ccna routing and_switching_chapter-4-5
TRANSCRIPT
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1
Chapter 4:Network Access
Chapter 5:Ethernet
Introduction to Networks
Mohammad Mamun Elahi
Assistant Professor, Department of CSE
Instructor, UIU Cisco Networking Academy
Presentation_ID 2© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 4: Objectives
Students will be able to:
Explain how physical layer protocols and services support communications across data networks.
Build a simple network using the appropriate.
Explain the role of the data link layer in supporting communications across data networks.
Compare media access control techniques and logical topologies used in networks.
Presentation_ID 3© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Purpose of the Physical Layer
The Physical Layer
Presentation_ID 4© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Purpose of the Physical Layer
Physical Layer Media
Presentation_ID 5© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Fundamental Principles of Layer 1
Physical Layer Fundamental Principles
MediaPhysical
Components
Frame Encoding
Technique
Signalling
Method
Copper
cable
• UTP
• Coaxial
• Connectors
• NICs
• Ports
• Interfaces
• Manchester Encoding
• Non-Return to Zero (NRZ)
techniques
• 4B/5B codes are used with
Multi-Level Transition Level 3
(MLT-3) signaling
• 8B/10B
• PAM5
• Changes in the
electromagnetic field
• Intensity of the
electromagnetic field
• Phase of the
electromagnetic wave
Fiber Optic
cable
• Single-mode Fiber
• Multimode Fiber
• Connectors
• NICs
• Interfaces
• Lasers and LEDs
• Photoreceptors
• Pulses of light
• Wavelength multiplexing using
different colors
• A pulse equals 1.
• No pulse is 0.
Wireless
media
• Access Points
• NICs
• Radio
• Antennae
• DSSS (direct-sequence spread-
spectrum)
• OFDM (orthogonal frequency
division multiplexing)
• Radio waves
Presentation_ID 6© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Fundamental Principles of Layer 1
Bandwidth
Presentation_ID 7© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Fundamental Principles of Layer 1
Throughput
Presentation_ID 8© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Copper Cabling
Copper Media
Shielded Twisted Pair (STP) cableUnshielded Twisted Pair (UTP) cable
Coaxial cable
Presentation_ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Copper Cabling
Unshielded Twisted-Pair (UTP) Cable
Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Copper Cabling
Shielded Twisted-Pair (STP) Cable
Foil Shields
Braided or Foil Shield
Presentation_ID 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Copper Cabling
Coaxial Cable
Presentation_ID 12© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
UTP Cabling
UTP Cabling Standards
Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
UTP Cabling
UTP Connectors
Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
UTP Cabling
Types of UTP Cable
Presentation_ID 15© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Fiber Optic Cabling
Fiber Media Cable Design
Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Fiber Optic Cabling
Types of Fiber Media
Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Fiber Optic Cabling
Fiber versus Copper
Implementation issues Copper media Fibre-optic
Bandwidth supported 10 Mbps – 10 Gbps 10 Mbps – 100 Gbps
DistanceRelatively short
(1 – 100 meters)
Relatively High
(1 – 100,000 meters)
Immunity to EMI and RFI LowHigh
(Completely immune)
Immunity to electrical hazards LowHigh
(Completely immune)
Media and connector costs Lowest Highest
Installation skills required Lowest Highest
Safety precautions Lowest Highest
Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
• IEEE 802.11 standards
• Commonly referred to as Wi-Fi.
• Uses CSMA/CA
• Variations include:• 802.11a: 54 Mbps, 5 GHz
• 802.11b: 11 Mbps, 2.4 GHz
• 802.11g: 54 Mbps, 2.4 GHz
• 802.11n: 600 Mbps, 2.4 and 5 GHz
• 802.11ac: 1 Gbps, 5 GHz
• 802.11ad: 7 Gbps, 2.4 GHz, 5 GHz, and 60 GHz
• IEEE 802.15 standard
• Supports speeds up to 3 Mbps
• Provides device pairing over distances from 1 to
100 meters.
• IEEE 802.16 standard
• Provides speeds up to 1 Gbps
• Uses a point-to-multipoint topology to provide
wireless broadband access.
Wireless Media
Types of Wireless Media
Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Wireless Media
802.11 Wi-Fi Standards
StandardMaximum
SpeedFrequency
Backwards
compatible
802.11a 54 Mbps 5 GHz No
802.11b 11 Mbps 2.4 GHz No
802.11g 54 Mbps 2.4 GHz 802.11b
802.11n 600 Mbps 2.4 GHz or 5 GHz 802.11b/g
802.11ac1.3 Gbps
(1300 Mbps)
2.4 GHz and 5.5
GHz 802.11b/g/n
802.11ad7 Gbps
(7000 Mbps)
2.4 GHz, 5 GHz and
60 GHz 802.11b/g/n/ac
Presentation_ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Purpose of the Data Link Layer
The Data Link Layer
Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Purpose of the Data Link Layer
Data Link Sublayers
Network
Data Link
LLC Sublayer
MAC Sublayer
Physical
80
2.3
E
the
rne
t
80
2.1
1W
i-F
i
80
2.1
5B
lue
too
th
Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Purpose of the Data Link Layer
Media Access Control
Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Purpose of the Data Link Layer
Providing Access to Media
Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Data Link Layer
Layer 2 Frame Structure
Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Topologies
Controlling Access to the Media
Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Topologies
Physical and Logical Topologies
Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
WAN Topologies
Common Physical WAN Topologies
Presentation_ID 28© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
WAN Topologies
Physical Point-to-Point Topology
Presentation_ID 29© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
WAN Topologies
Logical Point-to-Point Topology
Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
WAN Topologies
Half and Full Duplex
Presentation_ID 31© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
LAN Topologies
Physical LAN Topologies
Presentation_ID 32© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
LAN Topologies
Logical Topology for Shared Media
Presentation_ID 33© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
LAN Topologies
Contention-Based Access
Characteristics Contention-Based Technologies
• Stations can transmit at any time
• Collision exist
• There are mechanisms to resolve
contention for the media
• CSMA/CD for 802.3 Ethernet networks
• CSMA/CA for 802.11 wireless networks
Presentation_ID 34© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
LAN Topologies
Controlled Access
Characteristics Controlled Access Technologies
• Only one station can transmit at a time
• Devices wishing to transmit must wait
their turn
• No collisions
• May use a token passing method
• Token Ring (IEEE 802.5)
• Fiber Distributed Data Interface (FDDI)
Presentation_ID 35© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Data Link Frame
The Frame
Presentation_ID 36© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Data Link Frame
Layer 2 Address
Presentation_ID 37© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 5 : Objectives
In this chapter, you will learn to:
Describe the operation of the Ethernet sublayers.
Identify the major fields of the Ethernet frame.
Describe the purpose and characteristics of the Ethernet MAC address.
Describe the purpose of ARP.
Explain how ARP requests impact network and host performance.
Explain basic switching concepts.
Compare fixed configuration and modular switches.
Configure a Layer 3 switch.
Presentation_ID 38© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Ethernet Operation
LLC and MAC Sublayers
Ethernet –
• Most widely used LAN technology
• Operates in the data link layer and the physical layer
• Family of networking technologies that are defined in the IEEE 802.2 and 802.3 standards
• Supports data bandwidths of 10, 100, 1000, 10,000, 40,000, and 100,000 Mbps (100 Gbps)
Ethernet standards –
• Define Layer 2 protocols and Layer 1 technologies
• Two separate sub layers of the data link layer to operate - Logical link control (LLC) and the MAC sublayers
Presentation_ID 39© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Ethernet Operation
LLC and MAC Sublayers
Presentation_ID 40© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Ethernet Operation
LLC and MAC Sublayers
LLC
• Handles communication between upper and lower layers
• Takes the network protocol data and adds control information to help deliver the packet to the destination
MAC
• Constitutes the lower sublayer of the data link layer
• Implemented by hardware, typically in the computer NIC
• Two primary responsibilities:
• Data encapsulation
• Media access control
Presentation_ID 41© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Ethernet Operation
MAC Sublayer
Data encapsulation
• Frame assembly before transmission and frame disassembly upon reception of a frame
• MAC layer adds a header and trailer to the network layer PDU
Provides three primary functions:
• Frame delimiting – identifies a group of bits that make up a frame, synchronization between the transmitting and receiving nodes
• Addressing – each Ethernet header added in the frame contains the physical address (MAC address) that enables a frame to be delivered to a destination node
• Error detection - each Ethernet frame contains a trailer with a cyclic redundancy check (CRC) of the frame contents
Presentation_ID 42© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Ethernet Operation
MAC Sublayer
Media Access Control
• Responsible for the placement of frames on the media and the removal of frames from the media
• Communicates directly with the physical layer
• If multiple devices on a single medium attempt to forward data simultaneously, the data will collide resulting in corrupted, unusable data
• Ethernet provides a method for controlling how the nodes share access through the use a Carrier Sense Multiple Access (CSMA) technology
Presentation_ID 43© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Ethernet Operation
Media Access Control
Carrier Sense Multiple Access (CSMA) process
• Used to first detect if the media is carrying a signal
• If no carrier signal is detected, the device transmits its data
• If two devices transmit at the same time - data collision
Presentation_ID 44© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Ethernet Operation
Media Access Control
Presentation_ID 45© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Ethernet Operation
MAC Address: Ethernet Identity
• Layer 2 Ethernet MAC address is a 48-bit binary value expressed as 12 hexadecimal digits
IEEE requires a vendor to follow two simple rules:• Must use that vendor's assigned OUI as the first 3 bytes• All MAC addresses with the same OUI must be assigned a unique
value in the last 3 bytes
Presentation_ID 46© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Ethernet Operation
Frame Processing
MAC addresses assigned to workstations, servers, printers, switches, and routers
Example MACs: 00-05-9A-3C-78-00, 00:05:9A:3C:78:00, or 0005.9A3C.7800.
Forwarded message to an Ethernet network, attaches header information to the packet, contains the source and destination MAC address
Each NIC views information to see if the destination MAC address in the frame matches the device’s physical MAC address stored in RAM
No match, the device discards the frame
Matches the destination MAC of the frame, the NIC passes the frame up the OSI layers, where the decapsulation process takes place
Presentation_ID 47© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Ethernet Frame Attributes
Introduction to the Ethernet Frame
Preamble and Start Frame Delimiter FieldsUsed for synchronization between the sending and receiving devices
Length/Type FieldDefines the exact length of the frame's data field/ describes which protocol is implemented
Data and Pad FieldsContain the encapsulated data from a higher layer, an IPv4 packet
Presentation_ID 48© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Ethernet Frame Attributes
Introduction to the Ethernet Frame
Frame Check Sequence FieldUsed to detect errors in a frame with cyclic redundancy check (4 bytes), if calculations match at source and receiver, no error occurred.
Presentation_ID 49© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Ethernet MAC
MAC Address Representations
Presentation_ID 50© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Ethernet MAC
Unicast MAC Address
Presentation_ID 51© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Ethernet MAC
Broadcast MAC Address
Presentation_ID 52© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Ethernet MAC
Multicast MAC Address
Multicast MAC address is a special value that begins with
01-00-5E in hexadecimal
Range of IPV4 multicast addresses is 224.0.0.0 to 239.255.255.255
Presentation_ID 53© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
MAC and IP
MAC and IP
MAC address
This address does not change
Similar to the name of a person
Known as physical address because physically assigned to the host NIC
IP address
Similar to the address of a person
Based on where the host is actually located
Known as a logical address because assigned logically
Assigned to each host by a network administrator
Both the physical MAC and logical IP addresses are required for a computer to communicate just like both the name and address of a person are required to send a letter
Presentation_ID 54© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Ethernet MAC
End-to-End Connectivity, MAC, and IP
Presentation_ID 55© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Ethernet MAC
End-to-End Connectivity, MAC, and IP
Presentation_ID 56© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
ARP
Introduction to ARP
ARP Purpose
Sending node needs a way to find the MAC address of the destination for a given Ethernet link
The ARP protocol provides two basic functions:
Resolving IPv4 addresses to MAC addresses
Maintaining a table of mappings
Presentation_ID 57© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
ARP
Introduction to ARP
Presentation_ID 58© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
ARP
ARP Functions/Operation
Presentation_ID 59© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
ARP
ARP Functions/Operation
Presentation_ID 60© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
ARP
ARP Functions/Operation
Presentation_ID 61© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
ARP
ARP Functions/Operation
Presentation_ID 62© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
ARP
ARP Functions/Operation
Presentation_ID 63© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
ARP
ARP Functions/Operation
Presentation_ID 64© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
ARP
ARP Tables on Networking Devices
Presentation_ID 65© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Switching
Switch Port Fundamentals
Layer 2 LAN switch
Connects end devices to a central intermediate device on most Ethernet networks
Performs switching and filtering based only on the MAC address
Builds a MAC address table that it uses to make forwarding decisions
Depends on routers to pass data between IP subnetworks
Presentation_ID 66© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Switching
Switch MAC Address Table
1. The switch receives a broadcast frame from PC 1 on Port 1.2. The switch enters the source MAC address and the switch
port that received the frame into the address table.3. Because the destination address is a broadcast, the switch
floods the frame to all ports, except the port on which it received the frame.
4. The destination device replies to the broadcast with a unicast frame addressed to PC 1.
Continued…
Presentation_ID 67© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Switching
Switch MAC Address Table
5. The switch enters the source MAC address of PC 2 and the port number of the switch port that received the frame into the address table. The destination address of the frame and its associated port is found in the MAC address table.
6. The switch can now forward frames between source and destination devices without flooding, because it has entries in the address table that identify the associated ports.
Presentation_ID 68© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Switching
Duplex Settings
Presentation_ID 69© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Switching
Frame Forwarding Methods on Cisco Switches
Presentation_ID 70© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Switching
Cut-through SwitchingTwo variants:
Fast-forward switching: • Lowest level of latency
immediately forwards a packet after reading the destination address, typical cut-through method of switching
Fragment-free switching: • Switch stores the first
64 bytes of the frame before forwarding, most network errors and collisions occur during the first 64 bytes
Presentation_ID 71© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Switching
Memory Buffering on Switches
Presentation_ID 72© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Fixed or Modular
Fixed verses Modular Configuration
Presentation_ID 73© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Fixed or Modular
Fixed verses Modular Configuration
Presentation_ID 74© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Layer 3 Switching
Layer 2 verses Layer 3 Switching
Presentation_ID 75© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential