Chapter 9. Network Access

Objectives

Upon completion of this chapter, you will be able to answer the following questions:

Image What is the purpose and function of the data link layer in preparing communication for transmission on specific media?

Image What is the structure of the Layer 2 frame and which generic frame field types does it include?

Image What are some of the protocols and standards used by the data link layer?

Image What are the functions of logical topologies and physical topologies?

Image What are the basic characteristics of media access control methods on WAN topologies?

Image What are the basic characteristics of media access control methods on LAN topologies?

Image What are the characteristics and the functions of the data link layer frame?

Image What are the purpose and the function of the physical layer in the network?

Image How are standards established for the data link layer and the physical layer?

Image What are the basic characteristics of copper cabling?

Image How do you build a UTP cable used in Ethernet networks?

Image What is fiber-optic cabling and what are its main advantages over other media?

Image How do you connect devices using wired and wireless media?

Key Terms

This chapter uses the following key terms. You can find the definitions in the Glossary.

data link layer page 411

physical layer page 411

Logical Link Control (LLC) page 413

Media Access Control (MAC) page 413

media access control method page 414

Header page 416

Data page 416

Trailer page 416

International Telecommunication Union (ITU) page 418

American National Standards Institute (ANSI) page 418

topology page 420

media sharing page 420

physical topology page 420

logical topology page 420

point-to-point page 422

hub and spoke page 422

mesh page 422

half-duplex communication page 424

full-duplex communication page 425

star page 425

extended star or hybrid page 426

bus page 426

ring page 426

contention-based access page 427

controlled access page 427

carrier sense multiple access with collision detection (CSMA/CD) page 428

carrier sense multiple access with collision avoidance (CSMA/CA) page 428

logical ring topology page 431

Point-to-Point Protocol (PPP) page 437

802.11 Wireless page 438

copper cable page 442

fiber-optic cable page 442

wireless page 442

physical components page 445

frame encoding technique page 445

signaling method page 445

Manchester encoding page 447

Non-Return to Zero (NRZ) page 447

asynchronous page 448

synchronous page 448

frequency modulation (FM) page 448

amplitude modulation (AM) page 448

pulse-coded modulation (PCM) page 449

electromagnetic interference (EMI) and radio frequency interference (RFI) page 452

crosstalk page 452

unshielded twisted-pair (UTP) page 453

shielded twisted-pair (STP) page 453

coaxial page 453

Ethernet straight-through page 461

Ethernet crossover page 461

rollover page 462

Work area page 462

Horizontal cabling page 462

Telecommunications room page 463

Backbone cabling page 463

Central equipment room page 463

Entrance facility page 463

Enterprise networks page 465

FTTH and access networks page 465

Long-Haul Networks page 465

Submarine Networks page 465

single-mode fiber (SMF) page 467

multimode fiber (MMF) page 467

straight-tip (ST) connector page 468

subscriber connector page 468

Lucent connector page 468

misalignment page 470

end gap page 470

end finish page 470

IEEE 802.11 page 474

IEEE 802.15 page 474

IEEE 802.16 page 474

wireless access point (AP) page 475

wireless NIC adapters page 475

Introduction (9.0.1.1)

To support our communication, the Open Systems Interconnection (OSI) model divides the functions of a data network into layers. To recap:

Image The application layer provides the interface to the user.

Image The transport layer is responsible for dividing and managing communications between the processes running in the two end systems.

Image The network layer protocols organize our communication data so that it can travel across internetworks from the originating host to a destination host.

For network layer packets to be transported from source host to destination host, they must traverse different physical networks. These physical networks can consist of different types of physical media, such as copper wires, microwaves, optical fibers, and satellite links. Network layer packets do not have a way to directly access these different media.

It is the role of the OSI data link layer to prepare network layer packets for transmission and to control access to the physical media.

OSI upper-layer protocols prepare data from the human network for transmission to its destination. The physical layer controls how data is transmitted on the communication media by encoding the binary digits that represent data link layer frames into signals. It then transmits and receives these signals across the physical media (e.g., copper wires, optical fiber, and wireless) that connect network devices.

This chapter introduces the general functions of the data link layer and the protocols associated with it. It also covers the general functions of the physical layer and the standards and protocols that manage the transmission of data across local media.


Image

Class Activity 9.0.1.2: Managing the Medium

In this modeling activity, pretend that you and your colleague are attending a networking conference. There are many lectures and presentations held during this event, and because they overlap, each of you can only choose a limited set of sessions to attend.

Therefore, you decide to split, each of you attending a separate set of presentations, and after the event ends, you share the slides and the knowledge each of you gained during the event.

Try to answer the following questions:

Image How would you personally organize a conference where multiple sessions are held at the same time? Would you put all of them into a single conference room or would you use multiple rooms? What would be the reason?

Image Assume that the conference room is properly fitted with audiovisual equipment to display large-size video and amplify voice. If a person wanted to attend a specific session, does the seating arrangement make a difference, or is it sufficient to visit the proper conference room?

Image Would it be considered positive or harmful if the speech from one conference room somehow leaked into another?

Image If questions or inquiries arise during a presentation, should attendees simply shout out their questions, or should there be some form of process for handling questions, such as documenting them and handing them over to a facilitator? What would happen without this process?

Image If an interesting topic elicits a larger discussion where many attendees have questions or comments, can this result in the session running out of its time without going through the entire intended content? Why is that so?

Image Imagine that the session is a panel; that is, a freer discussion of attendees with panelists and, optionally, among themselves. If a person wants to address another person within the same room, can he/she do it directly? What would be necessary to do if a panelist wanted to invite another person to join who is not presently in the room?

Image What was accomplished by the isolation of multiple sessions into separate conference rooms if, after the event, people can meet and share the information?


Data Link Layer (9.1)

The data link layer (Layer 2 in the OSI model) prepares network data for the physical network. This section looks at this layer in depth.

The Data Link Layer (9.1.1.1)

The TCP/IP network access layer is the equivalent of the combined OSI data link layer (Layer 2) and physical layer (Layer 1). As shown in Figure 9-1, the data link layer is responsible for the exchange of frames between nodes over a physical network media. It allows the upper layers to access the media and controls how data is placed and received on the media.

Image

Figure 9-1 Data Link Layer


Note

indenthangingB

Specifically, the data link layer performs these two basic services:

Image It accepts Layer 3 packets and packages them into data units called frames.

Image It controls media access control and performs error detection.


The data link layer effectively separates the media transitions that occur as the packet is forwarded from the communication processes of the higher layers. The data link layer receives packets from and directs packets to an upper-layer protocol, in this case IPv4 or IPv6. This upper-layer protocol does not need to be aware of which media the communication will use.


Note

In this chapter, media and medium do not refer to digital content and multimedia such as audio, animation, television, and video. Media refers to the material that actually carries the data signals, such as copper cable and optical fiber.


Data Link Sublayers (9.1.1.2)

The data link layer is actually divided into two sublayers:

Image Logical Link Control (LLC): This upper sublayer defines the software processes that provide services to the network layer protocols. It places information in the frame that identifies which network layer protocol is being used for the frame. This information allows multiple Layer 3 protocols, such as IPv4 and IPv6, to utilize the same network interface and media.

Image Media Access Control (MAC): This lower sublayer defines the media access processes performed by the hardware. It provides data link layer addressing and delimiting of data according to the physical signaling requirements of the medium and the type of data link layer protocol in use.

Separating the data link layer into sublayers allows for one type of frame defined by the upper layer to access different types of media defined by the lower layer. Such is the case in many local area network (LAN) technologies, including Ethernet.

Figure 9-2 illustrates how the data link layer is separated into the LLC and MAC sublayers. The LLC sublayer communicates with the network layer, and the MAC sublayer allows various network access technologies. For instance, the MAC sublayer communicates with Ethernet LAN technology to send and receive frames over copper or fiber-optic cable. The MAC sublayer also communicates with wireless technologies such as Wi-Fi and Bluetooth to send and receive frames wirelessly.

Image

Figure 9-2 Data Link Sublayers

Media Access Control (9.1.1.3)

Layer 2 protocols specify the encapsulation of a packet into a frame and the techniques for getting the encapsulated packet on and off each medium. The technique used for getting the frame on and off media is called the media access control method.

As packets travel from source host to destination host, they typically traverse over different physical networks. These physical networks can consist of different types of physical media, such as copper wires, optical fibers, and wireless, which consist of different electromagnetic signals, such as radio and microwave frequencies and satellite links.

The packets do not have a way to directly access these different media. It is the role of the OSI data link layer to prepare network layer packets for transmission and to control access to the physical media. The media access control methods described by the data link layer protocols define the processes by which network devices can access the network media and transmit frames in diverse network environments.

Without the data link layer, network layer protocols such as IP would have to make provisions for connecting to every type of media that could exist along a delivery path. Moreover, IP would have to adapt every time a new network technology or medium was developed. This process would hamper protocol and network media innovation and development. This is a key reason for using a layered approach to networking.


Image

Video 9.1.1.3:

This video provides an example of a PC in Paris connecting to a laptop in Japan. Go to the online course to view this animation.


Providing Access to Media (9.1.1.4)

Different media access control methods may be required during the course of a single communication. Each network environment that packets encounter as they travel from a local host to a remote host can have different characteristics. For example, an Ethernet LAN consists of many hosts contending to access the network medium on an ad hoc basis. Serial links consist of a direct connection between only two devices over which data flows sequentially as bits in an orderly way.

Router interfaces encapsulate the packet into the appropriate frame, and a suitable media access control method is used to access each link. In any given exchange of network layer packets, there may be numerous data link layer and media transitions. At each hop along the path, a router

Image Accepts a frame from a medium

Image De-encapsulates the frame

Image Re-encapsulates the packet into a new frame

Image Forwards the new frame appropriate to the medium of that segment of the physical network


Image

Video 9.1.1.4: Transfer of Frames

This video demonstrates how frames are transferred, de-encapsulated, and re-encapsulated. Go to the online course to view this animation.


Layer 2 Frame Structure (9.1.2)

This section takes a look at how the data link layer frames are structured. It covers formatting of data as well as creating a frame.

Formatting Data for Transmission (9.1.2.1)

The data link layer prepares a packet for transport across the local media by encapsulating it with a header and a trailer to create a frame. The description of a frame is a key element of each data link layer protocol.

Data link layer protocols require control information to enable the protocols to function. Control information typically answers the following questions:

Image Which nodes are in communication with each other?

Image When does communication between individual nodes begin and when does it end?

Image Which errors occurred while the nodes communicated?

Image Which nodes will communicate next?

Unlike the other protocol data units (PDUs) that have been discussed in this course, the data link layer frame includes the following elements:

Image Header: Contains control information, such as addressing, and is located at the beginning of the PDU

Image Data: Contains the IP header, transport layer header, and application data

Image Trailer: Contains control information for error detection and is added to the end of the PDU

These frame elements are shown in Figure 9-3, and will be discussed in greater detail.

Image

Figure 9-3 Frame Elements

Creating a Frame (9.1.2.2)

When data travels on the media, it is converted into a stream of bits, or 1s and 0s. If a node is receiving long streams of bits, how does it determine where a frame starts and stops or which bits represent the address?

Framing breaks the stream into decipherable groupings, with control information inserted in the header and trailer as values in different fields. This format gives the physical signals a structure that can be received by nodes and decoded into packets at the destination.

As shown in Figure 9-4, generic frame field types include the following:

Image Frame start and Frame stop indicator flags: Used by the MAC sublayer to identify the beginning and end limits of the frame.

Image Addressing: Used by the MAC sublayer to identify the source and destination nodes.

Image Type: Used by the LLC sublayer to identify the Layer 3 protocol.

Image Control: Identifies special flow control services.

Image Data: Contains the frame payload (i.e., packet header, segment header, and the data).

Image Error Detection: Included after the data to form the trailer, these frame fields are used for error detection.

Image

Figure 9-4 Frame Fields

Not all protocols include all of these fields. The standards for a specific data link layer protocol define the actual frame format.


Note

Examples of frame formats are discussed toward the end of this chapter.



Image

Activity 9.1.2.3: Generic Frame Fields

Go to the online course to perform this practice activity (which has two parts).


Layer 2 Standards (9.1.3)

Several organizations have developed the Layer 2 standards. This section discusses those organizations.

Data Link Layer Standards (9.1.3.1)

Unlike the protocols of the upper layers of the TCP/IP suite, data link layer protocols generally are not defined by Requests for Comments (RFCs). Although the Internet Engineering Task Force (IETF) maintains the functional protocols and services for the TCP/IP protocol suite in the upper layers, the IETF does not define the functions and operation of that model’s network access layer.

Specifically, the data link layer services and specifications are defined by multiple standards based on a variety of technologies and media to which the protocols are applied. Some of these standards integrate both Layer 2 and Layer 1 services.

The functional protocols and services at the data link layer are described by

Image Engineering organizations that set public and open standards and protocols

Image Communications companies that set and use proprietary protocols to take advantage of new advances in technology or market opportunities

Engineering organizations that define open standards and protocols that apply to the data link layer include

Image Institute of Electrical and Electronics Engineers (IEEE)

Image International Telecommunication Union (ITU)

Image International Organization for Standardization (ISO)

Image American National Standards Institute (ANSI)

Table 9-1 highlights various standards organizations and some of their more important data link layer protocols.

Image

Table 9-1 Standards Organizations and Networking Standards


Image

Activity 9.1.3.2: Data Link Layer Standards Organizations

Go to the online course to perform practice activity of matching each data link layer protocol to its corresponding standards organization.


Media Access Control (9.2)

Regulating the placement of data frames onto the media is controlled by the MAC sublayer.

Topologies (9.2.1)

This section first looks at how to control access to the media and then describes the physical and logical topologies of a network.

Controlling Access to the Media (9.2.1.1)

Media access control is the equivalent of traffic rules that regulate the entrance of motor vehicles onto a roadway. The absence of any media access control would be the equivalent of vehicles ignoring all other traffic and entering the road without regard to the other vehicles. However, not all roads and entrances are the same. Traffic can enter the road by merging, by waiting for its turn at a stop sign, or by obeying signal lights. A driver follows a different set of rules for each type of entrance.

In the same way, there are different ways to regulate placing frames onto the media. The protocols at the data link layer define the rules for access to different media. Some media access control methods use highly controlled processes to ensure that frames are safely placed on the media. These methods are defined by sophisticated protocols, which require mechanisms that introduce overhead onto the network.

Among the different implementations of the data link layer protocols, there are different methods of controlling access to the media. These media access control techniques define if and how the nodes share the media.

The actual media access control method used depends on

Image Topology: How the connection between the nodes appears to the data link layer.

Image Media sharing: How the nodes share the media. The media sharing can be point-to-point, such as in wide area network (WAN) connections, or shared, such as in LAN networks, as shown in Figure 9-5.

Image

Figure 9-5 Sharing the Media

Physical and Logical Topologies (9.2.1.2)

The topology of a network is the arrangement or relationship of the network devices and the interconnections between them. LAN and WAN topologies can be viewed in two ways:

Image Physical topology: Refers to the physical connections and identifies how end devices and infrastructure devices such as routers, switches, and wireless access points are interconnected. Physical topologies are usually point-to-point or star, as shown in Figure 9-6.

Image

Figure 9-6 Physical Topology

Image Logical topology: Refers to the way a network transfers frames from one node to the next. This arrangement consists of virtual connections between the nodes of a network. These logical signal paths are defined by data link layer protocols. The logical topology of point-to-point links is relatively simple whereas shared media offers deterministic and non-deterministic media access control methods. Deterministic media access is the protocol used to control access to the physical medium in a token ring or FDDI network. Non-determinicstic media access is the CSMA/CD method used by Ethernet. See Figure 9-7.

Image

Figure 9-7 Logical Topology

The data link layer “sees” the logical topology of a network when controlling data access to the media. It is the logical topology that influences the type of network framing and media access control used.

WAN Topologies (9.2.2)

Understanding the differences between WAN and LAN topologies is essential to understanding network access in general. This section covers the WAN topologies.

Common Physical WAN Topologies (9.2.2.1)

WANs are commonly interconnected using the following physical topologies:

Image Point-to-point: This is the simplest topology, consisting of a permanent link between two endpoints. For this reason, this is a very popular WAN topology.

Image Hub and spoke: This is a WAN version of the star topology in which a central site interconnects branch sites using point-to-point links.

Image Mesh: This topology provides high availability but requires that every end system be interconnected to every other system. Therefore, the administrative and physical costs can be significant. Each link is essentially a point-to-point link to the other node. Variations of this topology include a partial mesh, where some but not all end devices are interconnected.

The three common physical WAN topologies are illustrated in Figure 9-8.

Image

Figure 9-8 WAN Topologies

Physical Point-to-Point Topology (9.2.2.2)

Physical point-to-point topologies directly connect two nodes, as shown in Figure 9-9.

Image

Figure 9-9 Point-to-Point Topology

In this arrangement, two nodes do not have to share the media with other hosts. Additionally, a node does not have to make any determination about whether an incoming frame is destined for it or another node. Therefore, the logical data link protocols can be very simple, as all frames on the media can only travel to or from the two nodes. The frames are placed on the media by the node at one end of the point-to-point circuit and are taken off the media by the node at the other end.

Data link layer protocols could provide more sophisticated media access control processes for logical point-to-point topologies, but this would only add unnecessary protocol overhead.

Logical Point-to-Point Topology (9.2.2.3)

The end nodes communicating in a point-to-point network can be physically connected via a number of intermediate devices. However, the use of physical devices in the network does not affect the logical topology.

As shown in Figure 9-10, the source and destination nodes may be indirectly connected to each other over some geographical distance. In some cases, the logical connection between nodes forms what is called a virtual circuit. A virtual circuit is a logical connection created within a network between two network devices. The two nodes on either end of the virtual circuit exchange the frames with each other. This occurs even if the frames are directed through intermediary devices. Virtual circuits are important logical communication constructs used by some Layer 2 technologies.

Image

Figure 9-10 Logical Connection

The media access method used by the data link protocol is determined by the logical point-to-point topology, not the physical topology. This means that the logical point-to-point connection between two nodes may not necessarily be between two physical nodes at each end of a single physical link. Figure 9-11 shows the physical devices in-between the two routers.

Image

Figure 9-11 Logical Point-to-Point Topology

Half and Full Duplex (9.2.2.4)

Figure 9-12 shows a point-to-point topology. In point-to-point networks, data can flow in one of two ways:

Image Half-duplex communication: Both devices can both transmit and receive on the media but cannot do so simultaneously. Ethernet has established arbitration rules for resolving conflicts arising from instances when more than one station attempts to transmit at the same time.

Image

Figure 9-12 Point-to-Point Connection


Image

Video 9.2.2.4 Part 2: Half-Duplex Communications

Go to the online course to view this half-duplex video.


Image Full-duplex communication: Both devices can transmit and receive on the media at the same time. The data link layer assumes that the media is available for transmission for both nodes at any time. Therefore, there is no media arbitration necessary in the data link layer.


Image

Video 9.2.2.4 Part 3: Full-Duplex Communications

Go to the online course to view this full-duplex video.


LAN Topologies (9.2.3)

This section takes a look at the physical and logical LAN topologies, as well as the multi-access topology. It also describes the two basic media access control methods for shared media, contention-based access and controlled access. A short discussion on ring topology is also presented.

Physical LAN Topologies (9.2.3.1)

As shown in Figure 9-13, physical topology defines how the end systems are physically interconnected. In shared media LANs, end devices can be interconnected using the following physical topologies:

Image Star: End devices are connected to a central intermediate device. Early star topologies interconnected end devices using hubs. However, star topologies now use switches. The star topology is the most common physical LAN topology primarily because it is easy to install, very scalable (easy to add and remove end devices), and easy to troubleshoot.

Image Extended star or hybrid: This is a combination of the other topologies, such as star networks interconnected to each other using a bus topology.

Image Bus: All end systems are chained to each other and terminated in some form on each end. Infrastructure devices such as switches are not required to interconnect the end devices. Bus topologies were used in legacy Ethernet networks because they were inexpensive to use and easy to set up.

Image Ring: All end systems are connected to their respective closest two neighbors, forming a ring. Unlike the bus topology, the ring does not need to be terminated. Ring topologies were used in legacy Token Ring and Fiber Distributed Data Interface (FDDI) networks. Specifically, FDDI networks employ a second ring for fault tolerance or performance enhancements.

Image

Figure 9-13 Physical Topologies

Logical Topology for Shared Media (9.2.3.2)

Logical topology of a network is closely related to the mechanism used to manage network access. Access methods provide the procedures to manage network access so that all stations have access. When several entities share the same media, some mechanism must be in place to control access. Access methods are applied to networks to regulate this media access.

Some network topologies share a common medium with multiple nodes. At any one time, there may be a number of devices attempting to send and receive data using the network media. There are rules that govern how these devices share the media.

There are two basic media access control methods for shared media:

Image Contention-based access: All nodes compete for the use of the medium but have a plan if there are collisions. Figure 9-14 shows contention-based access.

Image

Figure 9-14 Contention-Based Access

Image Controlled access: Each node has its own time to use the medium. Figure 9-15 shows controlled access.

Image

Figure 9-15 Controlled Access

The data link layer protocol specifies the media access control method that will provide the appropriate balance between frame control, frame protection, and network overhead.

Contention-Based Access (9.2.3.3)

When using a non-deterministic contention-based method, a network device can attempt to access the medium whenever it has data to send. To prevent complete chaos on the media, these methods use a carrier sense multiple access (CSMA) process to first detect if the media is carrying a signal.

If a carrier signal on the media from another node is detected, it means that another device is transmitting. When the device attempting to transmit sees that the media is busy, it will wait and try again after a short time period. If no carrier signal is detected, the device transmits its data. Ethernet and wireless networks use contention-based media access control.

It is possible that the CSMA process will fail and two devices will transmit at the same time, creating a data collision. If this occurs, the data sent by both devices will be corrupted and will need to be re-sent.

Contention-based media access control methods do not have the overhead of controlled access methods. A mechanism for tracking whose turn it is to access the media is not required. However, the contention-based systems do not scale well under heavy media use. As use and the number of nodes increase, the probability of successful media access without a collision decreases. Additionally, the recovery mechanisms required to correct errors due to these collisions further diminish the throughput.

CSMA is usually implemented in conjunction with a method for resolving the media contention. The two commonly used methods are

Image Carrier sense multiple access with collision detection (CSMA/CD): The end device monitors the media for the presence of a data signal. If a data signal is absent and therefore the media is free, the device transmits the data. If signals are then detected that show another device was transmitting at the same time, all devices stop sending and try again later. Traditional forms of Ethernet use this method.

Image Carrier sense multiple access with collision avoidance (CSMA/CA): The end device examines the media for the presence of a data signal. If the media is free, the device sends a notification across the media of its intent to use it (Request to Send frame). After it receives a clearance to transmit (Clear to Send frame), the device then sends the data. This method is used by 802.11 wireless networking technologies.

Figure 9-16 illustrates the following:

Image How contention-based access methods operate

Image Characteristics of contention-based access methods

Image Examples of contention-based access methods

Image

Figure 9-16 Contention-Based Access

Multi-Access Topology (9.2.3.4)

A logical multi-access topology enables a number of nodes to communicate by using the same shared media. Data from only one node can be placed on the medium at any one time. Every node sees all the frames that are on the medium, but only the node to which the frame is addressed processes the contents of the frame.

Having many nodes share access to the medium requires a data link media access control method to regulate the transmission of data and thereby reduce collisions between different signals.

Play Video 9.2.3.4 to see how nodes access the media in a multi-access topology.


Image

Video 9.2.3.4: Logical Multi-Access Topology

This video demonstrates how nodes access the media in a multi-access topology. Go to the online course to view this animation.


Controlled Access (9.2.3.5)

When using the controlled access method, network devices take turns, in sequence, to access the medium. If an end device does not need to access the medium, then the opportunity passes to the next end device. This process is facilitated by use of a token. An end device acquires the token and places a frame on the media, and no other device can do so until the frame has arrived and been processed at the destination, releasing the token.


Note

This method is also known as scheduled access or deterministic.


Although controlled access is well ordered and provides predictable throughput, deterministic methods can be inefficient because a device has to wait for its turn before it can use the medium.

Controlled access examples include

Image Token Ring (IEEE 802.5)

Image FDDI, which is based on the IEEE 802.4 token bus protocol


Note

Both of these media access control methods are considered obsolete. Synchronous Optical Network (SONET) is the standard for optical networks now.


Figure 9-17 illustrates the following:

Image How controlled access methods operate

Image Characteristics of controlled access methods

Image Examples of controlled access methods

Image

Figure 9-17 Controlled Access

Ring Topology (9.2.3.6)

In a logical ring topology, each node in turn receives a frame. If the frame is not addressed to the node, the node passes the frame to the next node. This allows a ring to use a controlled media access control technique called token passing.

Nodes in a logical ring topology remove the frame from the ring, examine the address, and send it on if it is not addressed for that node. In a ring, all nodes around the ring (between the source and destination node) examine the frame.

There are multiple media access control techniques that could be used with a logical ring, depending on the level of control required. For example, only one frame at a time is usually carried by the media. If there is no data being transmitted, a signal (known as a token) may be placed on the media, and a node can place a data frame on the media only when it has the token.

Remember that the data link layer “sees” a logical ring topology. The actual physical cabling topology could be another topology.

Play Video 9.2.3.6 to see how nodes access the media in a logical ring topology.


Image

Video 9.2.3.6: Logical Ring Topology

This video demonstrates how nodes access the media in a logical ring topology. Go to the online course view this animation.



Image

Activity 9.2.3.7: Logical and Physical Topologies

Go to the online course to perform this practice activity involving data link layer media access control methods.


Data Link Frame (9.2.4)

This section looks at the different pieces of the data link frame.

The Frame (9.2.4.1)

Although there are many different data link layer protocols that describe data link layer frames, each frame type has three basic parts:

Image Header

Image Data

Image Trailer

All data link layer protocols encapsulate the Layer 3 PDU within the Data field of the frame. However, the structure of the frame and the fields contained in the header and trailer vary according to the protocol.

The data link layer protocol describes the features required for the transport of packets across different media. These features of the protocol are integrated into the encapsulation of the frame. When the frame arrives at its destination and the data link protocol takes the frame off the media, the framing information is read and discarded.

There is no one frame structure that meets the needs of all data transportation across all types of media. Depending on the environment, the amount of control information needed in the frame varies to match the media access control requirements of the media and logical topology.

As shown in Figure 9-18, a fragile environment requires more control. However, a protected environment, as shown in Figure 9-19, requires fewer controls.

Image

Figure 9-18 Fragile Environment

Image

Figure 9-19 Protected Environment

The Header (9.2.4.2)

The frame header contains the control information specified by the data link layer protocol for the specific logical topology and media used.

Frame control information is unique to each type of protocol. It is used by the Layer 2 protocol to provide features demanded by the communication environment.

Figure 9-20 displays the Ethernet frame header fields:

Image Start Frame field: Indicates the beginning of the frame

Image Source and Destination Address fields: Indicate the source and destination nodes on the media

Image Type field: Indicates the upper-layer service contained in the frame

Image

Figure 9-20 Role of the Header

Different data link layer protocols may use different fields from those mentioned. For example, other Layer 2 protocol header frame fields could include

Image Priority/Quality of Service field: Indicates a particular type of communication service for processing

Image Logical Connection Control field: Used to establish a logical connection between nodes

Image Physical Link Control field: Used to establish the media link

Image Flow Control field: Used to start and stop traffic over the media

Image Congestion Control field: Indicates congestion in the media

Because the purposes and functions of data link layer protocols are related to the specific topologies and media, each protocol has to be examined to gain a detailed understanding of its frame structure. As protocols are discussed in this course, more information about the frame structure will be explained.

Layer 2 Address (9.2.4.3)

The data link layer provides addressing that is used in transporting a frame across a shared local media. Device addresses at this layer are referred to as physical addresses. Data link layer addressing is contained within the frame header and specifies the frame destination node on the local network. The frame header may also contain the source address of the frame.

Unlike Layer 3 logical addresses, which are hierarchical, physical addresses do not indicate on what network the device is located. Rather, the physical address is a unique, device-specific address. If the device is moved to another network or subnet, it will still function with the same Layer 2 physical address.

An address that is device specific and nonhierarchical cannot be used to locate a device across large networks or the Internet. This would be like trying to find a single house within the entire world, with nothing more than a house number and street name. The physical address, however, can be used to locate a device within a limited area. For this reason, the data link layer address is only used for local delivery. Addresses at this layer have no meaning beyond the local network. Compare this to Layer 3, where addresses in the packet header are carried from source host to destination host regardless of the number of network hops along the route.

If the data must pass onto another network segment, an intermediate device, such as a router, is necessary. The router must accept the frame based on the physical address and de-encapsulate the frame in order to examine the hierarchical Layer 3 address. Using the Layer 3 address, the router is able to determine the network location of the destination device and the best path to reach it. When it knows where to forward the packet, the router then creates a new frame for the packet, and the new frame is sent on to the next segment toward its final destination. Figure 9-21 highlights Layer 2 address requirements in multi-access and point-to-point topologies.

Image

Figure 9-21 Logical Multi-Access Topology

The Trailer (9.2.4.4)

Data link layer protocols add a trailer to the end of each frame. The trailer is used to determine if the frame arrived without error. This process is called error detection and is accomplished by placing a mathematical summary of the bits that comprise the frame in the trailer. Error detection is added at the data link layer because the signals on the media could be subject to interference, distortion, or loss that would substantially change the bit values that those signals represent.

A transmitting node creates a mathematical summary of the contents of the frame. This is known as the cyclic redundancy check (CRC) value. This value is placed in the Frame Check Sequence (FCS) field of the frame to represent the contents of the frame.


Image

Activity 9.2.4.4: Frame Trailer

Go to the online course to perform the FCS and Stop Frame practice activity.


When the frame arrives at the destination node, the receiving node calculates its own logical summary, or CRC, of the frame. The receiving node compares the two CRC values. If the two values are the same, the frame is considered to have arrived as transmitted. If the CRC value in the FCS field differs from the CRC calculated at the receiving node, the frame is discarded.

Therefore, the FCS field is used to determine if errors occurred in the transmission and reception of the frame. The error detection mechanism provided by the use of the FCS field discovers most errors caused on the media.

There is always the small possibility that a frame with a good CRC result is actually corrupt. Errors in bits may cancel each other out when the CRC is calculated. Upper-layer protocols would then be required to detect and correct this data loss.

LAN and WAN Frames (9.2.4.5)

In a TCP/IP network, all OSI Layer 2 protocols work with the IP at OSI Layer 3. However, the actual Layer 2 protocol used depends on the logical topology of the network and the implementation of the physical layer. Given the wide range of physical media used across the range of topologies in networking, there are a correspondingly high number of Layer 2 protocols in use.

Each protocol performs media access control for specified Layer 2 logical topologies. This means that a number of different network devices can act as nodes that operate at the data link layer when implementing these protocols. These devices include the network adapter or network interface cards (NICs) on computers as well as the interfaces on routers and Layer 2 switches.

The Layer 2 protocol used for a particular network topology is determined by the technology used to implement that topology. The technology is, in turn, determined by the size of the network—in terms of the number of hosts and the geographic scope—and the services to be provided over the network.

A LAN typically uses a high-bandwidth technology that is capable of supporting large numbers of hosts. A LAN’s relatively small geographic area (a single building or a multi-building campus) and its high density of users make this technology cost effective.

However, using a high-bandwidth technology is usually not cost effective for WANs that cover large geographic areas (cities or multiple cities, for example). The cost of the long-distance physical links and the technology used to carry the signals over those distances typically result in lower bandwidth capacity.

Difference in bandwidth normally results in the use of different protocols for LANs and WANs.

Common data link layer protocols include

Image Ethernet

Image Point-to-Point Protocol (PPP)

Image 802.11 Wireless

Other protocols covered in the CCNA curriculum are High-Level Data Link Control (HDLC) and Frame Relay.


Image

Video 9.2.4.5: Examples of Layer 2 Protocols

This video provides examples of Layer 2 protocols. Go to the online course to view this animation.


Ethernet Frame (9.2.4.6)

Ethernet is the dominant LAN technology. It is a family of networking technologies that are defined in the IEEE 802.2 and 802.3 standards.

Ethernet standards define both the Layer 2 protocols and the Layer 1 technologies. Ethernet is the most widely used LAN technology and supports data bandwidths of 10 Mbps, 100 Mbps, 1 Gbps (1,000 Mbps), or 10 Gbps (10,000 Mbps).

The basic frame format and the IEEE sublayers of OSI Layers 1 and 2 remain consistent across all forms of Ethernet. However, the methods for detecting and placing data on the media vary with different implementations.

Ethernet provides unacknowledged connectionless service over a shared media using CSMA/CD as the media access methods. Shared media requires that the Ethernet frame header use a data link layer address to identify the source and destination nodes. As with most LAN protocols, this address is referred to as the MAC address of the node. An Ethernet MAC address is 48 bits and is generally represented in hexadecimal format.

Figure 9-22 shows the many fields of the Ethernet frame. At the data link layer, the frame structure is nearly identical for all speeds of Ethernet. However, at the physical layer, different versions of Ethernet place the bits onto the media differently. Ethernet is discussed in more detail in the next chapter.

Image

Figure 9-22 Ethernet Protocol

Point-to-Point (PPP) Frame (9.2.4.7)

Another data link layer protocol is the Point-to-Point Protocol (PPP), which is used to deliver frames between two nodes. Unlike many data link layer protocols that are defined by electrical engineering organizations, the PPP standard is defined by RFCs. PPP was developed as a WAN protocol and remains the protocol of choice to implement many serial WANs. PPP can be used on various physical media, including twisted pair, fiber-optic lines, and satellite transmission, as well as for virtual connections.

PPP uses a layered architecture. To accommodate the different types of media, PPP establishes logical connections, called sessions, between two nodes. The PPP session hides the underlying physical media from the upper PPP protocol. These sessions also provide PPP with a method for encapsulating multiple protocols over a point-to-point link. Each protocol encapsulated over the link establishes its own PPP session.

PPP also allows the two nodes to negotiate options within the PPP session. This includes authentication, compression, and multilink (the use of multiple physical connections). Refer to Figure 9-23 for the basic fields in a PPP frame.

Image

Figure 9-23 Point-to-Point Protocol

802.11 Wireless Frame (9.2.4.8)

The IEEE 802.11 Wireless standard uses the same 802.2 LLC and 48-bit addressing scheme as other 802 LANs. However, there are many differences at the MAC sublayer and physical layer. In a wireless environment, the environment requires special considerations. There is no definable physical connectivity; therefore, external factors may interfere with data transfer and it is difficult to control access. To meet these challenges, wireless standards have additional controls.

The IEEE 802.11 standard is commonly referred to as Wi-Fi. It is a contention-based system using a CSMA/CA media access process. CSMA/CA specifies a random backoff procedure for all nodes that are waiting to transmit. The most likely opportunity for medium contention is just after the medium becomes available. Making the nodes back off for a random period greatly reduces the likelihood of a collision.

802.11 networks also use data link acknowledgements to confirm that a frame is received successfully. If the sending station does not detect the acknowledgement frame, either because the original data frame or the acknowledgment was not received intact, the frame is retransmitted. This explicit acknowledgement overcomes interference and other radio-related problems.

Other services supported by 802.11 are authentication, association (connectivity to a wireless device), and privacy (encryption). Figure 9-24 shows the different wireless protocol fields.

Image

Figure 9-24 802.11 Wireless LAN Protocol

As shown in Figure 9-24, an 802.11 frame contains these fields:

Image Protocol Version field: Version of 802.11 frame in use

Image Type and Subtype fields: Identify one of three functions and subfunctions of the frame: control, data, and management

Image To DS field: Set to 1 in data frames destined for the distribution system (devices in the wireless structure)

Image From DS field: Set to 1 in data frames exiting the distribution system

Image More Fragments field: Set to 1 for frames that have another fragment

Image Retry field: Set to 1 if the frame is a retransmission of an earlier frame

Image Power Management field: Set to 1 to indicate that a node will be in power-save mode

Image More Data field: Set to 1 to indicate to a node in power-save mode that more frames are buffered for that node

Image Wired Equivalent Privacy (WEP) field: Set to 1 if the frame contains WEP encrypted information for security

Image Order field: Set to 1 in a data type frame that uses Strictly Ordered service class (does not need reordering)

Image Duration/ID field: Depending on the type of frame, represents either the time, in microseconds, required to transmit the frame or an association identity (AID) for the station that transmitted the frame

Image Destination Address (DA) field: MAC address of the final destination node in the network

Image Source Address (SA) field: MAC address of the node that initiated the frame

Image Receiver Address (RA) field: MAC address that identifies the wireless device that is the immediate recipient of the frame

Image The Sequence control fields are made up of following two fields:

Image Fragment Number field: Indicates the number for each fragment of a frame

Image Sequence Number field: Indicates the sequence number assigned to the frame; retransmitted frames are identified by duplicate sequence numbers

Image Transmitter Address (TA) field: MAC address that identifies the wireless device that transmitted the frame

Image Frame Body field: Contains the information being transported; for data frames, typically an IP packet

Image FCS field: Contains a 32-bit cyclic redundancy check (CRC) of the frame


Image

Activity 9.2.4.9 Part 1: Ethernet Frame Fields

Go to the online course to perform the Ethernet frame building practice activity.



Image

Activity 9.2.4.9 Part 2: PPP Frame

Go to the online course to perform the PPP frame building practice activity.



Image

Activity 9.2.4.9 Part 3: 802.11 Wireless Frame

Go to the online course to perform the 802.11 Wireless frame building practice activity.


Physical Layer (9.3)

This section discusses the purpose and characteristics of the physical layer.

Purpose of the Physical Layer (9.3.1)

Let’s look at the physical layer, the physical layer media, and the physical layer standards.

The Physical Layer (9.3.1.1)

The OSI physical layer provides the means to transport across the network media the bits that make up a data link layer frame. This layer accepts a complete frame from the data link layer and encodes it as a series of signals that is transmitted onto the local media. The encoded bits that comprise a frame are received by either an end device or an intermediate device. Figure 9-25 shows the process of encapsulation and de-encapsulation.

Image

Figure 9-25 Encapsulation and De-encapsulation

The process that data undergoes from a source node to a destination node is as follows:

1. The user data is segmented by the transport layer, placed into packets by the network layer, and further encapsulated as frames by the data link layer.

2. The physical layer encodes the frames and creates the electrical, optical, or radio wave signals that represent the bits in each frame.

3. These signals are then sent on the media one at a time.

4. The destination node physical layer retrieves these individual signals from the media, restores them to their bit representations, and passes the bits up to the data link layer as a complete frame.

Physical Layer Media (9.3.1.2)

There are three basic forms of network media. The physical layer produces the representation and groupings of bits for each type of media as follows:

Image Copper cable: The signals are patterns of electrical pulses.

Image Fiber-optic cable: The signals are patterns of light.

Image Wireless: The signals are patterns of microwave transmissions.

Figure 9-26 displays signaling examples for copper cable, fiber-optic cable, and wireless.

Image

Figure 9-26 Signaling Examples

To enable physical layer interoperability, all aspects of these functions are governed by standards organizations.

Physical Layer Standards (9.3.1.3)

The protocols and operations of the upper OSI layers are performed in software designed by software engineers and computer scientists. For example, the services and protocols in the TCP/IP suite are defined by the IETF in RFCs, as represented in Figure 9-27.

Image

Figure 9-27 OSI Model Standards Organizations

The physical layer consists of electronic circuitry, media, and connectors developed by engineers. Therefore, it is appropriate that the standards governing this hardware are defined by the relevant electrical and communications engineering organizations.

There are many different international and national organizations, regulatory government organizations, and private companies involved in establishing and maintaining physical layer standards. For instance, the physical layer hardware, media, encoding, and signaling standards are defined and governed by the following organizations:

Image International Organization for Standardization (ISO)

Image Telecommunications Industry Association/Electronic Industries Association (TIA/EIA)

Image International Telecommunication Union (ITU)

Image American National Standards Institute (ANSI)

Image Institute of Electrical and Electronics Engineers (IEEE)

Image National telecommunications regulatory authorities, including the Federal Communication Commission (FCC) in the United States and the European Telecommunications Standards Institute (ESTI)

In addition to these organizations, regional cabling standards groups such as Canadian Standards Association (CSA), European Committee for Electrotechnical Standardization (CENELEC), and Japanese Standards Association (JSA/JIS) develop local specifications. Table 9-2 lists the major contributors and some of their relevant physical layer standards.

Image

Table 9-2 Major Contributors to Physical Layer Standards


Image

Lab 9.3.1.4: Identifying Network Devices and Cabling

In this lab, you will complete the following objectives:

Part 1: Identify Network Devices

Part 2: Identify Network Media


Characteristics of the Physical Layer (9.3.2)

This section looks at the physical layer functions and components as well as encoding techniques.

Physical Layer Functions (9.3.2.1)

The physical layer standards address three functional areas:

Image Physical components: Includes electronic hardware devices, media, and connectors that transmit and carry the signals to represent the bits.

Image Frame encoding technique: Refers to the method of converting a stream of data bits into a predefined code. Codes are groupings of bits used to provide a predictable pattern that can be recognized by both the sender and the receiver. Using predictable patterns helps to distinguish data bits from control bits and provide better media error detection.

Image Signaling method: Refers to the electrical, optical, or wireless signals that represent the “1” and “0” on the media. The physical layer standards must define what type of signal represents a 1 and a 0. This can be as simple as a change in the level of an electrical signal or optical pulse or a more complex signaling method. Signaling method varies depending on the encoding scheme.

Table 9-3 displays a few examples of physical components, frame encoding techniques, and signaling methods used by copper cable.

Image

Table 9-3 Physical Layer Functions

Physical Components (9.3.2.2)

Various standards organizations have contributed to the definition of the physical, electrical, and mechanical properties of the media available for different data communications. These specifications guarantee that cables and connectors will function as anticipated with different data link layer implementations.

Hardware components such as NICs, interfaces and connectors, cable materials, and cable designs are all specified in standards associated with the physical layer. The various ports and interfaces on a Cisco 1941 router are highlighted in Figure 9-28. Each connector has specific connectors and pinouts resulting from standards.

Image

Figure 9-28 Ports on Router

As an example, standards for copper media are defined for the following:

Image Type of copper cabling used

Image Bandwidth of the communication

Image Type of connectors used

Image Pinout and color codes of connections to the media

Image Maximum distance of the media

Frame Encoding Techniques (9.3.2.3)

Encoding is a method of converting a stream of data bits into a predefined code. Codes are groupings of bits used to provide a predictable pattern that can be recognized by both the sender and the receiver. Using predictable patterns helps to distinguish data bits from control bits and provide better media error detection.

Encoding methods at the physical layer may also provide codes for control purposes such as identifying the beginning and end of a frame. The transmitting host will transmit the specific pattern of bits, or code, to identify (i.e., pattern of bits = code) the beginning and end of the frame.

To illustrate this concept, consider the Morse code system developed more than 100 years ago. Each character (letter or numeral) is represented by a unique sequence of dots and dashes. The duration of a dash is three times the duration of a dot. For efficiency, the most common letters in the English language have the shortest codes assigned to them. For example, the letter “E” is a single dot. Consider the international code for the distress call, SOS. The letter “S” is three dots and the code for the letter “O” is three dashes. Video 9.3.2.3 shows an example of a telegraph operator sending the SOS distress call.


Image

Video 9.3.2.3: Example of Encoding

This video provides an example of a telegraph operator sending an SOS distress call. Go to the online course to view this video.


A telegraph operator would encode messages into Morse code and then transmit that code to another telegraph operator, who would then decode the message to reveal the message. Telegraph operators would follow each dot or dash by a short silence, equal to the dot duration, and separate letters of a word by a space equal to three dots (one dash).

Modern encoding techniques perform the same process except that the telegraph operators are now computerized and capable of encoding and decoding messages at lightning speed. Frame encoding methods are far more complex than Morse code but essentially serve the same purpose.

Examples of network encoding methods include

Image Manchester encoding: A 0 is represented by a high-to-low voltage transition in the middle of the bit time, and a 1 is represented by a low-to-high voltage transition in the middle of the bit time. Used in older versions of Ethernet, radio-frequency identification (RFID), and Near Field Communication (NFC).

Image Non-Return to Zero (NRZ): A common means of encoding data that has two states, “zero” and “one,” and no neutral or rest position. A 0 may be represented by one voltage level on the media during the bit time, and a 1 may be represented by a different voltage on the media during the bit time.


Note

Faster data rates require more complex encoding, such as 4B/5B; however, explanation of these methods is beyond the scope of this chapter.


Signaling Method (9.3.2.4)

The physical layer must generate the electrical, optical, or wireless signals that represent the binary numbers of the encoded frame. The method of representing the binary bits is called the signaling method.

The physical layer standards must define what type of signal represents a “1” and a “0” and how they will be transmitted. This can be as simple as a change in the level of an electrical signal or optical pulse, or a more complex signaling method. The receiving node must convert the signals back into bits. The bits are then examined for the start-of-frame and end-of-frame bit patterns to determine that a complete frame has been received. The physical layer then delivers all the bits of a frame to the data link layer. As shown in Figure 9-29, signals can be transmitted in one of two ways:

Image Asynchronous: Data signals are transmitted without an associated clock signal. The time spacing between data characters or blocks may be of arbitrary duration, meaning the spacing is not standardized; therefore, frames require start and stop indicator flags.

Image Synchronous: Data signals are sent along with a clock signal that occurs at evenly spaced time intervals. This is referred to as the bit time.

Image

Figure 9-29 Asynchronous Signal and Synchronous Signal

There are many ways to transmit signals. A common method to send data is to use modulation techniques. Modulation is the process by which the characteristic of one wave (the signal) modifies another wave (the carrier). The following modulation techniques have been widely used in transmitting data on a medium:

Image Frequency modulation (FM): A method of transmission in which the carrier frequency varies in accordance with the signal.

Image Amplitude modulation (AM): A transmission technique in which the amplitude of the carrier varies in accordance with the signal.

Image Pulse-coded modulation (PCM): A technique in which an analog signal, such as a voice, is converted into a digital signal by sampling the signal’s amplitude and expressing the different amplitudes as a binary number. The sampling rate must be at least twice the highest frequency in the signal.

The nature of the actual signals representing the bits on the media will depend on the signaling method in use. Some methods may use one attribute of a signal to represent a single 0 and use another attribute of a signal to represent a single 1. Figure 9-30 illustrates how AM and FM techniques are used to send a signal.

Image

Figure 9-30 Comparing Frequency Modulation and Amplitude Modulation

Video 9.3.2.4 3 shows an example of amplitude modulation displayed on an oscilloscope.


Image

Video 9.3.2.4 3: Example of Amplitude Modulation

This video provides an example of amplitude modulation displayed on an oscilloscope. Go to the online course to view this video.


Bandwidth (9.3.2.5)

Different physical media support the transfer of bits at different speeds. Data transfer is usually discussed in terms of bandwidth and throughput.

Bandwidth is the capacity of a medium to carry data. Digital bandwidth measures the amount of data that can flow from one place to another in a given amount of time. Bandwidth is typically measured in kilobits per second (kbps) or megabits per second (Mbps).

The practical bandwidth of a network is determined by a combination of factors:

Image The properties of the physical media

Image The technologies chosen for signaling and detecting network signals

Physical media properties, current technologies, and the laws of physics play a role in determining available bandwidth.

Table 9-4 shows the commonly used units of measure for bandwidth.

Image

Table 9-4 Bandwidth (FM)

Throughput (9.3.2.6)

Throughput is the measure of the transfer of bits across the media over a given period of time.

Due to a number of factors, throughput usually does not match the specified bandwidth in physical layer implementations such as Ethernet. Many factors influence throughput, including

Image The amount of traffic

Image The type of traffic

Image The latency created by the number of network devices encountered between source and destination

Latency refers to the amount of time for data to travel from one given point to another.

In a multi-access topology such as Ethernet, nodes are competing for media access and its use. Therefore, the throughput of each node is degraded as usage of the media increases.

In an internetwork or network with multiple segments, throughput cannot be faster than the slowest link of the path from source to destination. Even if all or most of the segments have high bandwidth, it will only take one segment in the path with low throughput to create a bottleneck to the throughput of the entire network.

There are many online speed tests that can reveal the throughput of an Internet connection. Figure 9-31 provides sample results from a speed test.

Image

Figure 9-31 Speed Test


Note

There is a third measurement to measure the transfer of usable data that is known as goodput. Goodput is the measure of usable data transferred over a given period of time. Goodput is throughput minus traffic overhead for establishing sessions, acknowledgements, and encapsulation.



Image

Activity 9.3.2.7: Parts 1 and 2: Physical Layer Terminology

Go to the online course to perform this practice activity of identifying physical layer terminology.


Network Media (9.4)

This section looks at the different media types: copper cabling, UTP cabling, fiber-optic cabling, and wireless.

Copper Cabling (9.4.1)

The most popular type of network media is copper cable; this section takes a look at this media.

Characteristics of Copper Media (9.4.1.1)

Networks use copper media because it is inexpensive, easy to install, and has low resistance to electrical current. However, copper media is limited by distance and signal interference.

Data is transmitted on copper cables as electrical pulses. A detector in the network interface of a destination device must receive a signal that can be successfully decoded to match the signal sent. However, the longer the signal travels, the more it deteriorates in a phenomenon referred to as signal attenuation. For this reason, all copper media must follow strict distance limitations as specified by the guiding standards.

The timing and voltage values of the electrical pulses are also susceptible to interference from two sources:

Image Electromagnetic interference (EMI) and radio frequency interference (RFI): EMI and RFI signals can distort and corrupt the data signals being carried by copper media. Potential sources of EMI and RFI include radio waves and electromagnetic devices such as fluorescent lights or electric motors.

Image Crosstalk: Crosstalk is a disturbance caused by the electric or magnetic fields of a signal on one wire affecting the signal in an adjacent wire. In telephone circuits, crosstalk can result in hearing part of another voice conversation from an adjacent circuit. Specifically, when electrical current flows through a wire, it creates a small, circular magnetic field around the wire that can be picked up by an adjacent wire.

Play Video 9.4.1.1 to see how data transmission can be affected by interference.


Image

Video 9.4.1.1: Data Transmission

This video shows how data transmission can be affected by interference. Go to the online course to view this animation.


To counter the negative effects of EMI and RFI, some types of copper cables are wrapped in metallic shielding and require proper grounding connections.

To counter the negative effects of crosstalk, some types of copper cables have opposing circuit wire pairs twisted together, which effectively cancels the crosstalk.

The susceptibility of copper cables to electronic noise can also be limited by

Image Selecting the cable type or category most suited to a given networking environment

Image Designing a cable infrastructure to avoid known and potential sources of interference in the building structure

Image Using cabling techniques that include the proper handling and termination of the cables

Copper Media (9.4.1.2)

There are three main types of copper media used in networking (as shown in Figure 9-32):

Image Unshielded twisted-pair (UTP) cable

Image Shielded twisted-pair (STP) cable

Image Coaxial cable

Image

Figure 9-32 Copper Media

These cables are used to interconnect nodes on a LAN and infrastructure devices such as switches, routers, and wireless access points. Each type of connection and the accompanying devices have cabling requirements stipulated by physical layer standards.

Different physical layer standards specify the use of different connectors. These standards specify the mechanical dimensions of the connectors and the acceptable electrical properties of each type. Networking media use modular jacks and plugs to provide easy connection and disconnection. Also, a single type of physical connector may be used for multiple types of connections. For example, the RJ-45 connector is widely used in LANs with one type of media and in some WANs with another media type.

UTP Cable (9.4.1.3)

UTP cabling is the most common networking media. UTP cable, terminated with RJ-45 connectors, is used for interconnecting network hosts with intermediate networking devices, such as switches and routers.

In LANs, UTP cable consists of four pairs of color-coded wires that have been twisted together and then encased in a flexible plastic sheath that protects the wires from minor physical damage. The twisting of wires helps protect against signal interference from other wires.

As shown in Figure 9-33, the color codes identify the individual pairs and the wires in the pairs and aid in cable termination.

Image

Figure 9-33 Unshielded Twisted-Pair Cable

STP Cable (9.4.1.4)

STP cable provides better noise protection than UTP cable. However, compared to UTP cable, STP cable is significantly more expensive and difficult to install. Like UTP cable, STP cable uses an RJ-45 connector.

STP cable combines the techniques of shielding (to counter EMI and RFI) and wire twisting (to counter crosstalk). To gain the full benefit of the shielding, STP cables are terminated with special shielded STP data connectors. If the cable is improperly grounded, the shield may act like an antenna and pick up unwanted signals.

Different types of STP cables with different characteristics are available. However, there are two common variations of STP:

Image STP cable shields the entire bundle of wires with foil, eliminating virtually all interference (more common).

Image STP cable shields the entire bundle of wires and the individual wire pairs with foil, eliminating all interference.

The STP cable shown in Figure 9-34 uses four pairs of wires, each wrapped in a foil shield, which are then wrapped in an overall metallic braid or foil.

Image

Figure 9-34 Shielded Twisted-Pair Cable

For many years, STP was the cabling structure specified for use in Token Ring network installations. With the decline of Token Ring, the demand for STP cabling also waned. However, the new 10 GB standard for Ethernet has a provision for the use of STP cabling, which is providing a renewed interest in STP cabling.

Coaxial Cable (9.4.1.5)

Coaxial cable, or coax for short, gets its name from the fact that there are two conductors that share the same axis. As shown in Figure 9-35, the structure of coaxial cable is as follows:

Image A copper conductor is used to transmit the electronic signals.

Image The copper conductor is surrounded by a layer of flexible plastic insulation.

Image The insulating material is surrounded in a woven copper braid, or metallic foil, that acts as the second wire in the circuit and as a shield for the inner conductor. This second layer, or shield, also reduces the amount of outside electromagnetic interference.

Image The entire cable is covered with a cable jacket to protect it from minor physical damage.

Image

Figure 9-35 Coax Cable


Note

There are different types of connectors used with coax cable.


Coaxial cable was traditionally used in cable television capable of transmitting in one direction. It was also used extensively in early Ethernet installations.

Although UTP cable has essentially replaced coaxial cable in modern Ethernet installations, the coaxial cable design has been adapted for use in

Image Wireless installations: Coaxial cables attach antennas to wireless devices. The coaxial cable carries radio frequency (RF) energy between the antennas and the radio equipment.

Image Cable Internet installations: Cable service providers are currently converting their one-way systems to two-way systems to provide Internet connectivity to their customers. To provide these services, portions of the coaxial cable and supporting amplification elements are replaced with fiber-optic cable. However, the final connection to the customer’s location and the wiring inside the customer’s premises is still coax cable. This combined use of fiber and coax is referred to as hybrid fiber-coax (HFC).

Copper Media Safety (9.4.1.6)

All three types of copper media are susceptible to fire and electrical hazards.

Fire hazards exist because cable insulation and sheaths may be flammable or produce toxic fumes when heated or burned. Building authorities or organizations may stipulate related safety standards for cabling and hardware installations (for example, plenum cable).

Electrical hazards are a potential problem because the copper wires could conduct electricity in undesirable ways. This could subject personnel and equipment to a range of electrical hazards. For example, a defective network device could conduct currents to the chassis of other network devices. Additionally, network cabling could present undesirable voltage levels when used to connect devices that have power sources with different ground potentials. Such situations are possible when copper cabling is used to connect networks in different buildings or on different floors of buildings that use different power facilities. Finally, copper cabling may conduct voltages caused by lightning strikes to network devices.

The result of undesirable voltages and currents can include damage to network devices and connected computers, or injury to personnel. It is important that copper cabling be installed appropriately, and according to the relevant specifications and building codes, in order to avoid potentially dangerous and damaging situations. Figure 9-36 displays proper cabling practices to avoid potential fire and electrical hazards.

Image

Figure 9-36 Copper Media Safety


Image

Activity 9.4.1.7: Copper Media Characteristics

Go to the online course to perform the practice activity of identifying copper media characteristics.


UTP Cabling (9.4.2)

Unshielded twisted-pair (UTP) cabling is the most common networking media and thus is discussed in depth in this section.

Properties of UTP Cabling (9.4.2.1)

When used as a networking medium, UTP cabling consists of four pairs of color-coded wires that have been twisted together and then encased in a flexible plastic sheath. Network UTP cable has four pairs of either 22- or 24-gauge copper wire. A UTP cable has an external diameter of approximately 0.43 cm (0.17 inch), and its small size can be advantageous during installation.

UTP cable does not use shielding to counter the effects of EMI and RFI. Instead, cable designers have discovered that they can limit the negative effect of crosstalk by using these techniques:

Image Cancellation: Designers now pair wires in a circuit. When two wires in an electrical circuit are placed close together, their magnetic fields are the exact opposite of each other. Therefore, the two magnetic fields cancel each other out and also cancel out any outside EMI and RFI signals.

Image Varying the number of twists per wire pair: To further enhance the cancellation effect of paired circuit wires, designers vary the number of twists of each wire pair in a cable. UTP cable must follow precise specifications governing how many twists or braids are permitted per meter (3.28 feet) of cable. Notice in Figure 9-37 that the orange/orange white pair (shown at the bottom of the figure) is twisted less than the blue/white blue pair (shown as the second pair from the bottom). Each colored pair is twisted a different number of times.

Image

Figure 9-37 Varying the Number of Twists per Wire Pair

UTP cable relies solely on the cancellation effect produced by the twisted wire pairs to limit signal degradation and effectively provide self-shielding for wire pairs within the network media.

UTP Cabling Standards (9.4.2.2)

UTP cabling conforms to the standards established jointly by the TIA and EIA. Specifically, TIA/EIA-568A stipulates the commercial cabling standards for LAN installations and is the standard most commonly used in LAN cabling environments. Some of the elements defined are

Image Cable types

Image Cable lengths

Image Connectors

Image Cable termination

Image Methods of testing cable

The electrical characteristics of copper cabling are defined by the IEEE. IEEE rates UTP cabling according to its performance. Cables are placed into categories according to their ability to carry bandwidth rates. For example, Category 5 (Cat5) cable is used commonly in 100BASE-TX Fast Ethernet installations. Other categories include Enhanced Category 5 (Cat5e) cable, Category 6 (Cat6), and Category 6a.

Cables in higher categories are designed and constructed to support higher data rates. As new gigabit-speed Ethernet technologies are being developed and adopted, Cat5e is now the minimally acceptable cable type, with Cat6 being the recommended type for new building installations.


Image

Activity 9.4.2.2: Categories of UTP Cabling

Go to the online course to perform the UTP cabling identification practice activity.



Note

Some manufacturers are making cables that exceed the TIA/EIA Category 6a specifications and are referring to these as Category 7.


UTP Connectors (9.4.2.3)

UTP cable is usually terminated with an ISO 8877 specified RJ-45 connector. This connector is used for a range of physical layer specifications, one of which is Ethernet. The TIA/EIA-568 standard describes the wire color codes to pin assignments (pinouts) for Ethernet cables.

Video 9.4.2.3 displays a UTP cable terminated with an RJ-45 connector.


Image

Video 9.4.2.3 Part 1: UTP Cable Termination

This video shows how a UTP cable is terminated with an RJ45 connector. Go to the online course to view this video.


As shown in Figure 9-38, the RJ-45 connector is the male component, crimped at the end of the cable. The socket is the female component in a network device, wall, cubicle partition outlet, or patch panel.

Image

Figure 9-38 RJ-45 UTP Plugs and Socket

Each time copper cabling is terminated, there is the possibility of signal loss and the introduction of noise to the communication circuit. When terminated improperly, each cable is a potential source of physical layer performance degradation. It is essential that all copper media terminations be of high quality to ensure optimum performance with current and future network technologies.

Figure 9-39 displays examples of a badly terminated UTP cable and a well-terminated UTP cable.

Image

Figure 9-39 Examples of Termination

Types of UTP Cable (9.4.2.4)

Different situations may require UTP cables to be wired according to different wiring conventions. This means that the individual wires in the cable have to be connected in different orders to different sets of pins in the RJ-45 connectors.

The following are main cable types that are obtained by using specific wiring conventions:

Image Ethernet straight-through cable: The most common type of networking cable. It is commonly used to interconnect a host to a switch and a switch to a router.

Image Ethernet crossover cable: An uncommon cable used to interconnect similar devices together (for example, a switch to a switch, a host to a host, or a router to a router).

Image Rollover cable: A Cisco proprietary cable used to connect to a router or switch console port.

Using a crossover or straight-through cable incorrectly between devices may not damage the devices, but connectivity and communication between the devices will not take place. This is a common error in the lab, and checking that the device connections are correct should be the first troubleshooting action if connectivity is not achieved.

Figure 9-40 shows the UTP cable type, related standards, and typical application of these cables. It also identifies the individual wire pairs for the TIA-568A and TIA-568B standards.

Image

Figure 9-40 UTP Cable Standards

LAN Cabling Areas (9.4.2.5)

As shown in Figure 9-41, the TIA/EIA-568 standard divides the LAN cabling distribution system into the following sections:

Image Work area: Consists of the communication outlets (wall boxes and faceplates), wiring, and connectors needed to connect network hosts using the horizontal wiring subsystem to the telecommunications room. The standard requires that two outlets be provided at each wall plate: one for voice and one for data.

Image Horizontal cabling: The cabling run from each outlet to the equipment room. The maximum horizontal distance is 90 meters (295 feet) independent of media type. An additional 6 meters (20 feet) is allowed for patch cables at the telecommunications room and at the workstation, but the combined length cannot exceed 10 meters (33 feet).

Image Telecommunications room: Sometimes referred to as the wiring closet, it provides an endpoint for horizontal cabling and backbone cabling. Typically contains patch panels and infrastructure devices such as switches and routers. Multiple telecommunications rooms exist in large organizations and connect to a central equipment room using backbone cabling.

Image Backbone cabling: The backbone wiring runs up through the floors of the building (risers) or across a campus and provides the interconnection between the equipment room and telecommunications room. The distance limitations of this cabling depend on the type of cable and facilities it connects, but the popular cabling consists of optical fiber cables.

Image Central equipment room: Sometimes referred to as the network operation center (NOC), this room provides the endpoint for all backbone cabling and may contain enterprise-class switches, routers, firewall appliances, servers, and access to the provider entrance facility.

Image Entrance facility: This contains the service provider telecommunications service entrance to the building. This facility may also contain campus-wide backbone connections. This area also defines the network demarcation point, which is the interconnection to the local exchange carrier’s telecommunications facilities. The demarcation point forms the boundary between the part of the network that is the responsibility of the organization and the part of the network that is the responsibility of the carrier.

Image

Figure 9-41 UTP LAN Cabling Distribution

Testing UTP Cables (9.4.2.6)

After installation, a UTP cable tester, as shown in Figure 9-42, should be used to test for the following parameters:

Image Wire map

Image Cable length

Image Signal loss due to attenuation

Image Crosstalk

Image

Figure 9-42 Testing Cable

It is recommended that you thoroughly check that all UTP installation requirements are met.


Image

Activity 9.4.2.7: Cable Pinouts

Go to the online course to perform the cable build practice activity.



Image

Lab 9.4.2.8: UTP Cabling

In this lab, you will complete the following objectives:

Image Part 1: Analyze Ethernet Cabling Standards and Pinouts

Image Part 2: Build an Ethernet Crossover Cable

Image Part 3: Test an Ethernet Crossover Cable


Fiber Optic Cabling (9.4.3)

Fiber Optic Cabling is gaining in popularity as a media for network application. There are various reasons for this discussed in this section.

Properties of Fiber Optic Cabling (9.4.3.1)

Optical fiber cable has become very popular for interconnecting infrastructure network devices.

Optical fiber is a flexible but extremely thin transparent strand of very pure glass (silica) not much bigger than a human hair. Bits are encoded on the fiber as light impulses. The fiber-optic cable acts as a waveguide, or “light pipe,” to transmit light between the two ends with minimal loss of signal.

As an analogy, consider an empty paper towel roll with the inside coated like a mirror that is a thousand meters in length and a small laser pointer is used to send Morse code signals at the speed of light. The signals bounce from the mirrored surface of the tube, traveling the entire distance of the tube. Essentially that is how a fiber-optic cable operates, except that it is smaller in diameter and uses sophisticated light emitting and receiving technologies.

Unlike copper wires, fiber-optic cable can transmit signals with less attenuation and is completely immune to EMI and RFI.

Fiber-optic cabling is now being used in four types of industry:

Image Enterprise networks: Fiber is used for backbone cabling applications and interconnecting infrastructure devices.

Image FTTH and access networks: Fiber to the home (FTTH) is used to provide always-on broadband services to homes and small businesses. FTTH supports affordable high-speed Internet access, as well as telecommuting, telemedicine, and video on demand.

Image Long-Haul networks: Service providers use long-haul terrestrial optical fiber networks to connect countries and cities. Networks typically range from a few dozen to a few thousand kilometers and use up to 10-Gbps-based systems.

Image Submarine networks: Special fiber cables are used to provide reliable high-speed, high-capacity solutions capable of surviving in harsh undersea environments up to transoceanic distances.

Our focus is the use of fiber within the enterprise.

Fiber Media Cable Design (9.4.3.2)

Although an optical fiber is very thin, it is composed of two kinds of glass and a protective outer shield. Specifically, these are the

Image Core: Consists of pure glass and is the part of the fiber where light is carried.

Image Cladding: The glass that surrounds the core and acts as a mirror. The light pulses propagate down the core while the cladding reflects the light pulses. This keeps the light pulses contained in the fiber core in a phenomenon known as total internal reflection.

Image Jacket: Typically a PVC jacket that protects the core and cladding. It may also include strengthening materials and a buffer (coating) whose purpose is to protect the glass from scratches and moisture.

Although susceptible to sharp bends, the properties of the core and cladding have been altered at the molecular level to make them very strong. Optical fiber is proof tested through a rigorous manufacturing process for strength at a minimum of 100,000 pounds per square inch. Optical fiber is durable enough to withstand handling during installation and deployment in harsh environmental conditions in networks all around the world.


Image

Activity 9.4.3.2: Fiber Cable

Go to the online course to perform the fiber cable identification practice activity.


Types of Fiber Media (9.4.3.3)

Light pulses representing the transmitted data as bits on the media are generated by either lasers or light emitting diodes (LEDs).

Electronic semiconductor devices called photodiodes detect the light pulses and convert them to voltages that can then be reconstructed into data frames.


Note

The laser light transmitted over fiber-optic cabling can damage the human eye. Care must be taken to avoid looking into the end of an active optical fiber.


Fiber-optic cables can be broadly classified into two types:

Image Single-mode fiber (SMF): Consists of a very small core and uses expensive laser technology to send a single ray of light. SMF is popular in long-distance situations spanning hundreds of kilometers such as those required in long-haul telephony and cable TV applications.

Image Multimode fiber (MMF): Consists of a larger core and uses LED emitters to send light pulses. Specifically, light from an LED enters the multimode fiber at different angles. MMF is popular in LANs because they can be powered by low-cost LEDs. It provides bandwidth up to 10 Gbps over link lengths of up to 550 meters.

Figures 9-43 and 9-44 highlight the characteristics of single-mode fiber and multimode fiber, respectively. One of the highlighted differences between SMF and MMF is the amount of dispersion, which refers to the spreading out of a light pulse over time and distance. The more dispersion there is, the greater the loss in signal strength.

Image

Figure 9-43 Single-Mode Fiber

Image

Figure 9-44 Multimode Fiber

Network Fiber Connectors (9.4.3.4)

An optical fiber connector terminates the end of an optical fiber. A variety of optical fiber connectors are available. The main differences among the types of connectors are dimensions and methods of mechanical coupling. Generally, organizations standardize on one kind of connector, depending on the equipment that they commonly use, or they standardize per type of fiber (one for MMF, one for SMF). Taking into account all the generations of connectors, about 70 connector types are in use today.

As shown in Figure 9-45, the three most popular network fiber-optic connectors include

Image Straight-tip (ST) connector: An older, bayonet-style connector widely used with multimode fiber.

Image Subscriber connector (SC): Sometimes referred to as square connector or standard connector, it is a widely adopted LAN and WAN connector that uses a push-pull mechanism to ensure positive insertion. This connector type is used with MMF and SMF.

Image Lucent connector (LC): Sometimes called a little connector or local connector, it is quickly growing in popularity due to its smaller size. It is used with SMF and also supports MMF.

Image

Figure 9-45 Fiber-Optic Connectors


Note

Other fiber connectors such as the ferrule connector (FC) and sub-miniature A (SMA) are not popular in LAN and WAN deployments. Obsolete connectors include biconic and D4 connectors. These connectors are beyond the scope of this chapter.


Because light can only travel in one direction over optical fiber, two fibers are required to support full-duplex operation. Therefore, fiber-optic patch cables bundle together two optical fiber cables and terminate them with a pair of standard single-fiber connectors. Some fiber connectors accept both the transmitting and receiving fibers in a single connector, known as a duplex connector (also shown in Figure 9-45).

Fiber patch cords are required for interconnecting infrastructure devices. For example, Figure 9-46 displays the following common patch cords:

Image SC-SC multimode patch cord

Image LC-LC single-mode patch cord

Image ST-LC multimode patch cord

Image SC-ST single-mode patch cord

Image

Figure 9-46 Common Fiber Patch Cords

Fiber cables should be protected with a small plastic cap when not in use. Also notice the use of color to distinguish between single-mode and multimode patch cords. The TIA-598 standard recommends the use of a yellow jacket for single-mode fiber cables and an orange (or aqua) jacket for multimode fiber cables.

Testing Fiber Cables (9.4.3.5)

Terminating and splicing fiber-optic cabling requires special training and equipment. Incorrect termination of fiber-optic media will result in diminished signaling distances or complete transmission failure.

Three common types of fiber-optic termination and splicing errors are

Image Misalignment: The fiber-optic media are not precisely aligned to one another when joined.

Image End gap: The media does not completely touch at the splice or connection.

Image End finish: The media ends are not well polished or dirt is present at the termination.

A quick and easy field test can be performed by shining a bright flashlight into one end of the fiber while observing the other end of the fiber. If light is visible, then the fiber is capable of passing light. Although this does not ensure the performance of the fiber, it is a quick and inexpensive way to find a broken fiber.

It is recommended that an optical tester such as what’s shown in Figure 9-47 be used to test fiber-optic cables. An optical time-domain reflectometer (OTDR) can be used to test each fiber-optic cable segment. This device injects a test pulse of light into the cable and measures scatter and reflection of light detected as a function of time. The OTDR will calculate the approximate distance at which these faults are detected along the length of the cable.

Image

Figure 9-47 Optical Time-Domain Reflectometer

Fiber Versus Copper (9.4.3.6)

There are many advantages to using fiber-optic cable instead of copper cable. Given that the fibers used in fiber-optic media are not electrical conductors, the media is immune to EMI and will not conduct unwanted electrical currents due to grounding issues. Because optical fibers are thin and have relatively low signal loss, they can be operated at much greater lengths than copper media, without the need for signal regeneration. Some optical fiber physical layer specifications allow lengths that can reach multiple kilometers.

Optical fiber media implementation issues include

Image More expensive than copper media over the same distance

Image Requires different skills and equipment to terminate and splice the cable infrastructure

Image Requires more careful handling than copper media

At present, in most enterprise environments, optical fiber is primarily used as backbone cabling for high-traffic point-to-point connections between data distribution facilities and for the interconnection of buildings in multi-building campuses. Because optical fiber does not conduct electricity and has low signal loss, it is well suited for these uses.

Table 9-5 highlights some of the differences between fiber-optic cabling and copper cabling.

Image

Table 9-5 Fiber Versus Copper


Image

Activity 9.4.3.7: Fiber-optics Terminology

Go to the online course to perform the fiber-optic media identification practice activity.


Wireless Media (9.4.4)

The use of radio waves (wireless connectivity) is becoming more popular. This section discusses the use of wireless media to access networks.

Properties of Wireless Media (9.4.4.1)

Wireless media carry electromagnetic signals that represent the binary digits of data communications using radio or microwave frequencies.

As a networking medium, wireless is not restricted to conductors or pathways, as are copper and fiber media. Wireless media provides the greatest mobility options of all media. As well, the number of wireless-enabled devices is continuously increasing. For these reasons, wireless has become the medium of choice for home networks. As network bandwidth options increase, wireless is quickly gaining in popularity in enterprise networks.

Figure 9-48 highlights various wireless-related symbols.

Image

Figure 9-48 Wireless Media Symbols

However, wireless does have some areas of concern, including the following:

Image Coverage area: Wireless data communication technologies work well in open environments. However, certain construction materials used in buildings and structures can limit the effective coverage, as can the local terrain.

Image Interference: Wireless is susceptible to interference and can be disrupted by such common devices as household cordless phones, some types of fluorescent lights, microwave ovens, and other wireless communications.

Image Security: Wireless communication coverage requires no access to a physical strand of media. Therefore, devices and users who are not authorized for access to the network can gain access to the transmission. Consequently, network security is a major component of wireless network administration.

Although wireless is increasing in popularity for desktop connectivity, copper and fiber are the most popular physical layer media for enterprise network deployments.

Types of Wireless Media (9.4.4.2)

The IEEE and telecommunications industry standards for wireless data communications cover both the data link and physical layers.

As shown in Figure 9-49, three common data communications standards apply to wireless media:

Image IEEE 802.11: Wireless LAN (WLAN) technology, commonly referred to as Wi-Fi, uses a contention or non-deterministic system with a CSMA/CA media access process.

Image IEEE 802.15: Wireless Personal Area Network (WPAN) standard, commonly known as Bluetooth, uses a device-pairing process to communicate over distances from 1 to 100 meters.

Image IEEE 802.16: Commonly known as Worldwide Interoperability for Microwave Access (WiMAX), uses a point-to-multipoint topology to provide wireless broadband access.

Image

Figure 9-49 Wireless Media Standards


Note

Other wireless technologies such as cellular and satellite communications can also provide data network connectivity. However, these wireless technologies are out of scope for this chapter.


In each of the examples shown in Figure 9-49, physical layer specifications are applied to areas that include

Image Data to radio signal encoding

Image Frequency and power of transmission

Image Signal reception and decoding requirements

Image Antenna design and construction


Note

Wi-Fi is a trademark of the Wi-Fi Alliance. Wi-Fi is used with certified products that belong to WLAN devices that are based on the IEEE 802.11 standards.


Wireless LAN (9.4.4.3)

A common wireless data implementation is to enable devices to wirelessly connect via a LAN. In general, a wireless LAN requires the following network devices:

Image Wireless Access Point (AP): Concentrates the wireless signals from users and connects, usually through a copper cable, to the existing copper-based network infrastructure, such as Ethernet. Home and small business wireless routers integrate the functions of a router, switch, and access point into one device, as shown in Figure 9-50.

Image Wireless NIC adapters: Provides wireless communication capability to each network host.

Image

Figure 9-50 Wireless Access Point

As the technology has developed, a number of WLAN Ethernet-based standards have emerged. Care needs to be taken in purchasing wireless devices to ensure compatibility and interoperability.

The benefits of wireless data communications technologies are evident, especially the savings on costly premises wiring and the convenience of host mobility. However, network administrators need to develop and apply stringent security policies and processes to protect wireless LANs from unauthorized access and damage.

802.11 Wi-Fi Standards (9.4.4.4)

Various 802.11 standards have evolved over the years. Standards include the following:

Image IEEE 802.11a: Operates in the 5 GHz frequency band and offers speeds of up to 54 Mbps. Because this standard operates at higher frequencies, it has a smaller coverage area and is less effective at penetrating building structures. Devices operating under this standard are not interoperable with the 802.11b and 802.11g standards described next.

Image IEEE 802.11b: Operates in the 2.4 GHz frequency band and offers speeds of up to 11 Mbps. Devices implementing this standard have a longer range and are better able to penetrate building structures than devices based on 802.11a.

Image IEEE 802.11g: Operates in the 2.4 GHz frequency band and offers speeds of up to 54 Mbps. Devices implementing this standard therefore operate at the same radio frequency and range as 802.11b but with the bandwidth of 802.11a.

Image IEEE 802.11n: Operates in the 2.4 GHz or 5 GHz frequency bands. The typical expected data rates are 100 Mbps to 600 Mbps with a distance range of up to 70 meters. It is backward compatible with 802.11a/b/g devices.

Image IEEE 802.11ac: Operates in the 5 GHZ frequency band, providing data rates up to 450 Mbps and 1.3 Gbps (1300 Mbps.) It is backward compatible with 802.11a/b/g/n devices.

Image IEEE 802.11ad: Also known as WiGig, it uses a tri-band Wi-Fi solution using 2.4 GHz, 5 GHz, and 60 GHz and offers theoretical speeds of up to 7 Gbps.

Table 9-6 highlights some of these differences in the 802.11 Wi-Fi standards.

Image

Table 9-6 Differences in 802.11 Wi-Fi Standards


Image

Packet Tracer Activity 9.4.4.5: Connecting a Wired and Wireless LAN

When working in Packet Tracer (a lab environment or a corporate setting), you should know how to select the appropriate cable and how to properly connect devices. This activity will examine device configurations in Packet Tracer, selecting the proper cable based on the configuration, and connecting the devices. This activity will also explore the physical view of the network in Packet Tracer.



Image

Lab 9.4.4.6: Viewing Wired and Wireless NIC Information

In this lab, you will complete the following objectives:

Image Part 1: Identify and Work with PC NICs

Image Part 2: Identify and Use the System Tray Network Icons


Summary (9.5)


Image

Class Activity 9.5.1.1: Linked In!

Go to the online course to perform this practice activity of designing a network.


Note

This activity is best completed in groups of two to three students.


Your small business is moving to a new location! Your building is brand new, and you have been tasked to come up with a physical model so that network port installation can begin.

Use the blueprint provided for this activity (your instructor will provide you with a copy from the Instructor Planning Guide)—the area indicated by Number 1 is the reception area, and the area labeled RR is the restroom area.

All rooms are within Category 6, UTP specifications (100 meters), so you have no worries about hard-wiring the building to code. Each room in the diagram must have at least one network connection available for users/intermediary devices.

With your teammate(s), indicate the following on the drawing:

Image The location of your network main distribution facility, while keeping security in mind

Image The number of intermediary devices that you would use and where you would place them

Image The type of cabling that would be used (UTP, STP, wireless, fiber optics, etc.) and where the ports would be placed

Image The types of end devices that would be used (wired, wireless, laptops, desktops, tablets, etc.).

Do not go “overboard” on your design—just use the content from the chapter to be able to justify your decisions to the class.


The TCP/IP network access layer is the equivalent of the OSI data link layer (Layer 2) and the physical layer (Layer 1).

The data link layer is responsible for the exchange of frames between nodes over a physical network media. It allows the upper layers to access the media and controls how data is placed and received on the media.

Among the different implementations of the data link layer protocols, there are different methods of controlling access to the media. These media access control techniques define if and how the nodes share the media. The actual media access control method used depends on the topology and media sharing. LAN and WAN topologies can be physical or logical. It is the logical topology that influences the type of network framing and media access control used. WANs are commonly interconnected using the point-to-point, hub and spoke, or mesh physical topologies. In shared media LANs, end devices can be interconnected using the star, bus, ring, or extended star (hybrid) physical topologies.

All data link layer protocols encapsulate the Layer 3 PDU within the Data field of the frame. However, the structure of the frame and the fields contained in the header and trailer vary according to the protocol.

The OSI physical layer provides the means to transport across the network media the bits that make up a data link layer frame. The physical components are the electronic hardware devices, media, and other connectors that transmit and carry the signals to represent the bits. Hardware components such as network adapters (NICs), interfaces and connectors, cable materials, and cable designs are all specified in standards associated with the physical layer. The physical layer standards address three functional areas: physical components, frame encoding technique, and signaling method.

Using the proper media is an important part of network communications. Without the proper physical connection, either wired or wireless, communications between any two devices will not occur.

Wired communication consists of copper media and fiber cable:

Image Three main types of copper media are used in networking: UTP, STP, and coaxial cable. UTP cabling is the most common copper networking media.

Image Optical fiber cable has become very popular for interconnecting infrastructure network devices. It permits the transmission of data over longer distances and at higher bandwidths (data rates) than any other networking media. Unlike copper wires, fiber-optic cable can transmit signals with less attenuation and is completely immune to EMI and RFI.

Wireless media carry electromagnetic signals that represent the binary digits of data communications using radio or microwave frequencies.

The number of wireless-enabled devices continues to increase. For these reasons, wireless has become the medium of choice for home networks and is quickly gaining in popularity in enterprise networks.

Figure 9-51 shows a typical end-to-end communication path.

Image

Figure 9-51 End-to-End Communication Path

Practice

The following activities provide practice with the topics introduced in this chapter. The Labs and Class Activities are available in the companion Network Basics Lab Manual (978-1-58713-313-8). The Packet Tracer Activities PKA files are found in the online course.

Image

Class Activities

Class Activity 9.0.1.2: Managing the Medium

Class Activity 9.5.1.1: Linked In!

Image

Labs

Lab 9.3.1.4: Identifying Network Devices and Cabling

Lab 9.4.2.8: UTP Cabling

Lab 9.4.4.6: Viewing Wired and Wireless NIC Information

Image

Packet Tracer Activity

Packet Tracer Activity 9.4.4.5: Connecting a Wired and Wireless LAN

Check Your Understanding

Complete all the review questions listed here to test your understanding of the topics and concepts in this chapter. The appendix, “Answers to the ‘Check Your Understanding’ Questions,” lists the answers.

1. Which two statements describe the services provided by the data link layer? (Choose two.)

A. It defines the end-to-end delivery addressing scheme.

B. It maintains the path between the source and destination devices during the data transmission.

C. It manages the access of frames to the network media.

D. It provides reliable delivery through link establishment and flow control.

E. It ensures that application data will be transmitted according to the prioritization.

F. It packages various Layer 3 PDUs into a frame format that is compatible with the network interface.

2. Match each field of a frame to its content. The fields are not in the correct sequence. (Not all options are used.)

Image

3. Which two engineering organizations define open standards and protocols that apply to the data link layer? (Choose two.)

A. International Organization for Standardization (ISO)

B. Internet Assigned Numbers Authority (IANA)

C. International Telecommunication Union (ITU)

D. Electronic Industries Alliance (EIA)

E. Internet Society (ISOC)

4. An enterprise has four branches. The headquarters needs full connectivity to all branches. The branches do not need to be connected directly to each other. Which WAN topology is most suitable?

A. Bus

B. Full mesh

C. Hub and spoke

D. Mesh

E. Point-to-point

5. What is a characteristic of CSMA/CA that differs from CSMA/CD?

A. CSMA/CA is suitable for networks with Token Ring topology.

B. An end device sends a notification across the media before it sends a data frame.

C. No collisions can exist within a local CSMA/CA network.

D. CSMA/CA is a deterministic access method that controls use of the network.

6. What are three characteristics of valid Ethernet Layer 2 addresses? (Choose three.)

A. They are 48 binary bits in length.

B. They are considered physical addresses.

C. They are generally represented in hexadecimal format.

D. They consist of four 8-bit octets of binary numbers.

E. They are used to determine the data path through the network.

F. They must be changed when an Ethernet device is added or moved within the network.

7. What is the purpose of the OSI physical layer?

A. Controlling access to media

B. Transmitting bits across the local media

C. Performing error detection on received frames

D. Exchanging frames between nodes over physical network media

8. What is a characteristic of a frame encoding technique related to fiber-optic cable?

A. Direct-sequence spread spectrum (DSSS)

B. Non-Return to Zero (NRZ)

C. Orthogonal frequency-division multiplexing (OFDM)

D. Wavelength multiplexing

9. With the use of unshielded twisted-pair copper wire in a network, what causes crosstalk within the cable pairs?

A. The magnetic field around the adjacent pairs of wire

B. The use of braided wire to shield the adjacent wire pairs

C. The reflection of the electrical wave back from the far end of the cable

D. The collision caused by two nodes trying to use the media simultaneously

10. What is Wi-Fi?

A. A WPAN standard that is used to communicate over distances from 1 to 100 meters

B. A point-to-multipoint topology that uses a deterministic system to provide access to the media

C. A technology based on the IEEE 802.16 standards

D. A WLAN technology that uses a contention system with a CSMA/CA media access process

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.117.145.173