Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

100
 Medios Opticos

Transcript of Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 1/100

 Medios Opticos

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 2/100

. 2

Medios Opticos

• Explain the basics of fiber-optic cable.

• Describe how fibers can guide light for long distances.

• Describe multimode and single-mode fiber.

• Describe how fiber is installed.

• Describe the type of connectors and equipment used with fiber-optic

cable.• Explain how fiber is tested to ensure that it will function properly.

• Discuss safety issues dealing with fiber-optics.

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 3/100

. 3

El espectro electromagnético

• The light used in optical fiber networks is one type of electromagneticenergy.

• When an electric charge moves back and forth, or accelerates, a type

of energy called electromagnetic energy is produced.

• This energy in the form of waves can travel through a vacuum, the air,

and through some materials like glass.•  An important property of any energy wave is the wavelength.

• Radio, microwaves, radar, visible light, x-rays are all types of

electromagnetic energy.

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 4/100

. 4

El espectro electromagnético

• The wavelength of an electromagnetic wave is determined by howfrequently the electric charge that generates the wave moves back andforth.

• If the charge moves back and forth slowly, the wavelength it generatesis a long wavelength.

• Visualize the movement of the electric charge as like that of a stick in apool of water.

• If the stick is moved back and forth slowly, it will generate ripples in thewater with a long wavelength between the tops of the ripples.

• If the stick is moved back and forth more rapidly, the ripples will have ashorter wavelength.

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 5/100

. 5

El espectro electromagnético

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 6/100

. 6

El espectro electromagnético

• Wavelengths that are not visible to the human eye are used to transmit

data over optical fiber.

• These wavelengths are slightly longer than red light and are called  infrared light. 

• Infrared light is used in TV remote controls.

• These wavelengths were selected because they travel through optical

fiber better than other wavelengths.

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 7/100. 7

Modelo de rayo de luz

• When electromagnetic waves travel out from a source, they travel in straight lines.

• These straight lines pointing out from the source are called rays.

• Think of light rays as narrow beams of light like those produced by lasers.

• In the vacuum of empty space, light travels continuously in a straight line at300,000 kilometers per second .

• However, light travels at different, slower speeds through other materials like air,water, and glass.

• When a light ray called the incident ray, crosses the boundary from one material toanother, some of the light energy in the ray will be reflected back.

• That is why you can see yourself in window glass.

• The light that is reflected back is called the reflected ray.

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 8/100. 8

Modelo de rayo de luz

• The light energy in the incident ray that is not reflected will enter the

glass.

• refracted ray - The entering ray will be bent at an angle from its

original path.

• How much the incident light ray is bent depends on the angle at which

the incident ray strikes the surface of the glass and the different rates

of speed at which light travels through the two substances

• The optical density of the glass determines how much the rays of light

in the glass bends.

• Optical density refers to how much a light ray slows down when it

passes through a substance.

• The greater the optical density of a material, the more it slows light

down from its speed in a vacuum.

• The ratio of the speed of light in a material to the speed of light in a

vacuum is called the Index of Refraction.

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 9/100. 9

Reflexión

• When a ray of light (the incident ray) strikes the shiny surface of a flatpiece of glass, some of the light energy in the ray is reflected.

• The angle between the incident ray and a line perpendicular to thesurface of the glass at the point where the incident ray strikes the glass is called the angle of incidence.

• The angle at which a light ray strikes a reflective surface determinesthe angle that the ray will reflect off the surface.

Interactive Media Activity

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 10/100. 10

Refración

• When a light strikes the interface between two transparentmaterials, the light divides into two parts.

• Part of the light ray is reflected back into the firstsubstance, with the angle of reflection equaling the angleof incidence.

• The remaining energy in the light ray crosses the interfaceand enters into the second substance.

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 11/100. 11

Refración

• If the incident ray strikes the glass surface at an exact 90-degreeangle, the ray goes straight into the glass.

• The ray is not bent. However, if the incident ray is not at an exact 90-degree angle to the surface, then the transmitted ray that enters theglass is bent.

• The bending of the entering ray is called refraction.

• How much the ray is refracted depends on the index of refraction of thetwo transparent materials.

• Interactive Media Activity 

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 12/100. 12

Reflexión total interna

•  A light ray that is being turned on and off to send data (1s and 0s) into an

optical fiber must stay inside the fiber until it reaches the far end.

• The ray must not refract into the material wrapped around the outside of the

fiber.

• The refraction would cause the loss of part of the light energy of the ray.•  A design must be achieved for the fiber that will make the outside surface of

the fiber act like a mirror to the light ray moving through the fiber.

• If any light ray that tries to move out through the side of the fiber were reflected

back into the fiber at an angle that sends it towards the far end of the fiber, this

would be a good “pipe” or “wave guide” for the light waves. 

R fl ió t t l

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 13/100. 13

Reflexión total

Interna

• The laws of reflection and refraction illustrate how to design a fiber thatguides the light waves through the fiber with a minimum energy loss.

• The following two conditions must be met for the light rays in afiber to be reflected back into the fiber without any loss due torefraction:

 – The core of the optical fiber has to have a larger index of refraction(n) than the material that surrounds it. The material that surroundsthe core of the fiber is called the cladding.

 – The angle of incidence of the light ray is greater than the criticalangle for the core and its cladding.

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 14/100

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 15/100. 15

Cableado de Fibra Optica

• The core is the light transmission element at the center of the optical fiber. Allthe light signals travel through the core.

• Cladding is also made of silica but with a lower index of refraction than thecore. Light rays traveling through the fiber core reflect off this core-to-claddinginterface as they move through the fiber by total internal reflection.

•Surrounding the cladding is a buffer  material that is usually plastic. The buffermaterial helps shield the core and cladding from damage.

• The strength material surrounds the buffer, preventing the fiber cable frombeing stretched when installers pull it. The material used is often Kevlar , thesame material used to produce bulletproof vests.

• The outer jacket surrounds the cable to protect the fiber against abrasion,solvents, and other contaminants.

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 16/100. 16

Cableado de Fibra Optica

Higher bandwidth.

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 17/100. 17

Cableado de Fibra Optica

• If the diameter of the core of the fiber is large enough so that there are

many paths that light can take through the fiber, the fiber is called

“multimode” fiber.

• Single-mode fiber has a much smaller core that only allows light rays

to travel along one mode inside the fiber.

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 18/100. 18

Cableado de Fibra Optica

• Every fiber-optic cable used for networking consists of two glass fibers

encased in separate sheaths.

• One fiber carries transmitted data from device A to device B.

• The second fiber carries data from device B to device A.

• This provides a full-duplex communication link.

• Typically, these two fiber cables will be in a single outer jacket until they

reach the point at which connectors are attached.

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 19/100. 19

Cableado de Fibra Optica

• Warning: The laser light used with single-mode has a longerwavelength than can be seen.

• The laser is so strong that it can seriously damage eyes.• Never  look at the near end of a fiber that is connected to a device at

the far end.

• Never  look into the transmit port on a NIC, switch, or router.

• Remember to keep protective covers over the ends of fiber and

inserted into the fiber-optic ports of switches and routers.

Core - Cladding

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 20/100. 20

Dispositivos Transmisores

• The transmitter converts the electronic signals into their equivalent lightpulses.

• There are two types of light sources used to encode and transmit the

data through the cable: –  A light emitting diode (LED) producing infrared light.

 – Light amplification by stimulated emission radiation (LASER) a lightsource producing a thin beam of intense infrared light usually withwavelengths of 1310nm or 1550 nm.

 – Lasers are used with single-mode fiber over the longer distancesinvolved in WANs or campus backbones.

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 21/100. 21

Dispositivos Receptores

• The receiver functions something like the photoelectric cell in a solar poweredcalculator.

• When light strikes the receiver, it produces electricity.

• The semiconductor devices that are usually used as receivers with fiber-optic

links are called p-intrinsic-n diodes (PIN photodiodes). • When struck by a pulse of light at the proper wavelength, the PIN photodiode

quickly produces an electric current of the proper voltage for the network. 

• It instantly stops producing the voltage when no light strikes the PINphotodiode.

• This generates the voltage changes that represent the data 1s and 0s on a

copper cable.

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 22/100. 22

Conetores ST y SC

• The type of connector most commonly used with

multimode fiber is the Subscriber Connector (SCconnector).

• On single-mode fiber, the Straight Tip (ST) connector is

frequently used.

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 23/100. 23

Panel de conexiones de Fibra Optica

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 24/100

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 25/100

. 25

Señal y ruido en Fibra Optica

• Fiber-optic cable is not affected by the sources of external noise thatcause problems on copper media because external light cannot enterthe fiber except at the transmitter end.

•  Although fiber is the best of all the transmission media at carrying large

amounts of data over long distances, fiber is not without problems.When light travels through fiber, some of the light energy is lost.

• The most important factor is scattering.

 – The scattering of light in a fiber is caused by microscopic non-uniformity (distortions) in the fiber that reflects and scatters some ofthe light energy.

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 26/100

. 26

Señal y ruido en Fibra Optica

• Absorption is another cause of light energy loss. – When a light ray strikes some types of chemical impurities in a

fiber, the impurities absorb part of the energy.

 – This light energy is converted to a small amount of heat energy.

 –  Absorption makes the light signal a little dimmer.

•  Another factor that causes attenuation of the light signal ismanufacturing irregularities or roughness in the core-to-claddingboundary.

 –  Any microscopic imperfections in the thickness or symmetry of thefiber will cut down on total internal reflection and the cladding will

absorb some light energy.

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 27/100

. 27

Señal y ruido en Fibra Optica

• Dispersion of a light flash also limits transmission distances on a fiber.

 – Dispersion is the technical term for the spreading of pulses of light

as they travel down the fiber

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 28/100

Medios Wireless

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 29/100

. 29

Medios Inalambricos

• Wireless LAN organizations and standards

• Wireless devices and topologies

• How wireless LANs communicate

•  Authentication and association

• The radio wave and microwave spectrums• Signals and noise on a WLANs

• Wireless security

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 30/100

. 30

Estandares Wireless LAN

• IEEE is the prime issuer of standards for wireless networks.

• The standards have been created within the framework of the regulationscreated by the Federal Communications Commission (FCC).

• 802.11 standard is Direct Sequence Spread Spectrum (DSSS).

 – DSSS applies to wireless devices operating within a 1 to 2 Mbpsrange.

• 802.11b may also be called Wi-Fi™ or high-speed wireless and refers toDSSS systems that operate at 1, 2, 5.5 and 11 Mbps.

 – The majority of 802.11b devices still fail to match the 11 Mbpsthroughput and generally function in the 2 to 4 Mbps range. 

• 802.11a covers WLAN devices operating in the 5 GHZ transmissionband.

 – 802.11a is capable of supplying data throughput of 54 Mbps and withproprietary technology known as "rate doubling " has achieved 108Mbps.

 – In production networks, a more standard rating is 20-26 Mbps.

• 802.11g provides the same throughout as 802.11a but with backwards

compatibility for 802.11b devices.

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 31/100

. 31

Dipositivos Wireless y Topologías

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 32/100

. 32

Dipositivos Wireless y Topologías

• Access point (AP) is commonly installed to act as a central hub forthe WLAN "infrastructure mode".

• The AP is hard wired to the cabled LAN to provide Internet access and

connectivity to the wired network. APs are equipped with antennae andprovide wireless connectivity over a specified area referred to as a cell.

• Depending on the structural composition of the location in which the AP is installed and the size and gain of the antennae, the size of thecell could greatly vary.

• Most commonly, the range will be from 91.44 to 152.4 meters (300 to500 feet).

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 33/100

. 33

Dipositivos Wireless y Topologías

• Overlap, on multiple AP networks, is critical to allow for movement of

devices within the WLAN.

•  Although not addressed in the IEEE standards, a 20-30% overlap isdesirable.

• This rate of overlap will permit roaming between cells, allowing for the

disconnect and reconnect activity to occur seamlessly without service

interruption.

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 34/100

. 34

Dipositivos Wireless y Topologías

• When a client is activated within the WLAN, it will start "listening" for a

compatible device with which to "associate".• This is referred to as "scanning" and may be active or passive.

•  Active scanning causes a probe request to be sent from the wirelessnode seeking to join the network.

• The probe request will contain the Service Set Identifier (SSID) of the

network it wishes to join.• When an AP with the same SSID is found, the AP will issue a proberesponse.

• The authentication and association steps are completed.

• From webpedia.com

 – Short for Service Set Identifier, a 32-character unique identifier attached tothe header of packets sent over a WLAN that acts as a password when amobile device tries to connect to the BSS. The SSID differentiates oneWLAN from another, so all access points and all devices attempting toconnect to a specific WLAN must use the same SSID. A device will not bepermitted to join the BSS unless it can provide the unique SSID. Becausean SSID can be sniffed in plain text from a packet it does not supply any

security to the network.

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 35/100

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 36/100

. 36

Configurando el SSID en el Access Point

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 37/100

. 37

Como se comunican las Wireless LAN

•  After establishing connectivity to the WLAN, a node will pass frames in

the same manner as on any other 802.x network.• WLANs do not use a standard 802.3 frame.

• Therefore, using the term wireless Ethernet is misleading.

• There are three types of frames: control, management, and data.

• Only the data frame type is similar to 802.3 frames.

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 38/100

. 38

Como se comunican las Wireless LAN

• Since radio frequency (RF) is a shared medium, collisions can occur

 just as they do on wired shared medium.

• The major difference is that there is no method by which the sourcenode is able to detect that a collision occurred.

• For that reason WLANs use Carrier Sense Multiple Access/Collision

 Avoidance (CSMA/CA).

• This is somewhat like Ethernet CSMA/CD.

C

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 39/100

. 39

Como se comunican las Wireless LAN

• When a source node sends a frame, the receiving node returns a

 positive acknowledgment (ACK). • This can cause consumption of 50% of the available bandwidth.

• This overhead when combined with the collision avoidance protocol

overhead reduces the actual data throughput to a maximum of 5.0 to

5.5 Mbps on an 802.11b wireless LAN rated at 11 Mbps.

• Performance of the network will also be affected by signal strength anddegradation in signal quality due to distance or interference.

•  As the signal becomes weaker, Adaptive Rate Selection (ARS) may be

invoked.

• The transmitting unit will drop the data rate from 11 Mbps to 5.5 Mbps,

from 5.5 Mbps to 2 Mbps or 2 Mbps to 1 Mbps.

A i ió A i ió

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 40/100

. 40

Autenticación y Asociación

• Unauthenticated and unassociated

 – The node is disconnected from the network and not

associated to an access point.•  Authenticated and unassociated

 – The node has been authenticated on the network but

has not yet associated with the access point.

•  Authenticated and associated – The node is connected to the network and able to

transmit and receive data through the access point.

Mét d d A t ti ió

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 41/100

. 41

Métodos de Autenticación

• IEEE 802.11 lists two types of authentication processes.

• The first authentication process is the open system. – This is an open connectivity standard in which only the SSID must

match.

 – This may be used in a secure or non-secure environment althoughthe ability of low level network „sniffers‟ to discover the SSID of theWLAN is high.

• The second process is the shared key.

 – This process requires the use of Wireless Equivalency Protocol(WEP) encryption.

 – WEP is a fairly simple algorithm using 64 and 128 bit keys.

 – The AP is configured with an encrypted key and nodes attemptingto access the network through the AP must have a matching key.

 – Statically assigned WEP keys provide a higher level of securitythan the open system but are def in i tely not hack proo f .

• The problem of unauthorized entry into WLANs is being addressed bya number of new security solution technologies.

L d d di l i d

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 42/100

. 42

Las ondas de radio y el espectro microondas

• Computers send data signals electronically.

• Radio transmitters convert these electrical signals to radio waves.

• Changing electric currents in the antenna of a transmitter generates theradio waves.

• However, radio waves attenuate as they move out from the transmittingantenna.

• In a WLAN, a radio signal measured at a distance of just 10 meters (30feet) from the transmitting antenna would be only 1/100th of its original

strength.

M d l ió

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 43/100

. 43

Modulación

• The process of altering the carrier signal that will enter the antenna of thetransmitter is called modulation.

• There are three basic ways in which a radio carrier signal can be modulated.

• For example, Amplitude Modulated (AM) radio stations modulate the height(amplitude) of the carrier signal .

• Frequency Modulated (FM) radio stations modulate the frequency of thecarrier signal  as determined by the electrical signal from the microphone.

• In WLANs, a third type of modulation called phase modulation is used tosuperimpose the data signal onto the carrier signal  that is broadcast by the

transmitter.

S ñ l R id WLAN

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 44/100

. 44

Señal y Ruido en una WLAN

• When using RF technology many kinds of interference must be takeninto consideration.

• In homes and offices, a device that is often overlooked as causinginterference is the standard microwave oven.

• Leakage from a microwave of as little as one watt into the RF spectrum

can cause major network disruption.• Wireless phones operating in the 2.4GHZ spectrum can also causenetwork disorder.

• Generally the RF signal will not be affected by even the most extremeweather conditions. However, fog or very high moisture conditions canand do affect wireless networks. Lightning can also charge the

atmosphere and alter the path of a transmitted signal.

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 45/100

Capitulo 4 – Fundamentos deEthernet

Li it i C 1

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 46/100

. 46

Limitaciones Capa 1

• Layer 1 involves media, signals, bit streams that travel on media,

components that put signals on media, and various topologies.• Layer 1 cannot communicate with the upper-level layers; Layer 2 does

that with Logica l L ink Contro l (LLC) . 

• Layer 1 cannot name or identify computers; Layer 2 uses an

addressing  (or naming) process.

• Layer 1 can only describe streams of bits; Layer 2 uses f raming  toorganize or group the bits.

• Layer 1 cannot decide which computer will transmit binary data from a

group that are all trying to transmit at the same time. Layer 2 uses a

system called Media Access Control (MAC). 

S b d l d d t

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 47/100

. 47

LLC (Logical Link Control)

MAC (Media Access Control)

IEEE 802 Extension to the

OSI Model

Subcapas de enlace de datos

The Institute of Electrical and Electronic Engineers (IEEE) is aprofessional organization that defines network standards.

IEEE 802.3 and IEEE 802.5 are the predominant and best known LAN

standards. The IEEE   divides the OSI data link layer into two separate sublayers.

Recognized IEEE sublayers are:

Media Access Control (MAC) (transitions down to media)

Logical Link Control (LLC) (transitions up to the network layer)

LLC S b C t l d E l Ló i

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 48/100

. 48

LLC – Subcapa Control de Enlace Lógico

Logical link sublayer allows part of the data link layer to function

independently from existing technologies.

Provides versatility in services to network layer protocols that are above

it, while communicating effectively with the variety of technologies below

it.

The LLC, as a sublayer, participates in the encapsulation process.

It adds two addressing components of the 802.2 specification - the

Destination Service Access Point (DSAP) and the Source Service

 Access Point (SSAP). (Later)

LLC Subcapa Control de Enlace Lógico

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 49/100

. 49

LLC – Subcapa Control de Enlace Lógico

Defined in the IEEE 802.2 specification

Defines a number of fields in the data link layer frames that enable

multiple higher-layer protocols to share a single physical data link.

The LLC acts as a managing buffer between the “executive” upperlayers and the “shipping department” lower layers. 

MAC Subcapa Control de Acceso al Medio

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 50/100

. 50

MAC – Subcapa Control de Acceso al Medio

The Media Access Control (MAC) sublayer deals with the protocols that

a host follows in order to access the physical media.

Responsible for the actual framing

builds the 1s and 0s to hand off to the physical layer. Responsible for media access: (later)

Contention

Token Passing

Polling 

802 2 LLC

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 51/100

. 51

802.2 LLC

IPX IPAPPLE-

TALK

LLC

Layer 3

Layer 2 - LLC

MAC &Layer 1 Ethernet TokenRing

FDDI* *

**

* Legacy technologies

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 52/100

Ethernet vs IEEE 802 3

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 53/100

. 53

Ethernet vs IEEE 802.3

• Most of the time, the term “Ethernet” is used to mean IEEE

802.3

• For the most part, Ethernet and IEEE 802.3 are used

interchangeably, even though they are not really the same

thing.

• We will discuss this more later.

La dirección MAC

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 54/100

. 54

La dirección MAC

• MAC addresses are:

 – 48 bits in length

 – Expressed as 12 hexadecimal digits.

 – The first 6 hexadecimal digits, which are administered by theIEEE, identify the manufacturer or vendor and thus comprise theOrganizational Unique Identif ier (OUI) . 

 – The remaining 6 hexadecimal digits comprise the interface serial

number , or another value administered by the specific vendor.

• MAC addresses are sometimes referred to as burned-in addresses (BIAs) because they are burned into read-only memory (ROM) and are copied intorandom-access memory (RAM) when the NIC initializes

Decimal Binary Hex

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 55/100

. 55

Decimal, Binary, Hex

Dec Bin Hex Dec Bin Hex

0 = 0000 = 0 8 = 1000 = 8

1 = 0001 = 1 9 = 1001 = 9

2 = 0010 = 2 10 = 1010 = A3 = 0011 = 3 11 = 1011 = B

4 = 0100 = 4 12 = 1100 = C

5 = 0101 = 5 13 = 1101 = D6 = 0110 = 6 14 = 1110 = E

7 = 0111 = 7 15 = 1111 = F

Computadoras sin nombre

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 56/100

. 56

Computadoras sin nombre

Formato de dirección MAC

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 57/100

. 57

Formato de dirección MAC

OUI  unique

•  An Intel MAC address: 00-20-E0-6B-17-62• 0000 0000 - 0010 0000 – 1110 0000 - 0110 1011 – 0001 0111 – 0110 0010

• IEEE OUI FAQs: http://standards.ieee.org/faqs/OUI.html

Dec Bin Hex Dec Bin Hex

0 = 0000 = 0 8 = 1000 = 8

1 = 0001 = 1 9 = 1001 = 9

2 = 0010 = 2 10 = 1010 = A3 = 0011 = 3 11 = 1011 = B

4 = 0100 = 4 12 = 1100 = C

5 = 0101 = 5 13 = 1101 = D

6 = 0110 = 6 14 = 1110 = E

7 = 0111 = 7 15 = 1111 = F

Las Direcciones MAC son planas

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 58/100

. 58

Las Direcciones MAC son planas

• MAC addresses provide a way for computers to identify themselves.

• They give hosts a permanent, unique name.

• The number of possible MAC addresses is 16^12 (or over 2 trillion!).

• MAC addresses do have one major disadvantage:

 – They have no structure, and are considered flat address spaces.

 – Like using just a name when sending a letter instead of a structured

address.

Ejemplo de encapsulamiento de datos

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 59/100

. 59

Application

Header + data

Ejemplo de encapsulamiento de datos

Let us focus on the Layer 2, Data Link, Ethernet Frame fornow.

010010100100100100111010010001101000… 

 Application Layer

Layer 4: Transport Layer

Layer 3: Network Layer

Layer 2:Data LinkLayer

Layer 1: PhysicalLayer

Comunicaciones de igual a igual

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 60/100

. 60

Comunicaciones de igual a igual

•  Again, we are dealing with just the Data Link (and

Physical) layers.

Routers

Switches

Repeaters,Hubs, Cables,

etc.

HostsHosts

Routers

Switches

Repeaters,Hubs,

Cables, etc.

Trama de Enlace de Datos Genérica

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 61/100

. 61

Trama de Enlace de Datos Genérica

• A message is “framed” at layer two. 

• Framing provides order, or structure, to the bitstream.

Tramas ethernet y las direcciones MAC

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 62/100

. 62

Tramas ethernet y las direcciones MAC

• DA = Destination MAC Address

• SA = Source MAC Address

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 63/100

. 63

• Let‟s bring the following together: 

 – Ethernet Frames and MAC Addresses

 – Sending and receiving Ethernet frames on a

bus

 – CSMA/CD – Sending and receiving Ethernet frames via a

hub

 – Sending and receiving Ethernet frames via aswitch

 – 5-4-3 rule

Sending and receiving Ethernet frames on a bus

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 64/100

. 64

Sending and receiving Ethernet frames on a bus

• When an Ethernet frame is sent out on the “bus” all

devices on the bus receive it.

• What do they do with it?

1111 2222 3333 nnnn  Abbreviated

MAC Addresses

11113333

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 65/100

Sending and receiving Ethernet frames on a bus

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 66/100

. 66

Sending and receiving Ethernet frames on a bus

• So, what happens when multiple computers try to transmit

at the same time?

1111 2222 3333 nnnn  Abbreviated

MAC Addresses

Sending and receiving Ethernet frames on a bus

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 67/100

. 67

Sending and receiving Ethernet frames on a bus

Collision!

1111 2222 3333 nnnn  Abbreviated

MAC Addresses

 X

Access Methods

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 68/100

. 68

Two common types of access methods for LANs include

• Non-Deterministic: Contention methods (Ethernet, IEEE 802.3)

 – Only one signal can be on a network segment at

one time.

 – Collisions are a normal occurrence on an

Ethernet/802.3 LAN

• Deterministic: Token Passing (Token Ring)

 –  more later

Access Methods

CSMA/CD (Carrier Sense Multiple Access

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 69/100

. 69

with Collision Detection) 

CSMA/CD Common contention method used with Ethernet

and IEEE 802.3• “Let everyone have access whenever they want and we

will work it out somehow.” 

CSMA/CD and Collisions

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 70/100

. 70

CSMA/CD (Carrier Sense Multiple Access with Collision Detection)

• Listens to the network‟s shared media to see if any other users on“on the line” by trying to sense a neutral electrical signal or carrier. 

• If no transmission is sensed, then multiple access allows anyoneonto the media without any further permission required.

• If two PCs detect a neutral signal and access the shared media at the

exact same time, a col l is ion  occurs and is detected .• The PCs sense the collision by being unable to deliver the entireframe (coming soon) onto the network. (This is why there areminimum frame lengths along with cable distance and speedlimitations. This includes the 5-4-3 rule.)

• When a collision occurs, a jamming signal is sent out by the first PC

to detect the collision.• Using either a priority or random backoff scheme, the PCs wait

certain amount of time before retransmitting.

• If collisions continue to occur, the PCs random interval is doubled,lessening the chances of a collision. 

CSMA/CD and Collisions

CSMA/CD and Collisions

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 71/100

. 71

 And as we said,

• When information (frame) is transmitted, every PC/NIC on theshared media copies part of the transmitted frame to see if thedestination address matches the address of the NIC.

• If there is a match, the rest of the frame is copied

• If there is NOT a match the rest of the frame is ignored.

1111 2222 3333 nnnn  AbbreviatedMAC

 Addresses

11113333

Nope NopeHey, that’sme!

Notice thelocation ofthe DA!

CSMA/CD and Collisions

Sending and receiving Ethernet frames via a

h b

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 72/100

. 72

hub

• So, what does a hub do

when it receives

information?• Remember, a hub is

nothing more than a

multiport repeater.

1111 2222

3333 4444

5555

?

11113333

Sending and receiving Ethernet frames via a hub

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 73/100

. 73

Sending and receiving Ethernet frames via a hub

Hub or  

Sending and receiving Ethernet frames via a

h b

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 74/100

. 74

hub

• The hub will flood it out allports except for the incomingport.

• Hub is a layer 1 device.•  A hub does NOT look at layer

2 addresses, so it is fast intransmitting data.

• Disadvantage with hubs: Ahub or series of hubs is a

single collision domain.

•  A collision will occur if any twoor more devices transmit atthe same time within thecollision domain.

• More on this later.

1111 2222

3333 4444

5555

11113333

Nope

Nope

Nope

For me!

Sending and receiving Ethernet frames via a hub

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 75/100

. 75

Sending and receiving Ethernet frames via a hub

•  Another disadvantage withhubs is that is take upunnecessary bandwidth on

other links.

1111 2222

3333 4444

5555

11112222

Nope Nope

Nope

For me!

Wasted

bandwidth

Sending and receiving Ethernet frames via a switch

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 76/100

. 76

g g

Sending and receiving Ethernet frames via a switch

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 77/100

. 77

g g

Source Address Table

Port Source MAC Add. Port Source MAC Add.

• Switches are also known aslearning bridges or learningswitches.

•  A switch has a source address

table in cache (RAM) where itstores source MAC addressafter it learns about them.

•  A switch receives an Ethernetframe it searches the sourceaddress table for theDestination MAC address.

• If it finds a match, it filters theframe by only sending it outthat port.

• If there is not a match if floods 

it out all ports.

switch

1111

2222

3333

4444

 AbbreviatedMACaddresses

11113333

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 78/100

Destination Address in table, Filter

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 79/100

. 79

,

Source Address Table

Port Source MAC Add. Port Source MAC Add.

1 1111 6 3333

• Most communications involvesome sort of client-serverrelationship or exchange ofinformation. (You will

understand this more as youlearn about TCP/IP.)

• Now 3333 sends data back to1111.

• The switch sees if it has the SAstored.

• It does NOT so it adds it. (Thiswill help next time 1111 sendsto 3333.)

• Next, it checks the DA and inour case it can filter  the frame,

by sending it only out port 1.

switch

1111

2222

3333

4444

 AbbreviatedMACaddresses

33331111

Destination Address in table, Filter

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 80/100

. 80

,

Source Address Table

Port Source MAC Add. Port Source MAC Add.

1 1111 6 3333

• Now, because both MACaddresses are in the switch‟s table,any information exchangedbetween 1111 and 3333 can besent (filtered) out the appropriateport.

• What happens when two devicessend to same destination?

• What if this was a hub?

• Where is (are) the collisiondomain(s) in this example?

switch

1111

2222

3333

4444

 AbbreviatedMACaddresses

11113333

33331111

No Collisions in Switch, Buffering

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 81/100

. 81

, g

Source Address Table

Port Source MAC Add. Port Source MAC Add.

1 1111 6 33339 4444 

• Unlike a hub, a collision doesNOT occur, which would cause

the two PCs to have to

retransmit the frames.

• Instead the switch buffers the

frames and sends them out port#6 one at a time.

• The sending PCs have no idea

that their was another PC

wanting to send to the same

destination.

switch

1111

2222

3333

4444

 AbbreviatedMACaddresses

11113333

44443333

Collision Domains

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 82/100

. 82

Source Address Table

Port Source MAC Add. Port Source MAC Add.

1 1111 6 33339 4444 

• When there is only one deviceon a switch port, the collision

domain is only between the PC

and the switch. (Cisco

curriculum is inaccurate on this

point.)• With a full-duplex PC and

switch port, there will be no

collision, since the devices and

the medium can send and

receive at the same time.

switch

1111

2222

3333

4444

 AbbreviatedMACaddresses

11113333

44443333

Collision Domains

Other Information

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 83/100

. 83

Source Address Table

Port Source MAC Add. Port Source MAC Add.

1 1111 6 33339 4444  • How long are addresses kept in the

Source Address Table?

 – 5 minutes is common on most

vendor switches.

• How do computers know the

Destination MAC address?

•  ARP Caches and ARP

Requests (later)

• How many addresses can be kept

in the table?

 – Depends on the size of thecache, but 1,024 addresses is

common.

• What about Layer 2 broadcasts?

 – Layer 2 broadcasts (DA = all

1‟s) is flooded out all ports. 

switch

1111

2222

3333

4444

 AbbreviatedMACaddresses

Side Note - Transparent Bridging

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 84/100

. 84

p g g

• Transparent bridging (normal switching process) is defined in IEEE

802.1d describing the five bridging processes of:

 – learning

 – flooding filtering

 – forwarding

 – aging

• These will be discussed further in STP (Spanning Tree Protocol)

Transparent Bridge Process - Jeff Doyle

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 85/100

. 85

p g y

Receive Packet

Learn source address or refresh aging timer

Is the destination a broadcast, multicast or unknown unicast?

 Are the source and destination on the same interface?

Forward unicast to correct port

Flood Packet

Filter Packet

Yes

Yes

No

No

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 86/100

5-4-3 Rule – Webopedia.com

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 87/100

. 87

• Ethernet and IEEE 802.3 implement a rule, known as the 5-4-3 rule, for thenumber of repeaters and segments on shared access Ethernet backbones in a

tree topology. The 5-4-3 rule divides the network into two types of physicalsegments: populated (user) segments, and unpopulated (link) segments. Usersegments have users' systems connected to them. Link segments are used toconnect the network's repeaters together. The rule mandates that between anytwo nodes on the network, there can only be a maximum of five segments,connected through four  repeaters, or concentrators, and only three of the five

segments may contain user connections.• The Ethernet protocol requires that a signal sent out over the LAN reach everypart of the network within a specified length of time. The 5-4-3 rule ensuresthis. Each repeater that a signal goes through adds a small amount of time tothe process, so the rule is designed to minimize transmission times of thesignals.

• The 5-4-3 rule -- which was created when Ethernet, 10Base5, and 10Base2were the only types of Ethernet network available -- only applies to shared-access Ethernet backbones. A switched Ethernet network should be exemptfrom the 5-4-3 rule because each switch has a buffer to temporarily store dataand all nodes can access a switched Ethernet LAN simultaneously.

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 88/100

. 88

Now, back to our regular scheduled

curriculum.

Generic Data Link Frame Format

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 89/100

. 89

Preamble or Start Field

• When computers are connected to a physical medium, there must be away they can grab the attention of other computers to broadcast themessage, "Here comes a frame!"

• Various technologies have different ways of doing this process, but allframes, regardless of technology, have a beginning signaling sequenceof bytes.

• Depending up frame format: Preamble = 7 bytes, Start or Start ofFrame Delimiter (SFD) = 1 byte

Generic Data Link Frame Format

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 90/100

. 90

Address Field

• We saw how IEEE 802.3 uses Destination and Source Addresses.

• By the way: Any idea how a serial data link frame is addressed?

 – Unicast address – Single device – Broadcast address – All devices

 – Multicast address – Specific group of devices

Generic Data Link Frame Format

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 91/100

. 91

Type Field

• Usually information indicating the layer 3 protocols in the data field, I.e.

IP Packet.

• Type field values of particular note for IEEE 802.3 frames include: – 0x0600 XNS (Xerox)

 – 0x0800 IP (the Internet protocol)

 – 0x8137 Novell NetWare packet formatted for Ethernet II

 – 0x6003 DECNET

“Ethernet” Frame Formats 

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 92/100

. 92802.2802.3

802.3

Length Field

• In some frame formats such as 802.3, there is a length field which specifies theexact length of a frame.

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 93/100

. 93

• IEEE 802.3 specification limits the data portion to a maximum of 1500 bytes.

• Designed to hold a Layer 3 IP packet.• When IEEE created 802.2, it saw the need for a protocol TYPE field that

identified what was inside the “data” field. 

• IEEE called its 1 byte type field DSAP (Destination Service Access Point).

• Turned out that 1 byte was not long enough to handle all the different numberof protocols.

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 94/100

. 94

• To accommodate more protocols IEEE added the SNAP (Subnetwork Access

Protocol) header.

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 95/100

. 95

• The fields of various Ethernet framing that are used for identifying the type of

data contained in a frame: – Ethernet II or DIX (DEC, Intel, Xerox) – Most common

 – IEEE Ethernet (802.3)

 – IEEE 802.3 with SNAP header

Generic Data Link Frame Format

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 96/100

. 96

Data Field

• Included along with this data, you must also send a few other bytes.

• They are called padding bytes, and are sometimes added so that the

frames have a minimum length for timing purposes.

• LLC bytes are also included with the data field in the IEEE standard

frames. (later)

Data Encapsulation Example

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 97/100

. 97

Application

Header + data

010010100100100100111010010001101000… 

 Application Layer

Layer 4: Transport Layer

Layer 3: Network Layer

Layer 2:NetworkLayer

Layer 1: PhysicalLayer

Generic Data Link Frame Format

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 98/100

. 98

FCS

• Used to insure that the data has arrived without corruption.

• More efficient than sending the data twice and comparing the results.

• Necessary to prevent errors.

Three Kinds of FCS

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 99/100

. 99

• Cyclic redundancy check (CRC)

 – performs polynomial calculations on the data

• Two-dimensional parity

 – adds an 8th bit that makes an 8-bit sequence have an odd or even

number of binary 1s

• Internet checksum

 – adds the numbers to determine a number  

Generic Data Link Frame Format

8/13/2019 Sistemas de Comunicaciones Cap 01-06-2007 1 (1)

http://slidepdf.com/reader/full/sistemas-de-comunicaciones-cap-01-06-2007-1-1 100/100

Stop Field (Other data link frame formats)

• The computer that transmits data must get the attention of other

devices, in order to start a frame, and then claim it again, to end the

frame.

• The length field implies the end, and the frame is considered endedafter the FCS.

• Sometimes there is a formal byte sequence referred to as an end-

f d li it