Chapter 7 – Layer 2 Technologies Token Ring FDDI Ethernet and IEEE 802.3 Layer 2 Devices Data Flow Ethernet: 10BASE-T Troubleshooting By: Stacy Olson –

Slides:



Advertisements
Similar presentations
Network Devices Repeaters, hubs, bridges, switches, routers, NICs.
Advertisements

CCNA3: Switching Basics and Intermediate Routing v3.0 CISCO NETWORKING ACADEMY PROGRAM Switching Concepts Introduction to Ethernet/802.3 LANs Introduction.
1 Version 3 Module 8 Ethernet Switching. 2 Version 3 Ethernet Switching Ethernet is a shared media –One node can transmit data at a time More nodes increases.
1 Version 3.0 Module 6 Ethernet Fundamentals. 2 Version 3.0 Why is Ethernet so Successful? In 1973, it could carry data at 3 Mbps Now, it can carry data.
1 I.S Introduction to Telecommunication in Business Chapter 6 Network Hardware Components Dr. Jan Clark FALL, 2002.
CCNA 1 v3.1 Module 6 Review. 2 What 3 things happen on an Ethernet network after a collision occurs? A backoff algorithm is invoked and transmission is.
1 Version 3 Module 8 Ethernet Switching. 2 Version 3 Ethernet Switching Ethernet is a shared media –One node can transmit data at a time More nodes increases.
TDC 461 Basic Communications Systems Local Area Networks 29 May, 2001.
EECC694 - Shaaban #1 lec #6 Spring Point-to-Point Vs. Shared Channel Communication In LANs Point-to-point: –Computers connected by communication.
Review on Networking Technologies Linda Wu (CMPT )
Understanding Network Architecture Access Methods –CSMA/CD Carrier Sense Multiple Access/Collision Detect –CSMA/CA Carrier Sense Multiple Access/Collision.
Chapter 2 Review of Computer Network Technology
Local Area Network local area network (LAN) is a computer network that is designed for a limited geographic area such as a building or a campus. Although.
Connecting LANs, Backbone Networks, and Virtual LANs
Chapter Five Network Architecture. Chapter Objectives  Describe the basic and hybrid LAN technologies  Describe a variety of enterprise-wide and WAN.
Chapter 2 Network Design Essentials Instructor: Nhan Nguyen Phuong.
SIMS-201 Computer Networks. 2 Introduction to Computer Networks Chapter 19 The Local Area Network  Overview.
20 LAN Hardware Overview Version A.01 H3065S Module 2 Slides.
Packet Transmission (Part III) Local Area Networks (LANs)
Layer 2: Technologies Chapter 7
Layer 2 Technology Andres, Wen-Yuan Liao Department of Computer Science and Engineering De Lin Institute of Technology
Connectivity Devices Hakim S. ADICHE, MSc
Network Technologies Chapter 2. Approaches to Network Communication Connection-Oriented –Circuit-switched –A dedicated connection (circuit) is formed.
S3C2 – LAN Switching Addressing LAN Problems. Congestion is Caused By Multitasking, Faster operating systems, More Web-based applications Client-Server.
P.1 C.C.Chau Chapter 7 Layer 2 - Technologies. P.2 C.C.Chau Lecture Objective (Week 8) After finishing the lecture, student should be able to: – Describe.
Jaringan Komputer Dasar Ethernet Aurelio Rahmadian.
1 Ethernet & IEEE Cisco Section 7.3 Stephanie Hutter October 2000.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 14 Local Area Networks: Ethernet.
Ethernet Fundamentals. The success of Ethernet is due to the following factors: Simplicity and ease of maintenance Ability to incorporate new technologies.
Module 8: Ethernet Switching
CCNA 3 Week 4 Switching Concepts. Copyright © 2005 University of Bolton Introduction Lan design has moved away from using shared media, hubs and repeaters.
Version 4.0 Ethernet Network Fundamentals – Chapter 9 Sandra Coleman, CCNA, CCAI.
Cisco 3 - Switching Perrine. J Page 16/4/2016 Chapter 4 Switches The performance of shared-medium Ethernet is affected by several factors: data frame broadcast.
Fiber Distributed Data Interface. The Fiber Distributed Data Interface (FDDI) specifies a 100-Mbps token-passing, dual-ring LAN using fiber-optic cable.
Institute of Technology Sligo - Dept of Computing Ethernet Operation CSMA/CD shared access method. 2.Destination node sends data up OSI layers.
Sem1 - Module 8 Ethernet Switching. Shared media environments Shared media environment: –Occurs when multiple hosts have access to the same medium. –For.
Semester 1 Chapter6 + Chapter7 Layer 2 Data Link Layer Concepts And Technologies.
Chapter 11 Extending LANs 1. Distance limitations of LANs 2. Connecting multiple LANs together 3. Repeaters 4. Bridges 5. Filtering frame 6. Bridged network.
CCNA Guide to Cisco Networking Chapter 2: Network Devices.
Star Topology Star Networks are one of the most common network topologies. consists of one central switch, hub or computer, which acts as a conduit to.
The Saigon CTT Semester 1 CHAPTER 7 Le Chi Trung.
1 Layer 2 Technologies Honolulu Community College Cisco Academy Training Center Semester 1 Version
Chapter 14 Local Area Networks
IEEE l IEEE has had the greatest impact on Layer 2 standards. l IEEE divided Layer 2 into two sublayers.
FDDI Network Security.
Unit 3 Physical Layer.
CCNA3 Module 4 Brierley Module 4. CCNA3 Module 4 Brierley Topics LAN congestion and its effect on network performance Advantages of LAN segmentation in.
CNAP AT VCC Semester 1 CHAPTER 7 Wael Yousif Connecting The Internet Generation.
Simple LAN Topologies  Terminators stop signals after they have reached their destination  Signal bounce –Phenomenon in which signals travel endlessly.
+ Lecture#2: Ethernet Asma ALOsaimi. + Objectives In this chapter, you will learn to: Describe the operation of the Ethernet sublayers. Identify the major.
Chapter Objectives After completing this chapter you will be able to: Describe in detail the following Local Area Network (LAN) technologies: Ethernet.
COMPUTER NETWORKS Lecture-8 Husnain Sherazi. Review Lecture 7  Shared Communication Channel  Locality of Reference Principle  LAN Topologies – Star.
Connectors, Repeaters, Hubs, Bridges, Switches, Routers, NIC’s
1 Kyung Hee University Chapter 13 Wired LANs: Ethernet.
Local Area Networks Honolulu Community College
Connecting Network Components
Networking Devices.
Ethernet and Token Ring LAN Networks
100BASE-TX: uses 2-pair UTP or STP that can handle 125 MHz signals and beyond. It uses a binary coding scheme called 4B5B, every 5 clock pulses are used.
Ethernet and Token Ring LAN Networks
Chapter 12 Local Area Networks
Data Link Issues Relates to Lab 2.
FDDI.
Physical and Logical Topologies
CS4470 Computer Networking Protocols
Chapter 12 Local Area Networks
Chapter 12 Local Area Networks
Connectors, Repeaters, Hubs, Bridges, Switches, Routers, NIC’s
Ethernet and Token Ring LAN Networks
Presentation transcript:

Chapter 7 – Layer 2 Technologies Token Ring FDDI Ethernet and IEEE Layer 2 Devices Data Flow Ethernet: 10BASE-T Troubleshooting By: Stacy Olson – With help from Stephanie Hutter’s Briefings

Chapter 7 – Layer 2 Technologies Token Ring –Developed by IBM – still used today –Two frames: Token –Start Delimiter –Access Control Byte »Priority and Reservation Fields »Token and Monitor bits –End Delimiter

Chapter 7 – Layer 2 Technologies Data/Command Frame

Chapter 7 – Layer 2 Technologies Token Ring Token Passing –Station can only transmit if it has the token –Station passes token on if it has no data to transmit – Station can hold the token for a maximum amount of time

Chapter 7 – Layer 2 Technologies Token Ring Characteristic: –Deterministic = Taking Turns Maximum time to transmit is subject to exact calculation. Ideal for applications where predictability and dependability are paramount.

Chapter 7 – Layer 2 Technologies Token Ring Management Mechanisms –Active Monitor One station acts as centralized source of timing information for other stations Can be any station Removes continuously circulating frames

Chapter 7 – Layer 2 Technologies Token Ring Management Mechanisms –MSAU Multi Station Access Units Can see all information in a Token Ring Network Check for problems Selectively remove stations from the ring if needed

Chapter 7 – Layer 2 Technologies Token Ring Management Mechanisms –Beaconing Detects and repairs network faults Sends a beacon frame, defining a failure domain –Reporting station –Nearest Active Upstream Neighbor (NAUN) –Everything in between Initiates autoreconfiguration –Nodes within the failure domain automatically perform diagnostics –Attempt to reconfigure around the failure –MSAUs use electrical reconfiguration to accomplish this

Chapter 7 – Layer 2 Technologies Token Ring Signaling Uses Manchester Encoding –Combines data and clock into bit symbols, which are split into two halves, the polarity of the second half always being the reverse of the first half. –0 is high-to-low transition –1 is low-to-high transition

Chapter 7 – Layer 2 Technologies Token Ring Media and Physical Topologies –Logical ring topology –Physical star topology Stations are directly connected to MSAUs Patch cables connect MSAUs Lobe cables connect MSAUs to stations

Overview of FDDI Fiber distributed data interface –“Fiddee” Four specifications –Media Access control –Physical Layer Protocol –Physical Layer Medium –Station Management

Media Access Control MAC Defines how the medium is accessed –Frame format –Token handling –Addressing –Algorithm for calculating a cyclic redundancy check and error recovery mechanisms

Physical Layer Protocol PHY Defines data encoding/decoding procedures –Clocking requirements –Framing –Other functions

Physical Layer Medium Defines the characteristics of the transmission medium –Fiber optic link –Power levels –Bit error rates –Optical components –Connectors

Station Management Defines the FDDI station configuration –Ring configuration –Station insertion and removal –Initialization –Fault isolation and recovery –Scheduling –Collection of statistics

Preamble –Prepares each station for the upcoming frame Start delimiter Frame Control –Indicates the size of the address fields –Indicates whether frame contains asynchronous or synchronous data –Other control information

Destination address –6 bytes –Unicast: to one address –Multicast: to several addresses –Broadcast: to all addresses Source address Data Frame Check Sequence End Delimiter Frame Status

FDDI Token

FDDI MAC Token passing strategy Early token release –New token can be released when the frame transmission has finished Deterministic Dual ring –Ensures transmission, even if one ring is damaged or disabled –Very reliable Real-time allocation of bandwidth –Defines two types of traffic Synchronous Asynchronous

Synchronous Traffic Consumes only a portion of the bandwidth Asynchronous traffic can consume the rest Synchronous bandwidth is allocated to those stations requiring continuous transmission, e.g. voice/video FDDI SMT specification defines a distributed bidding scheme to allocate FDDI bandwidth

Asynchronous Traffic Bandwidth is allocated using an eight-level priority scheme –Each station is assigned an asynchronous priority level FDDI also permits extended dialogues –Stations may temporarily use all the asynchronous bandwidth FDDI priority mechanism can lock out stations that cannot use synchronous bandwidth, and have too low an asynchronous priority

FDDI Signaling Uses an encoding scheme called 4B/5B –Every four bits of data are sent as a 5 bit code Signal sources are LEDs or lasers

FDDI Media Optical fiber is being installed at a rate of 4000 miles per day in the United States Explosive growth worldwide

Advantages of Optical Fiber –Security Fiber does not emit electrical signals that can be tapped –Reliability Fiber is immune to electrical interference –Speed Optical fiber has much higher throughput potential than copper cable

Types of Optical Fiber Modes are bundles of light rays entering the fiber at particular angles Single-mode –Also known as mono-mode –Only one mode propagates through fiber –Higher bandwidth than multi-mode –Longer cable runs than multi-mode –Lasers generate light signals –Used for inter-building connectivity

Types of Optical Fiber Multi-mode –Multiple modes propagate through fiber –Different angles mean different distances to travel Transmissions arrive at different times Modal dispersion –LEDs as light source –Used for intra-building connectivity

FDDI Rings FDDI specifies dual rings for physical connections Traffic on each ring travels in opposite directions Rings consist of two or more point-to-point connections between adjacent stations Primary ring is for data transmission Secondary ring is for back up

Single-Attachment Stations –SAS –Class B –Attach to one ring (primary) –Attached through a concentrator Provides connection for multiple SASs Ensures that no one SAS can interrupt the ring

Dual Attachment Stations DAS Class A Attach to both rings Has two ports to connect to the dual ring –Both ports connect to both rings

Chapter 7 – Layer 2 Technologies Shortly after the 1980 IEEE specification, Digital Equipment Corporation (DEC), Intel Corporation, and Xerox Corporation jointly developed and released an Ethernet specification. Version 2.0, that was substantially compatible with IEEE Together, Ethernet and IEEE currently maintain the greatest market share of any LAN protocol.

Chapter 7 – Layer 2 Technologies Today, the term Ethernet is often used to refer to all carrier sense multiple access/collision detection (CSMA/CD) LAN’s that generally conform to Ethernet specifications, including IEEE

Chapter 7 – Layer 2 Technologies

Ethernet performs three functions: –Transmitting and receiving data packets –decoding data packets and checking them for valid addresses before passing them to the upper layers of the OSI model –detecting errors within data packets or on the network In the CSMA/CD access method, networking devices with data to transmit over the networking media work in a listen-before- transmit mode.

NICs Provides ports for network connection Communicate with network via serial connection Communication with computer through parallel connection Resources required: –IRQ, I/O address, upper memory addresses

Selection Factors for NICs Type of network –Ethernet, Token Ring, FDDI Type of media –Twisted pair, coax, fiber Type of system bus –PCI, ISA

NIC Operations Layer 1 & Layer 2 device Primarily Layer 2 –Communicates with upper layers in the computer Logical Link Control (LLC) –Has MAC address burned in –Encapsulates data into frames –Provides access to the media Also Layer 1 –Creates signals and interfaces with the media –On-board transceiver

Bridges Connects two network segments –Can connect different layer 2 protocols Ethernet, Token Ring, FDDI Makes intelligent decisions about traffic –Reduces unnecessary traffic –Minimizes collisions –Filters traffic based on MAC address Maintains address tables Rarely implemented today –Conceptually important

Bridge Operations Bridging occurs at the data link layer: –Controls data flow –Handles transmission errors –Provides physical addressing –Manages access to the physical medium

Bridge Operations Transparent to upper layers Best used in low traffic areas –Can cause bottlenecks Must examine every packet Broadcasts –Messages sent to all devices Destination MAC address unknown Bridge will always forward Can cause Broadcast Storm –Network time outs, traffic slowdowns, unacceptable performance

Switching Operation Microsegmentation –Each switch port acts as a micro bridge (Layer 2 device) –Multiple traffic paths within the switch –Virtual circuits –Temporarily exist - only when needed –Each data frame has a dedicated path No collisions Increases bandwidth availability –Each host gets full bandwidth

Advantages of Switches Much faster than bridges –Hardware based, not software Support new uses –e.g. virtual LANs Reduce collision domains

Advantages of Switches Allows many users to communicate in parallel –Creates virtual circuits –Creates dedicated segments Collision free Maximizes bandwidth Cost effective –Can simply replace hubs in same cable infrastructure Minimal disruption Flexible network management –Software based configuration

Broadcast Domains All hosts connected to the same switch are still in the same broadcast domain A broadcast from one node will be seen by all other nodes connected through the LAN switch

Chapter 7 – Layer 2 Technologies Two primary reasons for segmenting a LAN: –Isolate traffic between segments –Achieve more bandwidth per user by creating smaller collision domains

Chapter 7 – Layer 2 Technologies Bridge Drawback: –Bridges increase the latency (delay) in a network by 10-30% –A bridge is considered a store-and- forward device slowing network transmissions, thus causing delay.

Chapter 7 – Layer 2 Technologies It is important to note that even though 100% of the bandwidth may be available, Ethernet networks perform best when kept under 30-40% of full capacity. Bandwidth usage that exceeds the recommended limitation results in increased collisions.

Chapter 7 – Layer 2 Technologies The Router is a layer 3 (Network) device, but operates at layers 1-3. –Routers create the highest level of segmentation because of their ability to make exact determinations of where to send the data packet. –Because routers perform more functions than bridges, they operate with a higher rate of latency.

Chapter 7 – Layer 2 Technologies Identify Broadcast Domains and Collision Domains

Chapter 7 – Layer 2 Technologies