Chabot College ELEC 99.05 Layer 2 - Highlights CISCO NETWORKING ACADEMY Layer 1 Limitations • No way to communicate with upper layers • No addressing • No logical grouping or organization of bits (framing) • No method to control media access CISCO NETWORKING ACADEMY Layer 2 Layer 2 solves these problems. 2 CISCO NETWORKING ACADEMY Data Link Sublayers LLC (Logical Link Control) MAC (Media Access Control) IEEE 802 Extension to the OSI Model CISCO NETWORKING ACADEMY The IEEE Working Groups 802.1 Networking Overview and Architecture 802.2 Logical Link Control 802.3 Ethernet 802.4 Token Bus 802.5 Token Ring 802.6 MANs 802.7 Broadband 802.8 Fiber Optic 802.9 Isochronous LAN ...and more! CISCO NETWORKING ACADEMY OSI v IEEE CISCO NETWORKING ACADEMY Logical Link Control (LLC) • Defined by a committee named 802.2 • Is technology independent • Is not used by all networks What is it? CISCO NETWORKING ACADEMY Logical Link Control • Provides independence to the protocols running in the upper and lower layers. • The LLC acts as a managing buffer between the “executive” upper layers and the “shipping department” lower layers. • Communicates up and down. CISCO NETWORKING ACADEMY 802.2 LLC Layer 3 IPX IP APPLETALK Layer 2 - LLC LLC Layer 2- MAC &Layer 1 10BaseT Ethernet CISCO NETWORKING ACADEMY 802.2 LLC IP Layer 3 LLC Layer 2 - LLC Layer 2- MAC &Layer 1 CISCO NETWORKING ACADEMY Ethernet Token Ring FDDI Media Access Control (MAC) • Responsible for the actual framing – builds the 1s and 0s to hand off to the physical layer. • Responsible for media access: – Contention – Token Passing – Polling CISCO NETWORKING ACADEMY The MAC Address CISCO NETWORKING ACADEMY MAC Addresses Are Flat CISCO NETWORKING ACADEMY Framing • A message is “framed” at layer two. • Framing provides order, or structure, to the bitstream. CISCO NETWORKING ACADEMY Frame Format CISCO NETWORKING ACADEMY FCS – Frame Checksum • Used to insure that the data has arrived without corruption. • More efficient than sending the data twice and comparing the results. • Necessary to prevent errors. CISCO NETWORKING ACADEMY Media Access Control Media Access Control methods can be divided into two flavors: – Deterministic – Non-deterministic CISCO NETWORKING ACADEMY Deterministic Media Access • aka “Taking Turns” – example: Token Passing used in Token Ring – No collisions CISCO NETWORKING ACADEMY Non-Deterministic • “First Come, First Served” – Example: CSMA/CD used in Ethernet – Carrier Sense Multiple Access with Collision Detection CISCO NETWORKING ACADEMY Layer 2 Technologies Three common layer 2 technologies: – Ethernet: non-deterministic – Token Ring: deterministic – FDDI: deterministic CISCO NETWORKING ACADEMY