Module 5-6
Module 5-6
IPv4 Addresses
• Routers and computers only understand binary, while humans work in decimal. It is important
for you to gain a thorough understanding of these two numbering systems and how they are used
in networking.
1
• IPv6 addresses are 128 bits in length. Every
4 bits is represented by a single hexadecimal
digit. That makes the IPv6 address a total of
32 hexadecimal values.
• The figure shows the preferred method of
writing out an IPv6 address, with each X
representing four hexadecimal values.
• Each four hexadecimal character group is referred to as a hextet.
2
Module (6) Data Link Layer
➢ 6.1 Purpose of the Data Link Layer
• The Data Link layer is responsible for communications
between end-device network interface cards.
• It allows upper layer protocols to access the physical
layer media and encapsulates Layer 3 packets (IPv4 and
IPv6) into Layer 2 Frames.
• It also performs error detection and rejects corrupts
frames.
3
➢ 6.2 Topologies
❖ Physical and Logical Topologies
The topology of a network is the arrangement and relationship of the network devices and the
interconnections between them.
There are two types of topologies used when describing networks:
• Physical topology – shows physical connections and how devices are interconnected.
• Logical topology – identifies the virtual connections between devices using device interfaces
and IP addressing schemes.
❖ WAN Topologies
There are three common physical WAN topologies:
• Point-to-point – the simplest and most common WAN topology. Consists of a permanent link
between two endpoints.
• Hub and spoke – similar to a star topology where a central site interconnects branch sites
through point-to-point links.
• Mesh – provides high availability but requires every end system to be connected to every other
end system.
❖ Point-to-Point WAN Topology
• Physical point-to-point topologies directly connect two nodes.
• The nodes may not share the media with other hosts.
• Because all frames on the media can only travel to or from the two nodes, Point-to-Point WAN
protocols can be very simple.
❖ LAN Topologies
• End devices on LANs are typically interconnected using a star or extended star topology. Star
and extended star topologies are easy to install, very scalable and easy to troubleshoot.
Early Ethernet and Legacy Token Ring technologies provide two additional topologies:
• Bus – All end systems chained together and terminated on each end.
• Ring – Each end system is connected to its respective neighbors to form a ring.
4
❖ Half and Full Duplex Communication
Half-duplex communication
• Only allows one device to send or receive at a time on a shared medium.
• Used on WLANs and legacy bus topologies with Ethernet hubs.
Full-duplex communication
• Allows both devices to simultaneously transmit and receive on a shared medium.
• Ethernet switches operate in full-duplex mode.
❖ Access Control Methods
Contention-based access
All nodes operating in half-duplex, competing for use of the medium. Examples are:
• Carrier sense multiple access with collision detection (CSMA/CD) as used on legacy bus-
topology Ethernet.
• Carrier sense multiple access with collision avoidance (CSMA/CA) as used on Wireless LANs.
Controlled access
• Deterministic access where each node has its own time on the medium.
• Used on legacy networks such as Token Ring and ARCNET.
5
➢6.3 Data Link Frame
The Frame
Data is encapsulated by the data link layer with a header and a trailer to form a frame.
A data link frame has three parts:
• Header
• Data
• Trailer
The fields of the header and trailer vary according to data link layer protocol.
The amount of control information carried with in the frame varies according to access control
information and logical topology.
Layer 2 Addresses
• Also referred to as a physical address.
• Contained in the frame header.
• Used only for local delivery of a frame on the link.
• Updated by each device that forwards the frame.
6
LAN and WAN Frames
The logical topology and physical media determine the data link protocol used:
• Ethernet
• 802.11 Wireless
• Point-to-Point (PPP)
• High-Level Data Link Control (HDLC)
• Frame-Relay
Each protocol performs media access control for specified logical topologies.