Download Chapter 7 - YSU Computer Science & Information Systems

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Point-to-Point Protocol over Ethernet wikipedia , lookup

Low-voltage differential signaling wikipedia , lookup

RapidIO wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Airborne Networking wikipedia , lookup

Power over Ethernet wikipedia , lookup

Computer network wikipedia , lookup

AppleTalk wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Network tap wikipedia , lookup

Asynchronous Transfer Mode wikipedia , lookup

Wake-on-LAN wikipedia , lookup

IEEE 802.1aq wikipedia , lookup

Deep packet inspection wikipedia , lookup

Internet protocol suite wikipedia , lookup

IEEE 802.11 wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

CAN bus wikipedia , lookup

IEEE 1355 wikipedia , lookup

UniPro protocol stack wikipedia , lookup

Transcript
Cisco – Chapter 7 – Layer 2
Technologies
IEEE LAN Standards
LAN Technologies
• Token Ring 802.5
– IBM 1970s
– Large installed base but losing favor
• FDDI
– Popular as campus backbone
– 4 specifications
• Ethernet 802.3
– Many flavors
Token Ring
•
•
•
•
Ring Logical topology
Star Physical topology
Access though MAC
Manchester Encoding
– Combines bit and timing
• 0 = high to low transition
• 1 = low to high transition
IEEE 802.5 and Token Ring
•
•
•
•
•
•
•
4MB to 16 MB
260 stations
Star Topology
Twisted Pair
Baseband
Token Passing
Differential
Manchester
•
•
•
•
•
•
•
Same
250 stations
Not specified
Not specified
Baseband
Token Passing
Differential
Mancheseter
Frame Fields
• Token is a flag bit
– Start delimiter, access control, end delimiter
•
•
•
•
•
Frame control
Source address
Destination address
FCS
Data
Token Process
•
•
•
•
•
•
•
Host seizes the token
Alters 1 bit which becomes start of frame
Appends data
Sends token to next station
Token continues until destination is reached
No other hosts can transmit data
Early release can release token when data
transmission is complete
Priority Systems - Token
• Priority field
– Only stations with priority value or higher can
seize the token
– Once token is seized, only stations with higher
priority can reserve token
– Next token has higher priority value
– Previous value reinstated when transmission is
complete
MSAU
• All active workstations can see
communications
• Stations can be selectively removed when
there is a transmission problem
• Beaconing detects and attempts to repair
network faults
• A beacon frame can define a failure domain
Signal Encoding
• Combining bits and timing into one stream
of signals
• Manchester differential encoding used by
token ring
FDDI
•
•
•
•
Common in backbone installations
Connects high speed computers in LAN
Continues to grow as price decreased
Four Specifications
–
–
–
–
MAC frames, token, addressing, FCS algorithm
Physical Layer Protocol – clocking & framing
Physical media – fiber, power, error rates
Station Management – configuration issues
FDDI Frame Format
• Token
– Preamble, start delimiter, frame control, end
delimiter
•
•
•
•
Destination address
Source Address
Data
FCS
FDDI MAC
•
•
•
•
•
Token grants permission to transmit data
Maximum period of time token can be held
Token becomes start of frame sequence
No collisions
Token circles ring until destination is
reached
• Deterministic and reliable
4B/5B Encoding
• Algorithm to prevent long durations of high
or low signals
– Danger of losing clocking mechanism
• 4 bits encoded as 5
– You don’t want to know the details
• Only important because it may be a test
question
Fiber Details
•
•
•
•
100 Megabits per second
Ring logical and ring physical topologies
Token is MAC mechanism
Medium is fiber
– Laser for single mode and LED for multimode
• Advantages
– Speed, Security, Distance, Reliability
Ethernet – IEEE 802.3
• Most common LAN technology
• Well suited to applications where a local
communication medium must carry
sporadic, occasionally heavy traffic at high
peak data rates
• CSMA/CD
• Broadcast
– All stations can see all communications
Differences 802.3 & IEEE
• Ethernet provides services corresponding to
layers 1 and 2 of OSI model
• IEEE does not specify a LLC protocol
• Both are implemented through hardware
Ethernet Family Tree
•
•
•
•
•
•
•
Refer to 7.3.2
10 Base 5
Coaxial
Cat 5 UTP
Twisted
10 Base FL Fiber
100 Base TX Twisted
100 Base FX Fiber
1000 Base TX Twisted
500 m
100 m
2000 m
100 m
2000 m
100 m
10mbs
10mbs
10 mbs
100mb
100mb
1000
Ethernet and 802.3 Frame Format
• Essentially the same
• Includes:
– Preamble, Start, Source and Destination Add
– Type, Data, and FCS
• Type specifies upper layer protocol
• Main difference is minimum number of data
bits; maximum is the same
CSMA/CD
• Performs three functions
– transmitting and receiving data packets
– decoding data packets and checking them for valid
addresses before passing them to the upper layers of
the OSI model
– detecting errors within data packets or on the network
• Connectionless – best delivery
• No notification
Ethernet Binary Encoding
• Manchester
– results in 0 being encoded as a high-to-low
transition and 1 being encoded as a low-to-high
– transition.
– Because both 0's and 1's result in a transition to
the signal, the clock can be effectively
recovered at the receiver
Star Topology
•
•
•
•
•
•
•
Easy to design and install
Easy to maintain
Layout is easy to modify and troubleshoot
Reliable
Easy to add hosts
Requires more media
Hub is single point of failure
TIA/EIA 568 Standards
• Requires horizontal cabling in star topology
• All cabling must be terminated at patch
panel
• Repeaters can be used to extend length of
cable run
• 100 meters total length (horizontal length
modified by need to run cable down walls
and around periphery of room)
NIC Selection Criteria
• LAN technology used
– Ethernet, Token Ring, or FDDI
• Type of media used
– UTP, Fiber, Coaxial
• Type of bus
– PCI or ISA
NIC Layer 2 Functions
•
•
•
•
•
Logical Link Control
Unique identifier – MAC address
Framing
MAC – access to shared medium
Signaling – creates signal to be placed on
medium
Bridge
•
•
•
•
Minimizes collisions
Reduces traffic
Filters based on MAC address
Concerned with frames – not packets
Data Link Layer
• Controls data flow, handles transmission
errors, provides physical addressing, and
manages access to the physical medium
• Bridges use various link layer protocols that
dictate specific flow control, error handling,
addressing, and media access algorithms
• Data link layer protocols include Ethernet,
Token Ring, and FDDI.
Bridge Functions
• Reduce large collision domains
• Work best when traffic between segments is
low
• Always spread a broadcast packet
• Too many broadcasts result in broadcast
storm
– Can cause time outs, low performance, traffic
slowdowns
Switches
• Can replace hubs without disrupting the
network or requiring new installation
• Build and maintain switching tables
• Switch data frames
• Connect network segments, use table of
MAC addresses, and reduce traffic
• Faster than bridges
• Can support virtual LANs
LAN Switches
• Are considered multiport bridge with no collision
domain
– Because virtual LANs can be created
•
•
•
•
Low latency levels
High speed for packet forwarding
Creates virtual circuits or PP connections
Microsegmentation provides full bandwidth to each host
• All hosts are still part of same broadcast domain
Segment LANs To:
•
•
•
•
Isolate traffic between segments
Achieve more bandwidth per host
Create smaller collision domains
Can act as firewall for potentially dangerous
network errors
• Can allow more hosts to use network
Switches vs Bridges
• Switches are faster
–
–
–
–
Operate in hardware rather than software
Can connect traffic with different bandwidths
Can support higher port densities
Can support cut-through switching
• Reduces latency
– Reduce collisions and increase bandwidth
• Because they can create virtual LANs
Bridges, Routers, & Switches
• Bridges and switches are layer 2
• Routers are layer 3
• Bridges pass data frames regardless of
protocol (operate at layer 2)
• Bridges increase latency – store & forward
– Thus cause propagation delay
Ethernet Performance
• Perform best when kept under 30-40% of
full capacity
• Bandwidth usage that exceeds the
recommended limitation results in increased
collisions
Router Segmentation
• Layer 3 – makes decisions based on IP address
• Make exact determinations of where to send data
packet
• Use routing table to make forwarding decisions
• Protocols that require acknowledgement have 3040% throughput
• Minimal acknowledgments (sliding windows)
have 20-30% loss in throughput
Troubleshooting
• Start at layer 1 – move up layer by layer to
layer 7