The Network Access Layer. In This Lecture. Network Access Layer. Hour 3

Similar documents
IEEE 802 LANs SECTION C

A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers,

Other Protocols. Arash Habibi Lashkari

Data Link Protocols. TCP/IP Suite and OSI Reference Model

Internet Architecture and Protocol

Lecture Outline. Lecture 2. OSI model and networking. The OSI model and networking. The OSI model and networking. The OSI model and networking

Chapter 9. Ethernet. Part II

M242 COMPUTER NETWORS AND SECURITY

Guide to Networking Essentials, 6 th Edition. Chapter 6: Network Reference Models and Standards

LAN. CS 4/55231 Internet Engineering. Kent State University Dept. of Computer Science

Objectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet

Introduction to LAN Topologies Cabling. 2000, Cisco Systems, Inc. 3-1

Data Link Layer, Part 3 Medium Access Control. Preface

Raj Jain. The Ohio State University Columbus, OH

1: Review Of Semester Provide an overview of encapsulation.

Chapter 15 Local Area Network Overview

Outline: Connecting Many Computers

Contention Protocols and Networks

Content. Deterministic Access Polling(1) Master-Slave principles: Introduction Layer 2: Media Access Control

ก ก Information Technology II

Local Area Networks. Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring

Introduction to Networks and the Internet

Networking Technologies and Applications

ET4254 Communications and Networking 1

Chapter 10: Local Area Networks

Local Area Network Overview

Layering in Networked computing. OSI Model TCP/IP Model Protocols at each layer

Computer Networks. Lecture 8 Local Area Network, IEEE 802.x

Integrating Information Systems: Technology, Strategy, and Organizational Factors

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Ethernet Basics. based on Chapter 4 of CompTIA Network+ Exam Guide, 4 th ed., Mike Meyers

Lecture (03) (I) OSI Reference Model

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

IT 4504 Section 4.0. Network Architectures. 2008, University of Colombo School of Computing 1

Lecture 8: Switched Ethernet and Collision Domains

Chapter 4: Network Access

Chapter 9 & 12: Wired LAN

More on LANS. LAN Wiring, Interface

EECS Introduction to Computer Networking. Local Area Networks / Ethernet. Hub

Layer 2 functionality bridging and switching

Data Link Layer, Part 5. Medium Access Control

Communication Networks

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space provided.

2. LAN Topologies Gilbert Ndjatou Page 1

The NIC is the main interface between the computer and the network cable.

Lecture (07) Media & Switching III Ethernet Protocol & Network Hardware Components

CS 3201 Computer Networks 2014/2015 Handout: Lab 3

Tutorial 3 (Ethernet)

Introductory to Computer Networks Local Area Networks. Lecture 16 Fall Isfahan University of technology Dr.

Network Media and Layer 1 Functionality

Computer Network : Lecture Notes Nepal Engineering College Compiled by: Junior Professor: Daya Ram Budhathoki Nepal Engineering college, Changunarayan

Chapter 6: DataLink Layer - Ethernet Olivier Bonaventure (2010)

The random access methods we study in this chapter have evolved from a very interesting protocol known as ALOHA, which used a very simple procedure

CSCD 330 Network Programming Winter 2016

Medium Access Protocols

Lecture 05 Chapter 16 High Speed LANs

Summary of MAC protocols

Data and Computer Communications

Part3. Local Area Networks (LAN)

NETWORK SECURITY ITEC 435

Communicating over the Network

Unit 10. Networks. Copyright 2005 Heathkit Company, Inc. All rights reserved.

Internetworking is connecting two or more computer networks with some sort of routing device to exchange traffic back and forth, and guide traffic on

OSI Model. Teran Subasinghe MBCS, Bsc.(Hons) in Computer Science - University of Greenwich, UK

Fundamentals of Networking Introduction to Networking Devices

THE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review.

Imi :... Data:... Nazwisko:... Stron:...

Ethernet Standard. Campus Network Design. Ethernet address. OSI Model. Thana Hongsuwan

CS 43: Computer Networks Switches and LANs. Kevin Webb Swarthmore College December 5, 2017

1. Which layer of the OSI model is responsible for specifying the encapsulation method used for specific types of media?

10- and 100-Mbps Ethernet

GAYATRI COMPUTERS Prepared by : VENKAT.G 1. Module 1: NETWORK BASICS

Defining Networks with the OSI Model. Module 2

TCOM 370 NOTES 99-1 NETWORKING AND COMMUNICATIONS

TCP/IP and OSI Model Ethernet LAN Network Cables Network Devices Network Topologies Redundant Internet Connections VLANs Wireless LANs Upcoming

! High Data Rates (0.1 to 1000 Mbps)! Short Distances (0.1 to 25 km) ! Low Error Rate (10 to 10 ) Local Area Networks

1. Data Link Layer Protocols

Chapter 9 Ethernet Part 1

Unit II. Part A (2 Marks)

Chapter 16 Networking

Link Layer and Ethernet

Token Ring and. Fiber Distributed Data Interface (FDDI) Networks: Token Ring and FDDI 1

Computer Communication Networks Lecture No. 1

Link Layer and Ethernet

CH : 15 LOCAL AREA NETWORK OVERVIEW

Network basics. Unit objectives Describe the basic components of a network Identify characteristics of network technologies Analyze the OSI model

Introduction to LAN Protocols

ITEC 3210 M - Applied Data Communications and Networks. Professor: Younes Benslimane, Ph.D.

Lecture 4b. Local Area Networks and Bridges

CARRIER SENSE MULTIPLE ACCESS (CSMA):

Computer Networks and Internet

CS3600 SYSTEMS AND NETWORKS

Introduction to Networking

Lecture (03) Data Encapsulation. Network Layer (Physical/Data link)

Lecture (04) Network Access layer fundamentals I

Lecture (04) Network Access layer fundamentals I

Lecture (04 & 05) Data link layer fundamental

LANs and ARP. Networking. Sirindhorn International Institute of Technology Thammasat University. Networking. LANs and ARP.

QUESTION BANK ENGINEERS ACADEMY. Computer Networks Computer Network Basics Segentation is done in. 12. Session layer is used for

Lecture (03) Ethernet Protocol & Network Hardware Components

Transcription:

The Network Access Layer Hour 3 In This Lecture Explain what the Network Access layer is Discuss how TCP/IP's Network Access layer relates to the OSI networking model Explain what a network architecture is List the contents of an ethernet frame Identify the methods that ethernet, token ring, and FDDI use for controlling access to the transmission medium Network Access Layer Interfacing with the computer's network adapter. Coordinating the data transmission with the conventions of the appropriate access method. Formatting the data into a unit called a frame and converting that frame into the stream of electric or analog pulses that passes across the transmission medium. Checking for errors in incoming frames. Adding error-checking information to outgoing frames so that the receiving computer can check the frame for errors. Acknowledging receipt of data frames and resending frames if acknowledgment is not received.

Subdivisions of OSI Data Link Layer Subdivisions of OSI Data Link Layer Media Access Control (MAC) provides an interface with the network adapter. The network adapter driver, in fact, is often called the MAC driver, and the hardware address burned into the card at the factory is often referred to as the MAC address. Logical Link Control (LLC) performs errorchecking functions for frames delivered over the subnet and manages links between devices communicating on the subnet. Network Architecture Access method An access method is a set of rules defining how the computers will share the transmission medium. To avoid data collisions, computers must follow these rules when they transmit data. Data frame format The IP-level datagram from the Internet layer is encapsulated in a data frame with a predefined format. The data enclosed in the header must supply the information necessary to deliver data on the physical network. You'll learn more about data frames later in this hour. Cabling type The type of cable used for a network has an effect on certain other design parameters, such as the electrical properties of the bitstream transmitted by the adapter. Cabling rules The protocols, cable type, and electrical properties of the transmission have an effect on the maximum and minimum lengths for the cable and for the cable connector specifications.

Physical Addressing The Network Access layer is necessary in order to relate the logical IP address, which is configured through the protocol software with the actual permanent physical address of the network adapter. The physical address is burned into the card at the factory. Data frames sent across the LAN must use this physical address to identify the source and destination adapters, but the lengthy physical address (48 bits in the case of ethernet) is so unfriendly that it is impractical for people to use. Encoding the physical address at higher protocol levels compromises the flexible modular architecture of TCP/IP, which requires that the upper layers remain independent of physical details. TCP/IP uses the Address Resolution Protocol (ARP) and Reverse Address Resolution Protocol (RARP) to relate IP addresses to the physical addresses of the network adapters on the local network. ARP and RARP provide a link between the logical IP addresses seen by the user and the (effectively invisible) hardware addresses used on the LAN. Network Access Layer Step 1 - Break IP Layer Data into chunks of 64 bytes to 1518 bytes Step 2 Package chunks into frames (including header) Preamble (mark beginning of frame 8 bytes the last is the 1 byte start frame delimiter) Recipient address (physical address) Source address (physical address) Length Data FCS (frame check sequence Cyclical Redundancy Check (CRC) Network Access Layer Step 3 passes the data frame to physical layer (as in the OSI model)

LAN Technologies Ethernet, including variants such as the following: 10BASE-2 (an ethernet standard using thin coaxial cable) 10BASE-5 (an ethernet standard using thick coaxial cable) 10BASE-T (an ethernet standard using twisted-pair cable in a star configuration) 100BASE-TX (a standard similar to 10BASE-T with faster transmissions speed (100Mbps) Token ring Ethernet Most common Lan Technology Uses Carrier Sense Multiple Access with Collision Detect (CSMA.CD) access method Using CSMA/CD, all computers monitor the transmission medium and wait until the line is available before transmitting. If two computers try to transmit at the same time, a collision occurs. The computers then stop, wait for a random time interval, and attempt to transmit again. Works well for light and moderate traffic but not heavy traffic (Solved by switches and routers (hour 9)) Media Table 3.1. Ethernet Media Technology Technology Name Media Type Operating Speed Maximum Distance 10BASE-2 Thin coax 185 meters 10BASE-5 Thick coax 500 meters 10BASE-T CAT3 or CAT5 UTP 100 meters 10BASE-F Fiber optic 2,000 meters 100BASE-TX CAT 5 UTP or STP 100 megabits 100 meters 100BASE-FX Fiber optic 100 megabits 2,000 meters

Token Ring Uses token passing Computers on the LAN are connected so that data is passed around the network in a logical ring The token ring configuration calls for the computers to be wired to a central hub called a MAU or MSAU. Data passes from one computer to the next in a circular motion. The computers pass a packet of data called a token around the network. Only the computer that holds the token can transmit a message on to the ring. Token Ring (Cont) Token ring is technically more sophisticated than ethernet, and it includes a number of built-in diagnosis and correction mechanisms that can help troubleshoot network problems. Also, because data is transmitted in a more orderly fashion, token ring does not suffer as badly under heavy data traffic. More expensive than ethernet by comparison the cable, the network adapter cards, and the other components as well. Token ring typically operates at either 4Mbps or 16Mbps. It is also available at 100Mbps. FDDI Fiber Distributed Data Interface (FDDI) Expensive Eemploys a pair of fiber-optic rings One ring is considered primary The second ring is principally there to repair the primary ring in the event of a breakdown. FDDI uses a token passing access method similar to token ring. Has error-detection and correction capabilities. In a normally operating FDDI ring, the token passes by each machine every so often. If the token is not seen within the maximum amount of time that it takes to circulate the largest ring, it indicates a problem has occurred such as a broken cable. Fiber-optic cable such as the cable used with FDDI can support very large volumes of data over large distances.

Bibliography Teach Yourself TCP/IP in 24 Hours, Second Edition, Joe Casad, Sams Publishing, March 01, 2001