Professional Documents
Culture Documents
45fundamentals of Networking
45fundamentals of Networking
Network Access
Overview
This lesson will discuss the used of physical layer and data link layer in data communications.
Learning Outcomes
The students should:
a. Explain how physical layer protocols and services support communications across data networks.
b. Explain the role of the data link layer in supporting communications across data networks.
c. Build a simple network using the appropriate media
d. Compare media access control techniques and logical topologies used in networks.
Course Materials
● https://www.youtube.com/watch?v=N8TbuZHmvYQ
● https://www.youtube.com/watch?v=wK3QzfVnAZI
● https://www.youtube.com/watch?v=-uKPOIXWQJ4
● https://www.youtube.com/watch?v=VgmcqcOThuI
Lesson 1
Types of Connections
● Encapsulation is a function of the data link layer. Different media types require different data link layer
encapsulation
● The OSI physical layer provides the means to transport the bits that make up a data link layer frame across
the network media.
Functions
Encoding – is a method of converting a stream of data bits into a predefined code. It is used to distinguish data bits
from control bits and identify where the frames starts and ends.
Signaling-sending the signals asynchronously mean that they are transmitted without a clock signal.
Bandwidth
Throughput
● Throughput is the measure of transfer of bits across the media over a given period of time.
● Latency refers to the amount of time, to include delays, for data to travel from one given point to another.
● There is a third measurement to measure the transfer of usable data that is known as goodput.
● Goodput is the measure of usable data transferred over a given period of time (throughput) minus the traffic
overhead for establishing sessions, acknowledgements, and encapsulation.
Lesson 2
Network Media
● Networks use copper media because it is inexpensive, easy to install, and has low resistance to electrical
current.
● Copper media is limited by distance and signal interference.
● Data is transmitted on copper cables as electrical pulses.
● Longer the signal travels, the more it deteriorates in a phenomenon referred to as signal attenuation. For
this reason, all copper media must follow strict distance limitations as specified by the guiding standards.
● The separation of data and electrical power cabling must comply with safety codes.
● Cables must be connected correctly.
● Installations must be inspected for damage.
● Equipment must be grounded correctly.
UTP cable does not use shielding to counter the effects of EMI and RFI. Instead, cable designer have discovered that
they can limit the negative effect of crosstalk by cancellation.
Cancellation
When two wires in an electrical circuit are placed close together, their magnetic fields are the exact opposite of each
other. Therefore, the two magnetic fields cancel each other out and also cancel out any outside EMI and RFI signals.
UTP cable must follow precise specifications governing how many twist or braids are permitted per meter (3.28 feet)
of cable.
Category 3
Category 5 and 5e
Category 6
T568A
1 white of green
2 green
3 white of orange
4 blue
5 white of blue
6 orange
7 white of brown
8 brown
T568B
1 white of orange
2 orange
3 white of green
4 blue
5 white of blue
6 green
7 white of brown
8 brown
Single-mode fiber
Consist of a very small core and uses expensive laser technology to send a single ray of light. Popular in
long-distance situations spanning hundreds of kilometers.
Multi-mode fiber
Consist of a larger core and uses LED emitters to send light pulses. Light from an LED enters the multimode fibers at
different angles. Popular in LANs. It provides bandwidth up to 10 Gb/s over link lengths up to 550 meters.
● Coverage area
● Interference
● Security
Lesson 3
1. It accepts layer 3 packets and packages them into data units called frames.
2. It control media access control and performs error detection.
This upper sublayer defines the software processes that provide services to the network layer. It places information in
the frame that identifies which network layer protocol is being used for the frame. This information allows multiple
layer 3 protocols, such as IPv4 and IPv6, to utilize the same network interface and media.
This lower sublayer defines the media access process performed by the hardware. It provides data link layer
addressing and delimiting of data according to physical signaling requirements of the medium and the type of data
link layer protocol in use. Separating the data link layer into sublayers allows for one type of frame defined by the
upper layer to access different types of media defined by the lower layer
● Star Topology
● Extended Star topology
● Bus topology
● Ring Topology
Lesson 4
Control Access
Contention-based Access
● Header
● Data
● Trailer
Unit 5
Ethernet
Overview
Learning Outcomes
The students should:
Course Materials
● https://www.youtube.com/watch?v=8O3VNtNRCpM
● https://www.youtube.com/watch?v=hi2nhVmN46U
● https://www.youtube.com/watch?v=RUzauyfKAL0&t=33s
●
Lesson 1
Ethernet
Ethernet Standards
● Define layer 2 protocols and layer 1 technologies
● Two separate sublayer of data link layer to operate – LLC and the MAC sublayers
Frame Processing
● The NIC views information to see if the destination MAC address in the frame matches the device physical
MAC address stored in RAM.
● If there is no match, the device discards the frame.
● If there is a match, the NIC passes the frame up the OSI layers, where the decapsulation process takes
place.
MAC Address
IP Address
Both the physical MAC and logical IP addresses are required for a computer to communicate just like both the name
and address of a person are required to send a letter.
Lesson 2
LAN Switches
2 The switch enters the source MAC address and the switch port that received the frame into the address table
3 Because the destination address is a broadcast, the switch floods the frame to all ports, except the port on which it
received the frame.
4 The destination device replies to the broadcast with a unicast frame addressed to PC 1.
5 The switch enters the source MAC address of PC 2 and the port number of the switch port that received the frame
into the address table. The destination address of the frame and its associated port is found in the MAC address
table.
6 The switch can now forward frames between source and destination devices without flooding, because it has
entries in the address table that identify the associated ports.
Switching
Half Duplex
Full Duplex
A store and forward switch receives the entire frame, and computes the CRC. If the CRC is valid, the switch looks up
the destination address, which determines the outgoing interface. The frame is then forwarded out the correct port.
Cut-through
A cut-through switch forwards the frame before it is entirely received. At a minimum, the destination address of the
frame must be read before the frame can be forwarded.
Fast-forward switching – lowest level of latency immediately forwards a packet after reading the destination
address.
Fragment-free switching – switch store the first 64 bytes of the frame before forwarding, most network errors
and collisions occur during the first 64 bytes.
Port-based memory In port-based memory buffering, frames are stored in queues that are linked to specific
incoming and outgoing ports
Shared memory Shared memory buffering deposits all frames into a common memory buffer, which all
the ports on the switch share.
Lesson 3
The address resolution protocol is a protocol used by the Internet Protocol (IP) specifically IPv4, to map IP network
addresses to the hardware addresses used by a data link protocol. The protocol operates below the network layer as
a part of the interface between the OSI network and OSI link layer. It is used when IPv4 is used over Ethernet.
The term address resolution refers to the process of finding an address of a computer in a network. The address is
"resolved" using a protocol in which a piece of information is sent by a client process executing on the local computer
to a server process executing on a remote computer. The information received by the server allows the server to
uniquely identify the network system for which the address was required and therefore to provide the required
address. The address resolution procedure is completed when the client receives a response from the server
containing the required address.
An Ethernet network uses two hardware addresses which identify the source and destination of each frame sent by
the Ethernet. The destination address (all 1's) may also identify a broadcast packet (to be sent to all connected
computers). The hardware address is also known as the Medium Access Control (MAC) address, in reference to the
standards which define Ethernet. Each computer network interface card is allocated a globally unique 6 byte link
address when the factory manufactures the card (stored in a PROM). This is the normal link source address used by
an interface. A computer sends all packets which it creates with its own hardware source link address, and receives
all packets which match the same hardware address in the destination field or one (or more) pre-selected
broadcast/multicast addresses.
The Ethernet address is a link layer address and is dependent on the interface card which is used. IP operates at the
network layer and is not concerned with the link addresses of individual nodes which are to be used. The address
resolution protocol is therefore used to translate between the two types of address. The arp client and server
processes operate on all computers using IP over Ethernet. The processes are normally implemented as part of the
software driver that drives the network interface card.