CCNA 1 Chapter 4 Network Access

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Types of Wireless Media

Wi-Fi, Bluetooth, WiMax

Types Of Physical Media

standards for copper media are defined for the: Type of copper cabling used Bandwidth of the communication Type of connectors used Pinout and color codes of connections to the media Maximum distance of the media

Wireless LAN (WLAN)

A common wireless data implementation is enabling devices to connect wirelessly via a LAN. In general, a wireless LAN requires the following network devices: Wireless Access Point (AP): Concentrates the wireless signals from users and connects to the existing copper-based network infrastructure, such as Ethernet. Home and small business wireless routers integrate the functions of a router, switch, and access point into one device as shown in the figure. Wireless NIC adapters: Provide wireless communication capability to each network host. As the technology has developed, a number of WLAN Ethernet-based standards have emerged. Care needs to be taken in purchasing wireless devices to ensure compatibility and interoperability. The benefits of wireless data communications technologies are evident, especially the savings on costly premises wiring and the convenience of host mobility. Network administrators need to develop and apply stringent security policies and processes to protect wireless LANs from unauthorized access and damage.

Shielded Twisted-Pair Cable

A type of network cabling that includes twisted-pair wires, with shielding around each pair of wires, as well as another shield around all wires in the cable. Shielded twisted-pair (STP) provides better noise protection than UTP cabling. However, compared to UTP cable, STP cable is significantly more expensive and difficult to install. Like UTP cable, STP uses an RJ-45 connector. STP cables combine the techniques of shielding to counter EMI and RFI, and wire twisting to counter crosstalk. To gain the full benefit of the shielding, STP cables are terminated with special shielded STP data connectors. If the cable is improperly grounded, the shield may act as an antenna and pick up unwanted signals.

Contention-Based Access - CSMA/CA

Another form of CSMA that is used by IEEE 802.11 WLANs is Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA). CMSA/CA uses a method similar to CSMA/CD to detect if the media is clear. CMSA/CA also uses additional techniques. CMSA/CA does not detect collisions but attempts to avoid them by waiting before transmitting. Each device that transmits includes the time duration that it needs for the transmission. All other wireless devices receive this information and know how long the medium will be unavailable, as shown in the figure. After a wireless device sends an 802.11 frame, the receiver returns an acknowledgment so that the sender knows the frame arrived. Whether it is an Ethernet LAN using hubs, or a WLAN, contention-based systems do not scale well under heavy media use. It is important to note that Ethernet LANs using switches do not use a contention-based system because the switch and the host NIC operate in full-duplex mode.

Data link layer protocols include:

Ethernet 802.11 Wireless Point-to-Point Protocol (PPP) HDLC Frame Relay

the main cable types that are obtained by using specific wiring conventions:

Ethernet Straight-through: The most common type of networking cable. It is commonly used to interconnect a host to a switch and a switch to a router. Ethernet Crossover: A cable used to interconnect similar devices. For example to connect a switch to a switch, a host to a host, or a router to a router. Rollover: A Cisco proprietary cable used to connect a workstation to a router or switch console port. Using a crossover or straight-through cable incorrectly between devices may not damage the devices, but connectivity and communication between the devices will not take place. This is a common error in the lab and checking that the device connections are correct should be the first troubleshooting action if connectivity is not achieved.

fiber optics terminology

Muiltimode can help data travel approximately 1.4 miles or 2km. uses light to emitting diodes (LED) as a source light. source transmitter. used within a campus network. Single mode uses lasers in a single stream as a data light source transmitter. used to connect long distance telephony and cable tv transmissions can travel approximately 62.5 miles or 100km

Physical Point-to-Point Topology

Physical point-to-point topologies directly connect two nodes two nodes do not have to share the media with other hosts. Additionally, a node does not have to make any determination about whether an incoming frame is destined for it or another node. Therefore, the logical data link protocols can be very simple, as all frames on the media can only travel to or from the two nodes. The frames are placed on the media by the node at one end and taken from the media by the node at the other end of the point-to-point circuit.

Bandwidth

The amount of data that can be transmitted over a network in a given amount of time. Data transfer is usually discussed in terms of bandwidth and throughput. Bandwidth is the capacity of a medium to carry data. Digital bandwidth measures the amount of data that can flow from one place to another in a given amount of time. Bandwidth is typically measured in kilobits per second (kb/s), megabits per second (mb/s), or gigabits per second (gb/s). Bandwidth is sometimes thought of as the speed that bits travel, however this is not accurate. Both 10mb/s and 100mb/s ethernet, the bits are sent at the speed of electricity. The difference is the number of bits that are transmitted per second.

Data Link Sublayers

The data link layer is divided into two sublayers: Logical Link Control (LLC) - This upper sublayer communicates with the network layer. It places information in the frame that identifies which network layer protocol is being used for the frame. This information allows multiple Layer 3 protocols, such as IPv4 and IPv6, to utilize the same network interface and media. Media Access Control (MAC) - This lower sublayer defines the media access processes performed by the hardware. It provides data link layer addressing and access to various network technologies. the data link layer is separated into the LLC and MAC sublayers. The LLC communicates with the network layer while the MAC sublayer allows various network access technologies. For instance, the MAC sublayer communicates with Ethernet LAN technology to send and receive frames over copper or fiber-optic cable. The MAC sublayer also communicates with wireless technologies such as Wi-Fi and Bluetooth to send and receive frames wirelessly.

Properties of UTP Cabling

When used as a networking medium, unshielded twisted-pair (UTP) cabling consists of four pairs of color-coded copper wires that have been twisted together and then encased in a flexible plastic sheath. Its small size can be advantageous during installation. UTP cable does not use shielding to counter the effects of EMI and RFI. Instead, cable designers have discovered that they can limit the negative effect of crosstalk by: Cancellation: Designers now pair wires in a circuit. When two wires in an electrical circuit are placed close together, their magnetic fields are the exact opposite of each other. Therefore, the two magnetic fields cancel each other and also cancel out any outside EMI and RFI signals. Varying the number of twists per wire pair: To further enhance the cancellation effect of paired circuit wires, designers vary the number of twists of each wire pair in a cable. UTP cable must follow precise specifications governing how many twists or braids are permitted per meter (3.28 feet) of cable. Notice in the figure that the orange/orange white pair is twisted less than the blue/blue white pair. Each colored pair is twisted a different number of times. UTP cable relies solely on the cancellation effect produced by the twisted wire pairs to limit signal degradation and effectively provide self-shielding for wire pairs within the network media.

physical layer terminology

Wireless Media that uses pattens of microwaves to represent bits. Bandwidth the capacity of a medium to carry data. Fiber Optic media that uses pattens of light to represent bits. Thoughput a measure of transfer of bits across the media. Copper media that uses electrical pulses to represent bits.

Each Of These Standards, Physical Layer Specifications Are Applied To Areas That Include:

Data to radio signal encoding Frequency and power of transmission Signal reception and decoding requirements Antenna design and construction Wi-Fi is a trademark of the Wi-Fi Alliance. Wi-Fi is used with certified products that belong to WLAN devices that are based on the IEEE 802.11 standards.

what are the four types of industry Fiber-optic cabling is now being used in?

Enterprise Networks: Used for backbone cabling applications and interconnecting infrastructure devices. Fiber-to-the-Home (FTTH): Used to provide always-on broadband services to homes and small businesses. Long-Haul Networks: Used by service providers to connect countries and cities. Submarine Cable Networks: Used to provide reliable high-speed, high-capacity solutions capable of surviving in harsh undersea environments up to transoceanic distances.

Fiber versus Copper

There are many advantages to using fiber-optic cable compared to copper cables. The figure highlights some of these differences. Given that the fibers used in fiber-optic media are not electrical conductors, the media is immune to electromagnetic interference and will not conduct unwanted electrical currents due to grounding issues. Optical fibers are thin and have a relatively low signal loss and can be operated at much greater lengths than copper media. Some optical fiber physical layer specifications allow lengths that can reach multiple kilometers. At present, in most enterprise environments, optical fiber is primarily used as backbone cabling for high-traffic point-to-point connections between data distribution facilities and for the interconnection of buildings in multi-building campuses. Because optical fiber does not conduct electricity and has a low signal loss, it is well suited for these uses.

Fiber-optic cables are broadly classified into two types:

Single-mode fiber (SMF): Consists of a very small core and uses expensive laser technology to send a single ray of light, as shown in Figure 1. Popular in long-distance situations spanning hundreds of kilometers, such as those required in long haul telephony and cable TV applications. Multimode fiber (MMF): Consists of a larger core and uses LED emitters to send light pulses. Specifically, light from an LED enters the multimode fiber at different angles, as shown in Figure 2. Popular in LANs because they can be powered by low-cost LEDs. It provides bandwidth up to 10 Gb/s over link lengths of up to 550 meters. One of the highlighted differences between multimode and single-mode fiber is the amount of dispersion. Dispersion refers to the spreading out of a light pulse over time. The more dispersion there is, the greater the loss of signal strength. Fiber patch cords are required for interconnecting infrastructure devices.The use of color distinguishes between single-mode and multimode patch cords. A yellow jacket is for single-mode fiber cables and orange (or aqua) for multimode fiber cables Fiber cables should be protected with a small plastic cap when not in use. Testing Fiber Cables Terminating and splicing fiber-optic cabling requires special training and equipment. Incorrect termination of fiber-optic media will result in diminished signaling distances or complete transmission failure.

each hop along the path, a router:

Accepts a frame from a medium De-encapsulates the frame Re-encapsulates the packet into a new frame Forwards the new frame appropriate to the medium of that segment of the physical network

Different Types Of Connectors Used With Coax Cable

Although UTP cable has essentially replaced coaxial cable in modern Ethernet installations, the coaxial cable design is used in: Wireless installations: Coaxial cables attach antennas to wireless devices. The coaxial cable carries radio frequency (RF) energy between the antennas and the radio equipment. Cable Internet installations: Cable service providers provide Internet connectivity to their customers by replacing portions of the coaxial cable and supporting amplification elements with fiber-optic cable. However, the wiring inside the customer's premises is still coax cable.

Types of UTP cables

Cat 5E, Cat 6, Cat 6a Different situations may require UTP cables to be wired according to different wiring conventions. This means that the individual wires in the cable have to be connected in different orders to different sets of pins in the RJ-45 connectors.

Commonly used types of UTP cabling are as follows:

Category 1—Used for telephone communications. Not suitable for transmitting data. Category 2—Capable of transmitting data at speeds up to 4 megabits per second (Mbps). Category 3—Used in 10BASE-T networks. Can transmit data at speeds up to 10 Mbps. Category 4—Used in Token Ring networks. Can transmit data at speeds up to 16 Mbps. Category 5—Can transmit data at speeds up to 100 Mbps. Category 5e —Used in networks running at speeds up to 1000 Mbps (1 gigabit per second [Gbps]). Category 6—Typically, Category 6 cable consists of four pairs of 24 American Wire Gauge (AWG) copper wires. Category 6 cable is currently the fastest standard for UTP.

Copper media Characteristics

Coaxial approaches antennas to wireless devices - can be bundled to fiber optic cabling to two way data transmission. Coaxial terminates with BNC, N Type and f type conductors. Shielded twisted Pair counters EMI and RFI by using shielded techniques and special conductors. Unshielded twisted Pair most common network media.

Coaxial Cable

Coaxial cable, or coax for short, gets its name from the fact that there are two conductors that share the same axis. coaxial cable consists of: A copper conductor used to transmit the electronic signals. A layer of flexible plastic insulation surrounding a copper conductor. The insulating material is surrounded in a woven copper braid, or metallic foil, that acts as the second wire in the circuit and as a shield for the inner conductor. This second layer, or shield, also reduces the amount of outside electromagnetic interference. The entire cable is covered with a cable jacket to prevent minor physical damage.

Physical Layer Media

Copper cable: The signals are patterns of electrical pulses. Fiber-optic cable: The signals are patterns of light. Wireless: The signals are patterns of microwave transmissions.

Characteristics of Copper Cabling

Data is transmitted on copper cables as electrical pulses. A detector in the network interface of a destination device must receive a signal that can be successfully decoded to match the signal sent. However, the longer the signal travels, the more it deteriorates. This is referred to as signal attenuation. For this reason, all copper media must follow strict distance limitations as specified by the guiding standards. The timing and voltage values of the electrical pulses are also susceptible to interference from two sources: Electromagnetic interference (EMI) or radio frequency interference (RFI) - EMI and RFI signals can distort and corrupt the data signals being carried by copper media. Potential sources of EMI and RFI include radio waves and electromagnetic devices, such as fluorescent lights or electric motors. Crosstalk - Crosstalk is a disturbance caused by the electric or magnetic fields of a signal on one wire to the signal in an adjacent wire. In telephone circuits, crosstalk can result in hearing part of another voice conversation from an adjacent circuit. Specifically, when an electrical current flows through a wire, it creates a small, circular magnetic field around the wire, which can be picked up by an adjacent wire. To counter the negative effects of EMI and RFI, some types of copper cables are wrapped in metallic shielding and require proper grounding connections. To counter the negative effects of crosstalk, some types of copper cables have opposing circuit wire pairs twisted together, which effectively cancels the crosstalk.

Providing Access to Media

Different media access control methods may be required during a single communication. Each network environment that packets encounter as they travel from a local host to a remote host can have different characteristics. For example, an Ethernet LAN consists of many hosts contending to access the network medium. Serial links consist of a direct connection between only two devices. Router interfaces encapsulate the packet into the appropriate frame, and a suitable media access control method is used to access each link. In any given exchange of network layer packets, there may be numerous data link layers and media transitions. At each hop along the path, a router: Accepts a frame from a medium De-encapsulates the frame Re-encapsulates the packet into a new frame Forwards the new frame appropriate to the medium of that segment of the physical network.

Half and Full Duplex

Duplex communications refer to the direction of data transmission between two devices. Half-duplex communications restrict the exchange of data to one direction at a time while full-duplex allows the sending and receiving of data to happen simultaneously. Half-duplex communication - Both devices can transmit and receive on the media but cannot do so simultaneously. The half-duplex mode is used in legacy bus topologies and with Ethernet hubs. WLANs also operate in half-duplex. Half-duplex allows only one device to send or receive at a time on the shared medium and is used with contention-based access methods Full-duplex communication - Both devices can transmit and receive on the media at the same time. The data link layer assumes that the media is available for transmission for both nodes at any time. Ethernet switches operate in full-duplex mode by default, but can operate in half-duplex if connecting to a device such as an Ethernet hub. it is important that two interconnected interfaces, such as a host's NIC and an interface on an Ethernet switch operate using the same duplex mode. Otherwise, there will be a duplex mismatch creating inefficiency and latency on the link.

Network Interface Cards

Enable computers to connect over a network. Each computer on the network must have an interface card with a unique ID Network Interface Cards (NICs) connect a device to the network. Ethernet NICs are used for a wired connection whereas WLAN (Wireless Local Area Network) NICs are used for wireless. end-user device may include one or both types of NICs. network printer, for example, may only have an Ethernet NIC, and therefore, must connect to the network using an Ethernet cable. All wireless devices must share access to the airwaves connecting to the wireless access point. A wired device does not need to share its access to the network with other devices. Each wired device has a separate communications channel over its Ethernet cable. This is important when considering some applications, such as online gaming, streaming video, and video conferencing, which require more dedicated bandwidth than other applications.

Frame Fields

Framing breaks the stream into decipherable groupings, with control information inserted in the header and trailer as values in different fields. This format gives the physical signals a structure that can be received by nodes and decoded into packets at the destination. Frame start and stop indicator flags - Used to identify the beginning and end limits of the frame. Addressing - Indicates the source and destination nodes on the media. Type - Identifies the Layer 3 protocol in the data field. Control - Identifies special flow control services such as quality of service (QoS). QoS is used to give forwarding priority to certain types of messages. Data link frames carrying voice over IP (VoIP) packets normally receive priority because they are sensitive to delay. Data - Contains the frame payload (i.e., packet header, segment header, and the data). Error Detection - These frame fields are used for error detection and are included after the data to form the trailer. Not all protocols include all of these fields. The standards for a specific data link protocol define the actual frame format. Data link layer protocols add a trailer to the end of each frame. The trailer is used to determine if the frame arrived without error. This process is called error detection and is accomplished by placing a logical or mathematical summary of the bits that comprise the frame in the trailer. Error detection is added at the data link layer because the signals on the media could be subject to interference, distortion, or loss that would substantially change the bit values that those signals represent. A transmitting node creates a logical summary of the contents of the frame, known as the cyclic redundancy check (CRC) value. This value is placed in the Frame Check Sequence (FCS) field to represent the contents of the frame. In the Ethernet trailer, the FCS provides a method for the receiving node to determine whether the frame experienced transmission errors.

LAN and WAN Frames

In a TCP/IP network, all OSI Layer 2 protocols work with IP at OSI Layer 3. However, the Layer 2 protocol used depends on the logical topology and the physical media. Each protocol performs media access control for specified Layer 2 logical topologies. This means that a number of different network devices can act as nodes that operate at the data link layer when implementing these protocols. These devices include the NICs on computers as well as the interfaces on routers and Layer 2 switches. The Layer 2 protocol used for a particular network topology is determined by the technology used to implement that topology. The technology is, in turn, determined by the size of the network - in terms of the number of hosts and the geographic scope - and the services to be provided over the network. A LAN typically uses a high bandwidth technology that is capable of supporting large numbers of hosts. A LAN's relatively small geographic area (a single building or a multi-building campus) and its high density of users, make this technology cost-effective. However, using a high bandwidth technology is usually not cost-effective for WANs that cover large geographic areas (cities or multiple cities, for example). The cost of the long distance physical links and the technology used to carry the signals over those distances typically results in lower bandwidth capacity. The difference in bandwidth normally results in the use of different protocols for LANs and WANs.

The Physical Layer Hardware, Media, Encoding, And Signaling Standards Are Defined And Governed By The:

International Organization for Standardization (ISO) Telecommunications Industry Association/Electronic Industries Association (TIA/EIA) International Telecommunication Union (ITU) American National Standards Institute (ANSI) Institute of Electrical and Electronics Engineers (IEEE) National telecommunications regulatory authorities including the Federal Communication Commission (FCC) in the USA and the European Telecommunications Standards Institute (ETSI)

Media Access Control (MAC)

Layer 2 protocols specify the encapsulation of a packet into a frame and the techniques for getting the encapsulated packet on and off each medium. The technique used for getting the frame on and off the media is called the media access control method. As packets travel from the source host to the destination host, they typically traverse over different physical networks. These physical networks can consist of different types of physical media such as copper wires, optical fibers, and wireless consisting of electromagnetic signals, radio and microwave frequencies, and satellite links. Without the data link layer, network layer protocols such as IP, would have to make provisions for connecting to every type of media that could exist along a delivery path. Moreover, IP would have to adapt every time a new network technology or medium was developed. This process would hamper protocol and network media innovation and development. This is a key reason for using a layered approach to networking.

Properties of Fiber-Optic Cabling

Optical fiber cable transmits data over longer distances and at higher bandwidths than any other networking media. Unlike copper wires, fiber-optic cable can transmit signals with less attenuation and is completely immune to EMI and RFI. Optical fiber is commonly used to interconnect network devices. Optical fiber is a flexible, but extremely thin, transparent strand of very pure glass, not much bigger than a human hair. Bits are encoded on the fiber as light impulses. The fiber-optic cable acts as a waveguide, or "light pipe," to transmit light between the two ends with minimal loss of signal. As an analogy, consider an empty paper towel roll with the inside coated like a mirror. It is a thousand meters in length, and a small laser pointer is used to send Morse code signals at the speed of light. Essentially that is how a fiber-optic cable operates, except that it is smaller in diameter and uses sophisticated light technologies.

Fiber-Optic Characteristics

Optical-fiber systems have many advantages over metallic-based communication systems. These advantages include interference, attenuation, and bandwidth characteristics. Furthermore, the relatively smaller cross section of fiber-optic cables allows room for substantial growth of the capacity in existing conduits. Fiber-optic characteristics can be classified as linear and nonlinear. Nonlinear characteristics are influenced by parameters, such as bit rates, channel spacing, and power levels.

The physical layer standards address three functional areas:

Physical Components The physical components are the electronic hardware devices, media, and other connectors that transmit and carry the signals to represent the bits. Hardware components such as NICs, interfaces and connectors, cable materials, and cable designs are all specified in standards associated with the physical layer. The various ports and interfaces on a Cisco 1941 router are also examples of physical components with specific connectors and pinouts resulting from standards. Encoding Encoding or line encoding is a method of converting a stream of data bits into a predefined "code". Codes are groupings of bits used to provide a predictable pattern that can be recognized by both the sender and the receiver. In the case of networking, encoding is a pattern of voltage or current used to represent bits; the 0s and 1s. Signaling The physical layer must generate the electrical, optical, or wireless signals that represent the "1" and "0" on the media. The method of representing the bits is called the signaling method. The physical layer standards must define what type of signal represents a "1" and what type of signal represents a "0". This can be as simple as a change in the level of an electrical signal or optical pulse. For example, a long pulse might represent a 1 whereas a short pulse represents a 0. There are many ways to transmit signals. A common method to send data is using modulation techniques. Modulation is the process by which the characteristic of one wave (the signal) modifies another wave (the carrier). The nature of the actual signals representing the bits on the media will depend on the signaling method in use.

Physical LAN Topologies

Physical topology defines how the end systems are physically interconnected. In shared media LANs, end devices can be interconnected using the following physical topologies: Star - End devices are connected to a central intermediate device. Early star topologies interconnected end devices using Ethernet hubs. However, star topologies now use Ethernet switches. The star topology is easy to install, very scalable (easy to add and remove end devices), and easy to troubleshoot. Extended Star - In an extended star topology, additional Ethernet switches interconnect other star topologies. An extended star is an example of a hybrid topology. Bus - All end systems are chained to each other and terminated in some form on each end. Infrastructure devices such as switches are not required to interconnect the end devices. Bus topologies using coax cables were used in legacy Ethernet networks because it was inexpensive and easy to set up. Ring - End systems are connected to their respective neighbor forming a ring. Unlike the bus topology, the ring does not need to be terminated. Ring topologies were used in legacy Fiber Distributed Data Interface (FDDI) and Token Ring networks.

Controlling Access to the Media

Regulating the placement of data frames onto the media is controlled by the media access control sublayer. Media access control is the equivalent of traffic rules that regulate the entrance of motor vehicles onto a roadway. The absence of any media access control would be the equivalent of vehicles ignoring all other traffic and entering the road without regard to the other vehicles. However, not all roads and entrances are the same. Traffic can enter the road by merging, by waiting for its turn at a stop sign, or by obeying signal lights. A driver follows a different set of rules for each type of entrance. In the same way, there are different methods to regulate placing frames onto the media. The protocols at the data link layer define the rules for access to different media. These media access control techniques define if and how the nodes share the media. The actual media access control method used depends on: Topology - How the connection between the nodes appears to the data link layer. Media sharing - How the nodes share the media. The media sharing can be point-to-point, such as in WAN connections, or shared such as in LAN networks.

Data Link Layer Protocols

The data link layer of the OSI model (Layer 2), allowing the upper layers to access the media Accepting Layer 3 packets and packaging them into frames Preparing network data for the physical network Controlling how data is placed and received on the media Exchanging frames between nodes over a physical network media, such as UTP or fiber-optic Receiving and directing packets to an upper layer protocol Performing error detection The Layer 2 notation for network devices connected to a common media is called a node. Nodes build and forward frames. the OSI data link layer is responsible for the exchange of Ethernet frames between source and destination nodes over a physical network media. The data link layer effectively separates the media transitions that occur as the packet is forwarded from the communication processes of the higher layers. The data link layer receives packets from and directs packets to an upper layer protocol, in this case IPv4 or IPv6. This upper layer protocol does not need to be aware of which media the communication will use.

The Frame

The data link layer prepares a packet for transport across the local media by encapsulating it with a header and a trailer to create a frame. The description of a frame is a key element of each data link layer protocol. Although there are many different data link layer protocols that describe data link layer frames, each frame type has three basic parts: Header Data Trailer All data link layer protocols encapsulate the Layer 3 PDU within the data field of the frame. However, the structure of the frame and the fields contained in the header and trailer vary according to the protocol. There is no one frame structure that meets the needs of all data transportation across all types of media. Depending on the environment, the amount of control information needed in the frame varies to match the access control requirements of the media and logical topology. in fragile environment more controls to ensure delivery. The header and trailer are larger as more control information is needed.

Layer 2 Address

The data link layer provides addressing that is used in transporting a frame across a shared local media. Device addresses at this layer are referred to as physical addresses. Data link layer addressing is contained within the frame header and specifies the frame destination node on the local network. The frame header may also contain the source address of the frame. Unlike Layer 3 logical addresses, which are hierarchical, physical addresses do not indicate on what network the device is located. Rather, the physical address is unique to the specific device. If the device is moved to another network or subnet, it will still function with the same Layer 2 physical address. An address that is device-specific and non-hierarchical cannot be used to locate a device on large networks or the Internet. This would be like trying to find a single house within the entire world, with nothing more than a house number and street name. The physical address, however, can be used to locate a device within a limited area. For this reason, the data link layer address is only used for local delivery. Addresses at this layer have no meaning beyond the local network. Compare this to Layer 3, where addresses in the packet header are carried from the source host to the destination host, regardless of the number of network hops along the route. If the data must pass onto another network segment, an intermediate device, such as a router, is necessary. The router must accept the frame based on the physical address and de-encapsulate the frame in order to examine the hierarchical address, or IP address. Using the IP address, the router is able to determine the network location of the destination device and the best path to reach it. When it knows where to forward the packet, the router then creates a new frame for the packet, and the new frame is sent on to the next network segment toward its final destination.

Logical Point-to-Point Topology

The end nodes communicating in a point-to-point network can be physically connected via a number of intermediate devices. However, the use of physical devices in the network does not affect the logical topology. the source and destination node may be indirectly connected to each other over some geographical distance. In some cases, the logical connection between nodes forms what is called a virtual circuit. A virtual circuit is a logical connection created within a network between two network devices. The two nodes on either end of the virtual circuit exchange the frames with each other. This occurs even if the frames are directed through intermediary devices. Virtual circuits are important logical communication constructs used by some Layer 2 technologies. The media access method used by the data link protocol is determined by the logical point-to-point topology, not the physical topology. This means that the logical point-to-point connection between two nodes may not necessarily be between two physical nodes at each end of a single physical link.

A Combination Of Factors Determines The Practical Bandwidth Of A Network:

The properties of the physical media The technologies chosen for signaling and detecting network signals Physical media properties, current technologies, and the laws of physics all play a role in determining the available bandwidth.

Physical and Logical Topologies

The topology of a network is the arrangement or relationship of the network devices and the interconnections between them. LAN and WAN topologies can be viewed in two ways: Physical topology - Refers to the physical connections and identifies how end devices and infrastructure devices such as routers, switches, and wireless access points are interconnected. Physical topologies are usually point-to-point or star. Logical topology - Refers to the way a network transfers frames from one node to the next. This arrangement consists of virtual connections between the nodes of a network. These logical signal paths are defined by data link layer protocols. The logical topology of point-to-point links is relatively simple while shared media offers different access control methods. The data link layer "sees" the logical topology of a network when controlling data access to the media. It is the logical topology that influences the type of network framing and media access control used.

What is process that data undergoes from a source node to a destination node?

The user data is segmented by the transport layer, placed into packets by the network layer, and further encapsulated into frames by the data link layer. The physical layer encodes the frames and creates the electrical, optical, or radio wave signals that represent the bits in each frame. These signals are then sent on the media, one at a time. The destination node physical layer retrieves these individual signals from the media, restores them to their bit representations, and passes the bits up to the data link layer as a complete frame.

UTP Connectors

UTP cable is usually terminated with an RJ-45 connector. This connector is used for a range of physical layer specifications, one of which is Ethernet. The TIA/EIA-568 standard describes the wire color codes to pin assignments (pinouts) for Ethernet cables. RJ-45 connector is the male component, crimped at the end of the cable. The socket is the female component of a network device, wall, cubicle partition outlet, or patch panel. Each time copper cabling is terminated; there is the possibility of signal loss and the introduction of noise into the communication circuit. When terminated improperly, each cable is a potential source of physical layer performance degradation. It is essential that all copper media terminations be of high quality to ensure optimum performance with current and future network technologies.

UTP Cabling Standards

UTP cabling conforms to the standards established jointly by the TIA/EIA. Specifically, TIA/EIA-568 stipulates the commercial cabling standards for LAN installations and is the standard most commonly used in LAN cabling environments. Some of the elements defined are: Cable types Cable lengths Connectors Cable termination Methods of testing cable The electrical characteristics of copper cabling are defined by the Institute of Electrical and Electronics Engineers (IEEE). IEEE rates UTP cabling according to its performance. Cables are placed into categories based on their ability to carry higher bandwidth rates. For example, Category 5 (Cat5) cable is used commonly in 100BASE-TX Fast Ethernet installations. Other categories include Enhanced Category 5 (Cat5e) cable, Category 6 (Cat6), and Category 6a. Cables in higher categories are designed and constructed to support higher data rates. As new gigabit speed Ethernet technologies are being developed and adopted, Cat5e is now the minimally acceptable cable type, with Cat6 being the recommended type for new building installations.

Data Link Layer Standards

Unlike the protocols of the upper layers of the TCP/IP suite, data link layer protocols are generally not defined by Request for Comments (RFCs). Although the Internet Engineering Task Force (IETF) maintains the functional protocols and services for the TCP/IP protocol suite in the upper layers, the IETF does not define the functions and operation of that model's network access layer. Engineering organizations that define open standards and protocols that apply to the network access layer include: Institute of Electrical and Electronics Engineers (IEEE) International Telecommunication Union (ITU) International Organization for Standardization (ISO) American National Standards Institute (ANSI)

Unshielded Twisted-Pair Cable

Unshielded twisted-pair (UTP) cabling is the most common networking media. UTP cabling, terminated with RJ-45 connectors, is used for interconnecting network hosts with intermediate networking devices, such as switches and routers. In LANs, UTP cable consists of four pairs of color-coded wires that have been twisted together and then encased in a flexible plastic sheath that protects from minor physical damage. The twisting of wires helps protect against signal interference from other wires.

Common Physical WAN Topologies

WANs are commonly interconnected using the following physical topologies: Point-to-Point - This is the simplest topology that consists of a permanent link between two endpoints. For this reason, this is a very popular WAN topology. Hub and Spoke - A WAN version of the star topology in which a central site interconnects branch sites using point-to-point links. Mesh - This topology provides high availability, but requires that every end system be interconnected to every other system. Therefore, the administrative and physical costs can be significant. Each link is essentially a point-to-point link to the other node. The three common physical WAN topologies are illustrated in the figure. A hybrid is a variation or combination of any of the above topologies. For example, a partial mesh is a hybrid topology in which some, but not all, end devices are interconnected.

Contention-Based Access - CSMA/CD

WLANs, Ethernet LANs with hubs, and legacy Ethernet bus networks are all examples of contention-based access networks. All of these networks operate in half-duplex mode. This requires a process to govern when a device can send and what happens when multiple devices send at the same time. The Carrier Sense Multiple Access/Collision Detection (CSMA/CD) process is used in half-duplex Ethernet LANs. Ethernet LAN using a hub. The CSMA process is as follows: 1. PC1 has an Ethernet frame to send to PC3. 2. PC1's NIC needs to determine if anyone is transmitting on the medium. If it does not detect a carrier signal, in other words, it is not receiving transmissions from another device, it will assume the network is available to send. 3. PC1's NIC sends the Ethernet Frame. 4. The Ethernet hub receives the frame. An Ethernet hub is also known as a multiport repeater. Any bits received on an incoming port are regenerated and sent out all other ports. 5. If another device, such as PC2, wants to transmit, but is currently receiving a frame, it must wait until the channel is clear. 6. All devices attached to the hub will receive the frame. Because the frame has a destination data link address for PC3, only that device will accept and copy in the entire frame. All other devices' NICs will ignore the frame. If two devices transmit at the same time, a collision will occur. Both devices will detect the collision on the network, this is the collision detection (CD). This is done by the NIC comparing data transmitted with data received, or by recognizing the signal amplitude is higher than normal on the media. The data sent by both devices will be corrupted and will need to be resent.

Properties Of Wireless Media

Wireless media carry electromagnetic signals that represent the binary digits of data communications using radio or microwave frequencies. Wireless media provides the greatest mobility options of all media, and the number of wireless-enabled devices continues to increase. As network bandwidth options increase, wireless is quickly gaining in popularity in en Wireless does have some areas of concern, including: Coverage area: Wireless data communication technologies work well in open environments. However, certain construction materials used in buildings and structures, and the local terrain, will limit the effective coverage. Interference: Wireless is susceptible to interference and can be disrupted by such common devices as household cordless phones, some types of fluorescent lights, microwave ovens, and other wireless communications. Security: Wireless communication coverage requires no access to a physical strand of media. Therefore, devices and users, not authorized for access to the network, can gain access to the transmission. Network security is a major component of wireless network administration. Shared medium: WLANs operate in half-duplex, which means only one device can send or receive at a time. The wireless medium is shared amongst all wireless users. The more users needing to access the WLAN simultaneously, results in less bandwidth for each user. Although wireless is increasing in popularity for desktop connectivity, copper and fiber are the most popular physical layer media for network deployments. terprise networks.

Media Access Control Methods

define the processes by which network devices can access the network media and transmit frames in diverse network environments. Some network topologies share a common medium with multiple nodes. These are called multi-access networks. Ethernet LANs and WLANs are examples of a multi-access network. At any one time, there may be a number of devices attempting to send and receive data using the same network media. Some multi-access networks require rules to govern how devices share the physical media. There are two basic access control methods for shared media: Contention-based access - All nodes operating in half-duplex compete for the use of the medium, but only one device can send at a time. However, there is a process if more than one device transmits at the same time. Ethernet LANs using hubs and WLANs are examples of this type of access control. Controlled access - Each node has its own time to use the medium. These deterministic types of networks are inefficient because a device must wait its turn to access the medium. Legacy Token Ring LANs are an example of this type of access control. By default, Ethernet switches operate in full-duplex mode. This allows the switch and the full-duplex connected device to send and receive simultaneously.

Latency refers to the amount of time, to include delays, for data to travel from one given point to another.

internetwork or network with multiple segments, throughput cannot be faster than the slowest link in the path from source to destination. Even if all or most of the segments have high bandwidth, it will only take one segment in the path with low throughput to create a bottleneck to the throughput of the entire network. There is a third measurement to assess the transfer of usable data that is known as goodput. Goodput is the measure of usable data transferred over a given period of time. Goodput is throughput minus traffic overhead for establishing sessions, acknowledgments, and encapsulation.

Three common types of fiber-optic termination and splicing errors are:

isalignment: The fiber-optic media are not precisely aligned to one another when joined. End gap: The media does not completely touch at the splice or connection. End finish: The media ends are not well polished, or dirt is present at the termination. A quick and easy field test can be performed by shining a bright flashlight into one end of the fiber while observing the other end. If light is visible, the fiber is capable of passing light. Although this does not ensure performance, it is a quick and inexpensive way to find a broken fiber. Optical Time Domain Reflectometer (OTDR) can be used to test each fiber-optic cable segment. This device injects a test pulse of light into the cable and measures backscatter and reflection of light detected as a function of time. The OTDR will calculate the approximate distance at which these faults are detected along the length of the cable.

what is the purpose of the The Physical Layer?

physical layer provides the means to transport the bits that make up a data link layer frame across the network media. This layer accepts a complete frame from the data link layer and encodes it as a series of signals that are transmitted onto the local media. The encoded bits that comprise a frame are received by either an end device or an intermediate device

Physical Layer Standards

protocols and operations of the upper OSI layers are performed in software designed by software engineers and computer scientists. services and protocols in the TCP/IP suite are defined by the Internet Engineering Task Force (IETF). physical layer consists of electronic circuitry, media, and connectors developed by engineers. it is appropriate that the standards governing this hardware are defined by the relevant electrical and communications engineering organizations.

Throughput

the amount of work performed by a system during a given period of time Throughput is the measure of the transfer of bits across the media over a given period of time. Due to a number of factors, throughput usually does not match the specified bandwidth in physical layer implementations. Many factors influence throughput, including: The amount of traffic The type of traffic The latency created by the number of network devices encountered between source and destination.


Kaugnay na mga set ng pag-aaral

unit one economics comprehension

View Set

HSK1-L3 你叫什么名字?(what is your name?)sentences

View Set

Circulatory System: Blood Vessels Quiz

View Set

Chem Quiz 4 (contains ch4 oxidation state assignments and redox reactions and ch5 thru slide 33)

View Set

Auditing Problem FA 2: Audit Planning

View Set