Network Access: Introduction To Networks
Network Access: Introduction To Networks
Network Access
Introduction to Networks
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1
4.4 Media Access Control
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
Chapter 4
4.1 Physical Layer Protocols
4.2 Network Media
4.3 Data Link Layer Protocols
4.4 Media Access Control
4.5 Summary
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
4.1 Physical Layer Protocols
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
Getting it Connected
Connecting to the Network
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
Purpose of the Physical Layer
The Physical Layer
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
Purpose of the Physical Layer
Physical Layer Media
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7
Purpose of the Physical Layer
Physical Layer Standards
Standard
Networking Standards
Organization
• ISO 8877: Officially adopted the RJ connectors (e.g., RJ-11, RJ-45)
ISO • ISO 11801: Network cabling standard similar to EIA/TIA 568.
• TIA-568-C: Telecommunications cabling standards, used by nearly all
voice, video and data networks.
• TIA-569-B: Commercial Building Standards for Telecommunications
EIA/TIA Pathways and Spaces
• TIA-598-C: Fiber optic color coding
• TIA-942: Telecommunications Infrastructure Standard for Data Centers
• 802.3: Ethernet
IEEE • 802.11: Wireless LAN (WLAN) & Mesh (Wi-Fi certification)
• 802.15: Bluetooth
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
Fundamental Principles of Layer 1
Physical Layer Fundamental Principles
Physical Frame Encoding
Media Signalling Method
Components Technique
• UTP • Manchester Encoding • Changes in the
• Coaxial • Non-Return to Zero (NRZ) electromagnetic field
• Connectors techniques • Intensity of the
Copper • NICs • 4B/5B codes are used with electromagnetic field
Cable • Ports Multi-Level Transition Level 3 • Phase of the
• Interfaces (MLT-3) signaling electromagnetic
• 8B/10B wave
• PAM5
• Single-mode • Pulses of light • A pulse equals 1.
Fiber • Wavelength multiplexing • No pulse is 0.
• Multimode Fiber using different colors
Fiber Optic • Connectors
Cable • NICs
• Interfaces
• Lasers and LEDs
• Photoreceptors
• Access Points • DSSS (direct-sequence • Radio waves
Wireless • NICs spread-spectrum)
Media • Radio • OFDM (orthogonal frequency
• Antennae division multiplexing)
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9
Fundamental Principles of Layer 1
Bandwidth
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10
Fundamental Principles of Layer 1
Throughput
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
4.2 Network Media
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
About Cables
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
13 13
Copper Wires
Conventional computer network use wires as the primary medium
Copper used almost exclusively because its low resistance
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
14 14
Copper Cabling
Characteristics of Copper Media
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
Copper Cabling
Copper Media
Coaxial Cable
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
Copper Cabling
UTP Cable
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17
Copper Cabling
STP Cable
Foil Shields
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18
Copper Cabling
Coaxial Cable
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19
UTP Cabling
Properties of UTP Cabling
UTP cable does not use shielding to counter the effects of RFI.
Instead, cable designers have discovered that they can limit the
negative effect of crosstalk by:
Cancellation
Varying the number of twists per wire pair
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20
UTP Cabling
UTP Cabling Standards
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 21
UTP Cabling
UTP Connectors
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 22
UTP Cabling
Types of UTP Cable
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 23
Fiber Optic Cabling
Properties of Fiber Optic Cabling
Fiber-optic cabling is now being used in four types of industry:
Enterprise Networks
Fiber-to-the-home (FTTH) and Access Networks
Long-Haul Networks
Submarine Networks
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 24
Fiber Optic Cabling
Fiber Media Cable Design
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 25
Fiber Optic Cabling
Types of Fiber Media
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 26
Fiber Optic Cabling
Network Fiber Connectors
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 27
Fiber Optic Cabling
Fiber versus Copper
Implementation Issues Copper Media Fibre Optic
High
Immunity To EMI And RFI Low
(Completely immune)
High
Immunity To Electrical Hazards Low
(Completely immune)
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 28
Wireless Media
Properties of Wireless Media
Wireless does have some areas of concern including:
Coverage area
Interference
Security
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 29
Wireless Media
Types of Wireless Media
• IEEE 802.11 standards
• Commonly referred to as Wi-Fi.
• Uses CSMA/CA
• Variations include:
• 802.11a: 54 Mbps, 5 GHz
• 802.11b: 11 Mbps, 2.4 GHz
• 802.11g: 54 Mbps, 2.4 GHz
• 802.11n: 600 Mbps, 2.4 and 5 GHz
• 802.11ac: 1 Gbps, 5 GHz
• 802.11ad: 7 Gbps, 2.4 GHz, 5 GHz, and 60 GHz
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 30
Wireless Media
802.11 Wi-Fi Standards
Maximum Backwards
Standard Frequency
Speed Compatible
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 31
Wireless Transmission
Electromagnetic Spectrum »
Radio Transmission »
Microwave Transmission »
Light Transmission »
Wireless vs. Wires/Fiber »
CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 32
Electromagnetic Spectrum
Different bands have different uses:
Radio: wide-area broadcast; Infrared/Light: line-of-sight
Microwave: LANs and 3G/4G; Networking focus
Microwave
CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 33
Radio Transmission
CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 34
Microwave Transmission
Microwaves have much bandwidth and are widely used
indoors (WiFi) and outdoors (3G, satellites)
Signal is attenuated/reflected by everyday objects
Strength varies with mobility due multipath fading, etc.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 35
Light Transmission
CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 36
Wireless vs. Wires/Fiber
Wireless:
+ Easy and inexpensive to deploy
+ Naturally supports mobility
+ Naturally supports broadcast
Transmissions interfere and must be managed
Signal strengths hence data rates vary greatly
Wires/Fiber:
+ Easy to engineer a fixed data rate over point-to-point links
Can be expensive to deploy, esp. over distances
Doesn’t readily support mobility or broadcast
CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 37
Communication Satellites
CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 38
Kinds of Satellites
Satellites and their properties vary by altitude:
Geostationary (GEO), Medium-Earth Orbit (MEO), and Low-
Earth Orbit (LEO)
CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 39
Low-Earth Orbit Satellites
Satellite:
+ Can rapidly set up anywhere/anytime communications (after
satellites have been launched)
+ Can broadcast to large regions
Limited bandwidth and interference to manage
Fiber:
+ Enormous bandwidth over long distances
Installation can be more expensive/difficult
CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 41
Introduction
Under simplest conditions, medium can carry only one signal
at any moment in time
For multiple signals to share a medium, medium must
somehow be divided, giving each signal a portion of the total
bandwidth
Current techniques include:
Frequency division multiplexing
Time division multiplexing
Code division multiplexing
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 42
Frequency Division Multiplexing
FDM (Frequency Division Multiplexing) shares the
channel by placing users on different frequencies:
CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 43
Frequency Division Multiplexing
• Assignment of non-overlapping frequency
ranges to each “user” or signal on a medium
Thus, all signals are transmitted at the same
time, each using different frequencies
• A multiplexor accepts inputs and assigns
frequencies to each device.
• demultiplexor, is on the end of the high-speed
line and separates the multiplexed signals
Data
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 44
Frequency Division Multiplexing (continued)
Data
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 45
Frequency Division Multiplexing (continued)
• Broadcast radio and television, cable
television, and cellular telephone systems use
frequency division multiplexing.
Data
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 46
Time Division Multiplexing
• Sharing of the signal is accomplished by
dividing available transmission time on a
medium among users
• It can be only used in digital data.
• Time division multiplexing comes in two basic
forms:
Synchronous time division multiplexing
Statistical time division multiplexing
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 47
Synchronous Time Division Multiplexing
The original time division multiplexing
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 48
Synchronous Time Division Multiplexing
Synchronous TDM works by the multiplexor giving exactly the
same amount of time to each device connected to it.
This time slice is allocated even if a device has nothing to
transmit.
This is wasteful in that there will be many times when
allocated time slots are not being used. Therefore, the use of
Synchronous TDM does not guarantee maximum line usage
and efficiency.
Data
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 49
Statistical Time Division Multiplexing
A statistical multiplexor transmits the data from active
workstations only
If a workstation is not active, no space is wasted in the
multiplexed stream
Data
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 50
Statistical Time Division Multiplexing
(continued)
5
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1 51
Statistical Time Division Multiplexing
(continued)
A statistical multiplexor accepts the incoming data streams
and creates a frame containing the data to be transmitted
To identify each piece of data, an address is included
Data
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 52
Statistical Time Division Multiplexing
(continued)
If the data is of variable size, a length is also included
Data
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 53
Wavelength Division Multiplexing
WDM is used with fiber optic cables.
WDM is a technology that closely resembles frequency
division multiplexing, but is specifically used to combine lots
of Optical Carrier signals into a single optical fiber.
Multiplexes multiple data streams onto a single fiber-optic line
Different wavelength lasers (called lambdas) transmit the
multiple signals
Data
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 54
Wavelength Division Multiplexing
(continued)
5
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5 55
Code Division Multiplexing
Also known as code division multiple access
An advanced technique that allows multiple devices to
transmit on the same frequencies at the same time
Each mobile device is assigned a unique 64-bit code
Data
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 56
Key elements of CDMA
Use of wide bandwidth.
Spreading codes used: In order to achieve the increased bandwidth,
the data is spread by use of a code which is independent of the data.
Level of security: In order to receive the data, the receiver must have a
knowledge of the spreading code, without this it is not possible to
decipher the transmitted data, and this gives a measure of security.
Multiple access: The use of the spreading codes which are
independent for each user along with synchronous reception allow
multiple users to access the same channel simultaneously.
Data
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 57
Code Division Multiplexing (continued)
To send a binary 1, a mobile device transmits the unique
code
To send a binary 0, a mobile device transmits the inverse of
the code
To send nothing, a mobile device transmits zeros
Data
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 58
Code Division Multiplexing (continued)
Receiver gets summed signal, multiplies it by receiver code,
adds up the resulting values
Interprets as a binary 1 if sum is near +64
Interprets as a binary 0 if sum is near -64
Data
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 59
Code Division Multiplexing (continued)
For simplicity, assume 8-bit code
Example
Three different mobile devices use the following codes:
Mobile A: 11110000
Mobile B: 10101010
Mobile C: 00110011
Assume Mobile A sends a 1, B sends a 0, and C sends a 1
Signal code:
1-chip = +N volt;
0-chip = -N volt
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 60
Code Division Multiplexing (continued)
Example (continued)
Three signals transmitted:
Mobile A sends a 1, or 11110000, or ++++----
Mobile B sends a 0, or 01010101, or -+-+-+-+
Mobile C sends a 1, or 00110011, or --++--++
Summed signal received by base station: -1, +1, +1, +3, -3, -1, -1, +1
Data
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 61
Code Division Multiplexing (continued)
Example (continued)
Base station decode for Mobile A:
Signal received: -1, +1, +1, +3, -3, -1, -1, +1
Mobile A’s code: +1, +1, +1, +1, -1, -1, -1, -1
Product result: -1, +1, +1, +3, +3, +1, +1, -1
Sum of Products: +8
Decode rule: For result near +8, data is binary 1
Data
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 62
Code Division Multiplexing (continued)
Example (continued)
Base station decode for Mobile B:
Signal received: -1, +1, +1, +3, -3, -1, -1, +1
Mobile B’s code: +1, -1, +1, -1, +1, -1, +1, -1
Product result: -1, -1, +1, -3, -3, +1, -1, -1
Sum of Products: -8
Decode rule: For result near -8, data is binary 0
Data
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 63
Comparison of Multiplexing Techniques
6
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4 64
4.3 Data Link Layer Protocols
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 65
Purpose of the Data Link Layer
Data Link Sublayers
Network
LLC Sublayer
Data Link
MAC Sublayer
Bluetooth
Bluetooth
Ethernet
Ethernet
802.15
802.11
802.15
802.11
Wi-Fi
Wi-Fi
802.3
Physical
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 66
Purpose of the Data Link Layer
Media Access Control
The Data Link Layer
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 67
Purpose of the Data Link Layer
Providing Access to Media
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 68
Data Link Layer
Formatting Data for Transmission
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 69
Layer 2 Standards
Data Link Layer Standards
Standard
Networking Standards
organization
• G.992: ADSL
• G.8100 - G.8199: MPLS over Transport aspects
ITU-T • Q.921: ISDN
• Q.922: Frame Relay
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 70
Topologies
Controlling Access to the Media
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 71
WAN Topologies
Common Physical WAN Topologies
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 72
WAN Topologies
Physical Point-to-Point Topology
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 73
WAN Topologies
Logical Point-to-Point Topology
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 74
WAN Topologies
Half- and Full-Duplex
Half-Duplex
Full-Duplex
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 75
LAN Topologies
Physical LAN Topologies
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 76
LAN Topologies
Logical Topology for Shared Media
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 77
LAN Topologies
Contention-Based Access
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 78
LAN Topologies
Multi-Access Topology
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 79
LAN Topologies
Controlled Access
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 80
LAN Topologies
Ring Topology
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 81
Data Link Frame
The Frame
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 82
Data Link Frame
Layer 2 Address
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 83
Data Link Frame
The Trailer
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 84
Data Link Frame
LAN and WAN Frames
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 85
Data Link Frame
Ethernet Frame
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 86
Data Link Frame
Point-to-Point Protocol Frame
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 87
Network Access
Summary
The TCP/IP network access layer is the equivalent of the OSI data link
layer (Layer 2) and the physical layer (Layer 1).
The OSI physical layer provides the means to transport the bits that make
up a data link layer frame across the network media.
The physical layer standards address three functional areas: physical
components, frame encoding technique, and signaling method.
Using the proper media is an important part of network communications.
Without the proper physical connection, either wired or wireless,
communications between any two devices will not occur.
Wired communication consists of copper media and fiber cable.
There are three main types of copper media used in networking:
unshielded-twisted pair (UTP), shielded-twisted pair (STP), and coaxial
cable. UTP cabling is the most common copper networking media.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 88
Network Access
Summary (cont.)
Optical fiber cable has become very popular for interconnecting
infrastructure network devices. It permits the transmission of data over
longer distances and at higher bandwidths (data rates) than any other
networking media.
Wireless media carry electromagnetic signals that represent the binary
digits of data communications using radio or microwave frequencies.
The data link layer is responsible for the exchange of frames between
nodes over a physical network media. It allows the upper layers to access
the media and controls how data is placed and received on the media.
Among the different implementations of the data link layer protocols, there
are different methods of controlling access to the media. These media
access control techniques define if and how the nodes share the media.
The actual media access control method used depends on the topology
and media sharing. LAN and WAN topologies can be physical or logical.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 89
Network Access
Summary (cont.)
WANs are commonly interconnected using the point-to-point, hub and
spoke, or mesh physical topologies.
In shared media LANs, end devices can be interconnected using the star,
bus, ring, or extended star (hybrid) physical topologies.
All data link layer protocols encapsulate the Layer 3 PDU within the data
field of the frame. However, the structure of the frame and the fields
contained in the header and trailer vary according to the protocol.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 90