism.Missing: WiFi | Show results with:WiFi
  24. [24]
    [PDF] Analysis of Error Detection and Correction in Data Link Layer
    Some popular techniques for error detection are: - Simple Parity check, Two- dimensional Parity check, Checksum, Cyclic redundancy check.
  25. [25]
    Cyclic Codes for Error Detection - Semantic Scholar
    Cyclic Codes for Error Detection · W. W. Peterson, D. T. Brown, Fuad Mohamed · Published in Proceedings of the IRE 1961 · Computer Science, Engineering, ...Missing: PNAS | Show results with:PNAS
  26. [26]
    [PDF] Cyclic Codes for Error Detection - Semantic Scholar
    Cyclic Codes for Error Detection. W. W. Peterson and D. T. Brown by. Fuad Mohamed. Page 2. Outline. ▫ Concept of Cyclic Redundancy Checks. ▫ Error detections.Missing: PNAS 1961
  27. [27]
    Cyclic Redundancy Check (CRC)
    CRC-32 = x32 + x26 + x23 + x22 + x16 + x12 + x11 + x10 + x8 + x7 + x5 + x4 + x2 + x + 1 (used in Ethernet). Although this division may be performed in software, ...
  28. [28]
    Cyclic Redundancy Check (CRC) - ASecuritySite.com
    With CRC we have a generator polynomial which will divide into a received value. If we receive a remainder of zero, we can determine there are no errors.
  29. [29]
    [PDF] Study of Undetected Error Probability of IEEE 802.3 CRC-32 code ...
    frame format of MAC (Media Access Control) sublayer of the data link layer for the Ethernet. • Fortunately, the error detecting capabilities of the CRC-32 ...
  30. [30]
    [PDF] The Bell System Technical Journal - Zoo | Yale University
    April, 1950. The Bell System Technical Journal. Vol. xx~. Copyright, 1950,American Telephone and Telegraph Company. Error Detecting and Error Correcting Codes.
  31. [31]
    [PDF] Chapter-1 Error Detection and Correction
    Three types of ARQ protocols are Stop-and-wait ARQ, Go-Back-N ARQ, and Selective ... Reed Solomon codes are used in compact discs to correct errors caused by ...
  32. [32]
    [PDF] TS 138 212 - V15.2.0 - 5G; NR; Multiplexing and channel coding ...
    3GPP TS 38.212 version 15.2.0 Release 15​​ IPRs essential or potentially essential to normative deliverables may have been declared to ETSI.
  33. [33]
    GPU-Based, LDPC Decoding for 5G and Beyond - IEEE Xplore
    Jan 26, 2021 · While LDPC codes enable a low, near Shannon capacity, bit error rate (BER), they also become a computational bottleneck in the physical layer ...
  34. [34]
  35. [35]
    Advice to link designers on link Automatic Repeat reQuest (ARQ)
    This document provides advice to the designers of digital communication equipment and link-layer protocols employing link-layer Automatic Repeat reQuest (ARQ) ...
  36. [36]
  37. [37]
  38. [38]
    A Guided Tour through Data-center Networking - ACM Queue
    May 3, 2012 · Flow control is carried out at different levels of the network stack: data-link, network, transport layer, and possibly within the application ...
  39. [39]
    [PDF] THE ALOHA SYSTEM—Another alternative for computer ...
    The ALOHA system is a remote-access computer system using radio communications as an alternative to wire communications for computer links.
  40. [40]
    ALOHA packet system with and without slots and capture
    *Editor's note: This paper was originally distributed informally as ARPA Satellite System Note 8 on June 26, 1972 . The paper is.
  41. [41]
    [PDF] Ethernet: distributed packet switching for local computer networks
    Metcalfe and David R. Boggs. Xerox Palo Alto Research Center. Ethernet is a branching broadcast communication system for carrying digital data packets among ...
  42. [42]
    [PDF] Packet Switching in Radio Channels: Part I-Carrier Sense Multiple ...
    KLEINROCK AND TOBAGI: PACKET SWITCHING IN RADIO CHANNELS: PART I. 1411. 1 , .2 ... The latter badly degrades the performance of CSMA as shown in. Part I1 of this ...
  43. [43]
    [PDF] Token Ring/IEEE 802.5
    The related IEEE 802.5 specification is almost identical to and completely compatible with IBM's Token Ring network. In fact, the IEEE 802.5 specification was.
  44. [44]
    Time Division Multiple Access - an overview | ScienceDirect Topics
    Time division multiple access (TDMA) is defined as a channel access method where multiple nodes share the same frequency and bandwidth by being assigned ...
  45. [45]
    [PDF] Queueing Delay Analysis of IEEE 802.11e EDCA - Hal-Inria
    Jan 30, 2006 · The model describes the priority schemes of the Enhanced Distributed Channel Access (EDCA) mechanism of the IEEE 802.11e standard [2]. EDCA ...
  46. [46]
    Enhancing LoRaWAN scalability with Longest First Slotted CSMA
    Oct 24, 2022 · However, LoRaWAN suffers from limited scalability since it uses an Aloha-based protocol for accessing the channel that causes a huge amount ...
  47. [47]
    [PDF] Slotted ALOHA Overlay on LoRaWAN - arXiv
    One potential scalability issue in current LoRaWAN is the adoption of. ALOHA, a pure random-access MAC (Medium Acces Control) protocol where devices transmit ...
  48. [48]
    RFC 1122 - Requirements for Internet Hosts - Communication Layers
    This RFC covers the communications protocol layers: link layer, IP layer, and transport layer; its companion RFC-1123 covers the application and support ...
  49. [49]
    RFC 826 - An Ethernet Address Resolution Protocol - IETF Datatracker
    The purpose of this RFC is to present a method of Converting Protocol Addresses (eg, IP addresses) to Local Network Addresses (eg, Ethernet addresses).
  50. [50]
    RFC 4861 - Neighbor Discovery for IP version 6 (IPv6)
    This document specifies the Neighbor Discovery protocol for IP Version 6. IPv6 nodes on the same link use Neighbor Discovery to discover each other's presence.
  51. [51]
    [PDF] A Survey of Wi-Fi 6: Technologies, Advances, and Challenges
    Oct 21, 2024 · Its prime goals are improving throughput by at least four times per station compared to IEEE 802.11ac while improving power efficiency and ...
  52. [52]
    IEEE 802.11be Wi-Fi 7: Feature Summary and Performance ... - arXiv
    Jul 24, 2025 · System-level simulation results suggest that by combining the new techniques, Wi-Fi 7 achieves 30 Gbps throughput and lower latency than Wi-Fi 6 ...
  53. [53]
    A Comprehensive Survey of 5G URLLC and Challenges in the 6G Era
    Aug 27, 2025 · Effort has been made to trace the history and evolution of latency and reliability issues in wireless communication. A layered approach is taken ...
  54. [54]
    [PDF] Multiplexing URLLC Traffic within eMBB Services in 5G NR
    Abstract—5G New Radio (NR) is envisioned to efficiently support both enhanced mobile broadband (eMBB) and ultra- reliable low-latency communication (URLLC).
  55. [55]
    Understanding Media Access Control Security (MACsec) | Junos OS
    Media Access Control security (MACsec) provides point-to-point security on Ethernet links. MACsec is defined by IEEE standard 802.1AE. You can use MACsec in ...
  56. [56]
    802.1AE: MAC Security (MACsec) |
    IEEE-Std 802.1AEcg-2017 specified Ethernet Data Encryption devices (EDEs) that provide transparent secure connectivity while supporting provider network ...Missing: layer | Show results with:layer
  57. [57]
    Quantum-Resistant Networks Using Post-Quantum Cryptography
    Oct 28, 2025 · This perspective presents a quantum-resistant network architecture that secures classical communication with post-quantum cryptographic ...
  58. [58]
    OpenFlow - an overview | ScienceDirect Topics
    OpenFlow is a Layer 2 communications protocol that provides access to the forwarding plane of a network switch or router over the network. It is a key principle ...
  59. [59]
  60. [60]
    The ZigBee Protocol - Netguru
    Mar 31, 2025 · The ZigBee protocol uses the IEEE 802.15.4 standard for the first two layers and adds the network and security, and framework protocol on top of ...The IEEE 802.15.4 · ZigBee - First release · Advantages of IoT with ZigBee
  61. [61]
    Enhancing Wi-Fi 6 spectrum access control with a heuristic OFDMA ...
    Proposed HOBO-UORA improves Wi-Fi 6 spectrum access and reduces channel collisions. AP uses AI/AD method for dynamic optimization of OFDMA spectrum in Wi-Fi 6 ...