Physical Layer Networking Guide
Physical Layer Networking Guide
4.1 PURPOSE OF THE PHYSICAL LAYER • Physical Layer Standards address three
THE PHYSICAL CONNECTION functional areas:
• Before any network communications can ➢ Physical Components
occur, a physical connection to a local ➢ Encoding
network must be established. ➢ Signaling
• This connection could be wired or wireless, • The Physical Components are the hardware
depending on the setup of the network. devices, media, and other connectors that
• This generally applies whether you are transmit the signals that represent the bits.
considering a corporate office or a home. ➢ Hardware components like NICs,
• A Network Interface Card (NIC) connects a interfaces and connectors, cable
device to the network. materials, and cable designs are all
• Some devices may have just one NIC, while specified in standards associated with
others may have multiple NICs (Wired and/or the physical layer.
Wireless, for example). ENCODING
• Not all physical connections offer the same • Encoding converts the stream of bits into a
level of performance. format recognizable by the next device in the
• Transports bits across the network media network path.
• Accepts a complete frame from the Data Link • This ‘coding’ provides predictable patterns
Layer and encodes it as a series of signals that that can be recognized by the next device.
are transmitted to the local media • Examples of encoding methods include
• This is the last step in the encapsulation Manchester (shown in the figure), 4B/5B, and
process. 8B/10B.
• The next device in the path to the destination
receives the bits and re-encapsulates the
frame, then decides what to do with it.
SIGNALING
• The signaling method is how the bit values, “1”
4.2 PHYSICAL LAYER CHARACTERISTICS
and “0” are represented on the physical
PHYSICAL LAYER STANDARDS
medium.
• The method of signaling will vary based on the
type of medium being used.
BANDWIDTH TERMINOLOGY
• Latency
➢ Amount of time, including delays, for
data to travel from one given point to
another UNSHIELDED TWISTED PAIR (UTP)
• Throughput
➢ The measure of the transfer of bits
across the media over a given period of
time
• Goodput
➢ The measure of usable data
transferred over a given period of time
➢ Goodput = Throughput - traffic
overhead
• UTP is the most common networking media. • There are different types of connectors used
• Terminated with RJ-45 connectors with coax cable.
• Interconnects hosts with intermediary • Commonly used in the following situations:
network devices. ➢ Wireless installations - attach
• Key Characteristics of UTP antennas to wireless devices
1. The outer jacket protects the copper ➢ Cable internet installations
wires from physical damage. - customer premises wiring
2. Twisted pairs protect the signal from
interference.
3. Color-coded plastic insulation
electrically isolates the wires from
each other and identifies each pair.
SHIELDED TWISTED PAIR (STP)
IPv4 ADDRESSES
• Routers and computers only understand
binary, while humans work in decimal. It is
CONVERT BINARY TO DECIMAL important for you to gain a thorough
understanding of these two numbering
systems and how they are used in networking
5.2 HEXADECIMAL NUMBER SYSTEM ➢ Convert the decimal number to 8-bi
HEXADECIMAL AND IPV6 ADDRESSES binary strings.
• To understand IPv6 addresses, you must be ➢ Divide the binary strings in groups of
able to convert hexadecimal to decimal and four starting from the rightmost
vice versa. position.
• Hexadecimal is a base sixteen numbering ➢ Convert each four binary numbers into
system, using the digits 0 through 9 and letters their equivalent hexadecimal digit.
A to F. • For example, 168 converted into hex using the
• It is easier to express a value as a single three-steps process.
hexadecimal digit than as four binary bit. ➢ 168 in binary is 10101000.
• Hexadecimal is used to represent IPv6 ➢ 10101000 in two groups of four binary
addresses and MAC addresses. digits is 1010 and 1000.
➢ 1010 is hex A and 1000 is hex 8, so 168
is A8 in hexadecimal.
HEXADECIMAL TO DECIMAL CONVERSIONS
• Follow the steps listed to convert hexadecimal
numbers to decimal values:
➢ Convert the hexadecimal number to 4-
bit binary strings.
➢ Create 8-bit binary grouping starting
from the rightmost position.
Convert each 8-bit binary grouping
into their equivalent decimal digit.
• For example, D2 converted into decimal using
HEXADECIMAL AND IPV6 ADDRESSES (CONT.)
the three-step process:
• IPv6 addresses are 128 bits in length. Every 4
➢ D2 in 4-bit binary strings is 1101 and
bits is represented by a single hexadecimal
0010.
digit. That makes the IPv6 address a total of 32
➢ 1101 and 0010 is 11010010 in an 8-bit
hexadecimal values.
grouping.
• The figure shows the preferred method of
➢ 11010010 in binary is equivalent to
writing out an IPv6 address, with each X
210 in decimal, so D2 is 210 is decimal
representing four hexadecimal values.
5.3 MODULE PRACTICE AND QUIZ
• Each four hexadecimal character group is WHAT DID I LEARN IN THIS MODULE?
referred to as a hextet.
• Binary is a base two numbering system that
consists of the numbers 0 and 1, called bits.
• Decimal is a base ten numbering system that
consists of the numbers 0 through 9.
• Binary is what hosts, servers, and networking
equipment uses to identify each other.
• Hexadecimal is a base sixteen numbering
system that consists of the numbers 0 through
9 and the letters A to F.
• Hexadecimal is used to represent IPv6
addresses and MAC addresses.
• IPv6 addresses are 128 bits long, and every 4
bits is represented by a hexadecimal digit for a
DECIMAL TO HEXADECIMAL CONVERSIONS total of 32 hexadecimal digits.
• Follow the steps listed to convert decimal
numbers to hexadecimal values:
• To convert hexadecimal to decimal, you must
first convert the hexadecimal to binary, then
convert the binary to decimal.
• To convert decimal to hexadecimal, you must
first convert the decimal to binary and then the
binary to hexadecimal.
MODULE 6: DATA LINK LAYER PROVIDING ACCESS TO MEDIA
6.1 PURPOSE OF THE DATA LINK LAYER • Packets exchanged between nodes may
THE DATA LINK LAYER experience numerous data link layers and
1. The Data Link Layer is responsible for media transitions.
communications between end-device • At each hop along the path, a router performs
network interface cards or end to end delivery. four basic Layer 2 functions:
2. It allows upper layer protocols to access the 1. Accepts a frame from the network
physical layer and media and encapsulates medium.
Layer 3 packets (IPv4 and IPv6) into Layer 2 2. De-encapsulates the frame to expose the
Frames. encapsulated packet.
3. It also performs error detection and rejects 3. Re-encapsulates the packets into a new
corrupts frames. frame.
4. Forwards the new frame on the medium of
the next network segment.
DATA LINK LAYER STANDARDS
• Data link layer protocols are defined by
engineering organizations:
➢ Institute for Electrical and Electronic
Engineers (IEEE).
➢ International Telecommunications
Union (ITU).
➢ International Organizations for
IEEE 802 LAN/MAN DATA LINK SUBLAYERS Standardization (ISO).
• IEEE 802 LAN/MAN standards are specific to ➢ American National Standards Institute
the type of network (Ethernet, WLAN, WPAN, (ANSI).
etc.) 6.2 TOPOLOGIES
• The Data Link Layer consists of two sublayers. PHYSICAL AND LOGICAL TOPOLOGIES
Logical Link Control (LLC) and Media Access • The topology of a network is the arrangement
Control (MAC). and relationship of the network devices and
➢ The LLC sublayer communicates the interconnections between them.
between the networking software at • There are two types of topologies used when
the upper layers and the device describing networks:
hardware at the lower layers. ➢ Physical topology – shows physical
➢ The MAC sublayer is responsible for connections and how devices are
data encapsulation and media access interconnected.
control. ➢ Logical topology – identifies the
virtual connections between devices
using device interfaces and IP
addressing schemes.
WAN TOPOLOGIES
• There are three common physical WAN
topologies:
➢ Point-to-point – the simplest and
most common WAN topology.
Consists of a permanent link between
two endpoints.
➢ Hub and spoke – similar to a star
topology where a central site
interconnects branch sites through ➢ Used on WLANs and legacy bus
point-to-point links. topologies with Ethernet hubs.
➢ Mesh – provides high availability but • Full-duplex communication
requires every end system to be ➢ Allows both devices to simultaneously
connected to every other end system. transmit and receive on a shred
POINT-TO-POINT WAN TOPOLOGY medium.
• Physical point-to-point topologies directly ➢ Ethernet switches operate in full-
connect two nodes. duplex mode.
• The nodes may not share the media with other ACCESS CONTROL METHODS
hosts. • Contention-based access
• Because all frames on the media can only • All nodes operating in half-duplex, competing
travel to of from the two nodes, Point-to-Point for use of the medium. Examples are:
WAN protocols can be very simple. ➢ Carrier sense multiple access with
collision detection (CSMA/CSD) as
used on legacy bus-topology Ethernet.
➢ Carrier sense multiple access with
LAN TOPOLOGIES
collision avoidance (CSMA/CA) as
• End devices on LANs are typically used on Wireless LANs.
interconnected using a star or extended star • Controlled access
topology. Star and extended star topologies ➢ Deterministic access where each
are easy to install, very scalable and easy to node has its own time on the medium.
troubleshoot. ➢ Used on legacy networks such as
• Early Ethernet and Legacy Token Ring Token Ring and ARCNET.
technologies provide two additional CONTENTION-BASED ACCESS – CSMA/CD
topologies: • CSMA/CD
➢ Bus – all end systems chained ➢ Used by legacy Ethernet LANs.
together and terminated on each end. ➢ Operates in half-duplex mode where
➢ Ring – each end system is connected only one device sends or receives at a
to its respective neighbors to form a time.
ring. ➢ Uses a collision detection process to
govern when a device can send and
what happens if multiple devices send
at the same time.
• CSMA/CD collision detection process:
➢ Devices transmitting simultaneously
will result in a signal collision on the
shared media.
➢ Devices detect the collision.
➢ Devices wait a random period of time
and retransmit data.
CONTENTION-BASED ACCESS – CSMA/CA
• CSMA/CA
➢ Used by IEEE 802.11 WLANs.
➢ Operates in half-duples mode where
HAIR AND FULL DUPLEX COMMUNICATION only one device sends or receives at a
• Half-duplex communication time.
➢ Only allows one device to send or ➢ Uses a collision avoidance process to
receive at a time on a shared medium. govern when a device can send and
what happens if multiple devices send LAN AND WAN FRAMES
at the same time. • The logical topology and physical media
• CSMA/CA collision avoidance process: determine the data link protocol used:
➢ When transmitting, devices also ➢ Ethernet
include the time duration needed for ➢ 802.11 Wireless
the transmission. ➢ Point-to-Point (PPP)
➢ Other devices on the shared medium ➢ High-Level Data Link Control (HDLC)
receive the time duration information ➢ Frame-Relay
and know how long the medium will be • Each protocol performs media access control
unavailable. for specified logical topologies.
6.3 DATA LINK FRAME
THE FRAME
• Data is encapsulated by the data link layer
with a header and a trailer to form a frame. A
data link frame has three parts.
➢ Header
➢ Data
➢ Trailer
• The fields of the header and trailer vary
according to data link layer protocol.
• The amount of control information carried
with in the frame varies according to access
control information and logical topology.
FRAME FIELDS
LAYER 2 ADDRESSES