Chabot College

Post on 13-Feb-2016

31 views 0 download

description

Chabot College. ELEC 99.05 Layer 2 - Highlights. Layer 1 Limitations. No way to communicate with upper layers No addressing No logical grouping or organization of bits (framing) No method to control media access. Layer 2. Layer 2 solves these problems. 2. Data Link Sublayers. - PowerPoint PPT Presentation

Transcript of Chabot College

CISCO NETWORKING ACADEMYCISCO NETWORKING ACADEMY

Chabot CollegeChabot College

ELEC 99.05ELEC 99.05Layer 2 - HighlightsLayer 2 - Highlights

CISCO NETWORKING ACADEMYCISCO NETWORKING ACADEMY

Layer 1 LimitationsLayer 1 Limitations

• No way to communicate with upper layers

• No addressing• No logical grouping or organization of

bits (framing)• No method to control media access

CISCO NETWORKING ACADEMYCISCO NETWORKING ACADEMY

Layer 2Layer 2

Layer 2 solves these problems.

2

CISCO NETWORKING ACADEMYCISCO NETWORKING ACADEMY

Data Link SublayersData Link Sublayers

LLC (Logical Link Control)MAC (Media Access Control)

IEEE 802 Extension to the OSI Model

CISCO NETWORKING ACADEMYCISCO NETWORKING ACADEMY

The IEEE Working GroupsThe IEEE Working Groups802.1802.2802.3802.4802.5802.6802.7802.8802.9

Networking Overview and ArchitectureLogical Link ControlEthernetToken BusToken RingMANsBroadbandFiber OpticIsochronous LAN

...and more!

CISCO NETWORKING ACADEMYCISCO NETWORKING ACADEMY

OSI v IEEEOSI v IEEE

CISCO NETWORKING ACADEMYCISCO NETWORKING ACADEMY

Logical Link Control (LLC)Logical Link Control (LLC)

• Defined by a committee named 802.2• Is technology independent• Is not used by all networks

What is it?

CISCO NETWORKING ACADEMYCISCO NETWORKING ACADEMY

Logical Link ControlLogical Link Control

• Provides independence to the protocols running in the upper and lower layers.

• The LLC acts as a managing buffer between the “executive” upper layers and the “shipping department” lower layers.

• Communicates up and down.

CISCO NETWORKING ACADEMYCISCO NETWORKING ACADEMY

802.2 LLC802.2 LLC

IPX IP APPLE-TALK

LLC

10BaseT Ethernet

Layer 3Layer 3

Layer 2 - LLCLayer 2 - LLC

Layer 2- MAC Layer 2- MAC &Layer 1&Layer 1

CISCO NETWORKING ACADEMYCISCO NETWORKING ACADEMY

802.2 LLC802.2 LLC

Ethernet Token Ring

FDDI

LLC

IPLayer 3Layer 3

Layer 2 - LLCLayer 2 - LLC

Layer 2- MAC Layer 2- MAC &Layer 1&Layer 1

CISCO NETWORKING ACADEMYCISCO NETWORKING ACADEMY

Media Access Control (MAC)Media Access Control (MAC)

• Responsible for the actual framing– builds the 1s and 0s to hand off to the

physical layer.• Responsible for media access:

– Contention– Token Passing– Polling

CISCO NETWORKING ACADEMYCISCO NETWORKING ACADEMY

The MAC AddressThe MAC Address

CISCO NETWORKING ACADEMYCISCO NETWORKING ACADEMY

MAC Addresses Are FlatMAC Addresses Are Flat

CISCO NETWORKING ACADEMYCISCO NETWORKING ACADEMY

FramingFraming

• A message is “framed” at layer two.• Framing provides order, or structure,

to the bitstream.

CISCO NETWORKING ACADEMYCISCO NETWORKING ACADEMY

Frame FormatFrame Format

CISCO NETWORKING ACADEMYCISCO NETWORKING ACADEMY

FCS – Frame ChecksumFCS – Frame Checksum

• Used to insure that the data has arrived without corruption.

• More efficient than sending the data twice and comparing the results.

• Necessary to prevent errors.

CISCO NETWORKING ACADEMYCISCO NETWORKING ACADEMY

Media Access ControlMedia Access Control

Media Access Control methods can be divided into two flavors:– Deterministic– Non-deterministic

CISCO NETWORKING ACADEMYCISCO NETWORKING ACADEMY

Deterministic Media AccessDeterministic Media Access

• aka “Taking Turns”– example: Token Passing used in Token

Ring– No collisions

CISCO NETWORKING ACADEMYCISCO NETWORKING ACADEMY

Non-DeterministicNon-Deterministic

• “First Come, First Served”– Example: CSMA/CD used in Ethernet– Carrier Sense Multiple Access with

Collision Detection

CISCO NETWORKING ACADEMYCISCO NETWORKING ACADEMY

Layer 2 TechnologiesLayer 2 TechnologiesThree common layer 2 technologies:– Ethernet: non-deterministic– Token Ring: deterministic– FDDI: deterministic