Chabot College ELEC 99.05 Layer 2 - Highlights CISCO NETWORKING ACADEMY

advertisement
Chabot College
ELEC 99.05
Layer 2 - Highlights
CISCO NETWORKING ACADEMY
Layer 1 Limitations
• No way to communicate with upper
layers
• No addressing
• No logical grouping or organization of
bits (framing)
• No method to control media access
CISCO NETWORKING ACADEMY
Layer 2
Layer 2 solves these problems.
2
CISCO NETWORKING ACADEMY
Data Link Sublayers
LLC (Logical Link Control)
MAC (Media Access Control)
IEEE 802 Extension to the OSI Model
CISCO NETWORKING ACADEMY
The IEEE Working Groups
802.1 Networking Overview and Architecture
802.2 Logical Link Control
802.3 Ethernet
802.4 Token Bus
802.5 Token Ring
802.6 MANs
802.7 Broadband
802.8 Fiber Optic
802.9 Isochronous LAN
...and more!
CISCO NETWORKING ACADEMY
OSI v IEEE
CISCO NETWORKING ACADEMY
Logical Link Control (LLC)
• Defined by a committee named 802.2
• Is technology independent
• Is not used by all networks
What is it?
CISCO NETWORKING ACADEMY
Logical Link Control
• Provides independence to the
protocols running in the upper and
lower layers.
• The LLC acts as a managing buffer
between the “executive” upper layers
and the “shipping department” lower
layers.
• Communicates up and down.
CISCO NETWORKING ACADEMY
802.2 LLC
Layer 3
IPX
IP
APPLETALK
Layer 2 - LLC
LLC
Layer 2- MAC
&Layer 1
10BaseT Ethernet
CISCO NETWORKING ACADEMY
802.2 LLC
IP
Layer 3
LLC
Layer 2 - LLC
Layer 2- MAC
&Layer 1
CISCO NETWORKING ACADEMY
Ethernet
Token
Ring
FDDI
Media Access Control (MAC)
• Responsible for the actual framing
– builds the 1s and 0s to hand off to the
physical layer.
• Responsible for media access:
– Contention
– Token Passing
– Polling
CISCO NETWORKING ACADEMY
The MAC Address
CISCO NETWORKING ACADEMY
MAC Addresses Are Flat
CISCO NETWORKING ACADEMY
Framing
• A message is “framed” at layer two.
• Framing provides order, or structure, to
the bitstream.
CISCO NETWORKING ACADEMY
Frame Format
CISCO NETWORKING ACADEMY
FCS – Frame Checksum
• Used to insure that the data has
arrived without corruption.
• More efficient than sending the data
twice and comparing the results.
• Necessary to prevent errors.
CISCO NETWORKING ACADEMY
Media Access Control
Media Access Control methods can be
divided into two flavors:
– Deterministic
– Non-deterministic
CISCO NETWORKING ACADEMY
Deterministic Media Access
• aka “Taking Turns”
– example: Token Passing used in Token
Ring
– No collisions
CISCO NETWORKING ACADEMY
Non-Deterministic
• “First Come, First Served”
– Example: CSMA/CD used in Ethernet
– Carrier Sense Multiple Access with
Collision Detection
CISCO NETWORKING ACADEMY
Layer 2 Technologies
Three common layer 2 technologies:
– Ethernet: non-deterministic
– Token Ring: deterministic
– FDDI: deterministic
CISCO NETWORKING ACADEMY
Download