1 / 60

Chapter (4) Layer 2 LAN Technologies

Chapter (4) Layer 2 LAN Technologies. A LAN interconnects network components located geographically close, such as the floor of a building, within a building, or on a campus.

Download Presentation

Chapter (4) Layer 2 LAN Technologies

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Chapter (4) Layer 2 LAN Technologies

  2. A LAN interconnects network components located geographically close, such as the floor of a building, within a building, or on a campus. The LAN infrastructure used is built and owned by a company or other organization. Typically, no external provider, such as a telephone company, is used to connect different parts of the LAN. LANs can scale from very small sizes, such as a small office/home office (SOHO), to a large corporation spanning multiple buildings on a campus, commonly referred to as an enterprise LAN.

  3. Common components you’ll find in a LAN include computers (PCs and servers), interconnections (network interface cards and media types such as cabling and wireless), network devices (routers, switches, hubs, firewalls, intrusion detection/ prevention systems, and so on), and protocols (Ethernet and TCP/IP). The main function of all of these components is to allow users to access applications and data, to share resources such as printers and network storage, and to connect to other networks if necessary.

  4. Ethernet Operation Ethernet is a LAN technology that functions at the data link layer. Ethernet uses the Carrier Sense Multiple Access/Collision Detection (CSMA/CD) mechanism to send information in a shared environment. Ethernet was initially developed with the idea that many devices would be connected to the same physical piece of wiring. The short form CSMA/CD describes the actual process of how Ethernet operates on a shared medium.

  5. Collision Domains Because Ethernet experiences collisions, networking devices that share the same medium (are connected to the same physical segment) are said to belong to the same collision or bandwidth domain. This means that, for better or worse, traffic generated by one device in the collision domain can adversely affect other devices in the same domain

  6. Framing One of the main differences between IEEE’s and Ethernet implementation of Ethernet is the framing used. that framing defines the format of information as it’s carried across a data link layer medium. A frame standardizes the fields in the frame and their lengths so that every device understands how toread the contents of the frame. The next sections discuss the framing that IEEE uses with the 802.3 and 802.2 standards and what Ethernet uses.

  7. Addressing Recall from Chapter 2 that Ethernet, as well as other LAN technologies such as FDDI and Token Ring, use MAC, or hardware, addresses to uniquely identify devices on a segment (physical or logical). MAC addresses are represented using a hexadecimal addressing scheme.

  8. You should be familiar with decimal, binary, and hexadecimal numbering, since you might be expected to convert decimal numbers to binary (and vice versa), decimal to hexadecimal (and vice versa), and binary to hexadecimal (and vice versa).

  9. Bit Values Before you can begin to understand the conversion process, you need to understandbinary mathematics. Computers and networking components process everything inbinary. In 1 byte (octet), there are 8 bits. Each bit in a byte, when enabled (turned on), represents a specific decimal value. Table 3-5 shows the conversion of a specific bit position, in a byte, when it is enabled. In this table, the bit positions are labeled from left to right, where the leftmost bit is the most significant and the rightmost bit is the least significant. A bit can contain one of two values: 0 or 1. If it is enabled (set to 1), then that equates to a particular decimal value, shown in the second row of

  10. Table 3-5. If it is disabled (set to 0), then this equates to a decimal value of 0. Higher order bits have a higher-numbered bit position (such as bit position 8), while lower order bits have a lower-numbered bit position (such as bit position 1). * To convert the binary byte value to a decimal value, you look at all the bits that are turned on and add up the equivalent decimal values.

  11. Problems and Limitations of Ethernet: Even though Ethernet is the main layer 2 technology used in LAN networks for many years, it does have two main disadvantages: ■ Distance ■ Collisions The following sections discuss these two problems in depth, and the rest of the chapter will cover some unique solutions commonly found in Ethernet-based networks today.

  12. Distance and Extension of LANs: One of the initial problems with Ethernet was that you were limited to the length of a segment because copper was used as a media type: 10Base5 supported 500 meters and 10Base2 supported 185 meters. When 10BaseT was introduced, using unshielded twisted pair (UTP) cabling, the distance limitation shrunk even further: 100 meters. One issue of using copper as a transmission medium is that as the signal travels down the copper wire, the signal slowly degrades because of noise in the line, the signal losing strength, and issues with devices not specifically following the rules defined by CSMA/CD.

  13. One solution is to use a physical layer repeater to repeat the signal to deal with noise and signal strength. With 10BaseT, a hub, a multiport physical layer repeater, is used to perform this function. A hub takes a signal received on one interface and repeats it across all other available interfaces. The main problem with a hub is that if the signal is bad, the hub repeats the bad signal: bad in, bad out. CSMA/CD also causes issues. For example, with CSMA/CD, when a device places a frame on a wire, it listens on the wire for a predetermined time period to determine whether a collision occurs. If no collision is detected during this time period, the source assumes that everyone on the segment successfully received the frame.

  14. Solutions to Collision Problems: Bridges were originally used to solve collision and bandwidth problems. Each port connected to a bridge is a separate collision domain. When a frame is pulled into a port on a bridge, the bridge checks the frame’s field checksum sequence (FCS), and if the FCS if valid, the frame is forwarded out of a destination port or ports. Recall from Chapter 3 that the FCS is a checksum to ensure that the destination can check that the Ethernet frame has not been corrupted. Basically, the bridge is creating the illusion that all physical segments to which it is connected are actually one large logical segment. All devices connected to this logical segment are in the same broadcast domain—this makes sense because bridges flood broadcasts. Note that if you are having problems with large amounts of broadcasts, bridges will not solve these problems.

  15. The problem with this implementation is that the longer the cable is, the longer the time period required to accommodate the signal traveling to the two endpoints of the cable. Therefore, the cable can’t be of infinite length. Because of this issue, we have different standards of Ethernet that allow for maximum lengths of the cable. If a device has a 10Base5 interface, its NIC knows that it must listen on the wire based on the amount of time it takes for an electrical signal to travel 500 meters, whether or not the cable happens to be this long.

  16. Network ..Subnet

  17. A subnet is a logical organization of network address ranges used to separate hosts and network devices from each other to serve a design purpose. In many cases, subnets are created to serve as physical or geographical separations similar to those found between rooms, floors, buildings, or cities.

  18. Subnetting is used to break the network into smaller more efficient subnets to prevent excessive rates of Ethernet packet collision in a large network. Such subnets can be arranged hierarchically, with the organization's network address space partitioned into a tree-like structure. Routers are used to manage traffic and constitute borders between subnets.

  19. And this is sample shows an IP address represented in both binary and decimal. 10. 1. 23. 19 (decimal) 00001010.00000001.00010111.00010011 (binary) These octets are broken down to provide an addressing scheme that can accommodate large and small networks. There are five different classes of networks, A to E. This document focuses on addressing classes A to C, since classes D and E are reserved and discussion of them is beyond the scope of this document.

  20. Network Masks A network mask helps you know which portion of the address identifies the network and which portion of the address identifies the node. Class A, B, and C networks have default masks, also known as natural masks, as shown here: Class A: 255.0.0.0 Class B: 255.255.0.0 Class C: 255.255.255.0 An IP address on a Class A network that has not been subnetted would have an address/mask pair similar to: 8.20.15.1 255.0.0.0. To see how the mask helps you identify the network and node parts of the address, convert the address and mask to binary numbers.

  21. 8.20.15.1 = 00001000.00010100.00001111.00000001 255.0.0.0 = 11111111.00000000.00000000.00000000 Once you have the address and the mask represented in binary, then identifying the network and host ID is easier. Any address bits which have corresponding mask bits set to 1 represent the network ID. Any address bits that have corresponding mask bits set to 0 represent the node ID. 8.20.15.1 = 00001000.00010100.00001111.00000001 255.0.0.0 = 11111111.00000000.00000000.00000000 ----------------------------------- net id | host id netid = 00001000 = 8 hostid = 00010100.00001111.00000001 = 20.15.1

  22. Hexadecimal-&-Decimal Convert the decimal number 650 to hexadecimal by repeated division by 16. 650 = 40.625 0.625 x 16 = 10 = A (LSD) 16 40 = 2.5 0.5 x 16 = 8 = 8 16 2 = 0.125 0.125 x 16 = 2 = 2 (MSD) 16 The hexadecimal number is 28A

  23. A network bridge connects multiple network segments at the data link layer (layer 2) of the OSI model, and the term layer 2 switch is very often used interchangeably with bridge. Bridges are similar to repeaters or network hubs, devices that connect network segments at the physical layer; however, with bridging, traffic from one network is managed rather than simply rebroadcast to adjacent network segments. In Ethernet networks, the term "bridge" formally means a device that behaves according to the IEEE 802.1D standard—this is most often referred to as a network switch in marketing literature

  24. Bridges tend to be more complex than hubs or repeaters. Bridges can analyze incoming data packets to determine if the bridge is able to send the given packet to another segment of the network. Since bridging takes place at the data link layer of the OSI model, a bridge processes the information from each frame of data it receives. In an Ethernet frame, this provides the MAC address of the frame's source and destination. Bridges use two methods to resolve the network segment that a MAC address belongs to.

  25. Bridging (networking) Bridgingis aforwardingtechnique used inpacket-switchedcomputer networks. Unlikerouting, bridging makes no assumptions about where in a network a particular address is located. Instead, it depends onfloodingand examination of source addresses in received packet headers to locate unknown devices. Once a device has been located, its location is recorded in a table where theMAC addressis stored so as to preclude the need for further broadcasting. The utility of bridging is limited by its dependence on flooding, and is thus only used inlocal area networks. Currently, two different bridging technologies are in widespread use. Transparent bridgingpredominates inEthernetnetworks, whilesource routingis used intoken ringnetworks. Thus, bridging allows you to connect two different networks seamlessly on thedata link layer, e.g. a wireless access point with a wirednetwork switchby using MAC addresses as an addressing system. A bridge and switch are very much alike.

  26. Bridging versus routing Bridgingandroutingare both ways of performing data control, but work through different methods. Bridging takes place atOSI Model Layer 2 (Data-Link Layer) while Routing takes place at theOSI Model Layer 3 (Network Layer). This difference means that a bridge directs frames according to hardware assignedMAC addresseswhile a router makes its decisions according to arbitrarily assignedIP Addresses. As a result of this, bridges are not concerned with and are unable to distinguishnetworkswhilerouterscan. When designing a network, one can choose to put multiple segments into one bridged network or to divide it into different networks interconnected by routers. If a host is physically moved from one network area to another in a routed network, it has to get a new IP address; if this system is moved within a bridged network, it doesn't have to reconfigure anything. These days bridges are replaced by switches

  27. switch is a marketing term rather than a technical one.[citation needed] Switches may operate at one or more OSI layers, including physical, data link, network, or transport (i.e., end-to-end). A device that operates simultaneously at more than one of these layers is called a multilayer switch, although use of the term is diminishing.[citation needed] In switches intended for commercial use, built-in or modular interfaces make it possible to connect different types of networks, for example Ethernet, Fibre Channel, ATM, ITU-TG.hn and 802.11. This connectivity can be at any of the layers mentioned. While Layer 2 functionality is adequate for speed-shifting within one technology, interconnecting technologies such as Ethernet and token ring are easier at Layer 3.

  28. Interconnection of different Layer 3 networks is done by routers. If there are any features that characterize "Layer-3 switches" as opposed to general-purpose routers, it tends to be that they are optimized, in larger switches, for high-density Ethernet connectivity. In some service provider and other environments where there is a need for much analysis of network performance and security, switches may be connected between WAN routers as places for analytic modules. Some vendors provide firewall, network intrusion detection, and performance analysis modules that can plug into switch ports. Some of these functions may be on combined modules.

  29. In other cases, the switch is used to create a mirror image of data that can go to an external device. Since most switch port mirroring provides only one mirrored stream, network hubs can be useful for fanning out data to several read-only analyzers, such as intrusion detection systems and packet sniffers.

  30. Connectionless Forwarding This is termed destination-based connectionless forwarding How does each router know the correct local forwarding decision for any possible destination address? Through knowledge of the topology state of the network This knowledge is maintained by a routing protocol

  31. Routing Protocols Distribute the knowledge of the current topology state of the network to all routers This knowledge is used by each router to generate a forwarding table, which contains the local switching decision for each known destination address

  32. Routing Protocols correct operation of the routing state of a network is essential for the management of a quality network service accuracy of the routing information dynamic adjustment of the routing information matching aggregate traffic flow to network capacity

  33. ISP Routing Tasks customers internal peer / upstream Exterior routing Interior routing Customer routing

  34. Interior Routing discovers the topology of a network through the operation of a distributed routing protocol

  35. Path Selection R1 R4 5 R7 40 45 5 5 6 R6 10 20 R2 B A 10 15 R8 4 10 R3 R5 10 5 Minimum cost from A to B is 39 units

  36. Dynamic Path Adjustment R1 R4 5 R7 40 45 5 5 6 R6 10 20 R2 B A 10 15 R8 4 R3 R5 10 5 If R5 – R7 breaks, minimum cost path from A to B is Now 46 units

  37. Interior Routing Protocols describe the current network topology Routing protocols distribute how to reach address prefix groups Routing protocols function through either distributed computing model (distance vector) parallel computing model (link state)

  38. Routing Protocols Distance Vector Routing Protocols Each node sends its routing table (dest, distance) to all neighbors every 30 seconds Lower distances are updated with the neighbor as next hop cannot scale cannot resolve routing loops quickly RIP is the main offender

  39. Routing Protocols Link State Routing Protocols Each link, the connected nodes and the metric is flooded to all routers Each link up/down status change is incrementally flooded Each router re-computes the routing table in parallel using the common link state database OSPF is the main protocol in use today

  40. Suggestions Just engineering a physical link does not ensure that traffic will flow some system somewhere must provide routing information about how to reach the newly connected network Installing backup circuits is easy, making the routing work may not be

  41. Suggestions need a clear understanding of how the client networks want their traffic to flow before you can start making routing configuration changes

  42. Interior and Exterior Routing Protocols Interior Route Space Interior Route Space AS1221 AS1 Interior Route Space AS3561 Exterior Routing Space Interior Route Space AS2402 Interior Route Space AS701

More Related