© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 4: Network Access Introduction to Networks
Presentation_ID 2 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter Physical Layer Protocols 4.2 Network Media 4.3 Data Link Layer Protocols 4.4 Media Access Control 4.5 Summary doda
Presentation_ID 3 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 4: Objectives Students will be able to: Explain how physical layer protocols and services support communications across data networks. Build a simple network using the appropriate. Explain the role of the data link layer in supporting communications across data networks. Compare media access control techniques and logical topologies used in networks
Presentation_ID 4 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Getting it Connected Connecting to the Network Do buttons on
Presentation_ID 5 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Getting it Connected Connecting to the Network
Presentation_ID 6 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Getting it Connected Network Interface Cards Connecting to the Wireless LAN with a Range Extender
Presentation_ID 7 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Purpose of the Physical Layer The Physical Layer
Presentation_ID 8 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Purpose of the Physical Layer Physical Layer Media
Presentation_ID 9 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Purpose of the Physical Layer Physical Layer Standards Standard organization Networking Standards ISO ISO 8877: Officially adopted the RJ connectors (e.g., RJ-11, RJ-45) ISO 11801: Network cabling standard similar to EIA/TIA 568. EIA/TIA TIA-568-C: Telecommunications cabling standards, used by nearly all voice, video and data networks. TIA-569-B: Commercial Building Standards for Telecommunications Pathways and Spaces TIA-598-C: Fiber optic color coding TIA-942: Telecommunications Infrastructure Standard for Data Centers ANSI 568-C: RJ-45 pinouts. Co-developed with EIA/TIA ITU-T G.992: ADSL IEEE 802.3: Ethernet : Wireless LAN (WLAN) & Mesh (Wi-Fi certification) : Bluetooth Do buttons on
Presentation_ID 10 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Purpose of the Physical Layer Lab - Identifying Network Devices and Cabling Do lab For a grade
Presentation_ID 11 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Fundamental Principles of Layer 1 Physical Layer Fundamental Principles Media Physical Components Frame Encoding Technique Signalling Method Copper cable UTP Coaxial Connectors NICs Ports Interfaces Manchester Encoding Non-Return to Zero (NRZ) techniques 4B/5B codes are used with Multi-Level Transition Level 3 (MLT-3) signaling 8B/10B PAM5 Changes in the electromagnetic field Intensity of the electromagnetic field Phase of the electromagnetic wave Fiber Optic cable Single-mode Fiber Multimode Fiber Connectors NICs Interfaces Lasers and LEDs Photoreceptors Pulses of light Wavelength multiplexing using different colors A pulse equals 1. No pulse is 0. Wireless media Access Points NICs Radio Antennae DSSS (direct-sequence spread- spectrum) OFDM (orthogonal frequency division multiplexing) Radio waves Do buttons on
Presentation_ID 12 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Fundamental Principles of Layer 1 Bandwidth
Presentation_ID 13 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Fundamental Principles of Layer 1 Throughput Know the Difference: Bandwidth Throughput Goodput Try: One student Then all at once!
Presentation_ID 14 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Fundamental Principles of Layer 1 Types of Physical Media
Presentation_ID 15 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Fundamental Principles of Layer Activity - Physical Layer Terminology Do in Activities on both buttons in class
Presentation_ID 16 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Network Media Copper Cabling 4.2.1
Presentation_ID 17 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Copper Cabling Characteristics of Copper Media Do the animation on
Presentation_ID 18 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Copper Cabling Copper Media Shielded Twisted Pair (STP) cableUnshielded Twisted Pair (UTP) cable Coaxial cable Know: UTP STP
Presentation_ID 19 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Copper Cabling Unshielded Twisted-Pair (UTP) Cable
Presentation_ID 20 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Copper Cabling Shielded Twisted-Pair (STP) Cable Foil Shields Braided or Foil Shield
Presentation_ID 21 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Copper Cabling Coaxial Cable
Presentation_ID 22 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Copper Cabling Cooper Media Safety
Presentation_ID 23 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential UTP Cabling Activity - Copper Media Characteristics Do activity in class
Presentation_ID 24 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential UTP Cabling Properties of UTP Cabling 4.2.2
Presentation_ID 25 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential UTP Cabling Properties of UTP Cabling Understand How Cancelation Works to limit signal degradation Each pair has a Varying the number of twists
Presentation_ID 26 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential UTP Cabling UTP Cabling Standards Click on each cable on
Presentation_ID 27 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential UTP Cabling UTP Connectors Do buttons and watch video on Note poorly made cable on button 3
Presentation_ID 28 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential UTP Cabling Types of UTP Cable Know straight-through and crossover Roll over is use to console to cisco routers.
Presentation_ID 29 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential UTP Cabling Testing UTP Cables Test newly made cables for: Wire map Cable length Signal loss due to attenuation Crosstalk
Presentation_ID 30 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential UTP Cabling Activity - Cable Pinouts Do in class
Presentation_ID 31 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential UTP Cabling Lab - Building an Ethernet Crossover Cable Do for a lab grade
Presentation_ID 32 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Fiber Optic Cabling Properties of Fiber Optic Cabling Fiber-optic cabling is now being used in four types of industry: Enterprise Networks FTTH and Access Networks Long-Haul Networks Submarine Networks
Presentation_ID 33 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Fiber Optic Cabling Fiber Media Cable Design Click on the parts of the diagram on
Presentation_ID 34 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Fiber Optic Cabling Types of Fiber Media Click on buttons on
Presentation_ID 35 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Fiber Optic Cabling Network Fiber Connectors Click on buttons on
Presentation_ID 36 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Fiber Optic Cabling Network Fiber Connectors TIA-598 standard which recommends the use of a Yellow jacket for single-mode fiber cables Orange (or aqua) for multimode fiber cables Click on buttons on
Presentation_ID 37 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Fiber Optic Cabling Testing Fiber Cables
Presentation_ID 38 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Fiber Optic Cabling Fiber versus Copper Implementation issuesCopper mediaFibre-optic Bandwidth supported 10 Mbps – 10 Gbps10 Mbps – 100 Gbps Distance Relatively short (1 – 100 meters) Relatively High (1 – 100,000 meters) Immunity to EMI and RFI Low High (Completely immune) Immunity to electrical hazards Low High (Completely immune) Media and connector costs LowestHighest Installation skills required LowestHighest Safety precautions LowestHighest
Presentation_ID 39 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Fiber Optic Cabling Activity - Fiber Optics Terminology Do Activity in class
Presentation_ID 40 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Wireless Media Properties of Wireless Media Wireless does have some areas of concern including: Coverage area Interference Security
Presentation_ID 41 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential IEEE standards Commonly referred to as Wi-Fi. Uses CSMA/CA Variations include: a: 54 Mbps, 5 GHz b: 11 Mbps, 2.4 GHz g: 54 Mbps, 2.4 GHz n: 600 Mbps, 2.4 and 5 GHz ac: 1 Gbps, 5 GHz ad: 7 Gbps, 2.4 GHz, 5 GHz, and 60 GHz IEEE standard Supports speeds up to 3 Mbps Provides device pairing over distances from 1 to 100 meters. IEEE standard Provides speeds up to 1 Gbps Uses a point-to-multipoint topology to provide wireless broadband access. Wireless Media Types of Wireless Media
Presentation_ID 42 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Wireless Media Wireless LAN Cisco Linksys EA ac wireless router
Presentation_ID 43 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Wireless Media Wi-Fi Standards Standard Maximum Speed Frequency Backwards compatible a 54 Mbps5 GHzNo b 11 Mbps2.4 GHzNo g 54 Mbps2.4 GHz802.11b n 600 Mbps2.4 GHz or 5 GHz802.11b/g ac 1.3 Gbps (1300 Mbps) 2.4 GHz and 5.5 GHz b/g/n ad 7 Gbps (7000 Mbps) 2.4 GHz, 5 GHz and 60 GHz b/g/n/ac
Presentation_ID 44 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Wireless Media Packet Tracer - Connecting a Wired and Wireless LAN Lab - Viewing Wired and Wireless NIC Information Do Packet Tracer And Lab For a lab grade
Presentation_ID 45 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Purpose of the Data Link Layer The Data Link Layer
Presentation_ID 46 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Purpose of the Data Link Layer Data Link Sublayers Network Data Link LLC Sublayer MAC Sublayer Physical Ethernet Ethernet Wi-Fi Wi-Fi Bluetooth Bluetooth The data link layer is actually divided into two sublayers: Logical Link Control (LLC) Media Access Control (MAC)
Presentation_ID 47 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Purpose of the Data Link Layer Media Access Control Do Animation on
Presentation_ID 48 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Purpose of the Data Link Layer Providing Access to Media Do Animation on
Presentation_ID 49 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Data Link Layer Layer 2 Frame Structure
Presentation_ID 50 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Layer 2 Frame Structure Creating a Frame
Presentation_ID 51 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Layer 2 Frame Structure Activity - Generic Frame Fields Do the Activities on both buttons in class
Presentation_ID 52 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Data Link Layer Layer 2 Standards
Presentation_ID 53 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Layer 2 Standards Data Link Layer Standards Standard organization Networking Standards IEEE 802.2: Logical Link Control (LLC) 802.3: Ethernet 802.4: Token bus 802.5: Token passing : Wireless LAN (WLAN) & Mesh (Wi-Fi certification) : Bluetooth : WiMax ITU-T G.992: ADSL G G.8199: MPLS over Transport aspects Q.921: ISDN Q.922: Frame Relay ISO HDLC (High Level Data Link Control) ISO 9314: FDDI Media Access Control (MAC) ANSI X3T9.5 and X3T12: Fiber Distributed Data Interface (FDDI)
Presentation_ID 54 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Topologies Activity - Data Link Layer Standards Organizations Do the Activity in class
Presentation_ID 55 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Topologies Controlling Access to the Media
Presentation_ID 56 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Topologies Physical and Logical Topologies Do the Buttons on in class
Presentation_ID 57 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential WAN Topologies Common Physical WAN Topologies
Presentation_ID 58 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential WAN Topologies Physical Point-to-Point Topology
Presentation_ID 59 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential WAN Topologies Logical Point-to-Point Topology Do the Buttons on in class
Presentation_ID 60 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential WAN Topologies Half and Full Duplex Do the Buttons and animations on in class
Presentation_ID 61 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential LAN Topologies Physical LAN Topologies
Presentation_ID 62 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential LAN Topologies Logical Topology for Shared Media Do the Buttons on in class
Presentation_ID 63 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential LAN Topologies Contention-Based Access CharacteristicsContention-Based Technologies Stations can transmit at any time Collision exist There are mechanisms to resolve contention for the media CSMA/CD for Ethernet networks CSMA/CA for wireless networks
Presentation_ID 64 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential LAN Topologies Multi-Access Topology Do the Animation on in class
Presentation_ID 65 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential LAN Topologies Controlled Access CharacteristicsControlled Access Technologies Only one station can transmit at a time Devices wishing to transmit must wait their turn No collisions May use a token passing method Token Ring (IEEE 802.5) Fiber Distributed Data Interface (FDDI) Both are obsolete
Presentation_ID 66 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential LAN Topologies Ring Topology Do the Animation on in class
Presentation_ID 67 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential LAN Topologies Activity - Logical and Physical Topologies Do the Activity on in class
Presentation_ID 68 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Data Link Frame The Frame Do the Buttons in class
Presentation_ID 69 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Data Link Frame The Header Click on parts of in class
Presentation_ID 70 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Data Link Frame Layer 2 Address
Presentation_ID 71 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Data Link Frame The Trailer Click on parts of in class
Presentation_ID 72 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Data Link Frame LAN and WAN Frames Do animation on in class
Presentation_ID 73 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Data Link Frame Ethernet Frame Minimum Frame length: 64 or 72? Depends on if you count the Preamble
Presentation_ID 74 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Data Link Frame Point-to-Point Protocol Frame
Presentation_ID 75 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Data Link Frame Wireless Frame
Presentation_ID 76 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Data Link Frame Activity - Frame Fields Do activities on all buttons on In class
Presentation_ID 77 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Network Access Summary Physical Layer Protocols Network Media Data Link Layer Protocols Media Access Control –
Presentation_ID 78 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential