0% found this document useful (0 votes)
22 views

Week 3 Ch4 Part 2 Data Link Layer

The document discusses data link layer protocols and media access control. It describes how the data link layer prepares network data for transmission and is divided into the logical link control and media access control sublayers. It also explains different physical network topologies for WANs including point-to-point, hub-and-spoke, and mesh. Additionally, it covers media access control methods for controlling access to shared media for both LANs and WANs.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views

Week 3 Ch4 Part 2 Data Link Layer

The document discusses data link layer protocols and media access control. It describes how the data link layer prepares network data for transmission and is divided into the logical link control and media access control sublayers. It also explains different physical network topologies for WANs including point-to-point, hub-and-spoke, and mesh. Additionally, it covers media access control methods for controlling access to shared media for both LANs and WANs.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 31

Chapter 4: Network Access

Part 2: Data Link Layer

CCNA Routing and Switching


Introduction to Networks v6.0

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1
Chapter 4 Part 2 - Sections & Objectives
§ 4.3 Data Link Layer Protocols
• Describe the purpose and function of the data link layer in preparing
communication for transmission on specific media.

§ 4.4 Media Access Control


• Compare the functions of logical topologies and physical topologies.
• Describe the basic characteristics of media access control methods
on WAN topologies.
• Describe the basic characteristics of media access control methods
on LAN topologies.
• Describe the characteristics and functions of the data link frame.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
4.3 Data Link Layer
Protocols

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
Data Link Layer Protocols
Purpose of the Data Link Layer
§ The Data Link Layer
• Prepares network data for the physical network

§ Data Link Sublayers


• LLC communicates with the network layer
• MAC defines the media access processes

§ Providing Access to Media


§ Data Link Layer Standards
• IEEE
• ITU
• ISO
• ANSI

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
Purpose of the Data Link Layer
The Data Link Layer

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
Purpose of the Data Link Layer
The Data Link Layer (Cont.)

Layer 2
Data Link
Addresses

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
Purpose of the Data Link Layer
Data Link Sublayers
§ Data link layer is divided into two sublayers:
• Logical Link Control (LLC)
o Communicates with the network layer.
o Identifies which network layer protocol is
being used for the frame.
o Allows multiple Layer 3 protocols, such as
IPv4 and IPv6, to utilize the same network
interface and media.
• Media Access Control (MAC)
o Defines the media access processes
performed by the hardware.
o Provides data link layer addressing and
access to various network technologies.
o Communicates with Ethernet to send and
receive frames over copper or fiber-optic
cable.
o Communicates with wireless technologies
such as Wi-Fi and Bluetooth.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7
Purpose of the Data Link Layer
Media Access Control
§ As packets travel from
the source host to the
destination host, they
travel over different
physical networks.
§ Physical networks can
consist of different
types of physical media
such as copper wires,
optical fibers, and
wireless consisting of
electromagnetic
signals, radio and
microwave frequencies,
and satellite links.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
Purpose of the Data Link Layer
Providing Access to Media

§ At each hop along the path, a router:


• Accepts a frame from a medium
• De-encapsulates the frame
• Re-encapsulates the packet into a new frame
• Forwards the new frame appropriate to the
medium of that segment
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9
4.4 Media Access Control

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10
Topologies
Controlling Access to the Media
§ Media access control is the
equivalent of traffic rules that
regulate the entrance of motor
vehicles onto a roadway.
§ The absence of any media access
control would be the equivalent of
vehicles ignoring all other traffic
and entering the road without
regard to the other vehicles.
§ However, not all roads and
entrances are the same.
§ Traffic can enter the road by
merging, by waiting for its turn at a
Sharing the stop sign, or by obeying signal
Media lights.
§ A driver follows a different set of
rules for each type of entrance.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
Topologies
Physical and Logical Topologies
§ Physical topology

Refers to the
physical connections
and identifies how
end devices and
infrastructure
devices such as
routers, switches,
and wireless access
points are
interconnected.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
Topologies
Physical and Logical Topologies (Cont.)
§ Logical Topology

Refers to the way


a network
transfers frames
from one node to
the next. These
logical signal paths
are defined by
data link layer
protocols.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
WAN Topologies
Common Physical WAN Topologies
§ Point-to-Point - Permanent
link between two endpoints.
§ Hub and Spoke - A central
site interconnects branch
sites using point-to-point
links.
§ Mesh - Provides high
availability, but requires that
every end system be
interconnected to every
other system.
Administrative and physical
costs can be significant.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14
WAN Topologies
Physical Point-to-Point Topology
§ Frames are
placed on the
media by the
node at one
end and taken
from the
media by the
node at the
other end of
the point-to-
point circuit.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
WAN Topologies
Logical Point-to-Point Topology

• End nodes communicating in a point-to-point network can


be physically connected via a number of intermediate
devices.
• However, the use of physical devices in the network does
not affect the logical topology.
• The logical connection between nodes forms what is called
a virtual circuit.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
WAN Topologies
Logical Point-to-Point Topology (Cont.)

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17
Media Access Control
LAN Topologies
§ Physical LAN Topologies
§ Half and Full Duplex
§ Media Access Control Methods
§ Contention-Based Access
• CSMA/CD vs. CSMA/CA

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18
LAN Topologies
Physical LAN Topologies
§ Star - End devices are connected to a central intermediate device. Use Ethernet switches.
§ Extended Star - Additional Ethernet switches interconnect other star topologies.
§ Bus - Used in legacy networks. All end systems are chained to each other and terminated in
some form on each end. Switches are not required to interconnect the end devices.

Bus topologies using coax cables were used in legacy Ethernet networks because it was
inexpensive and easy to set up.
§ Ring - End systems are connected to
their respective neighbor forming a ring.

Unlike the bus topology, the ring does


not need to be terminated.

Ring topologies were used in legacy


Fiber Distributed Data Interface (FDDI)
and Token Ring networks.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19
LAN Topologies
Half and Full Duplex

§ Half-Duplex Communication
• Both devices can transmit and receive on the
media but cannot do so simultaneously.
• Used in legacy bus topologies and with
Ethernet hubs.
• WLANs also operate in half-duplex.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20
LAN Topologies
Half and Full Duplex (Cont.)

§ Full-Duplex Communication
• Both devices can transmit and receive on the media
at the same time.
• Data link layer assumes that the media is available
for transmission for both nodes at any time.
• Ethernet switches operate in full-duplex mode by
default, but can operate in half-duplex if connecting
to a device such as an Ethernet hub.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 21
LAN Topologies
Media Access Control Methods

§ Contention-Based Access
• Nodes operate in half-
duplex.
• Compete for the use of
the medium.
• Only one device can send
at a time.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 22
LAN Topologies
Media Access Control Methods (Cont.)

§ Controlled Access
• Each node has its own
time to use the
medium.
• Legacy Token Ring
LANs are an example

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 23
LAN Topologies
Contention-based Access - CSMA/CD
§ Carrier Sense Multiple Access/Collision
Detection (CSMA/CD) process is used in
half-duplex Ethernet LANs.
• Diagrams show normal operation
• If two devices transmit at the same time, a
collision will occur.
1 • Both devices will detect the collision on the
network.
• Data sent by both devices will be corrupted
and will need to be resent.

2 3

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 24
LAN Topologies
Contention-based Access - CSMA/CA
§ CSMA/CA
• Uses a method to detect if the
media is clear.
• Does not detect collisions but
attempts to avoid them by
waiting before transmitting.

§ Note: Ethernet LANs using


switches do not use a
contention-based system
because the switch and the
host NIC operate in full-
duplex mode.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 25
Media Access Control
Data Link Frame
§ The Frame § LAN and WAN Frames
• Header • 802.11 Wireless Frame
• Data • PPP Frame
• Trailer • HDLC

§ Frame Fields • Frame Relay


• Ethernet Frame
§ Layer 2 Address

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 26
Data Link Frame
The Frame
§ Each frame type
has three basic
parts:
• Header
• Data
• Trailer

§ Structure of the
frame and the
fields contained in
the header and
trailer depend on
Layer 3 protocol.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 27
Data Link Frame
Frame Fields
§ Frame start and stop
indicator flags - Identifies
the beginning and end limits
of the frame.
§ Addressing - Indicates the
source and destination
nodes.
§ Type - Identifies the Layer 3
protocol in the data field.
§ Control - Identifies special
flow control services such
as QoS.

QoS = quality of service


§ Data - Contains the frame
payload (i.e., packet header,
segment header, and the
data).
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 28
Data Link Frame
Layer 2 Addresses

Each data link frame contains


the source data link address
of the NIC card sending the
frame, and the destination
data link address of the NIC
card receiving the frame.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 29
Data Link Frame
LAN and WAN Frames

§ Layer 2 protocol used for a


topology is determined by the
technology.
§ Data link layer protocols
include:
• Ethernet
• 802.11 Wireless
• Point-to-Point Protocol
(PPP)
• HDLC (High-Level Data
Link Control)
• Frame Relay

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 30
Summary
§ Data Link Layer Protocols

§ Media Access Control

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 31

You might also like