Tài liệu Bài giảng Network+ Certification - Chapter 5, Data-Link Layer Protocols: Chapter 5, Data-Link Layer Protocols 
|1| Chapter Overview 
 A. Ethernet 
 B. Token Ring 
 C. FDDI 
 D. Wireless Networking 
Chapter 5, Lesson 1 
Ethernet 
|2| 1. Ethernet Standards 
 A. Ethernet is the most popular LAN protocol operating at the data-link 
layer. 
 B. There are two sets of Ethernet standards: 
 1. DIX Ethernet 
 2. Institute of Electrical and Electronic Engineers (IEEE) 802.3 
|3| C. DIX Ethernet: the original Ethernet protocol 
 1. Developed by Digital, Intel, and Xerox 
 a. Known as thick Ethernet, ThickNet, or 10Base5 
 2. Privately held standard 
 3. DIX Ethernet II 
 a. Retains thick Ethernet (10Base5) 
 b. Adds thin Ethernet (10Base2) 
 4. The frame contains an Ethertype field that identifies the network layer 
protocol that generated the data in each packet. 
 a. Ethertype is the only element of the DIX Ethernet standard that is still 
commonly used. 
|4| D. IEEE 802.3 
 1. Developed by the IEEE 
 2. Retains 10Base5 and 10Base2 
 3. A...
                
              
                                            
                                
            
 
            
                
12 trang | 
Chia sẻ: honghanh66 | Lượt xem: 971 | Lượt tải: 0
              
            Bạn đang xem nội dung tài liệu Bài giảng Network+ Certification - Chapter 5, Data-Link Layer Protocols, để tải tài liệu về máy bạn click vào nút DOWNLOAD ở trên
Chapter 5, Data-Link Layer Protocols 
|1| Chapter Overview 
 A. Ethernet 
 B. Token Ring 
 C. FDDI 
 D. Wireless Networking 
Chapter 5, Lesson 1 
Ethernet 
|2| 1. Ethernet Standards 
 A. Ethernet is the most popular LAN protocol operating at the data-link 
layer. 
 B. There are two sets of Ethernet standards: 
 1. DIX Ethernet 
 2. Institute of Electrical and Electronic Engineers (IEEE) 802.3 
|3| C. DIX Ethernet: the original Ethernet protocol 
 1. Developed by Digital, Intel, and Xerox 
 a. Known as thick Ethernet, ThickNet, or 10Base5 
 2. Privately held standard 
 3. DIX Ethernet II 
 a. Retains thick Ethernet (10Base5) 
 b. Adds thin Ethernet (10Base2) 
 4. The frame contains an Ethertype field that identifies the network layer 
protocol that generated the data in each packet. 
 a. Ethertype is the only element of the DIX Ethernet standard that is still 
commonly used. 
|4| D. IEEE 802.3 
 1. Developed by the IEEE 
 2. Retains 10Base5 and 10Base2 
 3. Added 10Base-T to the existing physical standards 
 4. Not privately held 
 5. It cannot legally use the name Ethernet. 
 6. Virtually all implementations called Ethernet today are actually 
IEEE 802.3. 
 7. Differences from DIX Ethernet 
 a. IEEE 802.3 has additional physical layer standards. 
 b. Slight frame format differences 
 E. IEEE 802.3u 
 1. Fast Ethernet 
 F. IEEE 802.3z and IEEE 802.3ab 
 1. Gigabit Ethernet 
|5| G. DIX Ethernet/IEEE 802.3 components 
2 Outline, Chapter 5 
 Network+ Certification, Second Edition 
 1. Physical layer specifications 
 2. Frame format 
 3. Carrier Sense Multiple Access with Collision Detection (CSMA/CD) 
Media Access Control (MAC) mechanism 
2. Ethernet Types 
|6| A. Standard 10-Mbps Ethernet 
|7| B. Fast Ethernet (100 Mbps) 
|8| C. Gigabit Ethernet (1,000 Mbps) 
 3. Physical Layer Specifications 
|9| A. Coaxial Ethernet standards 
 1. 10Base5 (thick Ethernet) 
2. 10Base2 (thin Ethernet) 
|10| B. Coaxial network characteristics 
 1. Runs at 10 Mbps 
 2. Uses the bus topology 
|11| 3. Uses mixing segments (cable segments that connect more than two 
computers) 
 4. 10Base5 
 a. Also called thick Ethernet or ThickNet 
 b. Uses RG-8 coaxial cable 
 c. 500-meter maximum segment length 
 5. 10Base2 
 a. Also called thin Ethernet, ThinNet, or Cheapernet 
 b. Uses RG-58 coaxial cable 
 c. 185-meter maximum segment length 
|12| C. UTP Ethernet standards 
1. 10Base-T 
2. 100Base-TX (Fast Ethernet) 
3. 100Base-T4 (Fast Ethernet) 
4. 1000Base-T (Gigabit Ethernet) 
|13| D. UTP network characteristics 
 1. The most popular type of cable used on Ethernet networks today 
a. Easy to install 
b. Can be upgraded 
 2. Runs at various speeds up to 1,000 Mbps 
 3. Uses the star topology 
 4. Requires a hub 
|14| 5. Uses link segments 
 6. 10Base-T 
 a. Uses Category 3 unshielded twisted pair (UTP) cable 
 b. Uses 2 wire pairs only 
 c. Uses the star topology 
Outline, Chapter 5 3 
Network+ Certification, Second Edition 
 d. Uses link segments up to 100 meters long 
 e. Runs at 10 Mbps 
 7. 100Base-TX (Fast Ethernet) 
a. Runs at 100 Mbps 
b. Requires Category 5 UTP cable (current industry standard) 
 c. Uses two wire pairs only 
 8. 100Base-T4 (Fast Ethernet) 
 a. Runs at 100 Mbps 
 b. Uses Category 3 UTP cable 
 c. Uses all four wire pairs: one for transmitting, one for receiving, and 
two bidirectional 
 9. 1000Base-T (Gigabit Ethernet) 
a. Runs at 1,000 Mbps 
b. Requires Category 5 UTP cable, but Category 5E or better is 
preferred 
 c. Uses all four wire pairs 
 d. Uses a signaling scheme called Pulse Amplitude Modulation-5 
(PAM-5) 
 e. 1000Base-T is a Gigabit Ethernet standard that is specially designed 
to accommodate existing Category 5 cable installations. 
|15| E. Fiber optic Ethernet 
 1. Fiber Optic Inter-Repeater Link (FOIRL) 
 a. Included in the DIX Ethernet II standard 
 b. The original fiber optic Ethernet solution 
 2. IEEE 802.3 fiber optic standards 
 a. 10Base-FL 
 b. 10Base-FB 
 c. 10Base-FP 
 d. The 10-Mbps fiber optic standards were rarely used. 
 (1) FDDI was more common until the Fast Ethernet fiber standard 
arrived. 
 3. 100Base-FX 
 a. Uses the same hardware as 10Base-FL 
 b. Runs at 100 Mbps 
 4. Gigabit Ethernet standards 
 a. Runs at 1,000 Mbps 
 b. Uses various types of singlemode and multimode fiber optic cable 
 4. Cabling Guidelines 
 A. Ethernet standards include guidelines for cabling the network. 
 1. Repeaters extend the length that signals can travel over the network. 
 2. Ethernet limits the number of repeaters to prevent the distances that 
signals travel from growing too long. 
 3. Ethernet standards also define the maximum length for a cable segment. 
4 Outline, Chapter 5 
 Network+ Certification, Second Edition 
 4. Segments that are too long can prevent the Ethernet collision detection 
mechanism from functioning. 
|16| B. 5-4-3 rule for using repeaters 
 1. A standard Ethernet network can have no more than five segments, 
connected by four repeaters. 
 a. No more than three of the segments can be mixing segments. 
|17| 2. Coaxial networks can consist of five cable segments, but only three of 
those segments can be populated with computers. 
|18| 3. UTP networks consist of all link segments. 
 4. These guidelines are only rules of thumb. 
 a. The Ethernet standards contain a much more complex and precise 
method for calculating the maximum allowable segment lengths and 
hub configurations. 
 b. In practice, you can exceed the maximum limits slightly on a 
standard Ethernet network and still expect it to function properly. 
 c. On Fast Ethernet and Gigabit Ethernet networks, however, there is far 
less flexibility built into the guidelines, and the maximums should 
generally not be exceeded. 
 C. Fast Ethernet guidelines 
|19| 1. The Fast Ethernet standard defines two types of hubs: 
 a. Class I. Connects different types of cable segments 
 b. Class II. Connects cable segments of the same type 
|20| 2. Class I hubs 
 a. Maximum of one hub on the network 
 b. Total cable length (for all segments): 200 meters for UTP cable and 
272 meters for fiber optic cable 
 3. Class II hubs 
 a. Maximum of two hubs on the network 
 b. Total cable length (for all segments): 205 meters for UTP cable and 
228 meters for fiber optic cable 
 D. Gigabit Ethernet guidelines 
 1. Only one repeater is permitted. 
 5. The Ethernet Frame 
|21| A. Ethernet frame format 
 1. Preamble (7 bytes). Contains 7 bytes of alternating 0s and 1s, which the 
communicating systems use to synchronize their clock signals 
 2. Start Of Frame Delimiter (1 byte). Contains 6 bits of alternating 0s and 
1s, followed by two consecutive 1s, which is a signal to the receiver that 
the transmission of the actual frame is about to begin 
 3. Destination Address (6 bytes). Contains the 6-byte hexadecimal address 
of the network interface adapter on the LAN that the packet will be 
transmitted to 
 4. Source Address (6 bytes). Contains the 6-byte hexadecimal address of 
the network interface adapter in the system generating the packet 
Outline, Chapter 5 5 
Network+ Certification, Second Edition 
 5. Ethertype/Length (2 bytes). 
 a. In the DIX Ethernet frame, this field contains a code identifying the 
network layer protocol that the data in the packet is intended for. 
 b. In the IEEE 802.3 frame, this field specifies the length of the data 
field (excluding the pad). 
5. Data And Pad (46 to 1500 bytes). Contains the data received from the 
network layer protocol on the transmitting system, which is sent to the 
same protocol on the destination system 
 a. Ethernet frames (including the header and footer, except for the 
Preamble and Start Of Frame Delimiter) must be at least 64 bytes 
long. 
 b. If the data received from the network layer protocol is less than 46 
bytes, the system adds padding bytes to bring it up to its minimum 
length. 
6. Frame Check Sequence (4 bytes). The frame’s footer is a single field 
that comes after the network layer protocol data and contains a 4-byte 
checksum value for the entire packet. 
 a. The sending computer computes this value and places it into the field. 
 b. The receiving system performs the same computation and compares 
it to the field to verify that the packet was transmitted without error. 
 B. Ethernet frame characteristics 
 1. Regular, Fast, and Gigabit Ethernet all use the same frame. 
 2. Only data-link layer protocols use a footer as well as a header. 
 C. Ethernet addressing 
 1. Ethernet uses the 6-byte hardware (or MAC) addresses coded into 
network interface adapters. 
 2. A hardware address consists of a 3-byte, organizationally unique 
identifier (OUI), assigned by the IEEE, plus a unique 3-byte value 
assigned by the manufacturer. 
 3. The destination address field in an Ethernet packet always refers to a 
system on the same LAN that provides access to the destination link. 
|22| D. Ethertypes 
 1. DIX Ethernet frames use the Ethertype field. 
 2. Identify the protocol that generated the data in the frame 
 3. IEEE 802.3 frames contain a length field in place of the Ethertype field. 
 E. IEEE protocol identification 
 1. IEEE 802.3 frames use the Logical Link Control (LLC) and Subnetwork 
Access Protocol (SNAP) subheaders. 
 2. The IEEE documents split the data-link layer into two sublayers: 
 a. The MAC layer contains the elements defined in IEEE 802.3. 
 b. The Logical Link Control (LLC) sublayer is defined in IEEE 802.2. 
 3. The LLC sublayer 
 a. IEEE 802.2 defines an additional subheader, carried in the frame’s 
Data field. 
 b. The LLC subheader is 3 or 4 bytes long. 
6 Outline, Chapter 5 
 Network+ Certification, Second Edition 
c. The LLC subheader contains service access points (SAPs) that 
specify locations in memory where the source and destination 
systems store the packet data. 
d. To identify the protocol that generated the data in the frame, the LLC 
adds a 5-byte Subnetwork Access Protocol (SNAP) subheader that 
contains the same type of code as an Ethertype. 
 6. CSMA/CD 
|23| A. What is Media Access Control (MAC)? 
 1. The mechanism that enables computers on a shared network medium to 
transmit their data in an orderly fashion 
 a. If two computers in a shared network medium transmit packets 
simultaneously, a collision occurs. 
 b. MAC prevents collisions from occurring. 
 B. All Ethernet systems use Carrier Sense Multiple Access with Collision 
Detection (CSMA/CD) as their MAC mechanism. 
|24| C. CSMA/CD phases 
 1. Carrier sense. A computer listens to the network before transmitting, to 
see if it is in use. 
 a. If the network is busy, the computer waits and tries again. 
 2. Multiple access. All of the computers on the network contend for access 
to the same network medium. 
 3. Collision detection. While transmitting, a computer checks to see if a 
collision has occurred. 
a. If a collision occurs, the computers involved in the collision wait and 
then retransmit the packets. 
b. The wait is called a backoff period. 
c. The length of the wait is calculated using the truncated binary 
exponential backoff algorithm. 
d. The collision detection process varies depending on the type of 
network medium. For example: 
 (1) A computer on a UTP network assumes that a collision has 
occurred when it detects a signal on its transmit and receive 
wire pairs at the same time. 
 (2) On a coaxial network, the computers check for a voltage spike. 
|25| D. Collisions 
 1. Also called signal quality errors 
 2. Are normal and expected on Ethernet networks 
 3. The frequency of collisions increases as network traffic increases, 
thereby decreasing the efficiency of the network. 
 4. Late collisions occur after the transmission is completed and are a sign 
of a serious problem. 
Outline, Chapter 5 7 
Network+ Certification, Second Edition 
Chapter 5, Lesson 2 
Token Ring 
 1. Token Ring Standards 
 A. Originally designed by IBM 
 B. Standardized as IEEE 802.5 
 2. Token Ring Characteristics 
 A. Less commonly used than Ethernet 
 B. Requires hardware that is more expensive than Ethernet hardware 
 C. Topology 
 1. Uses the logical ring topology 
 2. Uses the physical star topology 
|26| 3. Physical Layer Specifications 
 A. Include two cable types: 
 1. IBM Type 1. Proprietary STP 
 2. IBM Type 3. Standard Category 5 UPT 
|27| B. IBM Type 1 cable characteristics 
 1. Proprietary cables developed by IBM as the original medium for Token 
Ring 
 2. Shielded twisted pair (STP) 
 3. Uses a proprietary connector called the IBM data connector (IDC) or the 
Universal Data Connector (UDC) 
 4. Cables connecting a computer to a multistation access unit (MAU) are 
called lobe cables. 
 a. Lobe cables can be up to 300 meters long. 
 5. Cables connecting MAUs together are called patch cables. 
 6. Supports up to 260 workstations 
 7. Drawbacks 
 a. Cable is thick and inflexible. 
 b. Difficult to install 
 c. Requires a port initialization “key” 
 8. Rarely used today 
 C. IBM Type 3 cable characteristics 
 1. Standard Category 5 UTP cable with RJ-45 connectors 
 2. Easy to install 
 3. Does not require an initialization key 
 4. Spans only 150 meters 
 5. Supports up to 72 workstations 
|28| 4. Token Passing 
 A. Is the MAC mechanism for Token Ring and other networks 
 B. Uses a separate frame type called a token 
 C. The token circulates continuously around the ring. 
8 Outline, Chapter 5 
 Network+ Certification, Second Edition 
 1. Gives each system on the network an equal opportunity to transmit data 
 D. Only the computer holding the token can transmit data. 
 E. There are no collisions on a Token Ring network. 
 F. Token passing is better suited to high-traffic networks, because traffic 
does not degrade performance. 
 G. After a computer transmits a data frame, the frame circulates around 
the ring and is eventually removed from the ring by the computer that 
transmitted it. 
|29| 5. Token Ring Frames 
 A. Token Ring uses four types of frames: data frame, token frame, 
command frame, and abort delimiter frame. 
 B. The data frame 
 1. Used to carry network layer protocol information across the network 
 2. Operates at the LLC sublayer 
|30| 3. Data frame format 
 a. Start Delimiter (1 byte). Contains a bit pattern that signals the 
beginning of the frame to the receiving system 
 b. Access Control (1 byte). Contains bits that can be used to prioritize 
Token Ring transmissions, enabling certain systems to have priority 
access to the token frame and the network 
 c. Frame Control (1 byte). Contains bits that specify whether the frame 
is a data or a command frame 
 d. Destination Address (6 bytes). Contains the 6-byte hexadecimal 
address of the network interface adapter on the local network to 
which the packet will be transmitted 
 e. Source Address (6 bytes). Contains the 6-byte hexadecimal address 
of the network interface adapter in the system generating the packet 
 f. Information (up to 4500 bytes). Contains the data generated by the 
network layer protocol, including a standard LLC header, as defined 
in IEEE 802.2 
 g. Frame Check Sequence (4 bytes). Contains a 4-byte checksum value 
for the packet (excluding the Start Delimiter, End Delimiter, and 
Frame Status fields) that the receiving system uses to verify that the 
packet was transmitted without error 
 h. End Delimiter (1 byte). This field contains a bit pattern that signals 
the end of the frame, including a bit that specifies if there are further 
packets in the sequence yet to be transmitted and a bit that indicates 
that the packet has failed the error check. 
 i. Frame Status (1 byte). Contains bits that indicate whether the 
destination system has received the frame and copied it into its 
buffers 
 C. The token frame 
 1. Used to control access to the network medium 
|31| 2. Token frame format 
 a. Start Delimiter (1 byte) 
Outline, Chapter 5 9 
Network+ Certification, Second Edition 
 b. Access Control (1 byte) 
 c. End Delimiter (1 byte) 
 D. The command frame 
 1. Also called the MAC frame 
 2. Operates at the MAC sublayer 
 3. Performs control functions only; carries no data 
 4. Uses the same basic format as the data frame 
 E. The abort delimiter frame 
 1. Used to flush all data from the ring when a problem occurs 
 2. Abort delimiter frame format 
 a. Start Delimiter (1 byte) 
 b. End Delimiter (1 byte) 
Chapter 5, Lesson 3 
FDDI 
|32| 1. FDDI Characteristics 
 A. Pronounced “fiddy” 
 B. Standardized by the American National Standards Institute (ANSI) 
 C. First commercial protocol to run at 100 Mbps over fiber optic cable 
 D. Used primarily on backbone networks 
 E. A copper-based version (CDDI) intended to run to the desktop never 
achieved great acceptance. 
 F. Uses the token passing MAC mechanism 
 2. The FDDI Physical Layer 
 A. Supports both singlemode and multimode cable 
 1. Includes 62.5/125 multimode, which supports segments up to 100 
kilometers 
|33| B. Double ring topology 
 1. The network is physically cabled as a ring. 
 2. Two separate rings with traffic running in opposite directions 
 a. The second ring provides fault tolerance. 
 b. When there is a cable fault in one ring, the transmitting computer 
switches to the other. 
 3. A computer connected to both rings is called a dual attachment station 
(DAS). 
 4. A double ring network in which both rings are in use due to a fault is 
called a wrapped ring. 
 5. Best suited to a backbone network 
 C. Logical ring topology 
 1. Uses a hub called a dual attachment concentrator (DAC) 
 2. The DAC implements a logical (single) ring internally, much like a 
Token Ring MAU. 
10 Outline, Chapter 5 
 Network+ Certification, Second Edition 
 3. A computer connected to a DAC is called a single attachment station 
(SAS). 
 4. Best suited for desktop connections 
|34| D. Dual ring of trees 
 1. Enterprise network constructed by connecting multiple DACs to a 
double ring backbone 
 2. Servers requiring fault tolerance are connected to the double ring. 
 3. Workstations are connected to a DAC. 
 3. The FDDI Frames 
|35| A. The data frame is the most common type. 
 1. Used to transmit network layer data across the network 
 2. The data frame format 
 a. Preamble (PA, 8 bytes). Contains series of alternating 0s and 1s; 
used for clock synchronization 
 b. Starting Delimiter (SD, 1 byte). Indicates the beginning of the frame 
 c. Frame Control (FC, 1 byte). Indicates the type of data found in the 
Data field 
 d. Destination Address (DA, 6 bytes). Specifies the hardware address of 
the computers that will receive the frame 
 e. Source Address (SA, 6 bytes). Specifies the hardware address of the 
system sending the frame 
 f. Data (variable). Contains network layer protocol data, or an SMT 
header and data, or MAC data, depending on the function of the 
frame 
 g. Frame Check Sequence (FCS, 4 bytes). Contains a cyclical 
redundancy check (CRC) value, used for error detection 
 h. Ending Delimiter (ED, 4 bits). Indicates the end of the frame 
 i. End of Frame Sequence (FS, 12 bits). Contains three indicators that 
may be modified by intermediate systems when they retransmit the 
packet 
 B. The token frame 
 1. The token frame format 
 a. Preamble (PA, 8 bytes). Contains series of alternating 0s and 1s; used 
for clock synchronization 
 b. Starting Delimiter (SD, 1 byte). Indicates the beginning of the frame 
 c. Frame Control (FC, 1 byte). Indicates the type of data found in the 
Data field 
 d. Ending Delimiter (ED, 4 bits). Indicates the end of the frame 
 C. The station management frame 
 1. Responsible for ring maintenance and network diagnostics 
Outline, Chapter 5 11 
Network+ Certification, Second Edition 
Chapter 5, Lesson 4 
Wireless Networking 
 1. History of Wireless Networking 
 A. Wireless products have been available for several years. 
 1. Early wireless products were slow and unreliable. 
 2. Limitations were tolerated in situations where wireless communication 
was required. 
 B. Today, wireless networks are much faster and more reliable. 
 1. However, they are not likely ever to be as fast or reliable as a cabled 
LAN. 
|36| 2. IEEE 802.11 Standards 
 A. IEEE 802.11 is the dominant wireless LAN standard today. 
 1. IEEE 802.11a. Speeds of 1 to 2 Mbps 
 2. IEEE 802.11b. Speeds of 5.5 to 11 Mbps 
 3. The IEEE 802.11 Physical Layer 
|37| A. Supports two topologies: ad hoc and infrastructure 
 B. Ad hoc topology (also called independent topology) 
 1. Wireless computers communicate with each other only, on a peer-to-
peer basis. 
 2. Intended for home or small office networks 
 C. Infrastructure topology 
 1. Wireless computers communicate with an access point connected to a 
cabled network. 
 a. The access point enables the wireless devices to communicate with 
the cabled network. 
 b. The access point can be a dedicated device or a computer with both 
wireless and wired network interface adapters. 
 c. One access point can typically support 10 to 20 wireless computers at 
a maximum range of 100–200 feet. 
 2. The wireless range can be extended by using an extension point (a 
wireless signal repeater that functions as a relay station). 
 D. Wireless LANs can use three types of signals: 
 1. Direct Sequence Spread Spectrum (DSSS) 
 a. Most commonly used type of signal 
 2. Frequency Hopping Spread Spectrum (FHSS) 
 3. Infrared 
 4. The IEEE 802.11 MAC Layer 
 A. IEEE 802.11 splits the data-link layer into the LLC and MAC sublayers. 
 B. LLC is defined by IEEE 802.2. 
 C. The MAC mechanism is Carrier Sense Multiple Access with Collision 
Avoidance (CSMA/CA). 
|38| D. CSMA/CA is a variation of CSMA/CD. 
12 Outline, Chapter 5 
 Network+ Certification, Second Edition 
 1. The standard Ethernet collision detection is impractical because it would 
require full-duplex communications. 
 2. On a CSMA/CA network, systems transmit acknowledgment messages 
to indicate that no collision has occurred. 
 a. If a computer does not receive an acknowledgment to its 
transmissions, it retransmits the packet automatically. 
|39| Chapter Summary 
 A. Ethernet 
 1. Supports multiple cable types and speeds 
 2. Uses the CSMA/CD MAC mechanism to detect collisions 
 B. Token Ring 
 1. Uses a logical ring topology 
 2. Uses the token passing MAC mechanism 
 C. FDDI 
 1. Uses a double ring or star topology 
 2. Uses the token passing MAC mechanism 
 D. Wireless networking 
 1. Runs at speeds up to 11 Mbps 
 2. Uses the CSMA/CA MAC mechanism 
            Các file đính kèm theo tài liệu này:
ch05_2907.pdf