Chabot College ELEC 99.05 Layer 2 - Highlights.

Slides:



Advertisements
Similar presentations
Data Link Layer B. Konkoth. PDU  Protocol Data Unit  A unit of data which is specified in a protocol of a given layer  Layer 5, 6, 7 – Data  Layer.
Advertisements

1 Data Link Protocols Relates to Lab 2. This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet,
Chapter 7 Data Link Layer
DCN286 INTRODUCTION TO DATA COMMUNICATION TECHNOLOGY Ethernet Fundamentals.
CISCO NETWORKING ACADEMY Chabot College ELEC Ethernet &
CIM 2465 Fundamentals of Ethernet1 Fundamentals of Ethernet (Topic 3) Textbook: Networking Basics, CCNA 1 Companion Guide, Cisco Press Cisco Networking.
CCNA 1 v3.1 Module 6 Review. 2 What 3 things happen on an Ethernet network after a collision occurs? A backoff algorithm is invoked and transmission is.
Institute of Technology Sligo - Dept of Computing Naming & Framing Ch. 6–Layer 2 Concepts Paul Flynn.
1 Computer Networks Local Area Networks. 2 A LAN is a network: –provides Connectivity of computers, mainframes, storage devices, etc. –spans limited geographical.
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 18 Introduction to Computer Networks.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
The Saigon CTT Semester 1 CHAPTER 6. The Saigon CTT  Content LAN Standards. Hexadecimal Numbers. MAC Addressing. Framing. Media Access Control (MAC).
CISCO NETWORKING ACADEMY PROGRAM (CNAP) Ethernet Fundamentals
Local Area Network local area network (LAN) is a computer network that is designed for a limited geographic area such as a building or a campus. Although.
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
CISCO NETWORKING ACADEMY Chabot College ELEC Ch 2 - OSI Model.
6. Network Model ENG224 INFORMATION TECHNOLOGY – Part I
Introducing Network Standards Open Systems Interconnection (OSI) Model IEEE 802.x Standard Device Drivers and OSI 1.
IEEE Standards, FDDI, Collision Free Protocols
Introduction to IT and Communications Technology Justin Champion C208 – 3292 Ethernet Fundamentals CE
Wired LANs: Ethernet In Chapter 1, we learned that a local area network (LAN) is a computer network that is designed for a limited geographic area such.
1 Data Link Layer Lecture 17 Imran Ahmed University of Management & Technology.
Component 9 – Networking and Health Information Exchange Unit 1-2 ISO Open Systems Interconnection (OSI) This material was developed by Duke University,
Naming & Framing Ch. 6–Layer 2 Concepts By: Allan Johnson.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 16.
Copyright Objectives: Chapter 3: Layer 2 Ethernet  Ethernet Fundamentals Ethernet Operations Carrier Sense Multiple Access/Collision.
Copyright CCNA 1 Chapter 5 Ethernet Fundamentals By Your Name.
Chapter 9 Ethernet – Part 1 CIS 82 Routing Protocols and Concepts Rick Graziani Cabrillo College Last Updated: 5/5/2008.
1 Layer 2: Concepts Honolulu Community College Cisco Academy Training Center Semester 1 Version
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Data Link Layer Dr. Muazzam A. Khan.
Ethernet Fundamentals. The success of Ethernet is due to the following factors: Simplicity and ease of maintenance Ability to incorporate new technologies.
Access to Shared Media - Media Access Control protocols RD-CSY10171.
CCNA1 v3 Module 1 v3 CCNA 1 Module 6 JEOPARDY K. Martin.
Ethernet Term Paper Introduced by: Almarshood, Yosef Bahaitham, Ahmed Alrashudi, Ahmed.
1 Semester 1 CHAPTER 6 REVIEW JEOPARDY Frames Data Link LayerMACAddressingHexadecimalsMiscellaneous
Agenda 1. QUIZ 2. HOMEWORK 3. LOCAL AREA NETWORKS 4. WIDE AREA NETWORKS.
1 IEEE 802 LANs Following the success of CDMA technologies ALOHA & Ethernet, IEEE standardized CDMA/CD technology as IEEE LAN Also standardized are.
Chapter Six The Data Link Layer. Objectives Learn about physical addressing on the network. Explore the MAC and LLC sublayers of Data Link. Get introduced.
Chapter 6 – Layer 2 MAC, Frames, Hex, etc.. Layer 1 / Layer 2 Layer 1 Signals, media, bit streams Layer 2 –Communicates with upper layers using Logical.
LOCAL AREA NETWORKS. LAN PROTOCOL ARCHITECTURE The basic functions of a LAN is organized by set of layering protocols. IEEE 802 Reference Model Protocols.
The Saigon CTT Semester 1 CHAPTER 6 Le Chi Trung.
Ethernet Overview it the IEEE standard for Ethernet.
Data Link Layer and Ethernet COM211 Communications and Networks CDA College Theodoros Christophides
Naming & Framing Ch. 6–Layer 2 Concepts. Layer 2’s Job For every limitation of Layer 1, Layer 2 has a solution. Layer 1 cannot name computers. How does.
IEEE 802.X Standards The Institute of Electrical and Electronics Engineers (IEEE) has developed a series of networking standards to ensure that networking.
Token Ring EthernetFDDIDevicesTesting
Networking and Health Information Exchange Unit 1b ISO Open Systems Interconnection (OSI) Component 9/Unit 1b1 Health IT Workforce Curriculum Version 1.0/Fall.
1 3/13/ :25 Chapter 5Protocol Architecture1 Rivier College CS575: Advanced LANs Chapter 5: Protocol Architecture.
Chapter Objectives After completing this chapter you will be able to: Describe in detail the following Local Area Network (LAN) technologies: Ethernet.
Introduction to Communication Lecture (10) 1. 2 Wired LANs: Ethernet IEEE Project 802 defines the LLC and MAC sublayers for all LANs including Ethernet.
Data Link Protocols Relates to Lab 2.
Data Communication Networks Lec 18. Wired LAN:Ethernet Datalink layer – Logical link control(LLC) – MAC Physical layer.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 03 Standards and Technologies.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 OSI data link layer CCNA Exploration Semester 1 Chapter 7.
Chapter 12 Multiple Access.
DATA COMMUNICATION Lecture-42.
“Copyright © 2001 John Wiley & Sons, Inc. All rights reserved
Ethernet and Token Ring LAN Networks
Ethernet and Token Ring LAN Networks
Chapter 12 Local Area Networks
CCNA 1 Chapter 5 Ethernet Fundamentals
CCNA 1 v3 JEOPARDY Module 6 CCNA1 v3 Module 6 K. Martin.
Chapter 12 Local Area Networks
Figure 3.1 Internet model.
Chapter 12 Local Area Networks
Ethernet and Token Ring LAN Networks
SYSTEM ADMINISTRATION Chapter 3
Presentation transcript:

Chabot College ELEC 99.05 Layer 2 - Highlights

Layer 1 Limitations No way to communicate with upper layers No addressing No logical grouping or organization of bits (framing) No method to control media access

Layer 2 Layer 2 solves these problems. 2

Data Link Sublayers LLC (Logical Link Control) MAC (Media Access Control) IEEE 802 Extension to the OSI Model

The IEEE Working Groups 802.1 Networking Overview and Architecture 802.2 Logical Link Control 802.3 Ethernet 802.4 Token Bus 802.5 Token Ring 802.6 MANs 802.7 Broadband 802.8 Fiber Optic 802.9 Isochronous LAN ...and more!

OSI v IEEE

Logical Link Control (LLC) Defined by a committee named 802.2 Is technology independent Is not used by all networks What is it?

Logical Link Control Provides independence to the protocols running in the upper and lower layers. The LLC acts as a managing buffer between the “executive” upper layers and the “shipping department” lower layers. Communicates up and down.

802.2 LLC IPX IP LLC 10BaseT Ethernet Layer 3 Layer 2 - LLC APPLE-TALK Layer 3 LLC Layer 2 - LLC Layer 2- MAC &Layer 1 10BaseT Ethernet

802.2 LLC IP LLC Layer 3 Layer 2 - LLC Layer 2- MAC &Layer 1 Ethernet Token Ring FDDI

Media Access Control (MAC) Responsible for the actual framing builds the 1s and 0s to hand off to the physical layer. Responsible for media access: Contention Token Passing Polling

The MAC Address

MAC Addresses Are Flat

Framing A message is “framed” at layer two. Framing provides order, or structure, to the bitstream.

Frame Format

FCS – Frame Checksum Used to insure that the data has arrived without corruption. More efficient than sending the data twice and comparing the results. Necessary to prevent errors.

Media Access Control Media Access Control methods can be divided into two flavors: Deterministic Non-deterministic

Deterministic Media Access aka “Taking Turns” example: Token Passing used in Token Ring No collisions

Non-Deterministic “First Come, First Served” Example: CSMA/CD used in Ethernet Carrier Sense Multiple Access with Collision Detection

Layer 2 Technologies Three common layer 2 technologies: Ethernet: non-deterministic Token Ring: deterministic FDDI: deterministic