Chabot College
description
Transcript of Chabot College
CISCO NETWORKING ACADEMYCISCO NETWORKING ACADEMY
Chabot CollegeChabot College
ELEC 99.05ELEC 99.05Layer 2 - HighlightsLayer 2 - Highlights
CISCO NETWORKING ACADEMYCISCO NETWORKING ACADEMY
Layer 1 LimitationsLayer 1 Limitations
• No way to communicate with upper layers
• No addressing• No logical grouping or organization of
bits (framing)• No method to control media access
CISCO NETWORKING ACADEMYCISCO NETWORKING ACADEMY
Layer 2Layer 2
Layer 2 solves these problems.
2
CISCO NETWORKING ACADEMYCISCO NETWORKING ACADEMY
Data Link SublayersData Link Sublayers
LLC (Logical Link Control)MAC (Media Access Control)
IEEE 802 Extension to the OSI Model
CISCO NETWORKING ACADEMYCISCO NETWORKING ACADEMY
The IEEE Working GroupsThe IEEE Working Groups802.1802.2802.3802.4802.5802.6802.7802.8802.9
Networking Overview and ArchitectureLogical Link ControlEthernetToken BusToken RingMANsBroadbandFiber OpticIsochronous LAN
...and more!
CISCO NETWORKING ACADEMYCISCO NETWORKING ACADEMY
OSI v IEEEOSI v IEEE
CISCO NETWORKING ACADEMYCISCO NETWORKING ACADEMY
Logical Link Control (LLC)Logical Link Control (LLC)
• Defined by a committee named 802.2• Is technology independent• Is not used by all networks
What is it?
CISCO NETWORKING ACADEMYCISCO NETWORKING ACADEMY
Logical Link ControlLogical Link Control
• Provides independence to the protocols running in the upper and lower layers.
• The LLC acts as a managing buffer between the “executive” upper layers and the “shipping department” lower layers.
• Communicates up and down.
CISCO NETWORKING ACADEMYCISCO NETWORKING ACADEMY
802.2 LLC802.2 LLC
IPX IP APPLE-TALK
LLC
10BaseT Ethernet
Layer 3Layer 3
Layer 2 - LLCLayer 2 - LLC
Layer 2- MAC Layer 2- MAC &Layer 1&Layer 1
CISCO NETWORKING ACADEMYCISCO NETWORKING ACADEMY
802.2 LLC802.2 LLC
Ethernet Token Ring
FDDI
LLC
IPLayer 3Layer 3
Layer 2 - LLCLayer 2 - LLC
Layer 2- MAC Layer 2- MAC &Layer 1&Layer 1
CISCO NETWORKING ACADEMYCISCO NETWORKING ACADEMY
Media Access Control (MAC)Media Access Control (MAC)
• Responsible for the actual framing– builds the 1s and 0s to hand off to the
physical layer.• Responsible for media access:
– Contention– Token Passing– Polling
CISCO NETWORKING ACADEMYCISCO NETWORKING ACADEMY
The MAC AddressThe MAC Address
CISCO NETWORKING ACADEMYCISCO NETWORKING ACADEMY
MAC Addresses Are FlatMAC Addresses Are Flat
CISCO NETWORKING ACADEMYCISCO NETWORKING ACADEMY
FramingFraming
• A message is “framed” at layer two.• Framing provides order, or structure,
to the bitstream.
CISCO NETWORKING ACADEMYCISCO NETWORKING ACADEMY
Frame FormatFrame Format
CISCO NETWORKING ACADEMYCISCO NETWORKING ACADEMY
FCS – Frame ChecksumFCS – Frame Checksum
• Used to insure that the data has arrived without corruption.
• More efficient than sending the data twice and comparing the results.
• Necessary to prevent errors.
CISCO NETWORKING ACADEMYCISCO NETWORKING ACADEMY
Media Access ControlMedia Access Control
Media Access Control methods can be divided into two flavors:– Deterministic– Non-deterministic
CISCO NETWORKING ACADEMYCISCO NETWORKING ACADEMY
Deterministic Media AccessDeterministic Media Access
• aka “Taking Turns”– example: Token Passing used in Token
Ring– No collisions
CISCO NETWORKING ACADEMYCISCO NETWORKING ACADEMY
Non-DeterministicNon-Deterministic
• “First Come, First Served”– Example: CSMA/CD used in Ethernet– Carrier Sense Multiple Access with
Collision Detection
CISCO NETWORKING ACADEMYCISCO NETWORKING ACADEMY
Layer 2 TechnologiesLayer 2 TechnologiesThree common layer 2 technologies:– Ethernet: non-deterministic– Token Ring: deterministic– FDDI: deterministic