O slideshow foi denunciado.
Seu SlideShare está sendo baixado. ×

Ccna routing and_switching_chapter-4-5

Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Anúncio
Carregando em…3
×

Confira estes a seguir

1 de 75 Anúncio

Mais Conteúdo rRelacionado

Diapositivos para si (17)

Anúncio

Semelhante a Ccna routing and_switching_chapter-4-5 (20)

Mais recentes (20)

Anúncio

Ccna routing and_switching_chapter-4-5

  1. 1. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1 Chapter 4:Network Access Chapter 5:Ethernet Introduction to Networks Mohammad Mamun Elahi Assistant Professor, Department of CSE Instructor, UIU Cisco Networking Academy
  2. 2. Presentation_ID 2© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 4: Objectives Students will be able to:  Explain how physical layer protocols and services support communications across data networks.  Build a simple network using the appropriate.  Explain the role of the data link layer in supporting communications across data networks.  Compare media access control techniques and logical topologies used in networks.
  3. 3. Presentation_ID 3© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Purpose of the Physical Layer The Physical Layer
  4. 4. Presentation_ID 4© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Purpose of the Physical Layer Physical Layer Media
  5. 5. Presentation_ID 5© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Fundamental Principles of Layer 1 Physical Layer Fundamental Principles Media Physical Components Frame Encoding Technique Signalling Method Copper cable • UTP • Coaxial • Connectors • NICs • Ports • Interfaces • Manchester Encoding • Non-Return to Zero (NRZ) techniques • 4B/5B codes are used with Multi-Level Transition Level 3 (MLT-3) signaling • 8B/10B • PAM5 • Changes in the electromagnetic field • Intensity of the electromagnetic field • Phase of the electromagnetic wave Fiber Optic cable • Single-mode Fiber • Multimode Fiber • Connectors • NICs • Interfaces • Lasers and LEDs • Photoreceptors • Pulses of light • Wavelength multiplexing using different colors • A pulse equals 1. • No pulse is 0. Wireless media • Access Points • NICs • Radio • Antennae • DSSS (direct-sequence spread- spectrum) • OFDM (orthogonal frequency division multiplexing) • Radio waves
  6. 6. Presentation_ID 6© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Fundamental Principles of Layer 1 Bandwidth
  7. 7. Presentation_ID 7© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Fundamental Principles of Layer 1 Throughput
  8. 8. Presentation_ID 8© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Copper Cabling Copper Media Shielded Twisted Pair (STP) cableUnshielded Twisted Pair (UTP) cable Coaxial cable
  9. 9. Presentation_ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Copper Cabling Unshielded Twisted-Pair (UTP) Cable
  10. 10. Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Copper Cabling Shielded Twisted-Pair (STP) Cable Foil Shields Braided or Foil Shield
  11. 11. Presentation_ID 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Copper Cabling Coaxial Cable
  12. 12. Presentation_ID 12© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential UTP Cabling UTP Cabling Standards
  13. 13. Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential UTP Cabling UTP Connectors
  14. 14. Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential UTP Cabling Types of UTP Cable
  15. 15. Presentation_ID 15© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Fiber Optic Cabling Fiber Media Cable Design
  16. 16. Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Fiber Optic Cabling Types of Fiber Media
  17. 17. Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Fiber Optic Cabling Fiber versus Copper Implementation issues Copper media Fibre-optic Bandwidth supported 10 Mbps – 10 Gbps 10 Mbps – 100 Gbps Distance Relatively short (1 – 100 meters) Relatively High (1 – 100,000 meters) Immunity to EMI and RFI Low High (Completely immune) Immunity to electrical hazards Low High (Completely immune) Media and connector costs Lowest Highest Installation skills required Lowest Highest Safety precautions Lowest Highest
  18. 18. Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential • IEEE 802.11 standards • Commonly referred to as Wi-Fi. • Uses CSMA/CA • Variations include: • 802.11a: 54 Mbps, 5 GHz • 802.11b: 11 Mbps, 2.4 GHz • 802.11g: 54 Mbps, 2.4 GHz • 802.11n: 600 Mbps, 2.4 and 5 GHz • 802.11ac: 1 Gbps, 5 GHz • 802.11ad: 7 Gbps, 2.4 GHz, 5 GHz, and 60 GHz • IEEE 802.15 standard • Supports speeds up to 3 Mbps • Provides device pairing over distances from 1 to 100 meters. • IEEE 802.16 standard • Provides speeds up to 1 Gbps • Uses a point-to-multipoint topology to provide wireless broadband access. Wireless Media Types of Wireless Media
  19. 19. Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Wireless Media 802.11 Wi-Fi Standards Standard Maximum Speed Frequency Backwards compatible 802.11a 54 Mbps 5 GHz No 802.11b 11 Mbps 2.4 GHz No 802.11g 54 Mbps 2.4 GHz 802.11b 802.11n 600 Mbps 2.4 GHz or 5 GHz 802.11b/g 802.11ac 1.3 Gbps (1300 Mbps) 2.4 GHz and 5.5 GHz 802.11b/g/n 802.11ad 7 Gbps (7000 Mbps) 2.4 GHz, 5 GHz and 60 GHz 802.11b/g/n/ac
  20. 20. Presentation_ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Purpose of the Data Link Layer The Data Link Layer
  21. 21. Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Purpose of the Data Link Layer Data Link Sublayers Network Data Link LLC Sublayer MAC Sublayer Physical 802.3 Ethernet 802.11 Wi-Fi 802.15 Bluetooth
  22. 22. Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Purpose of the Data Link Layer Media Access Control
  23. 23. Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Purpose of the Data Link Layer Providing Access to Media
  24. 24. Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Data Link Layer Layer 2 Frame Structure
  25. 25. Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Topologies Controlling Access to the Media
  26. 26. Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Topologies Physical and Logical Topologies
  27. 27. Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential WAN Topologies Common Physical WAN Topologies
  28. 28. Presentation_ID 28© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential WAN Topologies Physical Point-to-Point Topology
  29. 29. Presentation_ID 29© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential WAN Topologies Logical Point-to-Point Topology
  30. 30. Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential WAN Topologies Half and Full Duplex
  31. 31. Presentation_ID 31© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential LAN Topologies Physical LAN Topologies
  32. 32. Presentation_ID 32© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential LAN Topologies Logical Topology for Shared Media
  33. 33. Presentation_ID 33© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential LAN Topologies Contention-Based Access Characteristics Contention-Based Technologies • Stations can transmit at any time • Collision exist • There are mechanisms to resolve contention for the media • CSMA/CD for 802.3 Ethernet networks • CSMA/CA for 802.11 wireless networks
  34. 34. Presentation_ID 34© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential LAN Topologies Controlled Access Characteristics Controlled Access Technologies • Only one station can transmit at a time • Devices wishing to transmit must wait their turn • No collisions • May use a token passing method • Token Ring (IEEE 802.5) • Fiber Distributed Data Interface (FDDI)
  35. 35. Presentation_ID 35© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Data Link Frame The Frame
  36. 36. Presentation_ID 36© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Data Link Frame Layer 2 Address
  37. 37. Presentation_ID 37© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 5 : Objectives In this chapter, you will learn to:  Describe the operation of the Ethernet sublayers.  Identify the major fields of the Ethernet frame.  Describe the purpose and characteristics of the Ethernet MAC address.  Describe the purpose of ARP.  Explain how ARP requests impact network and host performance.  Explain basic switching concepts.  Compare fixed configuration and modular switches.  Configure a Layer 3 switch.
  38. 38. Presentation_ID 38© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Ethernet Operation LLC and MAC Sublayers Ethernet – • Most widely used LAN technology • Operates in the data link layer and the physical layer • Family of networking technologies that are defined in the IEEE 802.2 and 802.3 standards • Supports data bandwidths of 10, 100, 1000, 10,000, 40,000, and 100,000 Mbps (100 Gbps) Ethernet standards – • Define Layer 2 protocols and Layer 1 technologies • Two separate sub layers of the data link layer to operate - Logical link control (LLC) and the MAC sublayers
  39. 39. Presentation_ID 39© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Ethernet Operation LLC and MAC Sublayers
  40. 40. Presentation_ID 40© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Ethernet Operation LLC and MAC Sublayers LLC • Handles communication between upper and lower layers • Takes the network protocol data and adds control information to help deliver the packet to the destination MAC • Constitutes the lower sublayer of the data link layer • Implemented by hardware, typically in the computer NIC • Two primary responsibilities: • Data encapsulation • Media access control
  41. 41. Presentation_ID 41© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Ethernet Operation MAC Sublayer Data encapsulation • Frame assembly before transmission and frame disassembly upon reception of a frame • MAC layer adds a header and trailer to the network layer PDU Provides three primary functions: • Frame delimiting – identifies a group of bits that make up a frame, synchronization between the transmitting and receiving nodes • Addressing – each Ethernet header added in the frame contains the physical address (MAC address) that enables a frame to be delivered to a destination node • Error detection - each Ethernet frame contains a trailer with a cyclic redundancy check (CRC) of the frame contents
  42. 42. Presentation_ID 42© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Ethernet Operation MAC Sublayer Media Access Control • Responsible for the placement of frames on the media and the removal of frames from the media • Communicates directly with the physical layer • If multiple devices on a single medium attempt to forward data simultaneously, the data will collide resulting in corrupted, unusable data • Ethernet provides a method for controlling how the nodes share access through the use a Carrier Sense Multiple Access (CSMA) technology
  43. 43. Presentation_ID 43© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Ethernet Operation Media Access Control Carrier Sense Multiple Access (CSMA) process • Used to first detect if the media is carrying a signal • If no carrier signal is detected, the device transmits its data • If two devices transmit at the same time - data collision
  44. 44. Presentation_ID 44© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Ethernet Operation Media Access Control
  45. 45. Presentation_ID 45© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Ethernet Operation MAC Address: Ethernet Identity • Layer 2 Ethernet MAC address is a 48-bit binary value expressed as 12 hexadecimal digits  IEEE requires a vendor to follow two simple rules: • Must use that vendor's assigned OUI as the first 3 bytes • All MAC addresses with the same OUI must be assigned a unique value in the last 3 bytes
  46. 46. Presentation_ID 46© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Ethernet Operation Frame Processing  MAC addresses assigned to workstations, servers, printers, switches, and routers  Example MACs: 00-05-9A-3C-78-00, 00:05:9A:3C:78:00, or 0005.9A3C.7800.  Forwarded message to an Ethernet network, attaches header information to the packet, contains the source and destination MAC address  Each NIC views information to see if the destination MAC address in the frame matches the device’s physical MAC address stored in RAM  No match, the device discards the frame  Matches the destination MAC of the frame, the NIC passes the frame up the OSI layers, where the decapsulation process takes place
  47. 47. Presentation_ID 47© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Ethernet Frame Attributes Introduction to the Ethernet Frame Preamble and Start Frame Delimiter Fields Used for synchronization between the sending and receiving devices Length/Type Field Defines the exact length of the frame's data field/ describes which protocol is implemented Data and Pad Fields Contain the encapsulated data from a higher layer, an IPv4 packet
  48. 48. Presentation_ID 48© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Ethernet Frame Attributes Introduction to the Ethernet Frame Frame Check Sequence Field Used to detect errors in a frame with cyclic redundancy check (4 bytes), if calculations match at source and receiver, no error occurred.
  49. 49. Presentation_ID 49© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Ethernet MAC MAC Address Representations
  50. 50. Presentation_ID 50© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Ethernet MAC Unicast MAC Address
  51. 51. Presentation_ID 51© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Ethernet MAC Broadcast MAC Address
  52. 52. Presentation_ID 52© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Ethernet MAC Multicast MAC Address Multicast MAC address is a special value that begins with 01-00-5E in hexadecimal Range of IPV4 multicast addresses is 224.0.0.0 to 239.255.255.255
  53. 53. Presentation_ID 53© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential MAC and IP MAC and IP MAC address  This address does not change  Similar to the name of a person  Known as physical address because physically assigned to the host NIC IP address  Similar to the address of a person  Based on where the host is actually located  Known as a logical address because assigned logically  Assigned to each host by a network administrator Both the physical MAC and logical IP addresses are required for a computer to communicate just like both the name and address of a person are required to send a letter
  54. 54. Presentation_ID 54© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Ethernet MAC End-to-End Connectivity, MAC, and IP
  55. 55. Presentation_ID 55© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Ethernet MAC End-to-End Connectivity, MAC, and IP
  56. 56. Presentation_ID 56© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential ARP Introduction to ARP ARP Purpose  Sending node needs a way to find the MAC address of the destination for a given Ethernet link The ARP protocol provides two basic functions:  Resolving IPv4 addresses to MAC addresses  Maintaining a table of mappings
  57. 57. Presentation_ID 57© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential ARP Introduction to ARP
  58. 58. Presentation_ID 58© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential ARP ARP Functions/Operation
  59. 59. Presentation_ID 59© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential ARP ARP Functions/Operation
  60. 60. Presentation_ID 60© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential ARP ARP Functions/Operation
  61. 61. Presentation_ID 61© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential ARP ARP Functions/Operation
  62. 62. Presentation_ID 62© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential ARP ARP Functions/Operation
  63. 63. Presentation_ID 63© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential ARP ARP Functions/Operation
  64. 64. Presentation_ID 64© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential ARP ARP Tables on Networking Devices
  65. 65. Presentation_ID 65© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Switching Switch Port Fundamentals Layer 2 LAN switch  Connects end devices to a central intermediate device on most Ethernet networks  Performs switching and filtering based only on the MAC address  Builds a MAC address table that it uses to make forwarding decisions  Depends on routers to pass data between IP subnetworks
  66. 66. Presentation_ID 66© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Switching Switch MAC Address Table 1. The switch receives a broadcast frame from PC 1 on Port 1. 2. The switch enters the source MAC address and the switch port that received the frame into the address table. 3. Because the destination address is a broadcast, the switch floods the frame to all ports, except the port on which it received the frame. 4. The destination device replies to the broadcast with a unicast frame addressed to PC 1. Continued…
  67. 67. Presentation_ID 67© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Switching Switch MAC Address Table 5. The switch enters the source MAC address of PC 2 and the port number of the switch port that received the frame into the address table. The destination address of the frame and its associated port is found in the MAC address table. 6. The switch can now forward frames between source and destination devices without flooding, because it has entries in the address table that identify the associated ports.
  68. 68. Presentation_ID 68© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Switching Duplex Settings
  69. 69. Presentation_ID 69© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Switching Frame Forwarding Methods on Cisco Switches
  70. 70. Presentation_ID 70© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Switching Cut-through Switching Two variants: Fast-forward switching: • Lowest level of latency immediately forwards a packet after reading the destination address, typical cut-through method of switching Fragment-free switching: • Switch stores the first 64 bytes of the frame before forwarding, most network errors and collisions occur during the first 64 bytes
  71. 71. Presentation_ID 71© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Switching Memory Buffering on Switches
  72. 72. Presentation_ID 72© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Fixed or Modular Fixed verses Modular Configuration
  73. 73. Presentation_ID 73© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Fixed or Modular Fixed verses Modular Configuration
  74. 74. Presentation_ID 74© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Layer 3 Switching Layer 2 verses Layer 3 Switching
  75. 75. Presentation_ID 75© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

×