SlideShare uma empresa Scribd logo
1 de 71
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1
Chapter 4:
Network Access
Introduction to Networks
Presentation_ID 2© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 4: Objectives
Upon completion of this chapter, you will be able to:
 Identify device connectivity options.
 Describe the purpose and functions of the physical layer in the
network.
 Describe basic principles of the physical layer standards.
 Identify the basic characteristics of copper cabling.
 Build a UTP cable used in Ethernet networks.
 Describe fiber-optic cabling and its main advantages over other
media.
 Describe wireless media.
 Select the appropriate media for a given requirement and connect
devices.
Presentation_ID 3© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 4: Objectives (cont.)
Upon completion of this chapter, you will be able to:
 Describe the purpose and function of the data link layer in
preparing communication for transmission on specific media.
 Describe the Layer 2 frame structure and identify generic fields.
 Identify several sources for the protocols and standards used by
the data link layer.
 Compare the functions of logical topologies and physical
topologies.
 Describe the basic characteristics of media control methods on
WAN topologies.
 Describe the basic characteristics of media control methods on
LAN topologies.
 Describe the characteristics and functions of the data link frame.
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 4
4.4 Media Access Control
Presentation_ID 5© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 4
4.1 Physical Layer Protocols
4.2 Network Media
4.3 Data Link Layer Protocols
4.4 Media Access Control
4.5 Summary
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 6
4.1 Physical Layer Protocols
Presentation_ID 7© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Getting it Connected
Connecting to the Network
Presentation_ID 8© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Getting it Connected
Connecting to the Network (cont.)
Presentation_ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Getting it Connected
Network Interface Cards
Connecting to the Wireless LAN with a Range Extender
Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Purpose of the Physical Layer
The Physical Layer
Presentation_ID 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Purpose of the Physical Layer
Physical Layer Media
Presentation_ID 12© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Purpose of the Physical Layer
Physical Layer Standards
Standard
Organization
Networking Standards
ISO
• ISO 8877: Officially adopted the RJ connectors (e.g., RJ-11, RJ-45)
• ISO 11801: Network cabling standard similar to EIA/TIA 568.
EIA/TIA
• TIA-568-C: Telecommunications cabling standards, used by nearly all
voice, video and data networks.
• TIA-569-B: Commercial Building Standards for Telecommunications
Pathways and Spaces
• TIA-598-C: Fiber optic color coding
• TIA-942: Telecommunications Infrastructure Standard for Data Centers
ANSI • 568-C: RJ-45 pinouts. Co-developed with EIA/TIA
ITU-T • G.992: ADSL
IEEE
• 802.3: Ethernet
• 802.11: Wireless LAN (WLAN) & Mesh (Wi-Fi certification)
• 802.15: Bluetooth
Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Fundamental Principles of Layer 1
Physical Layer Fundamental Principles
Media
Physical
Components
Frame Encoding
Technique
Signalling Method
Copper
Cable
• UTP
• Coaxial
• Connectors
• NICs
• Ports
• Interfaces
• Manchester Encoding
• Non-Return to Zero (NRZ)
techniques
• 4B/5B codes are used with
Multi-Level Transition Level 3
(MLT-3) signaling
• 8B/10B
• PAM5
• Changes in the
electromagnetic field
• Intensity of the
electromagnetic field
• Phase of the
electromagnetic
wave
Fiber Optic
Cable
• Single-mode Fiber
• Multimode Fiber
• Connectors
• NICs
• Interfaces
• Lasers and LEDs
• Photoreceptors
• Pulses of light
• Wavelength multiplexing using
different colors
• A pulse equals 1.
• No pulse is 0.
Wireless
Media
• Access Points
• NICs
• Radio
• Antennae
• DSSS (direct-sequence
spread-spectrum)
• OFDM (orthogonal frequency
division multiplexing)
• Radio waves
Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Fundamental Principles of Layer 1
Bandwidth
Presentation_ID 15© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Fundamental Principles of Layer 1
Throughput
Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Fundamental Principles of Layer 1
Types of Physical Media
Gigabit Ethernet
Interfaces
SHDSL
Interface
Management
Ports
FastEthernet
Switch Ports
USB Mini-B
Connector
USB Type A
Connector
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 17
4.2 Network Media
Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Copper Cabling
Characteristics of Copper Media
Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Copper Cabling
Copper Media
Shielded Twisted
Pair (STP) Cable
Unshielded Twisted
Pair (UTP) Cable
Coaxial Cable
Presentation_ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Copper Cabling
UTP Cable
Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Copper Cabling
STP Cable
Foil Shields
Braided or Foil Shield
Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Copper Cabling
Coaxial Cable
Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Copper Cabling
Cooper Media Safety
Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
UTP Cabling
Properties of UTP Cabling
UTP cable does not use shielding to counter the effects of EMI and
RFI. Instead, cable designers have discovered that they can limit the
negative effect of crosstalk by:
 Cancellation
 Varying the number of twists per wire pair
Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
UTP Cabling
UTP Cabling Standards
Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
UTP Cabling
UTP Connectors
Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
UTP Cabling
Types of UTP Cable
Presentation_ID 28© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
UTP Cabling
Testing UTP Cables
After installation, a UTP cable tester should be used to test for the following
parameters:
 Wire map
 Cable length
 Signal loss due to attenuation
 Crosstalk
Presentation_ID 29© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Fiber Optic Cabling
Properties of Fiber Optic Cabling
Fiber-optic cabling is now being used in four types of industry:
 Enterprise Networks
 Fiber-to-the-home (FTTH) and Access Networks
 Long-Haul Networks
 Submarine Networks
Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Fiber Optic Cabling
Fiber Media Cable Design
Presentation_ID 31© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Fiber Optic Cabling
Types of Fiber Media
Presentation_ID 32© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Fiber Optic Cabling
Network Fiber Connectors
Presentation_ID 33© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Fiber Optic Cabling
Testing Fiber Cables
Presentation_ID 34© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Fiber Optic Cabling
Fiber versus Copper
Implementation Issues Copper Media Fibre Optic
Bandwidth Supported 10 Mbps – 10 Gbps 10 Mbps – 100 Gbps
Distance
Relatively short
(1 – 100 meters)
Relatively High
(1 – 100,000 meters)
Immunity To EMI And RFI Low
High
(Completely immune)
Immunity To Electrical Hazards Low
High
(Completely immune)
Media And Connector Costs Lowest Highest
Installation Skills Required Lowest Highest
Safety Precautions Lowest Highest
Presentation_ID 35© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Wireless Media
Properties of Wireless Media
Wireless does have some areas of concern including:
 Coverage area
 Interference
 Security
Presentation_ID 36© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
• IEEE 802.11 standards
• Commonly referred to as Wi-Fi.
• Uses CSMA/CA
• Variations include:
• 802.11a: 54 Mbps, 5 GHz
• 802.11b: 11 Mbps, 2.4 GHz
• 802.11g: 54 Mbps, 2.4 GHz
• 802.11n: 600 Mbps, 2.4 and 5 GHz
• 802.11ac: 1 Gbps, 5 GHz
• 802.11ad: 7 Gbps, 2.4 GHz, 5 GHz, and 60 GHz
• IEEE 802.15 standard
• Supports speeds up to 3 Mb/s
• Provides device pairing over distances from 1 to 100
meters.
• IEEE 802.16 standard
• Provides speeds up to 1 Gbps
• Uses a point-to-multipoint topology to provide
wireless broadband access.
Wireless Media
Types of Wireless Media
Presentation_ID 37© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Wireless Media
Wireless LAN
Cisco Linksys EA6500 802.11ac Wireless Router
Presentation_ID 38© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Wireless Media
802.11 Wi-Fi Standards
Standard
Maximum
Speed
Frequency
Backwards
Compatible
802.11a 54 Mbps 5 GHz No
802.11b 11 Mbps 2.4 GHz No
802.11g 54 Mbps 2.4 GHz 802.11b
802.11n 600 Mbps 2.4 GHz or 5 GHz 802.11b/g
802.11ac
1.3 Gbps
(1300 Mbps)
2.4 GHz and 5.5
GHz
802.11b/g/n
802.11ad
7 Gbps
(7000 Mbps)
2.4 GHz, 5 GHz and
60 GHz
802.11b/g/n/ac
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 39
4.3 Data Link Layer Protocols
Presentation_ID 40© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Purpose of the Data Link Layer
The Data Link Layer
Presentation_ID 41© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Purpose of the Data Link Layer
Data Link Sublayers
Network
Data Link
LLC Sublayer
MAC Sublayer
Physical
802.3
Ethernet
802.11
Wi-Fi
802.15
Bluetooth
Presentation_ID 42© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Purpose of the Data Link Layer
Media Access Control
The Data Link Layer
Presentation_ID 43© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Purpose of the Data Link Layer
Providing Access to Media
Presentation_ID 44© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Data Link Layer
Formatting Data for Transmission
Presentation_ID 45© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Layer 2 Frame Structure
Creating a Frame
Presentation_ID 46© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Layer 2 Standards
Data Link Layer Standards
Standard
organization
Networking Standards
IEEE
• 802.2: Logical Link Control (LLC)
• 802.3: Ethernet
• 802.4: Token bus
• 802.5: Token passing
• 802.11: Wireless LAN (WLAN) & Mesh (Wi-Fi certification)
• 802.15: Bluetooth
• 802.16: WiMax
ITU-T
• G.992: ADSL
• G.8100 - G.8199: MPLS over Transport aspects
• Q.921: ISDN
• Q.922: Frame Relay
ISO
• HDLC (High Level Data Link Control)
• ISO 9314: FDDI Media Access Control (MAC)
ANSI • X3T9.5 and X3T12: Fiber Distributed Data Interface (FDDI)
Presentation_ID 47© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Topologies
Controlling Access to the Media
Presentation_ID 48© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Topologies
Physical and Logical Topologies
Presentation_ID 49© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Topologies
Physical and Logical Topologies (cont.)
Presentation_ID 50© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
WAN Topologies
Common Physical WAN Topologies
Presentation_ID 51© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
WAN Topologies
Physical Point-to-Point Topology
Presentation_ID 52© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
WAN Topologies
Logical Point-to-Point Topology
Presentation_ID 53© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
WAN Topologies
Half- and Full-Duplex
Half-Duplex
Full-Duplex
Presentation_ID 54© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
LAN Topologies
Physical LAN Topologies
Presentation_ID 55© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
LAN Topologies
Logical Topology for Shared Media
Presentation_ID 56© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
LAN Topologies
Contention-Based Access
Characteristics Contention-Based Technologies
• Stations can transmit at any time
• Collision exist
• There are mechanisms to resolve
contention for the media
• CSMA/CD for 802.3 Ethernet networks
• CSMA/CA for 802.11 wireless networks
Presentation_ID 57© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
LAN Topologies
Multi-Access Topology
Presentation_ID 58© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
LAN Topologies
Controlled Access
Characteristics Controlled Access Technologies
• Only one station can transmit at a time
• Devices wanting to transmit must wait
their turn
• No collisions
• May use a token passing method
• Token Ring (IEEE 802.5)
• FDDI
Presentation_ID 59© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
LAN Topologies
Ring Topology
Presentation_ID 60© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Data Link Frame
The Frame
Presentation_ID 61© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Data Link Frame
The Header
Presentation_ID 62© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Data Link Frame
Layer 2 Address
Presentation_ID 63© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Data Link Frame
The Trailer
Presentation_ID 64© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Data Link Frame
LAN and WAN Frames
Presentation_ID 65© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Data Link Frame
Ethernet Frame
Presentation_ID 66© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Data Link Frame
Point-to-Point Protocol Frame
Presentation_ID 67© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Data Link Frame
802.11 Wireless Frame
Presentation_ID 68© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Access
Summary
 The TCP/IP network access layer is the equivalent of the OSI data link
layer (Layer 2) and the physical layer (Layer 1).
 The OSI physical layer provides the means to transport the bits that make
up a data link layer frame across the network media.
 The physical layer standards address three functional areas: physical
components, frame encoding technique, and signaling method.
 Using the proper media is an important part of network communications.
Without the proper physical connection, either wired or wireless,
communications between any two devices will not occur.
 Wired communication consists of copper media and fiber cable.
 There are three main types of copper media used in networking:
unshielded-twisted pair (UTP), shielded-twisted pair (STP), and coaxial
cable. UTP cabling is the most common copper networking media.
Presentation_ID 69© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Access
Summary (cont.)
 Optical fiber cable has become very popular for interconnecting
infrastructure network devices. It permits the transmission of data over
longer distances and at higher bandwidths (data rates) than any other
networking media.
 Wireless media carry electromagnetic signals that represent the binary
digits of data communications using radio or microwave frequencies.
 The data link layer is responsible for the exchange of frames between
nodes over a physical network media. It allows the upper layers to access
the media and controls how data is placed and received on the media.
 Among the different implementations of the data link layer protocols, there
are different methods of controlling access to the media. These media
access control techniques define if and how the nodes share the media.
 The actual media access control method used depends on the topology
and media sharing. LAN and WAN topologies can be physical or logical.
Presentation_ID 70© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Access
Summary (cont.)
 WANs are commonly interconnected using the point-to-point, hub and
spoke, or mesh physical topologies.
 In shared media LANs, end devices can be interconnected using the star,
bus, ring, or extended star (hybrid) physical topologies.
 All data link layer protocols encapsulate the Layer 3 PDU within the data
field of the frame. However, the structure of the frame and the fields
contained in the header and trailer vary according to the protocol.
Presentation_ID 71© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Mais conteúdo relacionado

Mais procurados

CCNA 2 Routing and Switching v5.0 Chapter 1
CCNA 2 Routing and Switching v5.0 Chapter 1CCNA 2 Routing and Switching v5.0 Chapter 1
CCNA 2 Routing and Switching v5.0 Chapter 1Nil Menon
 
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and ConfigurationCCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and ConfigurationVuz Dở Hơi
 
CCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing ConceptsCCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing ConceptsVuz Dở Hơi
 
CCNAv5 - S1: Chapter11 It's A Network
CCNAv5 - S1: Chapter11 It's A NetworkCCNAv5 - S1: Chapter11 It's A Network
CCNAv5 - S1: Chapter11 It's A NetworkVuz Dở Hơi
 
CCNAv5 - S2: Chapter11 Network Address Translation for ipv4
CCNAv5 - S2: Chapter11 Network Address Translation for ipv4CCNAv5 - S2: Chapter11 Network Address Translation for ipv4
CCNAv5 - S2: Chapter11 Network Address Translation for ipv4Vuz Dở Hơi
 
CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6Nil Menon
 
CCNA 1 Routing and Switching v5.0 Chapter 8
CCNA 1 Routing and Switching v5.0 Chapter 8CCNA 1 Routing and Switching v5.0 Chapter 8
CCNA 1 Routing and Switching v5.0 Chapter 8Nil Menon
 
CCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point ConnectionsCCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point ConnectionsVuz Dở Hơi
 
CCNAv5 - S2: Chapter3 Vlans
CCNAv5 - S2: Chapter3 VlansCCNAv5 - S2: Chapter3 Vlans
CCNAv5 - S2: Chapter3 VlansVuz Dở Hơi
 
CCNA RS_ITN - Chapter 6
CCNA RS_ITN - Chapter 6CCNA RS_ITN - Chapter 6
CCNA RS_ITN - Chapter 6Irsandi Hasan
 
CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11Nil Menon
 
CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3Nil Menon
 
CCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNAv5 - S3: Chapter1 Introduction to Scaling NetworksCCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNAv5 - S3: Chapter1 Introduction to Scaling NetworksVuz Dở Hơi
 
CCMAv5 - S4: Chapter 6: Broadband Solutions
CCMAv5 - S4: Chapter 6: Broadband SolutionsCCMAv5 - S4: Chapter 6: Broadband Solutions
CCMAv5 - S4: Chapter 6: Broadband SolutionsVuz Dở Hơi
 
CCNAv5 - S4: Chapter2 Connecting To The Wan
CCNAv5 - S4: Chapter2 Connecting To The WanCCNAv5 - S4: Chapter2 Connecting To The Wan
CCNAv5 - S4: Chapter2 Connecting To The WanVuz Dở Hơi
 
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1Nil Menon
 
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4Nil Menon
 
CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7Nil Menon
 

Mais procurados (19)

CCNA 2 Routing and Switching v5.0 Chapter 1
CCNA 2 Routing and Switching v5.0 Chapter 1CCNA 2 Routing and Switching v5.0 Chapter 1
CCNA 2 Routing and Switching v5.0 Chapter 1
 
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and ConfigurationCCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
 
CCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing ConceptsCCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing Concepts
 
CCNAv5 - S1: Chapter11 It's A Network
CCNAv5 - S1: Chapter11 It's A NetworkCCNAv5 - S1: Chapter11 It's A Network
CCNAv5 - S1: Chapter11 It's A Network
 
CCNAv5 - S2: Chapter11 Network Address Translation for ipv4
CCNAv5 - S2: Chapter11 Network Address Translation for ipv4CCNAv5 - S2: Chapter11 Network Address Translation for ipv4
CCNAv5 - S2: Chapter11 Network Address Translation for ipv4
 
CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6
 
CCNA 1 Routing and Switching v5.0 Chapter 8
CCNA 1 Routing and Switching v5.0 Chapter 8CCNA 1 Routing and Switching v5.0 Chapter 8
CCNA 1 Routing and Switching v5.0 Chapter 8
 
CCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point ConnectionsCCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point Connections
 
CCNAv5 - S2: Chapter3 Vlans
CCNAv5 - S2: Chapter3 VlansCCNAv5 - S2: Chapter3 Vlans
CCNAv5 - S2: Chapter3 Vlans
 
CCNA RS_ITN - Chapter 6
CCNA RS_ITN - Chapter 6CCNA RS_ITN - Chapter 6
CCNA RS_ITN - Chapter 6
 
CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11
 
CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3
 
CCNA Chapter1
CCNA Chapter1CCNA Chapter1
CCNA Chapter1
 
CCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNAv5 - S3: Chapter1 Introduction to Scaling NetworksCCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNAv5 - S3: Chapter1 Introduction to Scaling Networks
 
CCMAv5 - S4: Chapter 6: Broadband Solutions
CCMAv5 - S4: Chapter 6: Broadband SolutionsCCMAv5 - S4: Chapter 6: Broadband Solutions
CCMAv5 - S4: Chapter 6: Broadband Solutions
 
CCNAv5 - S4: Chapter2 Connecting To The Wan
CCNAv5 - S4: Chapter2 Connecting To The WanCCNAv5 - S4: Chapter2 Connecting To The Wan
CCNAv5 - S4: Chapter2 Connecting To The Wan
 
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1
 
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4
 
CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7
 

Semelhante a Network Access Overview

Itn instructor ppt_chapter4_network_access
Itn instructor ppt_chapter4_network_accessItn instructor ppt_chapter4_network_access
Itn instructor ppt_chapter4_network_accessbebe tampan
 
Ccna v5-S1-Chapter 4
Ccna v5-S1-Chapter 4Ccna v5-S1-Chapter 4
Ccna v5-S1-Chapter 4Hamza Malik
 
CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4Irsandi Hasan
 
CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9Irsandi Hasan
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 4
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 4CCNA (R & S) Module 01 - Introduction to Networks - Chapter 4
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 4Waqas Ahmed Nawaz
 
Itn6 instructor materials_chapter4
Itn6 instructor materials_chapter4Itn6 instructor materials_chapter4
Itn6 instructor materials_chapter4limenih muluneh
 
NetEss_Lecture Notes 1 (1).pptx
NetEss_Lecture Notes 1 (1).pptxNetEss_Lecture Notes 1 (1).pptx
NetEss_Lecture Notes 1 (1).pptxSaqibAhmedKhan4
 
Chapter 03 - Network Protocols and Communications
Chapter 03 - Network Protocols and CommunicationsChapter 03 - Network Protocols and Communications
Chapter 03 - Network Protocols and CommunicationsYaser Rahmati
 
CCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communicationsCCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communicationsVuz Dở Hơi
 
Chapter 3 : Network protocols and communications
Chapter 3 : Network protocols and communicationsChapter 3 : Network protocols and communications
Chapter 3 : Network protocols and communicationsteknetir
 
CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3Irsandi Hasan
 
Modulo 4 cisco ccna v7 para estudiantes d
Modulo 4 cisco ccna v7 para estudiantes dModulo 4 cisco ccna v7 para estudiantes d
Modulo 4 cisco ccna v7 para estudiantes dSebastianAcevedoGome1
 
Network Fundamentals – Chapter 2
Network Fundamentals – Chapter 2Network Fundamentals – Chapter 2
Network Fundamentals – Chapter 2Sachii Dosti
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 1
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 1CCNA (R & S) Module 01 - Introduction to Networks - Chapter 1
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 1Waqas Ahmed Nawaz
 
CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3Irsandi Hasan
 
Ccna v5-S1-Chapter 3
Ccna v5-S1-Chapter 3Ccna v5-S1-Chapter 3
Ccna v5-S1-Chapter 3Hamza Malik
 

Semelhante a Network Access Overview (20)

Itn instructor ppt_chapter4_network_access
Itn instructor ppt_chapter4_network_accessItn instructor ppt_chapter4_network_access
Itn instructor ppt_chapter4_network_access
 
Itn instructor ppt_chapter4_network_access
Itn instructor ppt_chapter4_network_accessItn instructor ppt_chapter4_network_access
Itn instructor ppt_chapter4_network_access
 
Ccna v5-S1-Chapter 4
Ccna v5-S1-Chapter 4Ccna v5-S1-Chapter 4
Ccna v5-S1-Chapter 4
 
CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4
 
Ccna routing and_switching_chapter-4-5
Ccna routing and_switching_chapter-4-5Ccna routing and_switching_chapter-4-5
Ccna routing and_switching_chapter-4-5
 
CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 4
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 4CCNA (R & S) Module 01 - Introduction to Networks - Chapter 4
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 4
 
Itn6 instructor materials_chapter4
Itn6 instructor materials_chapter4Itn6 instructor materials_chapter4
Itn6 instructor materials_chapter4
 
NetEss_Lecture Notes 1 (1).pptx
NetEss_Lecture Notes 1 (1).pptxNetEss_Lecture Notes 1 (1).pptx
NetEss_Lecture Notes 1 (1).pptx
 
Chapter 03 - Network Protocols and Communications
Chapter 03 - Network Protocols and CommunicationsChapter 03 - Network Protocols and Communications
Chapter 03 - Network Protocols and Communications
 
CCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communicationsCCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communications
 
Chapter 3 : Network protocols and communications
Chapter 3 : Network protocols and communicationsChapter 3 : Network protocols and communications
Chapter 3 : Network protocols and communications
 
CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3
 
Modulo 4 cisco ccna v7 para estudiantes d
Modulo 4 cisco ccna v7 para estudiantes dModulo 4 cisco ccna v7 para estudiantes d
Modulo 4 cisco ccna v7 para estudiantes d
 
chp 01
chp 01chp 01
chp 01
 
Network Fundamentals – Chapter 2
Network Fundamentals – Chapter 2Network Fundamentals – Chapter 2
Network Fundamentals – Chapter 2
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 1
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 1CCNA (R & S) Module 01 - Introduction to Networks - Chapter 1
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 1
 
CCNA Modulo 1 capitulo 1.pdf
CCNA Modulo 1 capitulo 1.pdfCCNA Modulo 1 capitulo 1.pdf
CCNA Modulo 1 capitulo 1.pdf
 
CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3
 
Ccna v5-S1-Chapter 3
Ccna v5-S1-Chapter 3Ccna v5-S1-Chapter 3
Ccna v5-S1-Chapter 3
 

Mais de Yaser Rahmati

Cisco WLAN - Chapter. 08 : Applications, Design, and Site Survey Preparation
Cisco WLAN - Chapter. 08 : Applications, Design, and Site Survey  PreparationCisco WLAN - Chapter. 08 : Applications, Design, and Site Survey  Preparation
Cisco WLAN - Chapter. 08 : Applications, Design, and Site Survey PreparationYaser Rahmati
 
Cisco WLAN - Chapter. 07 : Antennas
Cisco WLAN - Chapter. 07 : AntennasCisco WLAN - Chapter. 07 : Antennas
Cisco WLAN - Chapter. 07 : AntennasYaser Rahmati
 
Cisco WLAN - Chapter. 06 : bridges
Cisco WLAN - Chapter. 06 : bridgesCisco WLAN - Chapter. 06 : bridges
Cisco WLAN - Chapter. 06 : bridgesYaser Rahmati
 
Cisco WLAN - Chapter. 05 : Access Points
Cisco WLAN - Chapter. 05 : Access PointsCisco WLAN - Chapter. 05 : Access Points
Cisco WLAN - Chapter. 05 : Access PointsYaser Rahmati
 
Cisco WLAN - Chapter. 03 : wireless radio technology
Cisco WLAN - Chapter. 03 : wireless radio technologyCisco WLAN - Chapter. 03 : wireless radio technology
Cisco WLAN - Chapter. 03 : wireless radio technologyYaser Rahmati
 
Cisco WLAN - Chapter. 04 : wireless topologies
Cisco WLAN - Chapter. 04 : wireless topologiesCisco WLAN - Chapter. 04 : wireless topologies
Cisco WLAN - Chapter. 04 : wireless topologiesYaser Rahmati
 
Cisco WLAN - Chapter. 02 : Part 3 – 802.11 phy
Cisco WLAN -  Chapter. 02 : Part 3 – 802.11 phyCisco WLAN -  Chapter. 02 : Part 3 – 802.11 phy
Cisco WLAN - Chapter. 02 : Part 3 – 802.11 phyYaser Rahmati
 
Cisco WLAN - Chapter. 02 : Part 2 – 802.11 MAC
Cisco WLAN -  Chapter. 02 : Part 2 – 802.11 MACCisco WLAN -  Chapter. 02 : Part 2 – 802.11 MAC
Cisco WLAN - Chapter. 02 : Part 2 – 802.11 MACYaser Rahmati
 
Cisco WLAN - Chapter. 02 : Part 1 – 802.11 MAC and Cisco Client Adapters
Cisco WLAN -  Chapter. 02 :  Part 1 – 802.11 MAC and Cisco Client AdaptersCisco WLAN -  Chapter. 02 :  Part 1 – 802.11 MAC and Cisco Client Adapters
Cisco WLAN - Chapter. 02 : Part 1 – 802.11 MAC and Cisco Client AdaptersYaser Rahmati
 
Cisco WLAN - Chapter. 01 : Overview of Wireless LANs
Cisco WLAN -  Chapter. 01 : Overview of Wireless LANsCisco WLAN -  Chapter. 01 : Overview of Wireless LANs
Cisco WLAN - Chapter. 01 : Overview of Wireless LANsYaser Rahmati
 
MTCNA - MikroTik Certified Network Associate - v2
MTCNA - MikroTik Certified Network Associate - v2MTCNA - MikroTik Certified Network Associate - v2
MTCNA - MikroTik Certified Network Associate - v2Yaser Rahmati
 
Chapter 07 - Routing Dynamically
Chapter 07 - Routing DynamicallyChapter 07 - Routing Dynamically
Chapter 07 - Routing DynamicallyYaser Rahmati
 
Chapter 11 - Network Address Translation for IPv4
Chapter 11 - Network Address Translation for IPv4Chapter 11 - Network Address Translation for IPv4
Chapter 11 - Network Address Translation for IPv4Yaser Rahmati
 
Chapter 09 - Access Control Lists
Chapter 09 - Access Control ListsChapter 09 - Access Control Lists
Chapter 09 - Access Control ListsYaser Rahmati
 
Chapter 08 - Single-Area OSPF
Chapter 08 - Single-Area OSPFChapter 08 - Single-Area OSPF
Chapter 08 - Single-Area OSPFYaser Rahmati
 
Chapter 06 - Static Routing
Chapter 06 - Static RoutingChapter 06 - Static Routing
Chapter 06 - Static RoutingYaser Rahmati
 
Chapter 04 - Routing Concepts
Chapter 04 - Routing ConceptsChapter 04 - Routing Concepts
Chapter 04 - Routing ConceptsYaser Rahmati
 
Chapter 05 - Inter-VLAN Routing
Chapter 05 - Inter-VLAN RoutingChapter 05 - Inter-VLAN Routing
Chapter 05 - Inter-VLAN RoutingYaser Rahmati
 
Chapter 02 - Introduction to Switched Networks
Chapter 02 - Introduction to Switched NetworksChapter 02 - Introduction to Switched Networks
Chapter 02 - Introduction to Switched NetworksYaser Rahmati
 

Mais de Yaser Rahmati (20)

Cisco WLAN - Chapter. 08 : Applications, Design, and Site Survey Preparation
Cisco WLAN - Chapter. 08 : Applications, Design, and Site Survey  PreparationCisco WLAN - Chapter. 08 : Applications, Design, and Site Survey  Preparation
Cisco WLAN - Chapter. 08 : Applications, Design, and Site Survey Preparation
 
Cisco WLAN - Chapter. 07 : Antennas
Cisco WLAN - Chapter. 07 : AntennasCisco WLAN - Chapter. 07 : Antennas
Cisco WLAN - Chapter. 07 : Antennas
 
Cisco WLAN - Chapter. 06 : bridges
Cisco WLAN - Chapter. 06 : bridgesCisco WLAN - Chapter. 06 : bridges
Cisco WLAN - Chapter. 06 : bridges
 
Cisco WLAN - Chapter. 05 : Access Points
Cisco WLAN - Chapter. 05 : Access PointsCisco WLAN - Chapter. 05 : Access Points
Cisco WLAN - Chapter. 05 : Access Points
 
Cisco WLAN - Chapter. 03 : wireless radio technology
Cisco WLAN - Chapter. 03 : wireless radio technologyCisco WLAN - Chapter. 03 : wireless radio technology
Cisco WLAN - Chapter. 03 : wireless radio technology
 
Cisco WLAN - Chapter. 04 : wireless topologies
Cisco WLAN - Chapter. 04 : wireless topologiesCisco WLAN - Chapter. 04 : wireless topologies
Cisco WLAN - Chapter. 04 : wireless topologies
 
Cisco WLAN - Chapter. 02 : Part 3 – 802.11 phy
Cisco WLAN -  Chapter. 02 : Part 3 – 802.11 phyCisco WLAN -  Chapter. 02 : Part 3 – 802.11 phy
Cisco WLAN - Chapter. 02 : Part 3 – 802.11 phy
 
Cisco WLAN - Chapter. 02 : Part 2 – 802.11 MAC
Cisco WLAN -  Chapter. 02 : Part 2 – 802.11 MACCisco WLAN -  Chapter. 02 : Part 2 – 802.11 MAC
Cisco WLAN - Chapter. 02 : Part 2 – 802.11 MAC
 
Cisco WLAN - Chapter. 02 : Part 1 – 802.11 MAC and Cisco Client Adapters
Cisco WLAN -  Chapter. 02 :  Part 1 – 802.11 MAC and Cisco Client AdaptersCisco WLAN -  Chapter. 02 :  Part 1 – 802.11 MAC and Cisco Client Adapters
Cisco WLAN - Chapter. 02 : Part 1 – 802.11 MAC and Cisco Client Adapters
 
Cisco WLAN - Chapter. 01 : Overview of Wireless LANs
Cisco WLAN -  Chapter. 01 : Overview of Wireless LANsCisco WLAN -  Chapter. 01 : Overview of Wireless LANs
Cisco WLAN - Chapter. 01 : Overview of Wireless LANs
 
MTCNA - MikroTik Certified Network Associate - v2
MTCNA - MikroTik Certified Network Associate - v2MTCNA - MikroTik Certified Network Associate - v2
MTCNA - MikroTik Certified Network Associate - v2
 
Chapter 07 - Routing Dynamically
Chapter 07 - Routing DynamicallyChapter 07 - Routing Dynamically
Chapter 07 - Routing Dynamically
 
Chapter 11 - Network Address Translation for IPv4
Chapter 11 - Network Address Translation for IPv4Chapter 11 - Network Address Translation for IPv4
Chapter 11 - Network Address Translation for IPv4
 
Chapter 10 - DHCP
Chapter 10 - DHCPChapter 10 - DHCP
Chapter 10 - DHCP
 
Chapter 09 - Access Control Lists
Chapter 09 - Access Control ListsChapter 09 - Access Control Lists
Chapter 09 - Access Control Lists
 
Chapter 08 - Single-Area OSPF
Chapter 08 - Single-Area OSPFChapter 08 - Single-Area OSPF
Chapter 08 - Single-Area OSPF
 
Chapter 06 - Static Routing
Chapter 06 - Static RoutingChapter 06 - Static Routing
Chapter 06 - Static Routing
 
Chapter 04 - Routing Concepts
Chapter 04 - Routing ConceptsChapter 04 - Routing Concepts
Chapter 04 - Routing Concepts
 
Chapter 05 - Inter-VLAN Routing
Chapter 05 - Inter-VLAN RoutingChapter 05 - Inter-VLAN Routing
Chapter 05 - Inter-VLAN Routing
 
Chapter 02 - Introduction to Switched Networks
Chapter 02 - Introduction to Switched NetworksChapter 02 - Introduction to Switched Networks
Chapter 02 - Introduction to Switched Networks
 

Último

THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 

Último (20)

THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 

Network Access Overview

  • 1. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1 Chapter 4: Network Access Introduction to Networks
  • 2. Presentation_ID 2© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 4: Objectives Upon completion of this chapter, you will be able to:  Identify device connectivity options.  Describe the purpose and functions of the physical layer in the network.  Describe basic principles of the physical layer standards.  Identify the basic characteristics of copper cabling.  Build a UTP cable used in Ethernet networks.  Describe fiber-optic cabling and its main advantages over other media.  Describe wireless media.  Select the appropriate media for a given requirement and connect devices.
  • 3. Presentation_ID 3© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 4: Objectives (cont.) Upon completion of this chapter, you will be able to:  Describe the purpose and function of the data link layer in preparing communication for transmission on specific media.  Describe the Layer 2 frame structure and identify generic fields.  Identify several sources for the protocols and standards used by the data link layer.  Compare the functions of logical topologies and physical topologies.  Describe the basic characteristics of media control methods on WAN topologies.  Describe the basic characteristics of media control methods on LAN topologies.  Describe the characteristics and functions of the data link frame.
  • 4. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 4 4.4 Media Access Control
  • 5. Presentation_ID 5© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 4 4.1 Physical Layer Protocols 4.2 Network Media 4.3 Data Link Layer Protocols 4.4 Media Access Control 4.5 Summary
  • 6. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 6 4.1 Physical Layer Protocols
  • 7. Presentation_ID 7© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Getting it Connected Connecting to the Network
  • 8. Presentation_ID 8© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Getting it Connected Connecting to the Network (cont.)
  • 9. Presentation_ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Getting it Connected Network Interface Cards Connecting to the Wireless LAN with a Range Extender
  • 10. Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Purpose of the Physical Layer The Physical Layer
  • 11. Presentation_ID 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Purpose of the Physical Layer Physical Layer Media
  • 12. Presentation_ID 12© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Purpose of the Physical Layer Physical Layer Standards Standard Organization Networking Standards ISO • ISO 8877: Officially adopted the RJ connectors (e.g., RJ-11, RJ-45) • ISO 11801: Network cabling standard similar to EIA/TIA 568. EIA/TIA • TIA-568-C: Telecommunications cabling standards, used by nearly all voice, video and data networks. • TIA-569-B: Commercial Building Standards for Telecommunications Pathways and Spaces • TIA-598-C: Fiber optic color coding • TIA-942: Telecommunications Infrastructure Standard for Data Centers ANSI • 568-C: RJ-45 pinouts. Co-developed with EIA/TIA ITU-T • G.992: ADSL IEEE • 802.3: Ethernet • 802.11: Wireless LAN (WLAN) & Mesh (Wi-Fi certification) • 802.15: Bluetooth
  • 13. Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Fundamental Principles of Layer 1 Physical Layer Fundamental Principles Media Physical Components Frame Encoding Technique Signalling Method Copper Cable • UTP • Coaxial • Connectors • NICs • Ports • Interfaces • Manchester Encoding • Non-Return to Zero (NRZ) techniques • 4B/5B codes are used with Multi-Level Transition Level 3 (MLT-3) signaling • 8B/10B • PAM5 • Changes in the electromagnetic field • Intensity of the electromagnetic field • Phase of the electromagnetic wave Fiber Optic Cable • Single-mode Fiber • Multimode Fiber • Connectors • NICs • Interfaces • Lasers and LEDs • Photoreceptors • Pulses of light • Wavelength multiplexing using different colors • A pulse equals 1. • No pulse is 0. Wireless Media • Access Points • NICs • Radio • Antennae • DSSS (direct-sequence spread-spectrum) • OFDM (orthogonal frequency division multiplexing) • Radio waves
  • 14. Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Fundamental Principles of Layer 1 Bandwidth
  • 15. Presentation_ID 15© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Fundamental Principles of Layer 1 Throughput
  • 16. Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Fundamental Principles of Layer 1 Types of Physical Media Gigabit Ethernet Interfaces SHDSL Interface Management Ports FastEthernet Switch Ports USB Mini-B Connector USB Type A Connector
  • 17. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 17 4.2 Network Media
  • 18. Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Copper Cabling Characteristics of Copper Media
  • 19. Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Copper Cabling Copper Media Shielded Twisted Pair (STP) Cable Unshielded Twisted Pair (UTP) Cable Coaxial Cable
  • 20. Presentation_ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Copper Cabling UTP Cable
  • 21. Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Copper Cabling STP Cable Foil Shields Braided or Foil Shield
  • 22. Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Copper Cabling Coaxial Cable
  • 23. Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Copper Cabling Cooper Media Safety
  • 24. Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential UTP Cabling Properties of UTP Cabling UTP cable does not use shielding to counter the effects of EMI and RFI. Instead, cable designers have discovered that they can limit the negative effect of crosstalk by:  Cancellation  Varying the number of twists per wire pair
  • 25. Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential UTP Cabling UTP Cabling Standards
  • 26. Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential UTP Cabling UTP Connectors
  • 27. Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential UTP Cabling Types of UTP Cable
  • 28. Presentation_ID 28© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential UTP Cabling Testing UTP Cables After installation, a UTP cable tester should be used to test for the following parameters:  Wire map  Cable length  Signal loss due to attenuation  Crosstalk
  • 29. Presentation_ID 29© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Fiber Optic Cabling Properties of Fiber Optic Cabling Fiber-optic cabling is now being used in four types of industry:  Enterprise Networks  Fiber-to-the-home (FTTH) and Access Networks  Long-Haul Networks  Submarine Networks
  • 30. Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Fiber Optic Cabling Fiber Media Cable Design
  • 31. Presentation_ID 31© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Fiber Optic Cabling Types of Fiber Media
  • 32. Presentation_ID 32© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Fiber Optic Cabling Network Fiber Connectors
  • 33. Presentation_ID 33© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Fiber Optic Cabling Testing Fiber Cables
  • 34. Presentation_ID 34© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Fiber Optic Cabling Fiber versus Copper Implementation Issues Copper Media Fibre Optic Bandwidth Supported 10 Mbps – 10 Gbps 10 Mbps – 100 Gbps Distance Relatively short (1 – 100 meters) Relatively High (1 – 100,000 meters) Immunity To EMI And RFI Low High (Completely immune) Immunity To Electrical Hazards Low High (Completely immune) Media And Connector Costs Lowest Highest Installation Skills Required Lowest Highest Safety Precautions Lowest Highest
  • 35. Presentation_ID 35© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Wireless Media Properties of Wireless Media Wireless does have some areas of concern including:  Coverage area  Interference  Security
  • 36. Presentation_ID 36© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential • IEEE 802.11 standards • Commonly referred to as Wi-Fi. • Uses CSMA/CA • Variations include: • 802.11a: 54 Mbps, 5 GHz • 802.11b: 11 Mbps, 2.4 GHz • 802.11g: 54 Mbps, 2.4 GHz • 802.11n: 600 Mbps, 2.4 and 5 GHz • 802.11ac: 1 Gbps, 5 GHz • 802.11ad: 7 Gbps, 2.4 GHz, 5 GHz, and 60 GHz • IEEE 802.15 standard • Supports speeds up to 3 Mb/s • Provides device pairing over distances from 1 to 100 meters. • IEEE 802.16 standard • Provides speeds up to 1 Gbps • Uses a point-to-multipoint topology to provide wireless broadband access. Wireless Media Types of Wireless Media
  • 37. Presentation_ID 37© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Wireless Media Wireless LAN Cisco Linksys EA6500 802.11ac Wireless Router
  • 38. Presentation_ID 38© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Wireless Media 802.11 Wi-Fi Standards Standard Maximum Speed Frequency Backwards Compatible 802.11a 54 Mbps 5 GHz No 802.11b 11 Mbps 2.4 GHz No 802.11g 54 Mbps 2.4 GHz 802.11b 802.11n 600 Mbps 2.4 GHz or 5 GHz 802.11b/g 802.11ac 1.3 Gbps (1300 Mbps) 2.4 GHz and 5.5 GHz 802.11b/g/n 802.11ad 7 Gbps (7000 Mbps) 2.4 GHz, 5 GHz and 60 GHz 802.11b/g/n/ac
  • 39. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 39 4.3 Data Link Layer Protocols
  • 40. Presentation_ID 40© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Purpose of the Data Link Layer The Data Link Layer
  • 41. Presentation_ID 41© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Purpose of the Data Link Layer Data Link Sublayers Network Data Link LLC Sublayer MAC Sublayer Physical 802.3 Ethernet 802.11 Wi-Fi 802.15 Bluetooth
  • 42. Presentation_ID 42© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Purpose of the Data Link Layer Media Access Control The Data Link Layer
  • 43. Presentation_ID 43© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Purpose of the Data Link Layer Providing Access to Media
  • 44. Presentation_ID 44© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Data Link Layer Formatting Data for Transmission
  • 45. Presentation_ID 45© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Layer 2 Frame Structure Creating a Frame
  • 46. Presentation_ID 46© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Layer 2 Standards Data Link Layer Standards Standard organization Networking Standards IEEE • 802.2: Logical Link Control (LLC) • 802.3: Ethernet • 802.4: Token bus • 802.5: Token passing • 802.11: Wireless LAN (WLAN) & Mesh (Wi-Fi certification) • 802.15: Bluetooth • 802.16: WiMax ITU-T • G.992: ADSL • G.8100 - G.8199: MPLS over Transport aspects • Q.921: ISDN • Q.922: Frame Relay ISO • HDLC (High Level Data Link Control) • ISO 9314: FDDI Media Access Control (MAC) ANSI • X3T9.5 and X3T12: Fiber Distributed Data Interface (FDDI)
  • 47. Presentation_ID 47© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Topologies Controlling Access to the Media
  • 48. Presentation_ID 48© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Topologies Physical and Logical Topologies
  • 49. Presentation_ID 49© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Topologies Physical and Logical Topologies (cont.)
  • 50. Presentation_ID 50© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential WAN Topologies Common Physical WAN Topologies
  • 51. Presentation_ID 51© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential WAN Topologies Physical Point-to-Point Topology
  • 52. Presentation_ID 52© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential WAN Topologies Logical Point-to-Point Topology
  • 53. Presentation_ID 53© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential WAN Topologies Half- and Full-Duplex Half-Duplex Full-Duplex
  • 54. Presentation_ID 54© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential LAN Topologies Physical LAN Topologies
  • 55. Presentation_ID 55© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential LAN Topologies Logical Topology for Shared Media
  • 56. Presentation_ID 56© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential LAN Topologies Contention-Based Access Characteristics Contention-Based Technologies • Stations can transmit at any time • Collision exist • There are mechanisms to resolve contention for the media • CSMA/CD for 802.3 Ethernet networks • CSMA/CA for 802.11 wireless networks
  • 57. Presentation_ID 57© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential LAN Topologies Multi-Access Topology
  • 58. Presentation_ID 58© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential LAN Topologies Controlled Access Characteristics Controlled Access Technologies • Only one station can transmit at a time • Devices wanting to transmit must wait their turn • No collisions • May use a token passing method • Token Ring (IEEE 802.5) • FDDI
  • 59. Presentation_ID 59© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential LAN Topologies Ring Topology
  • 60. Presentation_ID 60© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Data Link Frame The Frame
  • 61. Presentation_ID 61© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Data Link Frame The Header
  • 62. Presentation_ID 62© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Data Link Frame Layer 2 Address
  • 63. Presentation_ID 63© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Data Link Frame The Trailer
  • 64. Presentation_ID 64© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Data Link Frame LAN and WAN Frames
  • 65. Presentation_ID 65© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Data Link Frame Ethernet Frame
  • 66. Presentation_ID 66© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Data Link Frame Point-to-Point Protocol Frame
  • 67. Presentation_ID 67© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Data Link Frame 802.11 Wireless Frame
  • 68. Presentation_ID 68© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Network Access Summary  The TCP/IP network access layer is the equivalent of the OSI data link layer (Layer 2) and the physical layer (Layer 1).  The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.  The physical layer standards address three functional areas: physical components, frame encoding technique, and signaling method.  Using the proper media is an important part of network communications. Without the proper physical connection, either wired or wireless, communications between any two devices will not occur.  Wired communication consists of copper media and fiber cable.  There are three main types of copper media used in networking: unshielded-twisted pair (UTP), shielded-twisted pair (STP), and coaxial cable. UTP cabling is the most common copper networking media.
  • 69. Presentation_ID 69© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Network Access Summary (cont.)  Optical fiber cable has become very popular for interconnecting infrastructure network devices. It permits the transmission of data over longer distances and at higher bandwidths (data rates) than any other networking media.  Wireless media carry electromagnetic signals that represent the binary digits of data communications using radio or microwave frequencies.  The data link layer is responsible for the exchange of frames between nodes over a physical network media. It allows the upper layers to access the media and controls how data is placed and received on the media.  Among the different implementations of the data link layer protocols, there are different methods of controlling access to the media. These media access control techniques define if and how the nodes share the media.  The actual media access control method used depends on the topology and media sharing. LAN and WAN topologies can be physical or logical.
  • 70. Presentation_ID 70© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Network Access Summary (cont.)  WANs are commonly interconnected using the point-to-point, hub and spoke, or mesh physical topologies.  In shared media LANs, end devices can be interconnected using the star, bus, ring, or extended star (hybrid) physical topologies.  All data link layer protocols encapsulate the Layer 3 PDU within the data field of the frame. However, the structure of the frame and the fields contained in the header and trailer vary according to the protocol.
  • 71. Presentation_ID 71© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential