Chapter 4: Network Access: Instructor Materials
Chapter 4: Network Access: Instructor Materials
Instructor Materials
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
4.1 Physical Layer Protocols
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
Physical Layer Connection
Types of Connections
Before network
communications can
occur, a physical
connection to a local
network must be
established.
A physical connection
can be a wired
connection using a
cable or a wireless
connection using
radio waves.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
Physical Layer Connection
Network Interface Cards
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
Purpose of the Physical Layer
Physical Layer Media
Three basic
forms of
network media
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
Physical Layer Characteristics
Functions
Encoding
The transition occurs at the
• Method of converting a stream of
middle of each bit period.
data bits into a predefined
"code”.
Signaling Method
• Method of representing the bits.
• Physical layer standards must
define what type of signal
represents a "1" and what type
of signal represents a "0”.
• Long pulse might represent a 1
whereas a short pulse
represents a 0.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
Physical Layer Characteristics
Bandwidth
Capacity of a medium to carry data.
Digital bandwidth measures the amount of data that can flow from one place to another in a given
amount of time.
Bandwidth is sometimes thought of as the speed that bits travel, however this is not accurate. In
both 10Mb/s and 100Mb/s Ethernet, the bits are sent at the speed of electricity. The difference is
the number of bits that are transmitted per second.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
Physical Layer Characteristics
Throughput
Measure of the transfer of bits across
the media over a given period of time.
Usually does not match the specified
bandwidth in physical layer
implementations due to many factors.
• Amount of traffic
• Type of traffic
• Latency created by network devices
encountered between source and
destination
Goodput is throughput minus traffic
overhead for establishing sessions,
acknowledgments, and encapsulation.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
Physical Layer Characteristics
Types of Physical Media
The figure shows different types of interfaces and ports available on a 1941 router.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
4.2 Network Media
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
Copper Cabling
Characteristics of Copper Media
Transmitted on copper cables as electrical pulses.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
Copper Cabling
Unshielded Twisted-Pair Cable
UTP cabling is the most common networking media.
• Terminated with RJ-45 connectors.
• Used for interconnecting network hosts with networking devices such as switches.
• Consists of four pairs of color-coded wires that have been twisted together to help protect against signal
interference from other wires.
• Color codes aid in cable termination.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
Copper Cabling
Shielded Twisted-Pair (STP) Cable
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
Copper Cabling
Coaxial Cable
Coax consists of:
• A copper conductor used to transmit the electronic signals.
UTP cable has essentially replaced coaxial cable in
modern Ethernet installations but is used in:
• Wireless installations: Coaxial cables attach antennas to
wireless devices.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
Copper Cabling
Copper Media Safety
Copper media are susceptible to fire and electrical hazards.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
UTP Cabling
Properties of UTP Cabling
Consists of four pairs of color-coded copper
wires that have been twisted together and
then encased in a flexible plastic sheath.
Small size can be advantageous during
installation. Notice that the
UTP cable does not use shielding to counter orange/orange white
the effects of EMI and RFI. pair is twisted less than
the blue/blue white pair.
• Cancellation: When two wires in an electrical
circuit are placed close together, their
Each colored pair is
magnetic fields are the exact opposite of each twisted a different
other and cancel out any outside EMI and RFI number of times.
signals.
• Varies the number of twists per wire pair to
further enhance the cancellation effect of a
paired circuit.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
UTP Cabling
UTP Cabling Standards UTP cabling conforms to the standards established by
TIA/EIA.
• TIA/EIA-568 stipulates the cabling standards for LAN
installations
Cat 3 Cable
• Used for voice communication
• Most often used for phone lines
Cat 5 and 5e Cable
• Used for data transmission
• Cat5 supports 100 Mb/s and can support 1000Mb/s, but
it is not recommended
• Cat5e supports 1000 Mb/s
Cat 6 Cable
• Used for data transmission
• An added separator is between each pair of wires
allowing it to function at higher speeds
• Support 1000 Mb/s – 10 Gb/s, though 10 Gb/s is not
recommended © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
UTP Cabling
UTP Connectors
UTP cable terminated with an RJ-45
connector.
RJ-45 connector is the male component,
crimped at the end of the cable.
Socket is the female component of a
network device, wall, cubicle partition
outlet, or patch panel.
Essential that all copper media
terminations be of high quality to ensure
optimum performance with current and
future network technologies.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
UTP Cabling
Types of UTP Cable
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
Fiber Optic Cabling
Properties of Fiber Optic Cabling
Transmits data over longer distances and at
higher bandwidths.
Used to interconnect network devices.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
Fiber Optic Cabling
Types of Fiber Media
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
Fiber Optic Cabling
Fiber-Optic Connectors
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
Fiber Optic Cabling
Fiber versus Copper
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
Wireless Media
Properties of Wireless Media
Wireless media carry electromagnetic signals that represent
the binary digits of data communications using radio or
microwave frequencies.
Wireless areas of concern:
• Coverage area: Construction materials used in buildings and
structures, and the local terrain, will limit the coverage.
• Security: Devices and users, not authorized for access to the
network, can gain access to the transmission.
• Shared medium: Only one device can send or receive at a
time and the wireless medium is shared amongst all wireless
users.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
Wireless Media
Types of Wireless Media
Wi-Fi: Standard IEEE 802.11
• Uses Carrier/Sense Multiple Access/Collision Avoidance (CSMA/CA).
• Wireless NIC must wait till channel is clear.
Bluetooth: Standard IEEE 802.15
• Wireless Personal Area Network (WPAN)
• Uses a device pairing process for distances 1 to 100 meters
WiMAX: Standard IEEE 802.16
• Worldwide Interoperability for Microwave Access
• Wireless broadband access.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
Wireless Media
Wireless LAN
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
4.3 Data Link Protocols
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
Purpose of the Data Link Layer
The Data Link Layer
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
Purpose of the Data Link Layer
The Data Link Layer (Cont.)
Layer 2
Data Link
Addresses
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
Purpose of the Data Link Layer
Data Link Sublayers Data link layer is divided into two sublayers:
• Logical Link Control (LLC)
• Communicates with the network layer.
• Identifies which network layer protocol is being used
for the frame.
• Allows multiple Layer 3 protocols, such as IPv4 and
IPv6, to utilize the same network interface and
media.
• Media Access Control (MAC)
• Defines the media access processes performed by
the hardware.
• Provides data link layer addressing and access to
various network technologies.
• Communicates with Ethernet to send and receive
frames over copper or fiber-optic cable.
• Communicates with wireless technologies such as
Wi-Fi and Bluetooth.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
Purpose of the Data Link Layer
Media Access Control
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
Purpose of the Data Link Layer
Providing Access to Media
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
Topologies
Controlling Access to the Media
Media access control is the equivalent of
traffic rules that regulate the entrance of
motor vehicles onto a roadway.
The absence of any media access control
would be the equivalent of vehicles
ignoring all other traffic and entering the
road without regard to the other vehicles.
However, not all roads and entrances are
the same. Traffic can enter the road by
merging, by waiting for its turn at a stop
sign, or by obeying signal lights. A driver
follows a different set of rules for each
type of entrance.
Sharing the Media
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38
Topologies
Physical and Logical Topologies
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39
Topologies
Physical and Logical Topologies (Cont.)
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40
WAN Topologies
Common Physical WAN Topologies
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41
WAN Topologies
Physical Point-to-Point Topology
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42
WAN Topologies
Logical Point-to-Point Topology
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44
LAN Topologies
Star - End devices are connected to a
Physical LAN Topologies central intermediate device. Use Ethernet
switches.
Extended Star - Additional Ethernet
switches interconnect other star topologies.
Bus - Used in legacy networks. All end
systems are chained to each other and
terminated in some form on each end.
Switches are not required to interconnect
the end devices. Bus topologies using coax
cables were used in legacy Ethernet
networks because it was inexpensive and
easy to set up.
Ring - End systems are connected to their
respective neighbor forming a ring. Unlike
the bus topology, the ring does not need to
be terminated. Ring topologies were used in
legacy Fiber Distributed Data Interface
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 45
(FDDI) and Token Ring networks.
LAN Topologies
Half and Full Duplex
Half-Duplex Communication
• Both devices can transmit and
receive on the media but cannot do
so simultaneously.
• Used in legacy bus topologies and
with Ethernet hubs.
• WLANs also operate in half-duplex.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 46
LAN Topologies
Half and Full Duplex (Cont.)
Full-Duplex Communication
• Both devices can transmit and
receive on the media at the same
time.
• Data link layer assumes that the
media is available for transmission for
both nodes at any time.
• Ethernet switches operate in full-
duplex mode by default, but can
operate in half-duplex if connecting to
a device such as an Ethernet hub.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47
LAN Topologies
Media Access Control Methods
Contention-Based Access
• Nodes operate in half-
duplex.
• Compete for the use of
the medium.
• Only one device can
send at a time.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 48
LAN Topologies
Contention-based Access - CSMA/CD
Carrier Sense Multiple Access/Collision Detection
(CSMA/CD) process is used in half-duplex Ethernet
LANs.
• If two devices transmit at the same time, a collision
will occur.
1 • Both devices will detect the collision on the network.
• Data sent by both devices will be corrupted and will
need to be resent.
2 3
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 49
LAN Topologies
Contention-based Access - CSMA/CA
CSMA/CA
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 50
Data Link Frame
The Frame
Each frame type has three
basic parts:
• Header
• Data
• Trailer
Structure of the frame and the
fields contained in the header
and trailer depend on Layer 3
protocol.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 51
Data Link Frame
Frame Fields
Frame start and stop indicator
flags - Identifies the beginning
and end limits of the frame.
Addressing - Indicates the source
and destination nodes.
Type - Identifies the Layer 3
protocol in the data field.
Control - Identifies special flow
control services such as QoS.
Data - Contains the frame payload
(i.e., packet header, segment
header, and the data).
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 52
Data Link Frame
Layer 2 Addresses
Each data link frame contains the source data link address of the NIC card sending the frame,
and the destination data link address of the NIC card receiving the frame.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 53
Data Link Frame
LAN and WAN Frames
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 54
4.5 Chapter Summary
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 55