© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 4: Network Access Introduction to Networks.

Slides:



Advertisements
Similar presentations
Network Hardware and Physical Media
Advertisements

Introduction to Network
Layer 1 of the TCP/IP protocol stack: Network Access Layer (NAL). Functions, performed on the layer. МАС address in Ethernet networks. Layer 1 of the TCP/IP.
Chapter 7 Data Link Layer
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Physical Layer Network Fundamentals – Chapter 8.
Chapter 7- Data Link Layer
CS335 Networking & Network Administration Thursday April 1.
Telecommunications Chapter 5 Chapter 5 Telecommunications
Network+ Guide to Networks, Fourth Edition Chapter 3 Transmission Basics and Networking Media.
1 Version 3.0 Module 3 Networking Media. 2 Version 3.0 Cable Specifications Cables have different specifications and expectations pertaining to performance:
Presentation_ID 1 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 4: Network Access.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 4: Network Access Introduction to Networks.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 4: Network Access Introduction to Networks.
1 12-Aug-15 OSI Physical layer CCNA Exploration Semester 1 Chapter 8.
Network Cabling and Wireless Network
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 OSI Physical Layer Network Fundamentals – Chapter 8.
思科网络技术学院理事会. 1 OSI Physical Layer Network Fundamentals – Chapter 8.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID Physical Layer Protocols.
CIS 81 Fundamentals of Networking Chapter 4: Network Access Rick Graziani Cabrillo College Fall 2013.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 4: Network Access Introduction to Networks.
Chapter 4 Intro to Routing & Switching.  Upon completion of this chapter, you should be able to:  Describe the purpose of the physical layer  Identify.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 OSI Data Link Layer Network Fundamentals – Chapter 7.
Cisco 1 - Networking Basics Perrine. J Page 19/3/2015 Chapter 3 Which of the following correctly describes the type of signal that the network media carries?
Hardware Concepts Chapter 4.
Network Fundamentals Chapter 8
Network Access and Transmission Methods Chapter 10.
1 Chapter 2: LAN Standards, Physical Connectivity, and Media Access.
Chapter 8 OSI Physical Layer.
Physical Transmission
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
Chapter 2 Communications Networks. Introduction Look at: –Telephony Networks (2.2) –OSI Reference Model(2.3) –The Internet (2.4) –Asynchronous Transfer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 OSI Data Link Layer Network Fundamentals – Chapter 7.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Data Link Layer Dr. Muazzam A. Khan.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 OSI Physical Layer Network Fundamentals – Chapter 8.
 LANs – A Definition - A local area network (LAN) is a computer network covering a small physical area, like a home, office, or small group of buildings,
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Ethernet Network Fundamentals – Chapter 9.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 OSI Physical Layer Network Fundamentals – Chapter 8.
First, by sending smaller individual pieces from source to destination, many different conversations can be interleaved on the network. The process.
Summary - Part 2 - Objectives The purpose of this basic IP technology training is to explain video over IP network. This training describes how video can.
Lab Tutorial 1 Network Media (Ref. CCNA5 Introduction to Networks 4.2) 1.
Networks Network Components. Learning Objectives Describe different media for transmitting data and their carrying capabilities. Explain the different.
Chapter 7 OSI Data Link Layer.
TOPIC 1.2 INTRODUCTION TO NETWORKING. OBJECTIVES By the end of the topic, students should be able to: a) List the elements of data communication systems.
LECTURE#6 - CABLES Asma AlOsaimi. Copper Coaxial Cable - Thick or Thin Unshielded Twisted Pair - CAT 3,4,5,5e&6 Optical Fiber Multimode Singlemode Wireless.
2016/3/11 1 Data Link Layer. 2016/3/11 2 Two basic services of Data Link Allows the upper layers to access the media using techniques such as framing.
+ Lecture1 Transmission Media Asma Alosaimi 1. + Topics: Review Transmission media types Copper Media Fiber Optical Media Wireless Media 2.
LOGO Physical Layer and Cabling Jaringan Komputer_D3 TT1.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 4: Network Access Introduction to Networks.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 OSI data link layer CCNA Exploration Semester 1 Chapter 7.
Cisco I Introduction to Networks Semester 1 Chapter 4 JEOPADY.
© 2015 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1 Chapter 7: Networking Concepts IT Essentials v6.0.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 9: Network Access Network Basics.
Chapter 4: Network Access
Chapter 4: Network Access
Instructor Materials Chapter 4: Network Access
Transmission Media Lecture 1 : CT1304 – Elham Sunbu.
Lecture #01 Transmission Media
Lecture #01 Transmission Media
Local Area Networks Honolulu Community College
Network Media Types COMPUTER NETWORKS 4TH Edition Chapter3
Chapter 4: Network Access
Lecture #01 Transmission Media
Layer 1 of the TCP/IP protocol stack: Network Access Layer (NAL)
LECTURE #01 TRANSMISSION MEDIA
Network Access Layer: Introduction
Lecture #01 Transmission Media
Network Fundamentals – Chapter 8
Review of Important Networking Concepts K. PALANIVEL Systems Analyst, Computer Centre Pondicherry University, Puducherry – LECTURE 2 COMS 525:
Data Link Layer 2019/2/19.
Presentation transcript:

© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 4: Network Access Introduction to Networks

Presentation_ID 2 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 4: Objectives Students will be able to:  Explain how physical layer protocols and services support communications across data networks.  Build a simple network using the appropriate.  Explain the role of the data link layer in supporting communications across data networks.  Compare media access control techniques and logical topologies used in networks.

Presentation_ID 3 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter Physical Layer Protocols 4.2 Network Media 4.3 Data Link Layer Protocols 4.4 Media Access Control 4.5 Summary

Presentation_ID 4 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Getting it Connected Connecting to the Network

Presentation_ID 5 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Getting it Connected Connecting to the Network

Presentation_ID 6 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Getting it Connected Network Interface Cards Connecting to the Wireless LAN with a Range Extender

Presentation_ID 7 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Purpose of the Physical Layer The Physical Layer

Presentation_ID 8 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Purpose of the Physical Layer Physical Layer Media

Presentation_ID 9 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Purpose of the Physical Layer Physical Layer Standards Standard organization Networking Standards ISO ISO 8877: Officially adopted the RJ connectors (e.g., RJ-11, RJ-45) ISO 11801: Network cabling standard similar to EIA/TIA 568. EIA/TIA TIA-568-C: Telecommunications cabling standards, used by nearly all voice, video and data networks. TIA-569-B: Commercial Building Standards for Telecommunications Pathways and Spaces TIA-598-C: Fiber optic color coding TIA-942: Telecommunications Infrastructure Standard for Data Centers ANSI 568-C: RJ-45 pinouts. Co-developed with EIA/TIA ITU-T G.992: ADSL IEEE 802.3: Ethernet : Wireless LAN (WLAN) & Mesh (Wi-Fi certification) : Bluetooth

Presentation_ID 10 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Purpose of the Physical Layer Physical Layer Standards  The protocols and operations of the upper OSI layers are performed in software designed by software engineers. For example, the services and protocols in the TCP/IP suite are defined by the Internet Engineering Task Force (IETF) in RFCs  The physical layer consists of electronic circuitry, media, and connectors developed by engineers. Therefore, it is appropriate that the standards governing this hardware are defined by the relevant electrical and communications engineering organizations.

Presentation_ID 11 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Fundamental Principles of Layer 1 Physical Layer Fundamental Principles Media Physical Components Frame Encoding Technique Signalling Method Copper cable UTP Coaxial Connectors NICs Ports Interfaces Manchester Encoding Non-Return to Zero (NRZ) techniques 4B/5B codes are used with Multi-Level Transition Level 3 (MLT-3) signaling 8B/10B PAM5 Changes in the electromagnetic field Intensity of the electromagnetic field Phase of the electromagnetic wave Fiber Optic cable Single-mode FiberSingle-mode Fiber Multimode FiberMultimode Fiber ConnectorsConnectors NICsNICs InterfacesInterfaces Lasers and LEDsLasers and LEDs PhotoreceptorsPhotoreceptors Pulses of light Wavelength multiplexing using different colors A pulse equals 1. No pulse is 0. Wireless media Access Points NICs Radio Antennae DSSS (direct-sequence spread- spectrum) OFDM (orthogonal frequency division multiplexing) Radio waves transmit and carry The physical components are the electronic hardware devices, media, and other connectors that transmit and carry the signals to represent the bits. converting Encoding or line encoding is a method of converting a stream of data bits into a predefined "code”. generate The physical layer must generate the electrical, optical, or wireless signals that represent the "1" and "0" on the media.

Presentation_ID 12 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Fundamental Principles of Layer 1 Physical Layer Fundamental Principles

Presentation_ID 13 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Fundamental Principles of Layer 1 Bandwidth transfer of bits at different speedsDifferent physical media support the transfer of bits at different speeds. discussed in terms of bandwidth and throughputData transfer is usually discussed in terms of bandwidth and throughput. capacity of a medium to carry dataBandwidth is the capacity of a medium to carry data. Typically measured in kilobits per second (kb/s) or megabits per second (Mb/s) The practical bandwidth of a network is determined by a combination of factors: The properties of the physical media The technologies chosen for signaling and detecting network signals

Presentation_ID 14 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Fundamental Principles of Layer 1 Throughput Throughput is the measure of the transfer of bits across the media over a given period of time. does not match the specified bandwidth Throughput usually does not match the specified bandwidth in physical layer implementations. Many factors influence throughput including: amount  The amount of traffic type  The type of traffic latency created  The latency created by the number of network devices encountered between source and destination Throughput cannot be faster than the slowest link in the path measure of usable data transferred over a given period of time Note: There is a third measurement to measure the transfer of usable data that is known as goodput. Goodput is the measure of usable data transferred over a given period of time. Goodput is throughput minus traffic overhead for establishing sessions, acknowledgements, and encapsulation. There are many online speed tests that can reveal the throughput of an Internet connection. The figure provides sample results from a speed test.

Presentation_ID 15 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Fundamental Principles of Layer 1 Types of Physical Media Specifications guarantee that cables and connectors will function as anticipated with different data link layer implementations. As an example, standards for copper media are defined for the:  Type of copper cabling used  Bandwidth of the communication  Type of connectors used  Pinout and color codes of connections to the media  Maximum distance of the media The figure shows different types of interfaces and ports available on a 1941 router.

Presentation_ID 16 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Network Media Copper Cabling Copper media is limited by distance and signal interference. The longer the signal travels, the more it deteriorates (signal attenuation). The timing and voltage values of the electrical pulses are also susceptible to interference from two sources: Electromagnetic interference (EMI) or radio frequency interference (RFI) Crosstalk - disturbance caused by the electric or magnetic fields of a signal on one wire to the signal in an adjacent wire

Presentation_ID 17 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Copper Cabling Characteristics of Copper Media

Presentation_ID 18 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Copper Cabling Copper Media Shielded Twisted Pair (STP) cableUnshielded Twisted Pair (UTP) cable Coaxial cable

Presentation_ID 19 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Copper Cabling Unshielded Twisted-Pair (UTP) Cable 4 pairs Color coded 4 pairs Color coded

Presentation_ID 20 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Copper Cabling Shielded Twisted-Pair (STP) Cable Foil Shields Braided or Foil Shield The STP cable shown uses four pairs of wires, each wrapped in a foil shield, which are then wrapped in an overall metallic braid or foil. Must be terminated properly

Presentation_ID 21 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Copper Cabling: Coaxial Cable As shown in the figure, coaxial cable consists of:  A copper conductor used to transmit the electronic signals  Conductor is surrounded by an insulating layer of flexible plastic insulation.  Insulating material is surrounded in a woven copper braid, that acts as the second wire in the circuit and as a shield for the inner conductor.  Entire cable is covered with a cable jacket; protects it from physical damage.

Presentation_ID 22 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Copper Cabling Cooper Media Safety

Presentation_ID 23 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential UTP Cabling Properties of UTP Cabling

Presentation_ID 24 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential UTP Cabling UTP Cabling Standards

Presentation_ID 25 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential UTP Cabling UTP Connectors

Presentation_ID 26 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential UTP Cabling Types of UTP Cable

Presentation_ID 27 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential UTP Cabling Testing UTP Cables

Presentation_ID 28 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Fiber Optic Cabling Properties of Fiber Optic Cabling  It permits the transmission of data over longer distances and at higher bandwidths (data rates) than any other networking media.  Flexible but extremely thin transparent strand of very pure glass (silica)  Bits are encoded on the fiber as light impulses.  Cable acts as a waveguide, or “light pipe,” to transmit light between the two ends with minimal loss of signal.

Presentation_ID 29 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Fiber Optic Cabling Fiber Media Cable Design

Presentation_ID 30 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Fiber Optic Cabling Types of Fiber Media

Presentation_ID 31 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Fiber Optic Cabling Network Fiber Connectors older bayonet style connector Straight-Tip (ST): An older bayonet style connector used with multimode fiber. square or standard connector Subscriber Connector (SC): Sometimes referred to as square or standard connector, used with multimode and single-mode fiber. Lucent Connector (LC): Sometimes called a little or local connector, used with single-mode, supports multimode. Yellow jacket for single-mode Orange (or aqua) for multimode.

Presentation_ID 32 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Fiber Optic Cabling Testing Fiber Cables Three common types of fiber-optic termination and splicing errors are:  Misalignment: The fiber-optic media are not precisely aligned to one another when joined.  End gap: The media does not completely touch at the splice or connection.  End finish: The media ends are not well polished or dirt is present at the termination. It is recommended that an optical tester, an Optical Time Domain Reflectometer (OTDR),such as shown in the figure be used to test fiber-optic cables.

Presentation_ID 33 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Fiber Optic Cabling Fiber versus Copper Implementation issuesCopper mediaFibre-optic Bandwidth supported 10 Mbps – 10 Gbps10 Mbps – 100 Gbps Distance Relatively short (1 – 100 meters) Relatively High (1 – 100,000 meters) Immunity to EMI and RFI Low High (Completely immune) Immunity to electrical hazards Low High (Completely immune) Media and connector costs LowestHighest Installation skills required LowestHighest Safety precautions LowestHighest Optical fiber media implementation issues include: More expensive (usually) than copper media over the same distance (but for a higher capacity) Different skills and equipment required to terminate and splice the cable infrastructure More careful handling than copper media

Presentation_ID 34 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Wireless Media Properties of Wireless Media electromagnetic signalsbinary digits of datausingradio or microwave frequencies Wireless media carry electromagnetic signals that represent the binary digits of data communications using radio or microwave frequencies. does have concern However, wireless does have some areas of concern including:  Coverage area: construction materials used in buildings and structures will limit the effective coverage.  Interference: can be disrupted by such common devices as household cordless phones, microwave ovens, and other wireless communications.  Security: network security is a major component of wireless network administration.

Presentation_ID 35 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential IEEE standards Commonly referred to as Wi-Fi. Uses CSMA/CA Variations include: a: 54 Mbps, 5 GHz b: 11 Mbps, 2.4 GHz g: 54 Mbps, 2.4 GHz n: 600 Mbps, 2.4 and 5 GHz ac: 1 Gbps, 5 GHz ad: 7 Gbps, 2.4 GHz, 5 GHz, and 60 GHz IEEE standard Supports speeds up to 3 Mbps Provides device pairing over distances from 1 to 100 meters. IEEE standard Provides speeds up to 1 Gbps Uses a point-to-multipoint topology to provide wireless broadband access. Wireless Media Types of Wireless Media

Presentation_ID 36 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Wireless Media Wireless LAN The benefits of wireless data communications technologies are:  Savings on costly premises wiring  Convenience of host mobility A common wireless LAN requires the following network devices:  Wireless Access Point (AP): Concentrates the wireless signals from users and connects, usually through a copper cable, to the existing copper-based network infrastructure, such as Ethernet.  Wireless NIC adapters: Provides wireless communication capability to each network host. NIC types: Integrated, card, USB Cisco Linksys EA ac wireless router Home and small business wireless routers integrate the functions of a router, switch, and access point into one device as shown in the figure.

Presentation_ID 37 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Wireless Media Wi-Fi Standards Standard Maximum Speed Frequency Backwards compatible a 54 Mbps5 GHzNo b 11 Mbps2.4 GHzNo g 54 Mbps2.4 GHz802.11b n 600 Mbps2.4 GHz or 5 GHz802.11b/g ac 1.3 Gbps (1300 Mbps) 2.4 GHz and 5.5 GHz b/g/n ad 7 Gbps (7000 Mbps) 2.4 GHz, 5 GHz and 60 GHz b/g/n/ac

Presentation_ID 38 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Purpose of the Data Link Layer The Data Link Layer The data link layer performs these two basic services:  It accepts Layer 3 packets and packages them into data units called frames.  It controls media access control and performs error detection.  Receives packets from and directs packets to an upper layer protocol, in this case IPv4 or IPv6.

Presentation_ID 39 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Purpose of the Data Link Layer Data Link Sublayers Network Data Link LLC Sublayer MAC Sublayer Physical Ethernet Ethernet Wi-Fi Wi-Fi Bluetooth Bluetooth The data link layer is divided into two sublayers: provide services to the network layer Logical Link Control (LLC): Defines the software processes that provide services to the network layer protocols. places information in the frame It places information in the frame that identifies which network layer protocol is being used for the frame. Media Access Control (MAC): Defines the media access processes performed by the hardware. It provides data link layer addressing and delimiting of data according to the physical signaling requirements of the medium and the type of data link layer protocol in use

Presentation_ID 40 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Purpose of the Data Link Layer Media Access Control specify the encapsulation of a packet into a frame getting the encapsulated packet on and off each medium. Layer 2 protocols specify the encapsulation of a packet into a frame and the techniques for getting the encapsulated packet on and off each medium. media access control method. The technique used for getting the frame on and off media is called the media access control method. Animation media access control method. The technique used for getting the frame on and off media is called the media access control method. Animation

Presentation_ID 41 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Purpose of the Data Link Layer Providing Access to Media Animation At each hop along the path, a router: Accepts a frame from a medium De-encapsulates the frame Re-encapsulates the packet into a new frame Forwards the new frame appropriate to the medium of that segment of the physical network At each hop along the path, a router: Accepts a frame from a medium De-encapsulates the frame Re-encapsulates the packet into a new frame Forwards the new frame appropriate to the medium of that segment of the physical network Different media access control methods may be required during the course of a single communication.

Presentation_ID 42 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Data Link Layer Layer 2 Frame Structure

Presentation_ID 43 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Layer 2 Frame Structure Creating a Frame

Presentation_ID 44 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Data Link Layer Layer 2 Standards - Ethernet

Presentation_ID 45 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Layer 2 Standards Data Link Layer Standards Standard organization Networking Standards IEEE (LAN/Wireless) 802.2: Logical Link Control (LLC) 802.3: Ethernet 802.4: Token bus 802.5: Token passing : Wireless LAN (WLAN) & Mesh (Wi-Fi certification) : Bluetooth : WiMax ITU-T (WAN) G.992: ADSL G G.8199: MPLS over Transport aspects Q.921: ISDN Q.922: Frame Relay ISO (WAN) HDLC (High Level Data Link Control) ISO 9314: FDDI Media Access Control (MAC) ANSI (WAN) X3T9.5 and X3T12: Fiber Distributed Data Interface (FDDI)

Presentation_ID 46 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Topologies Controlling Access to the Media Regulating the placement of data frames onto the media Regulating the placement of data frames onto the media is controlled by the media access control sublayer. rules that regulate Media access control is the equivalent of traffic rules that regulate the entrance of motor vehicles onto a roadway; if no rules, too many accidents different ways to regulate placing frames onto the mediaThe protocols at the data link layer define the rules for access There are different ways to regulate placing frames onto the media. The protocols at the data link layer define the rules for access to different media. The actual media access control method used depends on: Topology: How the connection between the nodes appears to the data link layer. Media sharing: How the nodes share the media. The media sharing can be point- to-point such as in WAN connections or shared such as in LAN networks.

Presentation_ID 47 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Physical and Logical Topologies Physical Topology Logical Topology The data link layer "sees" the logical topology of a network when controlling data access to the media. It is the logical topology that influences the type of network framing and media access control used.

Presentation_ID 48 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential WAN Topologies Common Physical WAN Topologies Point-to-Point: This is the simplest topology consists of a permanent link between two endpoints, WAN topology. Hub and Spoke: A WAN version of the star topology, central site interconnects branch sites using point-to- point links. Mesh: Provides high availability, but requires that every end system be interconnected to every other system. Costs can be significant. Partial mesh: Some but not all of end devices are interconnected.

Presentation_ID 49 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential WAN Topologies Physical Point-to-Point Topology The two nodes do not have to share the media with other hosts. The logical data link protocols can be very simple, frames on the media can only travel to or from the two nodes. Usually full duplex circuit is used, no chance of a collision

Presentation_ID 50 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential WAN Topologies Logical Point-to-Point Topology

Presentation_ID 51 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential WAN Topologies Half and Full Duplex Half Duplex: Ethernet has established arbitration rules for resolving conflicts arising from instances when more than one station attempts to transmit at the same time. Full Duplex: Both devices can transmit and receive on the media at the same time. The media is available for transmission for both nodes at any time. Therefore, there is no media arbitration necessary in the data link layer.

Presentation_ID 52 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential LAN Topologies Physical LAN Topologies Star: End devices are connected to a central intermediate device. Bus: All end systems are chained to each other and terminated in some form on each end. This is a combination of the other topologies such as star networks interconnected to each other using a bus topology Ring: End systems are connected to their respective neighbor forming a ring.

Presentation_ID 53 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential LAN Topologies Logical Topology for Shared Media

Presentation_ID 54 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential LAN Topologies Contention-Based Access CharacteristicsContention-Based Technologies Stations can transmit at any time Collision exist There are mechanisms to resolve contention for the media CSMA/CD for Ethernet networks CSMA/CA for wireless networks

Presentation_ID 55 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential LAN Topologies Multi-Access Topology

Presentation_ID 56 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential LAN Topologies Controlled Access CharacteristicsControlled Access Technologies Only one station can transmit at a time Devices wishing to transmit must wait their turn No collisions May use a token passing method Token Ring (IEEE 802.5) Fiber Distributed Data Interface (FDDI)

Presentation_ID 57 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential LAN Topologies Ring Topology

Presentation_ID 58 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Data Link Frame The Frame

Presentation_ID 59 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Data Link Frame The Header The figure displays the Ethernet frame header fields: Start Frame field: Indicates the beginning of the frame. Source and Destination Address fields: Indicates the source and destination nodes on the media. Type field: Indicates the upper layer service contained in the frame (IP). Different data link layer protocols may use different fields from those mentioned. For example other Layer 2 protocol header frame fields could include: Priority/Quality of Service field Logical connection control field Physical link control field Flow control field Congestion control field

Presentation_ID 60 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Data Link Frame Layer 2 Address

Presentation_ID 61 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Data Link Frame The Trailer Frame Check Sum: Data link layer protocols add a trailer to the end of each frame. The trailer is used to determine if the frame arrived without error. A transmitting node creates a logical mathematical summary of the contents of the frame. This is known as the cyclic redundancy check (CRC) value This value is placed in the Frame Check Sequence (FCS) field of the frame to represent the contents of the frame. If the CRC value in the FCS differs from the CRC calculated at the receiving node, the frame is discarded

Presentation_ID 62 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Data Link Frame LAN and WAN Frames Animation Animation E

Presentation_ID 63 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Data Link Frame Ethernet Frame

Presentation_ID 64 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Data Link Frame Point-to-Point Protocol Frame

Presentation_ID 65 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Data Link Frame Wireless Frame

Presentation_ID 66 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Network Access Summary Physical Layer Protocols Network Media Data Link Layer Protocols Media Access Control

Presentation_ID 67 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential