Chapter 4. Network Access
Chapter 4. Network Access
Network Access
Objectives
Upon completion of this chapter, you will be able to answer the following
questions:
What are the purpose and functions of the physical layer in data
networks?
What are advantages of using fiber-optic cabling over using other media
in data networks?
What are the purpose and functions of the data link layer in preparing
communications for transmission on specific data network media?
What are the standards that identify the protocols and standards of the
data link layer?
What are the characteristics and functions of the data link layer frame?
Key Terms
This chapter uses the following key terms. You can find the definitions in
the Glossary.
Introduction (4.0.1.1)
In networks, all data has to be prepared for transmission and placed onto
the media by the sending node as well as taken off the media by the re-
ceiving node. These are the functions of the TCP/IP data link layer.
On the sending device, it is the role of the data link layer to prepare data
for transmission and control how that data accesses the physical media.
However, the physical layer controls how the data is transmitted onto
the physical media by encoding the binary digits that represent data into
signals.
On the receiving end, the physical layer receives signals across the con-
necting media. After decoding the signal back into data, the physical layer
passes the data to the data link layer for acceptance and processing.
This chapter begins with the general functions of the physical layer and
the standards and protocols that manage the transmission of data across
local media. It also introduces the functions of the data link layer and the
protocols associated with it.
CLASS ACTIVITY 4.0.1.2: MANAGING THE MEDIUM
You and your colleague are attending a networking conference. There are
many lectures and presentations held during this event, and because they
overlap, each of you can only choose a limited set of sessions to attend.
Therefore, you decide to split, each of you attending a separate set of pre-
sentations, and after the event ends, you share the slides and the knowl-
edge that each of you gained during the event.
Imagine that the session is a panel, that is, a more free discussion of at-
tendees with panelists and optionally with themselves. If a person wants
to address another person within the same room, can he/she do it di-
rectly? What would be necessary to do if a panelist wanted to invite an-
other person to join who is not presently in the room?
The type of physical connection used is totally dependent upon the setup
of the network. For example, in many corporate offices, employees have
desktop or laptop computers that are physically connected, through a ca-
ble, to a shared switch. This type of setup is a wired network, in which
data is transmitted across a physical cable.
Switch devices and wireless access points are often two separate dedi-
cated devices within a network implementation. However, there are also
devices that offer both wired and wireless connectivity. In many homes,
for example, individuals are implementing home integrated service
routers (ISR). ISRs offer a switching component with multiple ports, al-
lowing multiple devices to be connected to the local-area network (LAN)
using cables. Additionally, many ISRs also include a WAP, which allows
wireless devices to connect as well.
Not all physical connections are equal, in terms of the performance level,
when connecting to a network.
All wireless devices must share access to the airwaves connecting to the
wireless access point. This means that slower network performance
might occur as more wireless devices access the network simultaneously.
A wired device does not need to share its access to the network with other
devices. Each wired device has a separate communications channel over
its own Ethernet cable. This is important when considering some applica-
tions, like online gaming, streaming video, and videoconferencing, which
require more dedicated bandwidth than other applications.
Over the next couple of topics, you will learn more about the physical
layer connections that occur and how those connections affect the trans-
portation of data.
The OSI physical layer provides the means to transport the bits that make
up a data link layer frame across the network media. This layer accepts a
complete frame from the data link layer and encodes it as a series of sig-
nals that are transmitted onto the local media. The encoded bits that com-
prise a frame are received by either an end device or an intermediate
device.
Figure 4-1 demonstrates the full encapsulation process and the transmit-
ting of encoded binary bits across the OSI Layer 1 medium to the destina-
tion. The processes that data undergoes from a source node to a destina-
tion node are
The user data is segmented by the transport layer, placed into packets
by the network layer, and further encapsulated as frames by the data link
layer.
The physical layer encodes the frames and creates the electrical, optical,
or radio wave signals that represent the bits in each frame.
These signals are then sent on the media one at a time.
There are three basic forms of network media. The physical layer pro-
duces the representation and groupings of bits for each type of media as
Table 4-1 Signal Types for Each of the Media at the Physical Layer
The protocols and operations of the upper OSI layers are performed in
software designed by software engineers and computer scientists. For ex-
ample, the services and protocols in the TCP/IP suite are defined by the
Internet Engineering Task Force (IETF) in RFCs.
Table 4-2 lists some of the major contributors and some of their relevant
physical layer standards.
Table 4-2 Organizations and Corresponding Physical Layer Standards
Encoding
NOTE
The physical layer must generate the electrical, optical, or wireless signals
that represent the “1” and “0” on the media. The method of representing
the bits is called the signaling method. The physical layer standards must
define what type of signal represents a 1 and what type of signal repre-
sents a 0. This can be as simple as a change in the level of an electrical sig-
nal or optical pulse. For example, a long pulse might represent a 1,
whereas a short pulse represents a 0.
This is similar to how Morse code is used for communication. Morse code
is another signaling method that uses a series of on-off tones, lights, or
clicks to send text over telephone wires or between ships at sea.
Synchronous: Data signals are sent along with a clock signal that occurs
at evenly spaced time durations referred to as the bit time.
There are many ways to transmit signals. A common method to send data
is using modulation techniques. Modulation is the process by which the
characteristic of one wave (the signal) modifies another wave (the car-
rier). The following modulation techniques have been widely used in
transmitting data on a medium:
The nature of the actual signals representing the bits on the media will
depend on the signaling method in use. Some methods might use one at-
tribute of signaling to represent a single 0 and use another attribute of
signaling to represent a single 1.
Bandwidth (4.1.3.2)
Table 4-3 shows the commonly used units of measure for bandwidth.
Throughput is the measure of the transfer of bits across the media over a
given period of time.
Latency refers to the amount of time, including delays, for data to travel
from one given point to another.
There are many online speed tests that can reveal the throughput of an
Internet connection.
NOTE
Network Media
Much of the aspects of the physical layer are dependent on the type of
media used. The characteristics of media types will be explored in this
section.
Copper Cabling (4.2.1)
One of the oldest and most used media for communications is copper ca-
bling. The characteristics and use of copper media in data networks will
be examined in this section.
The timing and voltage values of the electrical pulses are also susceptible
to interference from two sources:
To counter the negative effects of EMI and RFI, some types of copper ca-
bles are wrapped in metallic shielding and require proper grounding
connections.
Using cabling techniques that include the proper handling and termina-
tion of the cables
Twisted Pair
In LANs, UTP cable consists of four pairs of color-coded wires that have
been twisted together and then encased in a flexible plastic sheath that
protects them from minor physical damage. The twisting of wires helps
protect against signal interference from other wires.
As seen in the Figure 4-3, the color codes identify the individual pairs and
wires in the pairs and aid in cable termination. Most UTP cables used in
networking commonly have four wire pairs. The color coding for this ca-
bling is orange-white/orange, blue-white/blue, green-white/green, and
brown-white/brown.
Figure 4-3 Unshielded Twisted-Pair (UTP) Cable
STP cable combines the techniques of shielding to counter EMI and RFI
and wire twisting to counter crosstalk. To gain the full benefit of the
shielding, STP cables are terminated with special shielded STP data con-
nectors. If the cable is improperly grounded, the shield can act like an an-
tenna and pick up unwanted signals.
STP cable shields the entire bundle of wires with foil, eliminating virtu-
ally all interference (more common).
STP cable shields the entire bundle of wires as well as the individual
wire pairs, with foil eliminating all interference.
The STP cable shown Figure 4-4 uses four pairs of wires, each wrapped in
a foil shield, which are then wrapped in an overall metallic braid or foil.
Figure 4-4 Shielded Twisted-Pair (STP) Cable
For many years, STP was the cabling structure specified for use in Token
Ring network installations. With the decline of Token Ring, the demand
for shielded twisted-pair cabling also waned. However, the new 10-GB
standard for Ethernet has a provision for the use of STP cabling that is
providing a renewed interest in shielded twisted-pair cabling.
Coaxial Cable
Coaxial cable, or coax for short, gets its name from the fact that there
are two conductors that share the same axis. As shown in the Figure 4-5,
coaxial cable consists of
The entire cable is covered with a cable jacket to protect it from minor
physical damage.
Figure 4-5 Coaxial Cable
NOTE
All three types of copper media are susceptible to fire and electrical
hazards.
Fire hazards exist because cable insulation and sheaths can be flammable
or produce toxic fumes when heated or burned. Building authorities or
organizations can stipulate related safety standards for cabling and hard-
ware installations.
Some of the proper cabling practices to avoid potential fire and electrical
hazards are
Copper media has some inherent issues. Twisting the internal pairs of the
copper media, as used in UTP, is a low-cost solution to improve some of
the cabling performance. This section will further explore UTP cabling.
UTP cable does not use shielding to counter the effects of EMI and RFI.
Instead, cable designers have discovered that they can limit the negative
effect of crosstalk by:
Varying the number of twists per wire pair: To further enhance the
cancellation effect of paired circuit wires, designers vary the number of
twists of each wire pair in a cable. For example, the orange/orange-white
pairs are twisted less than the blue/white-blue pairs. Each colored pair is
twisted a different number of times. UTP cable must follow precise speci-
fications governing how many twists or braids are permitted per meter
(3.28 feet) of cable.
UTP cable relies solely on the cancellation effect produced by the twisted
wire pairs to limit signal degradation and effectively provide self-shield-
ing for wire pairs within the network media.
UTP Cabling Standards (4.2.2.2)
Cable types
Cable lengths
Connectors
Cable termination
NOTE
Figure 4-6 highlights the various categories of UTP cabling. Some charac-
teristics follow.
Figure 4-6 Categories of UTP
Cat 5 supports 100 Mbps and can support 1000 Mbps (Gigabit), but it is
not recommended.
Individual pairs are wrapped in a shield, and then the entire four pairs
wrapped in another shield.
VIDEO 4.2.2.3:
View the video in the online course for a demonstration of a UTP cable
terminated with an RJ-45 connector.
The following are the main cable types that are obtained by using specific
wiring conventions:
Table 4-4 shows the UTP cable type, related standards, and typical appli-
cation of these cables.
After installation, a UTP cable tester should be used to test for the follow-
ing parameters:
Wire map
Cable length
Crosstalk
Fiber Optics
Networking media selection is being driven by the growing needs for net-
work bandwidth. The distance and performance of fiber-optic cable make
it a good media choice to support these network needs. This section will
examine the characteristics of fiber-optic cabling use in data networks.
Optical fiber cable has become very popular for interconnecting infra-
structure network devices. It permits the transmission of data over longer
distances and at higher bandwidths (data rates) than any other network-
ing media.
Core: Consists of pure glass and is the part of the fiber where light is
carried.
Cladding: The glass that surrounds the core and acts as a mirror. The
light pulses propagate down the core while the cladding reflects the light
pulses. This keeps the light pulses contained in the fiber core in a phe-
nomenon known as total internal reflection.
Jacket: Typically a PVC jacket that protects the core and cladding. It can
also include strengthening materials and a buffer (coating) whose pur-
pose is to protect the glass from scratches and moisture.
Figure 4-10 shows the parts of a typical fiber-optic cable.
Light pulses representing the transmitted data as bits on the media are
generated by either
Lasers
NOTE
Multimode fiber (MMF): Consists of a larger core and uses LED emit-
ters to send light pulses. Specifically, light from an LED enters the multi-
mode fiber at different angles. Popular in LANs because they can be pow-
ered by low-cost LEDs. It provides bandwidth up to 10 Gbps over link
lengths of up to 550 meters.
NOTE
As shown Figure 4-12, the three most popular network fiber-optic con-
nectors include
Straight-tip (ST): An older bayonet style connector widely used with
multimode fiber, as well as single-mode.
NOTE
Because light typically only travels in one direction over optical fiber, two
fibers are usually required to support full-duplex operation. Therefore,
fiber-optic patch cables bundle together two optical fiber cables and ter-
minate them with a pair of standard single fiber connectors. Some fiber
connectors accept both the transmitting and receiving fibers in a single
connector known as a duplex connector, also shown in Figure 4-12.
NOTE
Fiber cables should be protected with a small plastic cap when not in use.
The color of the fiber jacket is often used to distinguish between single-
mode and multimode patch cords. This is because of the TIA-598 stan-
dard, which recommends the use of a yellow jacket for single-mode fiber
cables and orange (or aqua) for multimode fiber cables.
End finish: The media ends are not well polished or dirt is present at
the termination.
A quick and easy field test can be performed by shining a bright flashlight
into one end of the fiber while observing the other end of the fiber. If
light is visible, the fiber is capable of passing light. Although this does not
ensure the performance of the fiber, it is a quick and inexpensive way to
find a broken fiber.
Given that the fibers used in fiber-optic media are not electrical conduc-
tors, the media is immune to electromagnetic interference. It will also not
conduct unwanted electrical currents because of grounding issues.
Because optical fibers are thin and have relatively low signal loss, they
can be operated at much greater lengths than copper media, without the
need for signal regeneration. Some optical fiber physical layer specifica-
tions allow lengths that can reach multiple kilometers.
More expensive (usually) than copper media over the same distance
(but for a higher capacity)
Different skills and equipment required to terminate and splice the ca-
ble infrastructure
With more mobile devices being used, wireless networking is also grow-
ing in demand. This section explores wireless media characteristic and
uses.
NOTE
NOTE
Various 802.11 standards have evolved over the years. Standards include
IEEE 802.11a: Operates in the 5-GHz frequency band and offers speeds
of up to 54 Mbps. Because this standard operates at higher frequencies, it
has a smaller coverage area and is less effective at penetrating building
structures. Devices operating under this standard are not interoperable
with the 802.11b and 802.11g standards that are described as follows.
IEEE 802.11g: Operates in the 2.4-GHz frequency band and offers speeds
of up to 54 Mbps. Devices implementing this standard therefore operate
at the same radio frequency and range as 802.11b but with the bandwidth
of 802.11a.
IEEE 802.11n: Operates in the 2.4- or 5-GHz frequency bands. The typi-
cal expected data rates are 100 Mbps to 600 Mbps, with a distance range
of up to 70 meters. It is backward compatible with 802.11a/b/g devices.
IEEE 802.11ac: Can simultaneously operate in the 2.4- and 5-GHz fre-
quency bands, providing data rates up to 450 Mbps and 1.3 Gbps (1300
Mbps). It is backward compatible with 802.11a/b/g/n devices.
This section introduces the role of the data link layer in sending and re-
ceiving data over the physical layer.
Purpose of the Data Link Layer (4.3.1)
Just above physical layer is the data link layer. This layer provides struc-
ture to the 1s and 0s that are sent over the media. By adding grouping to
the seemingly arbitrary bits being placed on and extracted from the net-
work media, the data link layer provides meaningful data between the
upper layers of the sending and receiving nodes. This section will inspect
the important functions of the data link layer.
The TCP/IP network access layer is the equivalent of the following OSI
layers:
Physical (Layer 1)
The data link layer is responsible for the exchange of frames between
nodes over a physical network media. It allows the upper layers to access
the media and controls how data is placed and received on the media.
NOTE
Specifically, the data link layer performs these two basic services:
It accepts Layer 3 packets and packages them into data units called
frames.
NOTE
Logical Link Control (LLC): This upper sublayer defines the software
processes that provide services to the network layer protocols. It places
information in the frame that identifies which network layer protocol is
being used for the frame. This information allows multiple Layer 3 proto-
cols, such as IPv4 and IPv6, to utilize the same network interface and
media.
Media Access Control (MAC): This lower sublayer defines the media
access processes performed by the hardware. It provides data link layer
addressing and delimiting of data according to the physical signaling re-
quirements of the medium and the type of data link layer protocol in use.
Separating the data link layer into sublayers allows one type of frame de-
fined by the upper layer to access different types of media defined by the
lower layer. Such is the case in many LAN technologies, including
Ethernet.
Figure 4-14 illustrates how the data link layer is separated into the LLC
and MAC sublayers. The LLC sublayer communicates with the network
layer, while the MAC sublayer allows various network access technolo-
gies. For example, the MAC sublayer communicates with Ethernet LAN
technology to send and receive frames over copper or fiber-optic cable.
The MAC sublayer also communicates with wireless technologies such as
Wi-Fi and Bluetooth to send and receive frames wirelessly.
As packets travel from source host to destination host, they typically tra-
verse different physical networks. These physical networks can consist of
different types of physical media such as copper wires, optical fibers, and
wireless consisting of electromagnetic signals, radio and microwave fre-
quencies, and satellite links.
The packets do not have a way to directly access these different media. It
is the role of the OSI data link layer to prepare network layer packets for
transmission and to control access to the physical media. The media ac-
cess control methods described by the data link layer protocols define the
processes by which network devices can access the network media and
transmit frames in diverse network environments.
Without the data link layer, network layer protocols such as IP would
have to make provisions for connecting to every type of media that could
exist along a delivery path. Moreover, IP would have to adapt every time
a new network technology or medium was developed. This process would
hamper protocol and network media innovation and development. This is
a key reason for using a layered approach to networking.
On the first segment, between the PC and the router, an Ethernet link ex-
ists. So, as an IP packet travels from the PC to the laptop, it will be encap-
sulated into an Ethernet frame (802.3) leaving the PC. At the first router,
the Ethernet frame is deencapsulated, processed, and then encapsulated
into a new data link frame to cross the satellite link using a WAN protocol
(HDLC, PPP, and so on). For the final segment, the laptop is connected
through a wireless link. The packet will use one of the wireless data link
frame protocols (802.11b, 802.11g, 802.11n, and so on) from the router to
the laptop.
Providing Access to Media (4.3.1.4)
Router interfaces encapsulate the packet into the appropriate frame, and
a suitable Media Access Control method is used to access each link. In any
given exchange of network layer packets, there can be numerous data
link layer and media transitions. At each hop along the path, a router
The router in Figure 4-16 has an Ethernet interface to connect to the LAN
and a serial interface to connect to the WAN. As the router processes
frames, it will use data link layer services to receive the frame from one
medium, deencapsulate it to the Layer 3 PDU, reencapsulate the PDU into
a new frame, and place the frame on the medium of the next link of the
network.
Figure 4-16 Transfer of Frames
The data link layer prepares a packet for transport across the local media
by encapsulating it with a header and a trailer to create a frame. The de-
scription of a frame is a key element of each data link layer protocol.
Data link layer protocols require control information to enable the proto-
cols to function. Control information typically answers the following
questions:
Framing breaks the stream into decipherable groupings, with control in-
formation inserted in the header and trailer as values in different fields.
This format gives the physical signals a structure that can be received by
nodes and decoded into packets at the destination.
Frame start and stop indicator flags: Used by the MAC sublayer to
identify the beginning and end limits of the frame.
Addressing: Used by the MAC sublayer to identify the source and desti-
nation nodes.
Data: Contains the frame payload (that is, packet header, segment
header, and the data).
Error detection: Included after the data to form the trailer, these frame
fields are used for error detection.
Figure 4-17 Fields of a Generic Layer 2 Frame
NOTE
Not all protocols include all of these fields. The standards for
a specific data-link protocol define the actual frame format.
Examples of frame formats will be discussed at the end of
this chapter.
The encapsulation process uses very specific formats defined by data link
layer protocols. This section will examine some of these protocols.
Unlike the protocols of the upper layers of the TCP/IP suite, data link layer
protocols are generally not defined by Requests for Comments (RFC).
Although the Internet Engineering Task Force (IETF) maintains the func-
tional protocols and services for the TCP/IP protocol suite in the upper
layers, the IETF does not define the functions and operation of that
model’s network access layer.
Specifically the data link layer services and specifications are defined by
multiple standards based on a variety of technologies and media to which
the protocols are applied. Some of these standards integrate both Layer 2
and Layer 1 services.
The functional protocols and services at the data link layer are described
by
The data entering and exiting nodes is connected; the network media re-
quires coordination. This section will provide an overview of the data
link sublayer, which provides this function: Media Access Control.
Topologies (4.4.1)
As with any resource, there need to be rules defining how it is used and
shared. The same is true with network media. The rules need to specify
how and when a node can place data onto the media. Regulating the
placement of data frames onto the media is controlled by the Media
Access Control sublayer.
Media Access Control is the equivalent of traffic rules that regulate the
entrance of motor vehicles onto a roadway. The absence of any Media
Access Control would be the equivalent of vehicles ignoring all other traf-
fic and entering the road without regard to the other vehicles. However,
not all roads and entrances are the same. Traffic can enter the road by
merging, by waiting for its turn at a stop sign, or by obeying signal lights.
A driver follows a different set of rules for each type of entrance.
In the same way, there are different ways to regulate placing frames onto
the media. The protocols at the data link layer define the rules for access
to different media. Some Media Access Control methods use highly con-
trolled processes to ensure that frames are safely placed on the media.
These methods are defined by sophisticated protocols, which require
mechanisms that introduce overhead onto the network.
Topology: How the connection between the nodes appears to the data
link layer.
Media sharing: How the nodes share the media. The media sharing can
be point-to-point, such as in WAN connections, or shared, such as in LAN
networks.
The data link layer “sees” the logical topology of a network when control-
ling data access to the media. It is the logical topology that influences the
type of network framing and Media Access Control used.
WAN Topologies (4.4.2)
Mesh: This topology provides high availability, but requires that every
end system be interconnected to every other system. Therefore, the ad-
ministrative and physical costs can be significant. Each link is essentially
a point-to-point link to the other node. Variations of this topology include
a partial mesh, where some but not all the end devices are
interconnected.
In this arrangement, two nodes do not have to share the media with other
hosts. Additionally, a node does not have to make any determination
about whether an incoming frame is destined for it or another node.
Therefore, the logical data-link protocols can be very simple as all frames
on the media can only travel to or from the two nodes. The frames are
placed on the media by the node at one end and taken off the media by
the node at the other end of the point-to-point circuit.
Data link layer protocols could provide more sophisticated Media Access
Control processes for logical point-to-point topologies, but this would only
add unnecessary protocol overhead.
Like WANs, some physical and logical topologies are more predominately
used in LANs. These topologies will be examined in this section.
Physical topology defines how the end systems are physically intercon-
nected. In shared media LANs, end devices can be interconnected using
the following physical topologies:
Star: End devices are connected to a central intermediate device. Early
star topologies interconnected end devices using hubs. However, star
topologies now use switches. The star topology is the most common physi-
cal LAN topology primarily because it is easy to install, very scalable
(easy to add and remove end devices), and easy to troubleshoot.
Star Topology
Bus: All end systems are chained to each other and terminated in some
form on each end. Infrastructure devices such as switches are not re-
quired to interconnect the end devices. Bus topologies were used in
legacy Ethernet networks because they were inexpensive to use and easy
to set up.
Bus Topology
Ring Topology
There are two basic Media Access Control methods for shared media:
Contention-based access: All nodes compete for the use of the medium
but have a plan if there are collisions.
Controlled access: Each node has its own time to use the medium.
The data link layer protocol specifies the Media Access Control method
that will provide the appropriate balance between frame control, frame
protection, and network overhead.
It is possible that the CSMA process will fail and two devices will transmit
at the same time, creating a data collision. If this occurs, the data sent by
both devices will be corrupted and will need to be resent.
MAU
When using the controlled access method, network devices take turns, in
sequence, to access the medium. If an end device does not need to access
the medium, the opportunity passes to the next end device. This process
is facilitated by use of a token. An end device acquires the token and
places a frame on the media. No other device can do so until the frame
has arrived and been processed at the destination, releasing the token.
NOTE
NOTE
In a logical ring topology, each node in turn receives a frame. If the frame
is not addressed to the node, the node passes the frame to the next node.
This allows a ring to use a controlled Media Access Control technique
called token passing.
Nodes in a logical ring topology remove the frame from the ring, examine
the address, and send it on if it is not addressed for that node. In a ring,
all nodes around the ring (between the source and destination node) ex-
amine the frame.
There are multiple Media Access Control techniques that could be used
with a logical ring, depending on the level of control required. For exam-
ple, only one frame at a time is usually carried by the media. If there is no
data being transmitted, a signal (known as a token) can be placed on the
media and a node can only place a data frame on the media when it has
the token.
Remember that the data link layer “sees” a logical ring topology. The ac-
tual physical cabling topology could be another topology.
The data link layer needs to provide intelligible data between the Layer 3
of the sending host and the Layer 3 of the receiving host. To do this, the
Layer 3 PDU is wrapped with a header and trailer to form the Layer 2
frame. This section will examine the common elements of within the
frame structure as well as explore some of the commonly used data link
layer protocols.
Although there are many different data link layer protocols that describe
data link layer frames, each frame type has three basic parts:
Header
Data
Trailer
All data link layer protocols encapsulate the Layer 3 PDU within the data
field of the frame. However, the structure of the frame and the fields con-
tained in the header and trailer vary according to the protocol.
The data link layer protocol describes the features required for the trans-
port of packets across different media. These features of the protocol are
integrated into the encapsulation of the frame. When the frame arrives at
its destination and the data-link protocol takes the frame off the media,
the framing information is read and discarded.
There is no one frame structure that meets the needs of all data trans-
portation across all types of media. Depending on the environment, the
amount of control information needed in the frame varies to match the
Media Access Control requirements of the media and logical topology.
The frame header contains the control information specified by the data
link layer protocol for the specific logical topology and media used.
Start Frame field: Indicates the beginning of the frame. This field tells
other devices on the network segment that a frame is starting to be trans-
mitted on the medium.
Source and Destination Address fields: Indicate the source and desti-
nation nodes on the media.
Flow Control field: Used to start and stop traffic over the media.
Because the purposes and functions of data link layer protocols are re-
lated to the specific topologies and media, each protocol has to be exam-
ined to gain a detailed understanding of its frame structure. As protocols
are discussed in this course, more information about the frame structure
will be explained.
If the data must pass onto another network segment, an intermediate de-
vice, such as a router, is necessary. The router must accept the frame
based on the physical address and deencapsulate the frame to examine
the hierarchical address, or IP address. Using the IP address, the router is
able to determine the network location of the destination device and the
best path to reach it. After it knows where to forward the packet, the
router then creates a new frame for the packet, and the new frame is sent
onto the next segment toward its final destination.
Data link layer protocols add a trailer to the end of each frame. The trailer
is used to determine whether the frame arrived without error. This
process is called error detection and is accomplished by placing a logical
or mathematical summary of the bits that comprise the frame in the
trailer. Error detection is added at the data link layer because the signals
on the media could be subject to interference, distortion, or loss that
would substantially change the bit values that those signals represent.
The FCS is used for error checking. A transmitting node creates a logical
summary of the contents of the frame. This summary is a calculated num-
ber based on the frame’s data. This is known as the cyclic redundancy
check (CRC) value. This value is placed in the Frame Check Sequence
(FCS) field of the frame to represent the contents of the frame’s data.
When the frame arrives at the destination node, the receiving node calcu-
lates its own logical summary, or CRC, of the frame. The receiving node
compares the two CRC values. If the two values are the same, the frame is
considered to have arrived intact. If the CRC value in the FCS differs from
the CRC calculated at the receiving node, the frame is discarded.
NOTE
There is always the small possibility that a frame with a good CRC result
is actually corrupt. Errors in bits can cancel each other out when the CRC
is calculated. Upper-layer protocols would then be required to detect and
correct this data loss.
The Stop Frame field is a delimiter that indicates the end of the frame.
The transmitting node adds this after the FCS to indicate that the entire
frame has been sent. The receiving node examines the bits as received,
looking for the specific Stop Frame pattern. When this pattern is recog-
nized, the receiving node knows that the entire frame has been captured
off the media.
NOTE
In a TCP/IP network, all OSI Layer 2 protocols work with the IP at OSI
Layer 3. However, the actual Layer 2 protocol used depends on the logical
topology of the network and the implementation of the physical layer.
Given the wide range of physical media used across the range of topolo-
gies in networking, there are a correspondingly high number of Layer 2
protocols in use.
Each protocol performs Media Access Control for specified Layer 2 logical
topologies. This means that a number of different network devices can
act as nodes that operate at the data link layer when implementing these
protocols. These devices include the network adapter or network inter-
face cards (NIC) on computers as well as the interfaces on routers and
Layer 2 switches.
Ethernet
802.11 Wireless
Ethernet
Ethernet standards define both the Layer 2 protocols and the Layer 1
technologies. Ethernet is the most widely used LAN technology and sup-
ports data bandwidths of 10 Mbps, 100 Mbps, 1 Gbps (1000 Mbps), or 10
Gbps (10,000 Mbps).
The basic frame format and the IEEE sublayers of OSI Layers 1 and 2 re-
main consistent across all forms of Ethernet. However, the methods for
detecting and placing data on the media vary with different
implementations.
Type: Value to indicate which upper-layer protocol will receive the data
after the Ethernet process is complete.
Frame Check Sequence (FCS): A CRC value used to check for damaged
frames.
At the data link layer, the frame structure is nearly identical for all speeds
of Ethernet. However, at the physical layer, different versions of Ethernet
place the bits onto the media differently. Ethernet is discussed in more de-
tail in the next chapter.
Another data link layer protocol is the Point-to-Point Protocol (PPP). PPP
is a protocol used to deliver frames between two nodes. Unlike many data
link layer protocols that are defined by electrical engineering organiza-
tions, the PPP standard is defined by RFCs. PPP was developed as a WAN
protocol and remains the protocol of choice to implement many serial
WANs. PPP can be used on various physical media, including twisted-pair,
fiber-optic lines, and satellite transmission, as well as for virtual
connections.
PPP also allows the two nodes to negotiate options within the PPP session.
This includes authentication, compression, and multilink (the use of mul-
tiple physical connections).
Flag: A single byte that indicates the beginning or end of a frame. The
flag field consists of the binary sequence 01111110.
Address: A single byte that contains the standard PPP broadcast ad-
dress. PPP does not assign individual station addresses.
Protocol: Two bytes that identify the protocol encapsulated in the data
field of the frame. The most up-to-date values of the protocol field are
specified in the most recent Assigned Numbers RFC.
Data: Zero or more bytes that contain the datagram for the protocol
specified in the protocol field.
Frame Check Sequence (FCS): Normally 16 bits (2 bytes). By prior
agreement, consenting PPP implementations can use a 32-bit (4-byte) FCS
for improved error detection.
802.11 Wireless
The IEEE 802.11 standard uses the same 802.2 LLC and 48-bit addressing
scheme as other 802 LANs. However, there are many differences at the
MAC sublayer and physical layer. In a wireless environment, the environ-
ment requires special considerations. There is no definable physical con-
nectivity; therefore, external factors can interfere with data transfer and
it is difficult to control access. To meet these challenges, wireless stan-
dards have additional controls.
Type and Subtype fields: Identify one of three functions and subfunc-
tions of the frame: control, data, and management
More Fragments field: Set to 1 for frames that have another fragment
Order field: Set to 1 in a data type frame that uses Strictly Ordered ser-
vice class (does not need reordering)
Source Address (SA) field: MAC address of the node that initiated the
frame
Receiver Address (RA) field: MAC address that identifies the wireless
device that is the immediate recipient of the frame
Transmitter Address (TA) field: MAC address that identifies the wire-
less device that transmitted the frame
Frame Body field: Contains the information being transported; for data
frames, typically an IP packet
FCS field: Contains a 32-bit cyclic redundancy check (CRC) of the frame
NOTE
Use the blueprint provided for this activity (your instructor will provide
you with a copy from the Instructor Planning Guide). The area indicated
by Number 1 is the reception area; the area numbered RR is the restroom
area.
All rooms are within Category 6, UTP specifications (100 meters), so you
have no worries about hard-wiring the building to code. Each room in the
diagram must have at least one network connection available for
users/intermediary devices.
The number of intermediary devices that you would use and where you
would place them
The type of cabling that would be used (UTP, STP, wireless, fiber-optic,
and so on) and where would the ports be placed
The types of end devices that would be used (wired, wireless, laptops,
desktops, tablets, and so on)
Do not go “overboard” on your design; just use the content from the chap-
ter to be able to justify your decisions to the class.
The TCP/IP network access layer is the equivalent of the OSI data link
layer (Layer 2) and the physical layer (Layer 1).
The OSI physical layer provides the means to transport the bits that make
up a data link layer frame across the network media. The physical compo-
nents are the electronic hardware devices, media, and other connectors
that transmit and carry the signals to represent the bits. Hardware com-
ponents such as network adapters (NICs), interfaces and connectors, ca-
ble materials, and cable designs are all specified in standards associated
with the physical layer. The physical layer standards address three func-
tional areas: physical components, frame encoding technique, and signal-
ing method.
There are three main types of copper media used in networking: un-
shielded twisted-pair (UTP), shielded twisted-pair (STP), and coaxial cable.
UTP cabling is the most common copper networking media.
Optical fiber cable has become very popular for interconnecting infra-
structure network devices. It permits the transmission of data over longer
distances and at higher bandwidths (data rates) than any other network-
ing media. Unlike copper wires, fiber-optic cable can transmit signals
with less attenuation and is immune to EMI and RFI.
The data link layer is responsible for the exchange of frames between
nodes over a physical network media. It allows the upper layers to access
the media and controls how data is placed and received on the media.
Among the different implementations of the data link layer protocols,
there are different methods of controlling access to the media. These
Media Access Control techniques define if and how the nodes share the
media. The actual Media Access Control method used depends on the
topology and media sharing. LAN and WAN topologies can be physical or
logical. It is the logical topology that influences the type of network fram-
ing and Media Access Control used. WANs are commonly interconnected
using the point-to-point, hub-and-spoke, or mesh physical topologies. In
shared media LANs, end devices can be interconnected using the star,
bus, ring, or extended star (hybrid) physical topologies.
All data link layer protocols encapsulate the Layer 3 PDU within the data
field of the frame. However, the structure of the frame and the fields con-
tained in the header and trailer vary according to the protocol.
Practice
The following activities provide practice with the topics introduced in this
chapter. The labs and class activities are available in the companion
Introduction to Networking Lab Manual (ISBN 978-1-58713-312-1). The
Packet Tracer Activities PKA files are found in the online course.
Class Activities
Labs
Complete all the review questions listed here to test your understanding
of the topics and concepts in this chapter. The appendix, “Answers to the
‘Check Your Understanding’ Questions” lists the answers.
1. What are the purpose and functions of the physical layer in data net-
works? (Choose two.)
A. Cable grounding
B. Noise cancellation
D. EMI protection
4. Identify the wire colors associated with the pins when building a 568B
network cable.
A. Pin 1 ___________________
B. Pin 2 ___________________
C. Pin 3 ___________________
D. Pin 4 ___________________
E. Pin 5 ___________________
F. Pin 6 ___________________
G. Pin 7 ___________________
H. Pin 8 ___________________
5. What are the advantages of using fiber-optic cable over copper cable?
(Choose three.)
7. If a node receives a frame and the calculated CRC does not match the
CRC in the FCS, what action will the node take?
A. A CRC
A. Is always multiaccess