Session 1 FT Networkingbasics Phy DLL Layer
Session 1 FT Networkingbasics Phy DLL Layer
Networking Basics,
Physical and Data
Link Layer
Session delivered by:
Dr. Rinki Sharma
Dr. Jyothi A P
Mr. Nithin Rao R
1
Session Objectives
22
Session Topics
• Network Model
• Data Communication
• Five Components of Data Communication
• Benefits of Layering
• OSI 7 Layer Functions
• 802.3 MAC frame
• Ethernet Address
• Ethernet encapsulation of IP packet
• Flow control techniques
• Attachment unit interface
33
Session Topics
• Medium Attachment Unit
• Ethernet Standards
• Bridges and Switches
• MAC Sublayer
• Physical Layer
• Physical Layer Implementation
• Bridged Ethernet
• Switched Ethernet
• Full-Duplex Ethernet
44
Data Communication
55
Data Communication
• Interface
• Signal generation
• Exchange management
• Error Detection & Correction
• Flow Control
• Addressing & routing
• Recovery of message
• Message formatting
• Security
• Network Management
66
Five Components of Data Communication
7
Network Hardware
• Local Area Networks
• Wireless Networks
• Home Networks
• Internetworks
88
Broadcast Networks
• Types of transmission technology
• Broadcast links
• Point-to-point links
99
Broadcast Networks
• Classification by scale
10
10
Network Models
11
Benefits of Layering
12
12
12
OSI 7 layers
13
TCP/IP Network Model
14
Difference Between OSI model & TCP/IP model
OSI TCP / IP
Application (Layer7)
Session (Layer 5)
15
15
OSI and TCP/IP Model
16
16
16
Brief Description of TCP/IP
Layers
17
Peer-to-Peer Process
18
Exchange of Data using
TCP/IP
19
Difference Between OSI model
& TCP/IP model
20
20
Various components in network
21
Physical Layer
22
Position of the physical layer
23
Physical Layer
• The physical layer is responsible for transmitting
individual bits from one node to the next.
24
24
Duties of Physical Layer
25
Duties of Physical Layer
26
26
Duties of Physical Layer
• Bit Synchronization:
• The timing of the bit transfer is crucial in data communications.
• The physical layer governs the synchronization of the bits by providing clocking
mechanisms that control both the sender and the receiver.
• Multiplexing:
• It is a process of dividing a link, the physical medium, into logical channels for
better efficiency.
• Switching:
• Switching in data communications can be done in several ways. In circuit
switching a dedicated link is established between source and destination.
Internet uses packet switching.
27
27
Transmission medium and physical layer
28
Transmission medium and physical layer
29
29
Twisted Pair Cable
30
Coaxial Cable
31
31
Fiber Optic Cable
32
Unguided Media: Wireless
• Radio Waves
• Microwaves
• Infrared
33
33
Unguided Media: Wireless
34
Physical Layer Functions
• The Physical Layer has two responsibilities; it sends bits and receives
bits.
• All wiring, power, cabling and connections are part of the physical
layer. Without the physical layer functioning properly none of the
upper layers will respond correctly.
35
35
Physical Layer Functionalities
• Transmits raw bit stream over physical cable.
36
36
Network Devices in Physical
Layer
• Multiplexers
• Multiplexer operate at the physical layer (OSI layer one), taking data bits from
several devices, and interleaving this data onto a single physical link.
• Multiplexer “manage the bandwidth” available on the serial link, and, hence,
are often called bandwidth managers.
37
37
Multiplexers
38
38
Categories of Multiplexing
39
Frequency Division
Multiplexing
40
Wave Division Multiplexing
41
Time Division Multiplexing
42
Circuit Switching
• (a) Circuit switching
• (b) Packet switching
43
43
Message Switching
• (a) Circuit switching
• (b) Message switching
• (c) Packet switching
44
44
Packet Switching
• A comparison of circuit switched and packet-switched networks.
45
45
Network Devices
46
46
Network Devices in Physical
Layer
• Repeaters
47
47
Repeaters
48
Repeaters
• A repeater regenerates the received signals and then retransmits the regenerated (or
conditioned) signals on other segments.
• To pass data through the repeater in a usable fashion from one segment to the next, the packets
and the Logical Link Control (LLC) protocols must be the same on the each segment.
• This means that a repeater will not enable communication, for example, between an 802.3
segment (Ethernet) and an 802.5 segment (Token Ring).
• That is, they cannot translate an Ethernet packet into a Token Ring packet. In other words,
repeaters do not translate anything.
49
49
Hubs
50
50
Hubs
51
51
Hubs
• The most basic Ethernet hubs support 10 Mbps speeds. Newer hubs support 100 Mbps Ethernet.
• To help users move ahead to the newer technology while still supporting the old, some hubs
support both 10 Mbps and 100 Mbps data rates. These are so-called "dual-speed" or "10/100"
hubs.
• Four- and five-port hubs are most common in home networks, but eight- and 16-port hubs can be
found in some home and small office environments.
52
52
NIC (Network Interface Card)
• A NIC or Network Interface Card is a circuit board or chip, which
allows the computer to communicate to other computers on a
Network.
• Local or Wide area networks are generally used for large businesses
as well as are beginning to be found in homes as home users begin to
have more then one computer.
53
53
Network Interface Card (NIC)
54
Network Interface Card (NIC)
55
Data Link Layer
56
56
Sublayers of Data Link Layer
• The LLC sub-layer acts as an interface between the Media Access
Control (MAC) sublayer and the network layer
57
57
Sublayers of Data Link Layer
• It provides addressing and channel access control mechanisms that
make it possible for several terminals or network nodes to
communicate within a multi-point network, typically a local area
network (LAN) or metropolitan area network (MAN).
58
58
Data Link Layer
59
59
Data Link Layer
60
60
Framing
Character Count Technique
• A character stream
• (a) Without errors
• (b) With one error.
61
61
Framing
Byte Stuffing Technique
• (a) A frame delimited by flag bytes
• (b) Four examples of byte sequences before and after stuffing
62
62
Framing
Bit stuffing Technique
• (a) The original data
• (b) The data as they appear on the line
• (c) The data as they are stored in receiver’s memory after destuffing
63
63
Three generations of Ethernet
64
PLS (Physical Layer
Signaling)
65
MAU (Medium Attachment Unit) (Transceiver)
66
Categories of Traditional
Ethernet
67
Station Connected To Medium
Using 10Base5
68
Fast Ethernet Implementations
69
69
Fast Ethernet Implementations
• 100BASE-T: A term for any of the three standard for 100 Mbit/s
Ethernet over twisted pair cable. Includes 100BASE-TX, 100BASE-T4
and 100BASE-T2.
• 100BASE-TX: Uses two pairs, but requires Category 5 cable. Similar star-
shaped configuration to 10BASE-T. 100 Mbit/s.
• 100BASE-T4: 100 Mbit/s Ethernet over Category 3 cabling (as used for
10BASE-T installations). Uses all four pairs in the cable. Now obsolete, as
Category 5 cabling is the norm. Limited to half-duplex.
71
71
Gigabit Ethernet
Implementations
72
Gigabit Ethernet
Implementations
• 1000BASE-T: 1 Gbit/s over Category 5e copper
cabling.
74
802.3 MAC Frame
75
75
802.3 MAC Frame
76
76
802.3 MAC Frame
• Versions 1.0 and 2.0 of the Digital/Intel/Xerox (DIX) Ethernet
specification have a 16-bit sub-protocol label field called the type.
• The new IEEE 802.3 Ethernet specification replaced that with a 16-bit
length field, with the MAC header followed by an IEEE 802.2 logical
link control (LLC) header.
• The maximum length of a frame was 1518 bytes for classical Ethernet
v2 and IEEE802.3 frames.
77
77
802.3 MAC Frame
• The two formats were eventually unified by the convention that
values of that field between 64 and 1518 indicated the use of the new
802.3 Ethernet format with a length field,
78
78
Minimum & Maximum Length
• Ethernet has used 1500 byte frame sizes since it was created
(around 1980). To maintain backward compatibility, 100
Mbps ethernet used the same size, and today "standard"
gigabit ethernet is also using 1500 byte frames
79
79
Minimum & Maximum Length
• The time it takes for a signal to propagate from one end of the
network to the other is known as the propagation delay
• In worst-case collision scenario Node A’s frame must travel all the way
to Node B, and then the collision signal must travel all the way from
Node B back to Node A. This time is known as the slot time.
• An Ethernet node must be transmitting a frame for the slot time for a
collision with that frame to be detected. This is the reason for the
minimum Ethernet frame size.
80
80
Ethernet Addresses in
Hexadecimal Notation
81
Unicast and Multicast
Addresses
82
Hardware/Ethernet Multicasting
• When a computer joins a multicast group, it needs to be able to distinguish between normal
unicasts (which are packets directed to one computer or one MAC address) and multicasts.
• With hardware multicasting, the network card is configured, via its drivers, to watch out for
particular MAC addresses (in this case, multicast MAC addresses) apart from its own.
• When the network card picks up a packet which has a destination MAC that matches any of the
multicast MAC addresses, it will pass it to the upper layers for further processing.
• Ethernet uses the last bit of the first octet to distinguish conventional unicast addresses from
multicast addresses. A unicast would have this bit set to ZERO (0), whereas a multicast would
be set to ONE (1)
83
83
Ethernet Encapsulation of IP
Packet
84
Ethernet Header Structure
85
85
Flow and Error Control
• Flow Control:
• Flow control refers to a set of procedures used to restrict the amount of data
that the sender can send before waiting for acknowledgment
• Error Control:
• Error control in the data link layer is based on automatic repeat request,
which is the retransmission of data
86
86
Stop-and-Wait ARQ
Normal operation
87
87
Stop-and-Wait ARQ, lost frame
88
Stop-and-Wait ARQ, lost ACK frame
89
Stop-and-Wait ARQ
• In Stop-and-Wait ARQ, numbering frames prevents the retaining of
duplicate frames
90
90
Piggybacking
91
Sender Sliding Window
92
Receiver Sliding Window
93
Sequence Numbers
• Frames from sending station are numbered sequentially
• If we ‘m’ bits for sequence number, sequence number will range from 0 to 2 m – 1
94
94
Control Variables
95
Go-Back-N ARQ, normal operation
96
Go-Back-N ARQ, lost frame
97
97
Go-Back-N ARQ: sender window size
98
Selective Repeat ARQ, sender and receiver
windows
99
Selective Repeat ARQ, lost frame
10
0
Selective Repeat ARQ & Go Back N ARQ
10
1
Selective Repeat ARQ, Sender Window Size
10
2
Error Detection and Correction
• Single-Bit Error
• In a single-bit error, only one bit in the data unit has
changed.
• Burst Error
• A burst error means that 2 or more bits in the data unit
have changed
10
3
Single-Bit Error
10
4
Burst Error
10
5
Error Detection
• Redundancy
• Parity Check
• Cyclic Redundancy Check (CRC)
• Checksum
10
6
Redundancy
10
7
Detection Methods
10
8
Even-Parity Concept
10
9
Parity Check
11
0
Two-dimensional Parity
11
1
CRC Generator and Checker
11
2
Binary Division in a CRC
Generator
11
3
Binary Division in CRC
Checker
11
4
CRC Generator Polynomial
11
5
Polynomial Representing a
Divisor
11
6
Standard Polynomials
11
7
Standard Polynomial
11
8
Standard Polynomial
The CRC-12
x12 + x11 + x3 + x + 1
which has a degree of 12, will detect all burst errors
affecting an odd number of bits, will detect all burst
errors with a length less than or equal to 12, and will
detect, 99.97 percent of the time, burst errors with a
length of 12 or more.
11
9
Checksum
12
0
Data Unit and Checksum
12
1
Data Unit and Checksum
12
2
Data Unit and Checksum
12
3
Multiple-Access Protocols
12
4
Random Access
• MA
• CSMA
• CSMA/CD
• CSMA/CA
12
5
Evolution of Random-Access Methods
12
7
Procedure for ALOHA Protocol
12
8
Collision in CSMA
12
9
Persistence Strategies
13
0
CSMA/CD Procedure
13
1
CSMA/CA Procedure
13
2
Control Access
• Reservation
• Polling
• Token Passing
13
3
Reservation Access Method
13
4
Select
13
5
Poll
13
6
Token-Passing Network
In this method, stations are arranged around a ring. Each station has a
predecessor and a successor.
Frames are coming from the predecessor and going to the successor.
13
7
Token-Passing Procedure
13
8
Network Devices
13
9
Network With and Without a
Bridge
14
0
Bridges
14
1
Bridges
• Bridges simply pass all protocols along the network
• A bridge works on the principle that each network node has its own
address
• The bridge will then use this RAM to build a routing table based on source
addresses
14
2
Collision Domains
14
3
Switches
• A network switch is a small hardware device that joins multiple
computers together within one Local Area Network (LAN)
Technically, network switches operate at layer two (Data Link
Layer) of the OSI model.
14
4
Switches
14
5
Switches
14
6
Switched Ethernet
14
7
Full-duplex Switched Ethernet
14
8
Switches
• Different models of network switches support
differing numbers of connected devices.
14
9
Backbone Networks
• A backbone network allows several LANs to be connected
15
0
Backbone Networks
15
1
Summary
• The term network usually means a set of computers and peripherals
(printers, modems, plotters, scanners, and so on) that are connected
together by some medium.
15
2
Summary
• Flow control is the regulation of the sender’s data rate so that the receiver
buffer does not become overwhelmed.
• The Point to Point(PPP) was designed to provide a dedicated line for users who
need Internet access via a telephone line or cable TV connection.
15
4
References
• Behrouz A. Forouzan, Data Communication and Networking, 2nd
edition, Tata McGraw-Hill, 2000
15
5