Lecture0 Physical and Datalink
Lecture0 Physical and Datalink
Lecture0 Physical and Datalink
Link Layer
IoT Networks and Data Communications
• Physical Layer & Data Link Layer (Multiple Access) • Sec 25, 26, 27, 28
1
4 • Transport Layer
• Quiz 10%
7 • IoT Networks : WAN
• Assignment© 2019
& Cisco
Homework 10%
and/or its affiliates. All rights reserved. Cisco Confidential 2
Reference Model
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
Reference Model
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
Today’s Topics
• Physical Layer Overview
• Data Link Layer Overview
• Data Link Topologies
• Multiple Access Techniques
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
Physical Layer
Purpose of the Physical Layer
The Physical Connection
• Before any network communications can occur, a physical connection to a local
network must be established.
• This connection could be wired or wireless, depending on the setup of the network.
• This generally applies whether you are considering a corporate office or a home.
• A Network Interface Card (NIC) connects a device to the network.
• Some devices may have just one NIC, while others may have multiple NICs (Wired
and/or Wireless, for example).
• Not all physical connections offer the same level of performance.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
Purpose of the Physical Layer
The Physical Layer
• Transports bits across the
network media
• Accepts a complete frame from
the Data Link Layer and
encodes it as a series of
signals that are transmitted to
the local media
• This is the last step in the
encapsulation process.
• The next device in the path to
the destination receives the bits
and re-encapsulates the frame,
then decides what to do with it.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
Physical Layer Characteristics
Physical Layer Standards
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
Physical Layer Characteristics
Physical Components
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
Physical Layer Characteristics
Encoding
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
Physical Layer Characteristics
Signaling
• The signaling method is how the bit Light Pulses Over Fiber-Optic Cable
values, “1” and “0” are represented on
the physical medium.
• The method of signaling will vary based
on the type of medium being used.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
Copper Cabling
Types of Copper Cabling
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
UTP Cabling
Properties of UTP Cabling
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
UTP Cabling
UTP Cabling Standards and Connectors (Cont.)
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
Fiber-Optic Cabling
Fiber-Optic Cabling Usage
Our focus in this course is the use of fiber within the enterprise.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
Fiber-Optic Cabling
Fiber-Optic Connectors
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
Purpose of the Data Link Layer
IEEE 802 LAN/MAN Data Link Sublayers
IEEE 802 LAN/MAN standards are specific to
the type of network (Ethernet, WLAN, WPAN,
etc).
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
Purpose of the Data Link Layer
Providing Access to Media
Packets exchanged between nodes may experience numerous data
link layers and media transitions.
At each hop along the path, a router performs four basic Layer 2
functions:
• Accepts a frame from the network medium.
• De-encapsulates the frame to expose the encapsulated packet.
• Re-encapsulates the packet into a new frame.
• Forwards the new frame on the medium of the next network segment.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
Purpose of the Data Link Layer
Data Link Layer Standards
Data link layer protocols are
defined by engineering
organizations:
• Institute for Electrical and
Electronic Engineers (IEEE).
• International Telecommunications
Union (ITU).
• International Organizations for
Standardization (ISO).
• American National Standards
Institute (ANSI).
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
Topologies
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
Topologies
Physical and Logical Topologies
The topology of a network is the arrangement and relationship of the network
devices and the interconnections between them.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
Topologies
WAN Topologies
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
Topologies
Point-to-Point WAN Topology
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
Topologies
LAN Topologies
End devices on LANs are typically
interconnected using a star or extended
star topology. Star and extended star
topologies are easy to install, very scalable
and easy to troubleshoot.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
Topologies
Half and Full Duplex Communication
Half-duplex communication
• Only allows one device to send or receive at a time on a shared medium.
• Used on WLANs and legacy bus topologies with Ethernet hubs.
Full-duplex communication
• Allows both devices to simultaneously transmit and receive on a shared medium.
• Ethernet switches operate in full-duplex mode.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
Multiple Access
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
Multiple Access
• Multiple Access คือข้อกำหนดในกำร ควบคุมกำรเชื่อมต่อ ระหว่ำงอุปกรณ์กำรสื่อสำรหลำยชุด ซึ่ง
ใช้ตัวกลำงร่วมกัน (Common Link) เพื่อบริหำรจัดกำร และจัดสรรช่องสัญญำณมีจุดประสงค์หลักคือ
• 1) ป้องกันกำรแทรกสอดจำกอุปกรณ์ที่ไม่เกี่ยวข้อง
• 2) ป้องกันกำรยึดครองตัวกลำงแต่เพียงผู้เดียว
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
Multiple Access
Random Access Protocols
• วิธีการเข้าใช้แบบ RA จะกาหนดสิทธิ์ให้กับอุปกรณ์การสื่อสารทุกตัวสามารถเข้าใช้ตัวกลาง
(Access) ได้อย่าง อิสระ ไม่ถูกควบคุมด้วยอุปกรณ์อื่นใด
• ด้วยเหตุนี้จึงมักจะเกิดความขัดแย้งในการเข้าใช้ตัวกลาง (Access Conflict) หรือ การชนกัน
ของข้อมูลข่าวสารในตัวกลาง (Collision) ซึ่งสามารถแก้ไขได้ด้วยกระบวนการ ซึ่งตอบคาถาม
ต่อไปนี้
• When เมื่อใดถึงจะสำมำรถเข้ำใช้ตัวกลำงได้
• What อุปกรณ์สื่อสำรต้องทำเช่นไร เมื่อตัวกลำงขณะนั้นไม่ว่ำง (Busy)
• How อุปกรณ์กำรสื่อสำรสำมำรถประเมินผลสัมฤทธิ์ หรือควำมล้มเหลวของกำรส่งผ่ำนข้อมูลได้อย่ำงไร
• What อุปกรณ์สื่อสำรต้องทำเช่นไร เมื่อเกิดภำวะควำมขัดแย้งในกำรเข้ำใช้ตัวกลำง หรือ Access Conflict
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
Multiple Access
Random Access Protocols
Communication
Every source stations must send every information to base station (Upload freq. 407MHz)
Base station then pass the information to destination station (Download freq. 413 MHz)
MA ทุกสถำนีสำมำรถรับ/ส่ง
ข้อมูล (Multiple Access) ได้
เท่ำเทียมกัน
ACK เมื่อสถำนีใดส่งข้อมูลไป
แล้วจะจับเวลำรอ ACK ถ้ำหำก
ไม่ได้รับภำยในเวลำที่กำหนด (2
เท่ำของเวลำในกำรเดินทำงของ
สัญญำณ) จะต้องส่งใหม่
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
ALOHA network
Multiple Access
Random Access Protocols
Frames in a pure ALOHA network
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39
Multiple Access
Random Access Protocols
Frames in a slotted ALOHA network
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40
Multiple Access
Random Access Protocols
Compare of Pure and slot ALOHA
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43
Multiple Access
Carrier Sense Multiple Access
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44
Multiple Access
Carrier Sense Multiple Access
CSMA/CD
• CSMA ไม่ดำเนินกำรใดๆ หำกเกิดกำรชน (จึงไม่มีกำรใช้งำนจริงในทำงปฎิบัติ)
• ดังนั้นได้มีกำรพัฒนำ CSMA with Collision Detection (CSMA/CD) ขึ้นโดยเพิ่มกระบวนกำร
ตรวจสอบกำรชนกันของข่ำวสำร
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 46
Multiple Access
Carrier Sense Multiple Access
CSMA/CA
• มักพบใช้งำนใน Wireless LAN
• CSMA/CA จะไม่มีกำรชนกันเกิดขึ้นเนื่องจำก
พยำยำมหลีกเลี่ยง
• CSMA/CA ใช้แผน Persistent ในกำรส่ง Data
Frame โดยจะเว้นช่วงเวลำรอก่อนส่งข้อมูล = IFS
(Interframe Space) และรอต่อไปอีกช่วงหนึ่ง
(สุ่ม)
• เมื่อสถำนีส่ง Data Frame ไปแล้วจะจับเวลำเพื่อ
รอ ACK
• ถ้ำหำกผิดพลำด (อำจเนื่องมำจำก Frame หรือ
ACK สูญหำย) สถำนีจะใช้แผนตั้งหลักเหมือนกับ
CSMA/CD
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47
Topologies
Contention-Based Access – CSMA/CD
CSMA/CD
• Used by legacy Ethernet LANs.
• Operates in half-duplex mode where only one device sends or receives at a time.
• Uses a collision detection process to govern when a device can send and what
happens if multiple devices send at the same time.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 48
Topologies
Contention-Based Access – CSMA/CA
CSMA/CA
• Used by IEEE 802.11 WLANs.
• Operates in half-duplex mode where only one device sends or receives at a time.
• Uses a collision avoidance process to govern when a device can send and what
happens if multiple devices send at the same time.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 49
Channelization
Channelization is a multiple-access method in which the available
bandwidth of a link is shared in time, frequency, or through code, between
different stations. In this section, we discuss three channelization protocols.
• Frequency-Division Multiple Access (FDMA)
• Time-Division Multiple Access (TDMA)
• Code-Division Multiple Access (CDMA)
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 50
Channelization
TDMA Figure 12.22 Time-division multiple access (TDMA)
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 53
Channelization
CDMA
CDMA พัฒนำบนพื้นฐำนของทฤษฎีกำรเข้ำรหัส โดยที่แต่ละสถำนีจะได้รับกำรมอบหมำย (Assign) รหัส เฉพำะในรูปของอนุกรมตัวเลข
เรียกว่ำ Chips ดังตัวอย่ำง
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 55
Channelization
CDMA
MUX จะคูณค่ำ Data ที่ส่งมำด้วย Chip ของแต่ละสถำนี แล้วนำผลคูณที่ได้จำกทุกสถำนีมำ บวกกัน ได้เป็น sequence ใหม่ ดังรูป
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 56
Channelization
CDMA
DeMUX จะคูณค่ำ sequence ที่รับมำได้ด้วย Chip ของแต่ละสถำนี แล้วบวกค่ำใน Chip ของแต่ละสถำนีเข้ำด้วยกัน ซึ่งผลลัพธ์มีค่ำ 0, N หรือ –N (N:
จำนวนสถำนี)
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 57
12.58
Figure 12.28 Decoding of the composite signal for one in CDMA
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 58
Figure 12.29 General rule and examples of creating Walsh tables
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 59
Homework
Channelization อีกชนิดหนึ่ง : OFDMA คืออะไร ? มีหลักกำรทำงำนอย่ำงไร ? ประยุกต์ใช้กับกำรสื่อสำร
แบบใดในปัจจุบัน ?
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 60
END