Physical Layer Physical layer equipment
Hubs operate at the physical layer
Domain of network devices Collision: In Ethernet, when two nodes transmit data at the same time, the frames sent from the two devices will collide and meet on the physical medium, and the data of each other will be destroyed. Collision domain A network segment that supports shared media Broadcast domain: The network range where broadcast frames are transmitted. The boundaries are usually set by routers (because routers do not forward broadcasts). The same collision domain
Carrier sense multiple access/collision detect (CSMA/CD): A medium access control method. When different nodes in the same shared network transmit data packets at the same time, conflicts are inevitable. The CSMA/CD mechanism is used to resolve such conflicts. How CSMA/CD works When a node wants to send data in the network, it first checks whether there are signals from other hosts being transmitted on the line: if so, it means that other hosts are sending data, and it will use the backoff algorithm to wait for a while before trying to send again; if there are no signals from other hosts on the line, it will send the data and keep monitoring the line to make sure that other hosts are not sending data. If other signals are detected, it will send a JAM blocking signal to notify other nodes on the network segment to stop sending data. At this time, other nodes must also use the backoff algorithm to wait for a while before trying to send again. Important Features of CSMA/CD Ethernet using the CSMA/CD protocol cannot perform full-duplex communication but can only perform two-way alternating communication (half-duplex communication). There is a possibility of collision for each station within a short period of time after sending data. This uncertainty in transmission makes the average communication volume of the entire Ethernet much less than the maximum data rate of Ethernet. Data Link Layer MAC sublayer (media access control): Responsible for MAC addressing and defining media access control methods, encapsulating the data handed down by the upper layer into frames for transmission (the opposite process is performed when receiving, and the frames are disassembled) LLC sublayer (logical link control): provides SAP (service access point) for the upper layer protocol, adds control information to the data, establishes and releases the logical connection of the data link layer LLC sublayer protocol: 802.2 The 802.2 protocol is only in the LLC sublayer, providing common functions for Ethernet and Token Ring networks, and identifying the protocol used by the upper layer. SAP (Service Access Point): The LLC sublayer provides services for various protocols of the network layer, while the upper layer may run different protocols. In order to distinguish the data of different upper layer protocols, a service access point is used. Header Network Layer
Network layer functions
Reliable transport layer function, establish three-way handshake The significance and defects of OSI model Significance of OSI Model
Flaws of the OSI Model
|
<<: Clarity: Docker's four network modes
>>: Looking at 5G from a different perspective: Don’t talk about technology, talk about demand
[[273990]] When is IPv6 tunneling used? Connect t...
In the development of the digital economy, innova...
After the Spring Festival of the Year of the Ox, ...
Today we will look at the basic configuration cas...
On the occasion of the 51st World Telecommunicati...
2019 is known as the first year of 5G. In fact, s...
In the article "Understanding OAuth2 through...
Part 01 Bluetooth mesh technology features - Supp...
When interviewing for network-related positions, ...
[51CTO.com original article] On March 22, Huawei ...
Virtualization has revolutionized the data center...
When it comes to comparing SD-WAN vs. VPN service...
GSA released a report that believes that the freq...
5G has unique challenges in not only enabling ser...
spinservers has released a promotion for the upco...