Chabot College

20
CISCO NETWORKING ACADEMY CISCO NETWORKING ACADEMY Chabot College Chabot College ELEC 99.05 ELEC 99.05 Layer 2 - Highlights Layer 2 - Highlights

description

Chabot College. ELEC 99.05 Layer 2 - Highlights. Layer 1 Limitations. No way to communicate with upper layers No addressing No logical grouping or organization of bits (framing) No method to control media access. Layer 2. Layer 2 solves these problems. 2. Data Link Sublayers. - PowerPoint PPT Presentation

Transcript of Chabot College

Page 1: Chabot College

CISCO NETWORKING ACADEMYCISCO NETWORKING ACADEMY

Chabot CollegeChabot College

ELEC 99.05ELEC 99.05Layer 2 - HighlightsLayer 2 - Highlights

Page 2: Chabot College

CISCO NETWORKING ACADEMYCISCO NETWORKING ACADEMY

Layer 1 LimitationsLayer 1 Limitations

• No way to communicate with upper layers

• No addressing• No logical grouping or organization of

bits (framing)• No method to control media access

Page 3: Chabot College

CISCO NETWORKING ACADEMYCISCO NETWORKING ACADEMY

Layer 2Layer 2

Layer 2 solves these problems.

2

Page 4: Chabot College

CISCO NETWORKING ACADEMYCISCO NETWORKING ACADEMY

Data Link SublayersData Link Sublayers

LLC (Logical Link Control)MAC (Media Access Control)

IEEE 802 Extension to the OSI Model

Page 5: Chabot College

CISCO NETWORKING ACADEMYCISCO NETWORKING ACADEMY

The IEEE Working GroupsThe IEEE Working Groups802.1802.2802.3802.4802.5802.6802.7802.8802.9

Networking Overview and ArchitectureLogical Link ControlEthernetToken BusToken RingMANsBroadbandFiber OpticIsochronous LAN

...and more!

Page 6: Chabot College

CISCO NETWORKING ACADEMYCISCO NETWORKING ACADEMY

OSI v IEEEOSI v IEEE

Page 7: Chabot College

CISCO NETWORKING ACADEMYCISCO NETWORKING ACADEMY

Logical Link Control (LLC)Logical Link Control (LLC)

• Defined by a committee named 802.2• Is technology independent• Is not used by all networks

What is it?

Page 8: Chabot College

CISCO NETWORKING ACADEMYCISCO NETWORKING ACADEMY

Logical Link ControlLogical Link Control

• Provides independence to the protocols running in the upper and lower layers.

• The LLC acts as a managing buffer between the “executive” upper layers and the “shipping department” lower layers.

• Communicates up and down.

Page 9: Chabot College

CISCO NETWORKING ACADEMYCISCO NETWORKING ACADEMY

802.2 LLC802.2 LLC

IPX IP APPLE-TALK

LLC

10BaseT Ethernet

Layer 3Layer 3

Layer 2 - LLCLayer 2 - LLC

Layer 2- MAC Layer 2- MAC &Layer 1&Layer 1

Page 10: Chabot College

CISCO NETWORKING ACADEMYCISCO NETWORKING ACADEMY

802.2 LLC802.2 LLC

Ethernet Token Ring

FDDI

LLC

IPLayer 3Layer 3

Layer 2 - LLCLayer 2 - LLC

Layer 2- MAC Layer 2- MAC &Layer 1&Layer 1

Page 11: Chabot College

CISCO NETWORKING ACADEMYCISCO NETWORKING ACADEMY

Media Access Control (MAC)Media Access Control (MAC)

• Responsible for the actual framing– builds the 1s and 0s to hand off to the

physical layer.• Responsible for media access:

– Contention– Token Passing– Polling

Page 12: Chabot College

CISCO NETWORKING ACADEMYCISCO NETWORKING ACADEMY

The MAC AddressThe MAC Address

Page 13: Chabot College

CISCO NETWORKING ACADEMYCISCO NETWORKING ACADEMY

MAC Addresses Are FlatMAC Addresses Are Flat

Page 14: Chabot College

CISCO NETWORKING ACADEMYCISCO NETWORKING ACADEMY

FramingFraming

• A message is “framed” at layer two.• Framing provides order, or structure,

to the bitstream.

Page 15: Chabot College

CISCO NETWORKING ACADEMYCISCO NETWORKING ACADEMY

Frame FormatFrame Format

Page 16: Chabot College

CISCO NETWORKING ACADEMYCISCO NETWORKING ACADEMY

FCS – Frame ChecksumFCS – Frame Checksum

• Used to insure that the data has arrived without corruption.

• More efficient than sending the data twice and comparing the results.

• Necessary to prevent errors.

Page 17: Chabot College

CISCO NETWORKING ACADEMYCISCO NETWORKING ACADEMY

Media Access ControlMedia Access Control

Media Access Control methods can be divided into two flavors:– Deterministic– Non-deterministic

Page 18: Chabot College

CISCO NETWORKING ACADEMYCISCO NETWORKING ACADEMY

Deterministic Media AccessDeterministic Media Access

• aka “Taking Turns”– example: Token Passing used in Token

Ring– No collisions

Page 19: Chabot College

CISCO NETWORKING ACADEMYCISCO NETWORKING ACADEMY

Non-DeterministicNon-Deterministic

• “First Come, First Served”– Example: CSMA/CD used in Ethernet– Carrier Sense Multiple Access with

Collision Detection

Page 20: Chabot College

CISCO NETWORKING ACADEMYCISCO NETWORKING ACADEMY

Layer 2 TechnologiesLayer 2 TechnologiesThree common layer 2 technologies:– Ethernet: non-deterministic– Token Ring: deterministic– FDDI: deterministic