Ubiquitous Computing Requirement - PowerPoint PPT Presentation

1 / 123
About This Presentation
Title:

Ubiquitous Computing Requirement

Description:

... then it adds whatever headers and trailers the layer needs to perform its function. ... The electrical signal takes time to travel down the cable (delay), and each ... – PowerPoint PPT presentation

Number of Views:71
Avg rating:3.0/5.0
Slides: 124
Provided by: richar895
Learn more at: https://richardjones.org
Category:

less

Transcript and Presenter's Notes

Title: Ubiquitous Computing Requirement


1
OPERATIONS VIEW (OV)
Ubiquitous Computing Requirement
IPV 6 Provisions real number space for every
communicating entity or object
2
Network Symbols
3
Equipment
FIRE WALLs
Cluster
Networks

Blade Server
WAN LINKS
4
(No Transcript)
5
(No Transcript)
6
BRIDGE i.e. WAP
HUB
ROUTER
SWITCH
7
- Carrier Class Core Router - ATM Switch - Frame
Relay Switch
SWITCH Image
SWITCH
HUB
Switch
Switch ATM, ?
BRIDGE i.e. WAP
Unknown
8
Some Networking Symbols
  • Serial Link
  • Ethernet
  • Network Cloud (X.25, Frame Relay, ATM)
  • Token Ring Network
  • Host
  • Internetworking Device
  • Router
  • Switch
  • Bridge

Internetworking Device
9
ROUTER
Router
Router Image
Communication Server
10
(No Transcript)
11
(No Transcript)
12
(No Transcript)
13
(No Transcript)
14
WANs and WAN Devices
15
End User Devices
16
LANs technologies
17
Network Devices
18
Pipe Analogy for Bandwidth
19
(No Transcript)
20
(No Transcript)
21
Network Definitions
22
End user devices
  • End-user devices that provide users with a
    connection to the network are also referred to as
    hosts
  • These devices allow users to share, create, and
    obtain information.
  • Host devices are physically connected to the
    network media using a network interface card
    (NIC)

23
Network devices
  • Network devices provide transport for the data
    that needs to be transferred between end-user
    devices. Network devices provide extension of
    cable connections, concentration of connections,
    conversion of data formats, and management of
    data transfers.

24
Networking Devices
  • Equipment that connects directly to a network
    segment is referred to as a device. These devices
    are broken up into two classifications.
  • Network Devices
  • end-user devices

25
Local-area networks (LANs)
  • LANs consist of the
  • following components
  • Computers
  • Network interface cards
  • Peripheral devices
  • Networking media
  • Network devices
  • Some common LAN
  • technologies are
  • Ethernet
  • Token Ring
  • FDDI

26
Local Area Networks (LAN)
  • Businesses needed a
  • solution that would
  • successfully address the
  • following three problems
  • How to avoid duplication of equipment and
    resources
  • How to communicate efficiently
  • How to set up and manage a network

27
Wide-area networks (WANs)
  • WANs interconnect LANs, which then provide access
    to computers or file servers in other locations.
  • Some common WAN
  • technologies are
  • Modems
  • Integrated Services Digital Network (ISDN)
  • Digital Subscriber Line (DSL)
  • Frame Relay
  • US (T) and Europe (E) Carrier Series T1, E1,
    T3, E3
  • Synchronous Optical Network (SONET)

28
Wide-area networks (WANs)
  • A way for information to move efficiently and
    quickly
  • WANs could connect user networks over large
    geographic areas

29
Metropolitan-area networks (MANs)
  • A MAN is a network that spans a metropolitan area
    such as a city or suburban area. A MAN usually
    consists of two or more LANs in a common
    geographic area .

30
Storage-area networks (SANs)
  • A SAN is a dedicated, high-performance network
    used to
  • move data between servers and storage resources
  • SANs offer the following features
  • Performance SANs enable concurrent access of
    disk or tape arrays by two or more servers at
    high speeds.
  • Availability SANs have disaster tolerance built
    in, because data can be mirrored using a SAN up
    to 10 kilometers (km) or 6.2 miles away.
  • Scalability Like a LAN/WAN, it can use a
    variety of technologies. This allows easy
    relocation of backup data, operations, file
    migration, and data replication between systems.

31
Storage-area networks (SANs)
32
An understanding of the following key points
should have been achieved
  • A SAN provides enhanced system performance, is
    scalable, and has disaster tolerance built in
  • A VPN is a private network that is constructed
    within a public network infrastructure
  • Three main types of VPNs are access, Intranet,
    and Extranet VPNs
  • Intranets are designed to be available to users
    who have access privileges to the internal
    network of an organization
  • Extranets are designed to deliver applications
    and services that are Intranet based, using
    extended, secured access to external users or
    enterprises

33
Repeater
  • A repeater is a network device used to regenerate
    a signal. Repeaters regenerate analog or digital
    signals distorted by transmission loss due to
    attenuation.

34
Repeaters - Hubs
Repeaters
  • A repeater regenerates and retimes network
    signals at the bit level to allow them to travel
    a longer distance
  • 5-4-3 Rule for 10-Mbps Ethernet should be used to
    limit latency
  • Too much latency on the LAN increases the number
    of latecollisions and makes the LAN less efficient

Hubs
  • Hubs are actually multiport repeaters
  • Change the network topology from a linear bus to
    a star
  • Three basic types
  • Passive no boost, no clean and no power
  • Active - needs power to amplify the incoming
    signal
  • Intelligent - microprocessor chip and diagnostic
    capabilities

35
Routers
  • Routers have all the capabilities listed above.
  • regenerate signals
  • concentrate multiple connections
  • convert data transmission formats, and manage
    data transfers
  • They can also connect to a WAN, which allows them
    to connect LANs that are separated by great
    distances

36
Switches
  • Workgroup switches add more intelligence to data
    transfer management.
  • They can determine whether data should remain on
    a LAN or not
  • They can transfer the data only to the connection
    that needs that data.

37
Switches
38
Bridges Switches
Bridges
  • Bridges and switches operate at the Data Link
    layer.
  • Destination MAC address is looked up in the
    bridge table to determine whether to filter,
    flood, or copy the frame onto another segment.
  • Switches
  • A switch has many ports with many network
    segments connected to them.
  • A switch chooses the port to which the
    destination device is connected.
  • Alleviates congestion in LANs by reducing the
    size of collision domains, reducing traffic and
    increasing bandwidth.
  • Two basic operations
  • Switching data frames.
  • Build and maintain switching tables and search
    for loops.
  • Switches operate at much higher speeds than
    bridges and can support new functionality, such
    as virtual LANs.

39
Bridges
  • convert network transmission data formats as well
    as perform basic data transmission management.
  • provide connections between LANs.
  • perform a check on the data to determine whether
    it should cross the bridge or not. This makes
    each part of the network more efficient

40
Bridges
41
Network topology
  • Network topology defines the structure of the
    network. One part of the topology definition is
    the physical topology, which is the actual layout
    of the wire or media. The other part is the
    logical topology, which defines how the media is
    accessed by the hosts for sending data

42
Different topologies
43
Logical topology
  • The logical topology of a network is how the
    hosts communicate across the medium
  • - broadcast
  • Ethernet
  • - token passing
  • Token Ring
  • Fiber Distributed Data
    Interface (FDDI)

44
A protocol
  • A protocol is a formal description of a set of
    rules and conventions that govern a particular
    aspect of how devices on a network communicate.
  • Protocols determine the format, timing,
    sequencing, and error control in data
    communication

45
Protocols
  • Protocols control all aspects of data
  • communication, which include the following
  • (IEEE, ANSI , TIA , EIA , ITU )
  • How the physical network is built
  • How computers connect to the network
  • How the data is formatted for transmission
  • How that data is sent
  • How to deal with errors

46
Virtual private network (VPN)
  • A VPN is a private network that is constructed
    within a public network infrastructure such as
    the global Internet. Using VPN, a telecommuter
    can access the network of the company
    headquarters through the Internet by building a
    secure tunnel between the telecommuters PC and a
    VPN router in the headquarters

47
Types of VPNs
  • Access VPNs Access VPNs provide remote access
    to a mobile worker and small office/home office
    (SOHO) to the headquarters of the Intranet or
    Extranet over a shared infrastructure.
  • Intranet VPNs Intranet VPNs link regional and
    remote offices to the headquarters of the
    internal network over a shared infrastructure
    using dedicated connections
  • Extranet VPNs Extranet VPNs link business
    partners to the headquarters of the network over
    a shared infrastructure using dedicated
    connections

48
Benefits of VPNs
  • A VPN is a service that offers secure, reliable
    connectivity over a shared public network
    infrastructure such as the Internet.
  • They are the most cost-effective method of
    establishing a point-to-point connection between
    remote users and an enterprise customer's network

49
Intranets and extranets
  • Intranets are designed to permit access by users
    who have access privileges to the internal LAN of
    the organization.
  • Extranets refer to applications and services that
    are Intranet based, and use extended, secure
    access to external users or enterprises.

50
Network Comparisons
51
Throughput
  • Throughput refers to actual measured bandwidth,
    at a specific time of day, using specific
    Internet routes, and while a specific set of data
    is transmitted on the network

52
Limitations
  • Bandwidth varies depending upon the type of media
    as well as the LAN and WAN technologies used. The
    physics of the media account for some of the
    difference.
  • The actual bandwidth of a network is determined
    by a combination of the physical media and the
    technologies chosen for signaling and detecting
    network signals.

53
Measurement
  • In digital systems, the basic unit of bandwidth
    is bits per second (bps). Bandwidth is the
    measure of how much information, or bits, can
    flow from one place to another in a given amount
    of time, or seconds.

54
WAVEFORM ANALYSIS
55
Digital versus analog
  • Electromagnetic waves are called analog because
    they have the same shapes as the light and sound
    waves produced by the transmitters
  • Analog bandwidth is measured by how much of the
    electromagnetic spectrum is occupied by each
    signal. The basic unit of analog bandwidth is
    hertz (Hz), or cycles per second.
  • In digital signaling all information is sent as
    bits, regardless of the kind of information it
    is. Voice, video, and data all become streams of
    bits when they are prepared for transmission over
    digital media.
  • Unlimited amounts of information can be sent over
    the smallest or lowest bandwidth digital channel.

56
Bandwidth
  • Analog bandwidth
  • Refers to the frequency range of an analog
    electronic system.
  • The units of measurement is Hertz
  • Digital bandwidth
  • Digital bandwidth measures how much information
    can flow from one place to another in a given
    amount of time.
  • The unit of measurement is bits per second
    (bps).

57
Distance and bandwidth
58
Importance of bandwidth
  • Bandwidth is defined as the amount of information
    that can flow through a network connection in a
    given period of time.

59
Highway Analogy for Bandwidth
60
File Transfer Time Calculations
61
An understanding of the following key points
should have been achieved
  • Understanding bandwidth is essential when
    studying networking
  • Bandwidth is finite, costs money, and the demand
    for it increases daily
  • Bandwidth is measured in bits per second, bps,
    kpbs, Mbps, or Gbps
  • Limitations on bandwidth include type of media
    used, LAN and WAN technologies, and network
    equipment
  • Throughput refers to actual measured bandwidth,
    which is affected by factors that include number
    of users on network, networking devices, type of
    data, users computer and the server
  • The formula TS/BW (transfer time size of file
    / bandwidth) can be used to calculate data
    transfer time
  • Comparison of analog and digital bandwidth

62
Networking Models
  • The concept of layers is used to describe
    communication from one computer to another
  • As the data passes between layers, each layer
    adds additional information that enables
    effective communication with the corresponding
    layer on the other computer
  • The OSI and TCP/IP models have layers that
    explain how data is communicated from one
    computer to another.

63
OSI layers
  • The OSI reference model explains how packets
    travel through the
  • various layers to another device on a network
  • Dividing the network into seven layers provides
    the following
  • advantages
  • It breaks network communication into smaller,
    more manageable parts.
  • It standardizes network components to allow
    multiple vendor development and support.
  • It allows different types of network hardware and
    software to communicate with each other.
  • It prevents changes in one layer from affecting
    other layers.
  • It divides network communication into smaller
    parts to make learning it easier to understand.

64
OSI model
65
The OSI Model - Layer 1
66
The OSI Model - Layer 2
67
The OSI Model - Layer 3
68
The OSI Model - Layer 4
69
Layer Communication
  • Layer 4 on the source computer communicates with
    Layer 4 on the destination computer. The rules
    and conventions used for this layer are known as
    Layer 4 protocols.

70
The OSI Model - Layer 5
71
The OSI Model - Layer 6
72
The OSI Model - Layer 7
73
TCP/IP model
  • Application layer handles issues of
    representation, encoding, and dialog control.
  • The transport layer deals with the quality of
    service issues of reliability, flow control, and
    error correction
  • Internet layer divides TCP segments into packets
    and send them from any network
  • Network layer is concerned with all of the
    components, both physical and logical, that are
    required to make a physical link

74
Common TCP/IP Protocols
The relationship between IP and TCP is an
important one. IP can be thought to point the way
for the packets, while TCP provides a reliable
transport
75
Comparing TCP/IP with OSI
TCP
IP
Ethernet
76
Peer-to-peer communications
77
An understanding of the following key points
should have been achieved
  • Network communication is described by layered
    models
  • The OSI and TCP/IP are the two most important
    models of network communication
  • The International Organization for
    Standardization developed the OSI model to
    address the problems of network incompatibility
  • The seven layers of the OSI are application,
    presentation, session, transport, network, data
    link, and physical
  • The four layers of the TCP/IP are application,
    transport, internet, and network access
  • The TCP/IP application layer is equivalent to the
    OSI application, presentation, and session layers
  • Fundamental networking devices are hubs, bridges,
    switches, and routers
  • The physical topology layouts include the bus,
    ring, star, extended star, hierarchical, and mesh
  • A WAN consists of two or more LANs spanning a
    common geographic area

78
Detailed encapsulation process
  • If one computer (host A) wants to send data to
    another computer (host B), the data must first be
    packaged through a process called encapsulation.
  • Encapsulation wraps data with the necessary
    protocol information before network transit.

79
Data Encapsulation
80
Data Encapsulation example
81
Physical Network
82
6.2.1 Media Access Control (MAC)
  • The specific technologies for each are as
    follows
  • Ethernet logical bus topology (information flow
    is on a linear bus) and physical star or extended
    star (wired as a star)
  • Token Ring logical ring topology (in other
    words, information flow is controlled in a ring)
    and a physical star topology (in other words, it
    is wired as a star)
  • FDDI logical ring topology (information flow is
    controlled in a ring) and physical dual-ring
    topology (wired as a dual-ring)

83
6.2.1 Media Access Control (MAC)
  • There are two broad categories of Media Access
    Control, deterministic (taking turns) and
    non-deterministic (first come, first served).
  • deterministic protocols include Token Ring and
    FDDI.
  • Non-deterministic MAC protocols use a first-come,
    first-served approach. CSMA/CD is a simple
    system. The NIC listens for an absence of a
    signal on the media and starts transmitting.

84
6.2.2 MAC rules and collision detection/backoff
  • The access method CSMA/CD used in Ethernet
    performs three functions
  • Transmitting and receiving data packets
  • Decoding data packets and checking them for valid
    addresses before passing them to the upper layers
    of the OSI model
  • Detecting errors within data packets or on the
    network

85
IP defines private intranet address
ranges 10.0.0.0 - 10.255.255.255 (Class
A) 172.16.0.0 - 172.31.255.255 (Class
B) 192.168.0.0 - 192.168.255.255 (Class
C) Addresses reused by many organizations Addresse
s cannot be used for communication on Internet
86
6.1.4 Naming
  • Ethernet uses MAC addresses that are 48 bits in
    length and expressed as twelve hexadecimal
    digits. The first six hexadecimal digits, which
    are administered by the IEEE, identify the
    manufacturer or vendor. This portion of the MAC
    address is known as the Organizational Unique
    Identifier (OUI). The remaining six hexadecimal
    digits represent the interface serial number, or
    another value administered by the specific
    equipment manufacturer. MAC addresses are
    sometimes referred to as burned-in addresses
    (BIA) because they are burned into read-only
    memory (ROM) and are copied into random-access
    memory (RAM) when the NIC initializes.

87
Various types of cabling
  • Shielded twisted-pair (STP)
  • STP cable is more expensive, more difficult to
    install, and less frequently used than UTP.
  • Unshielded twisted pair (UTP)
  • UTP contains no shielding and is more
    susceptible to external noise but is the most
    frequently used because it is inexpensive and
    easier to install.

88
Ethernet Media
  • Ethernet technologies can be used in a campus
    network in several different ways
  • 10 Mbps at the user level to provide good
    performance.
  • 100 Mbps for clients or servers that require
    more bandwidth.
  • Fast or Gigabit Ethernet between backbone
    devices.

89
(No Transcript)
90
Network Connections
91
DTE/DCE
  • When the connection is made directly to a service
    provider, or a device that provides signal
    clocking such as a channel/data service unit
    (CSU/DSU), the router will be a data terminal
    equipment (DTE) and use a DTE serial cable.
  • When the local router is required to provide the
    clocking rate it will use a data communications
    equipment (DCE) cable

92
Peer-to-peer communications
  • Each layer of the OSI model at the source
    communicate with its peer layer at the
    destination
  • The protocols of each layer exchange information,
    called protocol data units (PDUs).
  • Each layer depends on the service function of the
    OSI layer below it.
  • The lower layer uses encapsulation to put the PDU
    from the upper layer into its data field then it
    adds whatever headers and trailers the layer
    needs to perform its function.

93
RJ-45 PINOUTS
The Ethernet standard specifies that each of the
pins on an RJ-45 connector have a particular
purpose. A NIC transmits signals on pins 1 and
2, and it receives signals on pins 3 and 6. The
wires in UTP cable must be connected to the
proper pins at each end of a cable.
94
(No Transcript)
95
(No Transcript)
96
(No Transcript)
97
Interconnecting Devices
  • Use straight-through cables for
  • Switch to router
  • Switch to PC or server
  • Hub to PC or server
  • Use roll-over cables to
  • Connect a terminal to a console port
  • Use crossover cables for
  • Switch to switch
  • Switch to hub
  • Hub to hub
  • Router to router
  • PC to PC
  • Router to PC

98
Router Connections
  • Cisco router physical connectivity is provided by
    serial connections
  • The first type of serial connections is a 60-pin
    connector
  • The second is a more compact smart serial
    connector
  • The provider connector will vary depending on the
    type of service equipment

99
Router Connection Points
100
Ethernet
101
6.1.1 Introduction to Ethernet
  • From its beginning in the 1970s, Ethernet has
    evolved to meet the increasing demand for high
    speed LANs. the same protocol that transported
    data at 3 Mbps in 1973 is carrying data at 10
    Gbps.
  • The success of Ethernet is due to the following
    factors
  • Simplicity and ease of maintenance
  • Ability to incorporate new technologies
  • Reliability
  • Low cost of installation and upgrade

102
6.1.1 Introduction to Ethernet
  • This work later formed the basis for the Ethernet
    access method known as CSMA/CD.
  • The original idea for Ethernet grew out of the
    problem of allowing two or more hosts to use the
    same medium and prevent the signals from
    interfering with each other. This problem of
    multiple user access to a shared medium was
    studied in the early 1970s at the University of
    Hawaii. A system called Alohanet was developed to
    allow various stations on the Hawaiian Islands
    structured access to the shared radio frequency
    band in the atmosphere.

103
6.1.1 Introduction to Ethernet
  • The differences between the two standards were so
    minor that any Ethernet network interface card
    (NIC) can transmit and receive both Ethernet and
    802.3 frames. Essentially, Ethernet and IEEE
    802.3 are the same standards.
  • In 1985, the Institute of Electrical and
    Electronics Engineers (IEEE) standards committee
    for LANs published standards. They started with
    the number 802. Called Ethernet 802.3. This had
    to be compatible with the ISO/OSI model. To do
    this, the IEEE 802.3 standard had to address the
    needs of Layer 1 and the lower portion of Layer 2
    of the OSI model. As a result, some small
    modifications to the original Ethernet standard
    were made in 802.3.

104
6.1.3 Ethernet and the OSI model
  • maps a variety of Ethernet technologies to the
    lower half of OSI Layer 2 and all of Layer 1.
    Ethernet at Layer 1 involves interfacing with
    media, signals, bit streams that travel on the
    media, components that put signals on media, and
    various topologies. Ethernet Layer 1 performs a
    key role in the communication that takes place
    between devices, but each of its functions has
    limitations. Layer 2 addresses these limitations.

105
6.1.3 Ethernet and the OSI model
  • Data link sublayers contribute significantly to
    technology compatibility and computer
    communication. The MAC sublayer is concerned with
    the physical components that will be used to
    communicate the information. The Logical Link
    Control (LLC) sublayer remains relatively
    independent of the physical equipment that will
    be used for the communication process.

106
6.1.3 Ethernet and the OSI model
  • Ethernet operates in two areas of the OSI model,
    the lower half of the data link layer, known as
    the MAC sublayer and the physical layer.

107
6.1.3 Ethernet and the OSI model
  • A collision domain is then a shared resource.
    Problems originating in one part of the collision
    domain will usually impact the entire collision
    domain.

108
6.1.3 Ethernet and the OSI model
  • Layer 1 involves media, signals, bit streams that
    travel on media, components that put signals on
    media, and various topologies. Each of its
    functions has its limitations. Layer 2 addresses
    these limitations.
  • For each limitation in Layer 1, Layer 2 has a
    solution.
  • Layer 1 cannot communicate with the upper-level
    layers Layer 2 does that with logical link
    control (LLC).
  • Layer 1 cannot name or identify computers Layer
    2 uses an addressing (or naming) process.
  • Layer 1 can only describe streams of bits Layer
    2 uses framing to organize or group the bits.
  • Layer 1 cannot choose which computer will
    transmit binary data, from a group in which all
    computers are trying to transmit at the same
    time Layer 2 accomplishes this by using a system
    called Media Access Control (MAC).

109
6.1.2 IEEE Ethernet naming rules
  • Ethernet is not one networking technology, but a
    family of networking technologies that includes
    Legacy, Fast Ethernet, and Gigabit Ethernet.
    Ethernet speeds can be 10, 100, 1000, or 10,000
    Mbps. The basic frame format and the IEEE
    sublayers of OSI Layers 1 and 2 remain consistent
    across all forms of Ethernet.
  • The abbreviated description consists of
  • A number indicating the number of Mbps
    transmitted.
  • The word base, indicating that baseband signaling
    is used.
  • One or more letters of the alphabet indicating
    the type of medium used (F fiber optical cable,
    T copper unshielded twisted pair).

110
6.1.6 Ethernet frame structure
111
6.1.7 Ethernet frame fields
  • fields permitted or required in an 802.3 Ethernet
    Frame are
  • Preamble - is an alternating pattern of ones and
    zeroes used for timing synchronization in the
    asynchronous 10 Mbps and slower implementations
    of Ethernet.
  • Start Frame Delimiter - one-octet field that
    marks the end of the timing information, and
    contains the bit sequence 10101011.
  • Destination Address
  • Source Address
  • Length/Type
  • Data and Pad
  • FCS - contains a four byte CRC value that is
    created by the sending device and is recalculated
    by the receiving device to check for damaged
    frames.
  • Extension

112
6.2.3 Ethernet timing
  • The electrical signal takes time to travel down
    the cable (delay), and each subsequent repeater
    introduces a small amount of latency in
    forwarding the frame from one port to the next.
    Because of the delay and latency, it is possible
    for more than one station to begin transmitting
    at or near the same time. This results in a
    collision.
  • Full-duplex operation also changes the timing
    considerations and eliminates the concept of slot
    time. Full-duplex operation allows for larger
    network architecture designs since the timing
    restriction for collision detection is removed.
  • In half duplex, assuming that a collision does
    not occur, the sending station will transmit 64
    bits of timing synchronization information that
    is known as the preamble. The sending station
    will then transmit the following information
  • Destination and source MAC addressing information
  • Certain other header information
  • The actual data payload
  • Checksum (FCS) used to ensure that the message
    was not corrupted along the way
  • Stations receiving the frame recalculate the FCS
    to determine if the incoming message is valid and
    then pass valid messages to the next higher layer
    in the protocol stack.

113
6.2.7 Ethernet errors
  • The following are the sources of Ethernet error
  • Collision or runt Simultaneous transmission
    occurring before slot time has elapsed
  • Late collision Simultaneous transmission
    occurring after slot time has elapsed
  • Jabber, long frame and range errors Excessively
    or illegally long transmission 
  • Short frame, collision fragment or runt
    Illegally short transmission
  • FCS error Corrupted transmission
  • Alignment error Insufficient or excessive
    number of bits transmitted
  • Range error Actual and reported number of
    octets in frame do not match
  • Ghost or jabber Unusually long Preamble or Jam
    event

114
6.2.9 Ethernet auto-negotiation
  • 10BASE-T required each station to transmit a link
    pulse about every 16 milliseconds, whenever the
    station was not engaged in transmitting a
    message. Auto-Negotiation adopted this signal and
    renamed it a Normal Link Pulse (NLP). When a
    series of NLPs are sent in a group for the
    purpose of Auto-Negotiation, the group is called
    a Fast Link Pulse (FLP) burst. Each FLP burst is
    sent at the same timing interval as an NLP, and
    is intended to allow older 10BASE-T devices to
    operate normally in the event they should receive
    an FLP burst.
  • Auto-Negotiation is accomplished by transmitting
    a burst of 10BASE-T Link Pulses from each of the
    two link partners. The burst communicates the
    capabilities of the transmitting station to its
    link partner.

115
Other
116
6.1.5 Layer 2 framing
  • Framing helps obtain essential information that
    could not, otherwise, be obtained with coded bit
    streams alone.
  • Which computers are communicating with one
    another
  • When communication between individual computers
    begins and when it terminates
  • Provides a method for detection of errors that
    occurred during the communication
  • Whose turn it is to "talk" in a computer
    "conversation"

117
6.1.5 Layer 2 framing
  • The frame format diagram shows different
    groupings of bits (fields) that perform other
    functions.
  • The names of the fields are as follows
  • Start frame field
  • Address field
  • Length / type field
  • Data field
  • Frame check sequence field 

118
6.1.5 Layer 2 framing
  • All frames contain naming information, such as
    the name of the source node (MAC address) and the
    name of the destination node (MAC address).
  • In some technologies, a length field specifies
    the exact length of a frame in bytes. Some frames
    have a type field, which specifies the Layer 3
    protocol making the sending request.
  • Data
  • The Frame Check Sequence (FCS) field contains a
    number that is calculated by the source node
    based on the data in the frame. This FCS is then
    added to the end of the frame that is being sent.
  • There are three primary ways to calculate the
    Frame Check Sequence number
  • Cyclic Redundancy Check (CRC) performs
    calculations on the data.
  • Two-dimensional parity adds an 8th bit that
    makes an 8 bit sequence have an odd or even
    number of binary 1s.
  • Internet checksum adds the values of all of the
    data bits to arrive at a sum.

119
6.2.4 Interframe spacing and backoff
  • The minimum spacing between two non-colliding
    frames is also called the interframe spacing.
  • The minimum spacing between two non-colliding
    frames is also called the interframe spacing.

120
6.2.5 Error handling
121
6.2.6 Types of collisions
  • Collisions typically take place when two or more
    Ethernet stations transmit simultaneously within
    a collision domain. A single collision is a
    collision that was detected while trying to
    transmit a frame, but on the next attempt the
    frame was transmitted successfully.
  • Three types of collisions are
  • Local - collision on coax cable (10BASE2 and
    10BASE5), the signal travels down the cable until
    it encounters a signal from the other station.
  • Remote - a frame that is less than the minimum
    length, has an invalid FCS checksum, but does not
    exhibit the local collision symptom of
    over-voltage or simultaneous RX/TX activity. This
    sort of collision usually results from collisions
    occurring on the far side of a repeated
    connection.
  • Late - Collisions occurring after the first 64
    octets. The most significant difference between
    late collisions and collisions occurring before
    the first 64 octets is that the Ethernet NIC will
    retransmit a normally collided frame
    automatically, but will not automatically
    retransmit a frame that was collided late.

122
6.2.8 FCS and beyond
  • A received frame that has a bad Frame Check
    Sequence, also referred to as a checksum or CRC
    error, differs from the original transmission by
    at least one bit. In an FCS error frame the
    header information is probably correct, but the
    checksum calculated by the receiving station does
    not match the checksum appended to the end of the
    frame by the sending station. The frame is then
    discarded.

123
6.2.10 Link establishment and full and half duplex
  • Link partners are allowed to skip offering
    configurations of which they are capable. This
    allows the network administrator to force ports
    to a selected speed and duplex setting, without
    disabling Auto-Negotiation. 
Write a Comment
User Comments (0)
About PowerShow.com