ccna routing and_switching_chapter-4-5

75
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID 1 Chapter 4:Network Access Chapter 5:Ethernet Introduction to Networks Mohammad Mamun Elahi Assistant Professor, Department of CSE Instructor, UIU Cisco Networking Academy

Upload: united-international-university

Post on 22-Jan-2018

107 views

Category:

Engineering


1 download

TRANSCRIPT

Page 1: Ccna routing and_switching_chapter-4-5

© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1

Chapter 4:Network Access

Chapter 5:Ethernet

Introduction to Networks

Mohammad Mamun Elahi

Assistant Professor, Department of CSE

Instructor, UIU Cisco Networking Academy

Page 2: Ccna routing and_switching_chapter-4-5

Presentation_ID 2© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Chapter 4: Objectives

Students will be able to:

Explain how physical layer protocols and services support communications across data networks.

Build a simple network using the appropriate.

Explain the role of the data link layer in supporting communications across data networks.

Compare media access control techniques and logical topologies used in networks.

Page 3: Ccna routing and_switching_chapter-4-5

Presentation_ID 3© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Purpose of the Physical Layer

The Physical Layer

Page 4: Ccna routing and_switching_chapter-4-5

Presentation_ID 4© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Purpose of the Physical Layer

Physical Layer Media

Page 5: Ccna routing and_switching_chapter-4-5

Presentation_ID 5© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Fundamental Principles of Layer 1

Physical Layer Fundamental Principles

MediaPhysical

Components

Frame Encoding

Technique

Signalling

Method

Copper

cable

• UTP

• Coaxial

• Connectors

• NICs

• Ports

• Interfaces

• Manchester Encoding

• Non-Return to Zero (NRZ)

techniques

• 4B/5B codes are used with

Multi-Level Transition Level 3

(MLT-3) signaling

• 8B/10B

• PAM5

• Changes in the

electromagnetic field

• Intensity of the

electromagnetic field

• Phase of the

electromagnetic wave

Fiber Optic

cable

• Single-mode Fiber

• Multimode Fiber

• Connectors

• NICs

• Interfaces

• Lasers and LEDs

• Photoreceptors

• Pulses of light

• Wavelength multiplexing using

different colors

• A pulse equals 1.

• No pulse is 0.

Wireless

media

• Access Points

• NICs

• Radio

• Antennae

• DSSS (direct-sequence spread-

spectrum)

• OFDM (orthogonal frequency

division multiplexing)

• Radio waves

Page 6: Ccna routing and_switching_chapter-4-5

Presentation_ID 6© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Fundamental Principles of Layer 1

Bandwidth

Page 7: Ccna routing and_switching_chapter-4-5

Presentation_ID 7© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Fundamental Principles of Layer 1

Throughput

Page 9: Ccna routing and_switching_chapter-4-5

Presentation_ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Copper Cabling

Unshielded Twisted-Pair (UTP) Cable

Page 10: Ccna routing and_switching_chapter-4-5

Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Copper Cabling

Shielded Twisted-Pair (STP) Cable

Foil Shields

Braided or Foil Shield

Page 11: Ccna routing and_switching_chapter-4-5

Presentation_ID 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Copper Cabling

Coaxial Cable

Page 12: Ccna routing and_switching_chapter-4-5

Presentation_ID 12© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

UTP Cabling

UTP Cabling Standards

Page 13: Ccna routing and_switching_chapter-4-5

Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

UTP Cabling

UTP Connectors

Page 14: Ccna routing and_switching_chapter-4-5

Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

UTP Cabling

Types of UTP Cable

Page 15: Ccna routing and_switching_chapter-4-5

Presentation_ID 15© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Fiber Optic Cabling

Fiber Media Cable Design

Page 16: Ccna routing and_switching_chapter-4-5

Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Fiber Optic Cabling

Types of Fiber Media

Page 17: Ccna routing and_switching_chapter-4-5

Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Fiber Optic Cabling

Fiber versus Copper

Implementation issues Copper media Fibre-optic

Bandwidth supported 10 Mbps – 10 Gbps 10 Mbps – 100 Gbps

DistanceRelatively short

(1 – 100 meters)

Relatively High

(1 – 100,000 meters)

Immunity to EMI and RFI LowHigh

(Completely immune)

Immunity to electrical hazards LowHigh

(Completely immune)

Media and connector costs Lowest Highest

Installation skills required Lowest Highest

Safety precautions Lowest Highest

Page 18: Ccna routing and_switching_chapter-4-5

Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

• IEEE 802.11 standards

• Commonly referred to as Wi-Fi.

• Uses CSMA/CA

• Variations include:• 802.11a: 54 Mbps, 5 GHz

• 802.11b: 11 Mbps, 2.4 GHz

• 802.11g: 54 Mbps, 2.4 GHz

• 802.11n: 600 Mbps, 2.4 and 5 GHz

• 802.11ac: 1 Gbps, 5 GHz

• 802.11ad: 7 Gbps, 2.4 GHz, 5 GHz, and 60 GHz

• IEEE 802.15 standard

• Supports speeds up to 3 Mbps

• Provides device pairing over distances from 1 to

100 meters.

• IEEE 802.16 standard

• Provides speeds up to 1 Gbps

• Uses a point-to-multipoint topology to provide

wireless broadband access.

Wireless Media

Types of Wireless Media

Page 19: Ccna routing and_switching_chapter-4-5

Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Wireless Media

802.11 Wi-Fi Standards

StandardMaximum

SpeedFrequency

Backwards

compatible

802.11a 54 Mbps 5 GHz No

802.11b 11 Mbps 2.4 GHz No

802.11g 54 Mbps 2.4 GHz 802.11b

802.11n 600 Mbps 2.4 GHz or 5 GHz 802.11b/g

802.11ac1.3 Gbps

(1300 Mbps)

2.4 GHz and 5.5

GHz 802.11b/g/n

802.11ad7 Gbps

(7000 Mbps)

2.4 GHz, 5 GHz and

60 GHz 802.11b/g/n/ac

Page 20: Ccna routing and_switching_chapter-4-5

Presentation_ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Purpose of the Data Link Layer

The Data Link Layer

Page 21: Ccna routing and_switching_chapter-4-5

Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Purpose of the Data Link Layer

Data Link Sublayers

Network

Data Link

LLC Sublayer

MAC Sublayer

Physical

80

2.3

E

the

rne

t

80

2.1

1W

i-F

i

80

2.1

5B

lue

too

th

Page 22: Ccna routing and_switching_chapter-4-5

Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Purpose of the Data Link Layer

Media Access Control

Page 23: Ccna routing and_switching_chapter-4-5

Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Purpose of the Data Link Layer

Providing Access to Media

Page 24: Ccna routing and_switching_chapter-4-5

Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Data Link Layer

Layer 2 Frame Structure

Page 25: Ccna routing and_switching_chapter-4-5

Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Topologies

Controlling Access to the Media

Page 26: Ccna routing and_switching_chapter-4-5

Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Topologies

Physical and Logical Topologies

Page 27: Ccna routing and_switching_chapter-4-5

Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

WAN Topologies

Common Physical WAN Topologies

Page 28: Ccna routing and_switching_chapter-4-5

Presentation_ID 28© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

WAN Topologies

Physical Point-to-Point Topology

Page 29: Ccna routing and_switching_chapter-4-5

Presentation_ID 29© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

WAN Topologies

Logical Point-to-Point Topology

Page 30: Ccna routing and_switching_chapter-4-5

Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

WAN Topologies

Half and Full Duplex

Page 31: Ccna routing and_switching_chapter-4-5

Presentation_ID 31© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

LAN Topologies

Physical LAN Topologies

Page 32: Ccna routing and_switching_chapter-4-5

Presentation_ID 32© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

LAN Topologies

Logical Topology for Shared Media

Page 33: Ccna routing and_switching_chapter-4-5

Presentation_ID 33© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

LAN Topologies

Contention-Based Access

Characteristics Contention-Based Technologies

• Stations can transmit at any time

• Collision exist

• There are mechanisms to resolve

contention for the media

• CSMA/CD for 802.3 Ethernet networks

• CSMA/CA for 802.11 wireless networks

Page 34: Ccna routing and_switching_chapter-4-5

Presentation_ID 34© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

LAN Topologies

Controlled Access

Characteristics Controlled Access Technologies

• Only one station can transmit at a time

• Devices wishing to transmit must wait

their turn

• No collisions

• May use a token passing method

• Token Ring (IEEE 802.5)

• Fiber Distributed Data Interface (FDDI)

Page 35: Ccna routing and_switching_chapter-4-5

Presentation_ID 35© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Data Link Frame

The Frame

Page 36: Ccna routing and_switching_chapter-4-5

Presentation_ID 36© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Data Link Frame

Layer 2 Address

Page 37: Ccna routing and_switching_chapter-4-5

Presentation_ID 37© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Chapter 5 : Objectives

In this chapter, you will learn to:

Describe the operation of the Ethernet sublayers.

Identify the major fields of the Ethernet frame.

Describe the purpose and characteristics of the Ethernet MAC address.

Describe the purpose of ARP.

Explain how ARP requests impact network and host performance.

Explain basic switching concepts.

Compare fixed configuration and modular switches.

Configure a Layer 3 switch.

Page 38: Ccna routing and_switching_chapter-4-5

Presentation_ID 38© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Ethernet Operation

LLC and MAC Sublayers

Ethernet –

• Most widely used LAN technology

• Operates in the data link layer and the physical layer

• Family of networking technologies that are defined in the IEEE 802.2 and 802.3 standards

• Supports data bandwidths of 10, 100, 1000, 10,000, 40,000, and 100,000 Mbps (100 Gbps)

Ethernet standards –

• Define Layer 2 protocols and Layer 1 technologies

• Two separate sub layers of the data link layer to operate - Logical link control (LLC) and the MAC sublayers

Page 39: Ccna routing and_switching_chapter-4-5

Presentation_ID 39© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Ethernet Operation

LLC and MAC Sublayers

Page 40: Ccna routing and_switching_chapter-4-5

Presentation_ID 40© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Ethernet Operation

LLC and MAC Sublayers

LLC

• Handles communication between upper and lower layers

• Takes the network protocol data and adds control information to help deliver the packet to the destination

MAC

• Constitutes the lower sublayer of the data link layer

• Implemented by hardware, typically in the computer NIC

• Two primary responsibilities:

• Data encapsulation

• Media access control

Page 41: Ccna routing and_switching_chapter-4-5

Presentation_ID 41© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Ethernet Operation

MAC Sublayer

Data encapsulation

• Frame assembly before transmission and frame disassembly upon reception of a frame

• MAC layer adds a header and trailer to the network layer PDU

Provides three primary functions:

• Frame delimiting – identifies a group of bits that make up a frame, synchronization between the transmitting and receiving nodes

• Addressing – each Ethernet header added in the frame contains the physical address (MAC address) that enables a frame to be delivered to a destination node

• Error detection - each Ethernet frame contains a trailer with a cyclic redundancy check (CRC) of the frame contents

Page 42: Ccna routing and_switching_chapter-4-5

Presentation_ID 42© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Ethernet Operation

MAC Sublayer

Media Access Control

• Responsible for the placement of frames on the media and the removal of frames from the media

• Communicates directly with the physical layer

• If multiple devices on a single medium attempt to forward data simultaneously, the data will collide resulting in corrupted, unusable data

• Ethernet provides a method for controlling how the nodes share access through the use a Carrier Sense Multiple Access (CSMA) technology

Page 43: Ccna routing and_switching_chapter-4-5

Presentation_ID 43© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Ethernet Operation

Media Access Control

Carrier Sense Multiple Access (CSMA) process

• Used to first detect if the media is carrying a signal

• If no carrier signal is detected, the device transmits its data

• If two devices transmit at the same time - data collision

Page 44: Ccna routing and_switching_chapter-4-5

Presentation_ID 44© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Ethernet Operation

Media Access Control

Page 45: Ccna routing and_switching_chapter-4-5

Presentation_ID 45© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Ethernet Operation

MAC Address: Ethernet Identity

• Layer 2 Ethernet MAC address is a 48-bit binary value expressed as 12 hexadecimal digits

IEEE requires a vendor to follow two simple rules:• Must use that vendor's assigned OUI as the first 3 bytes• All MAC addresses with the same OUI must be assigned a unique

value in the last 3 bytes

Page 46: Ccna routing and_switching_chapter-4-5

Presentation_ID 46© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Ethernet Operation

Frame Processing

MAC addresses assigned to workstations, servers, printers, switches, and routers

Example MACs: 00-05-9A-3C-78-00, 00:05:9A:3C:78:00, or 0005.9A3C.7800.

Forwarded message to an Ethernet network, attaches header information to the packet, contains the source and destination MAC address

Each NIC views information to see if the destination MAC address in the frame matches the device’s physical MAC address stored in RAM

No match, the device discards the frame

Matches the destination MAC of the frame, the NIC passes the frame up the OSI layers, where the decapsulation process takes place

Page 47: Ccna routing and_switching_chapter-4-5

Presentation_ID 47© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Ethernet Frame Attributes

Introduction to the Ethernet Frame

Preamble and Start Frame Delimiter FieldsUsed for synchronization between the sending and receiving devices

Length/Type FieldDefines the exact length of the frame's data field/ describes which protocol is implemented

Data and Pad FieldsContain the encapsulated data from a higher layer, an IPv4 packet

Page 48: Ccna routing and_switching_chapter-4-5

Presentation_ID 48© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Ethernet Frame Attributes

Introduction to the Ethernet Frame

Frame Check Sequence FieldUsed to detect errors in a frame with cyclic redundancy check (4 bytes), if calculations match at source and receiver, no error occurred.

Page 49: Ccna routing and_switching_chapter-4-5

Presentation_ID 49© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Ethernet MAC

MAC Address Representations

Page 50: Ccna routing and_switching_chapter-4-5

Presentation_ID 50© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Ethernet MAC

Unicast MAC Address

Page 51: Ccna routing and_switching_chapter-4-5

Presentation_ID 51© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Ethernet MAC

Broadcast MAC Address

Page 52: Ccna routing and_switching_chapter-4-5

Presentation_ID 52© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Ethernet MAC

Multicast MAC Address

Multicast MAC address is a special value that begins with

01-00-5E in hexadecimal

Range of IPV4 multicast addresses is 224.0.0.0 to 239.255.255.255

Page 53: Ccna routing and_switching_chapter-4-5

Presentation_ID 53© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

MAC and IP

MAC and IP

MAC address

This address does not change

Similar to the name of a person

Known as physical address because physically assigned to the host NIC

IP address

Similar to the address of a person

Based on where the host is actually located

Known as a logical address because assigned logically

Assigned to each host by a network administrator

Both the physical MAC and logical IP addresses are required for a computer to communicate just like both the name and address of a person are required to send a letter

Page 54: Ccna routing and_switching_chapter-4-5

Presentation_ID 54© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Ethernet MAC

End-to-End Connectivity, MAC, and IP

Page 55: Ccna routing and_switching_chapter-4-5

Presentation_ID 55© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Ethernet MAC

End-to-End Connectivity, MAC, and IP

Page 56: Ccna routing and_switching_chapter-4-5

Presentation_ID 56© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

ARP

Introduction to ARP

ARP Purpose

Sending node needs a way to find the MAC address of the destination for a given Ethernet link

The ARP protocol provides two basic functions:

Resolving IPv4 addresses to MAC addresses

Maintaining a table of mappings

Page 57: Ccna routing and_switching_chapter-4-5

Presentation_ID 57© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

ARP

Introduction to ARP

Page 58: Ccna routing and_switching_chapter-4-5

Presentation_ID 58© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

ARP

ARP Functions/Operation

Page 59: Ccna routing and_switching_chapter-4-5

Presentation_ID 59© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

ARP

ARP Functions/Operation

Page 60: Ccna routing and_switching_chapter-4-5

Presentation_ID 60© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

ARP

ARP Functions/Operation

Page 61: Ccna routing and_switching_chapter-4-5

Presentation_ID 61© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

ARP

ARP Functions/Operation

Page 62: Ccna routing and_switching_chapter-4-5

Presentation_ID 62© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

ARP

ARP Functions/Operation

Page 63: Ccna routing and_switching_chapter-4-5

Presentation_ID 63© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

ARP

ARP Functions/Operation

Page 64: Ccna routing and_switching_chapter-4-5

Presentation_ID 64© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

ARP

ARP Tables on Networking Devices

Page 65: Ccna routing and_switching_chapter-4-5

Presentation_ID 65© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Switching

Switch Port Fundamentals

Layer 2 LAN switch

Connects end devices to a central intermediate device on most Ethernet networks

Performs switching and filtering based only on the MAC address

Builds a MAC address table that it uses to make forwarding decisions

Depends on routers to pass data between IP subnetworks

Page 66: Ccna routing and_switching_chapter-4-5

Presentation_ID 66© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Switching

Switch MAC Address Table

1. The switch receives a broadcast frame from PC 1 on Port 1.2. The switch enters the source MAC address and the switch

port that received the frame into the address table.3. Because the destination address is a broadcast, the switch

floods the frame to all ports, except the port on which it received the frame.

4. The destination device replies to the broadcast with a unicast frame addressed to PC 1.

Continued…

Page 67: Ccna routing and_switching_chapter-4-5

Presentation_ID 67© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Switching

Switch MAC Address Table

5. The switch enters the source MAC address of PC 2 and the port number of the switch port that received the frame into the address table. The destination address of the frame and its associated port is found in the MAC address table.

6. The switch can now forward frames between source and destination devices without flooding, because it has entries in the address table that identify the associated ports.

Page 68: Ccna routing and_switching_chapter-4-5

Presentation_ID 68© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Switching

Duplex Settings

Page 69: Ccna routing and_switching_chapter-4-5

Presentation_ID 69© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Switching

Frame Forwarding Methods on Cisco Switches

Page 70: Ccna routing and_switching_chapter-4-5

Presentation_ID 70© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Switching

Cut-through SwitchingTwo variants:

Fast-forward switching: • Lowest level of latency

immediately forwards a packet after reading the destination address, typical cut-through method of switching

Fragment-free switching: • Switch stores the first

64 bytes of the frame before forwarding, most network errors and collisions occur during the first 64 bytes

Page 71: Ccna routing and_switching_chapter-4-5

Presentation_ID 71© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Switching

Memory Buffering on Switches

Page 72: Ccna routing and_switching_chapter-4-5

Presentation_ID 72© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Fixed or Modular

Fixed verses Modular Configuration

Page 73: Ccna routing and_switching_chapter-4-5

Presentation_ID 73© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Fixed or Modular

Fixed verses Modular Configuration

Page 74: Ccna routing and_switching_chapter-4-5

Presentation_ID 74© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Layer 3 Switching

Layer 2 verses Layer 3 Switching

Page 75: Ccna routing and_switching_chapter-4-5

Presentation_ID 75© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential