0% found this document useful (0 votes)
85 views46 pages

Chapter Ethernet

Uploaded by

Richard Bateman
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
85 views46 pages

Chapter Ethernet

Uploaded by

Richard Bateman
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 46

Network

Fundamentals

Chapter 9:
Ethernet

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 1
Objectives
 Identify the basic characteristics of network media
used in Ethernet.
 Describe the physical and data link features of
Ethernet.
 Describe the function and characteristics of the media
access control method used by Ethernet protocol.
 Explain the importance of Layer 2 addressing used for
data transmission
 Compare and contrast the application and benefits of
using Ethernet switches as apposed to hubs in a LAN
 Explain the ARP process.
2
Ethernet Background…
 Ethernet is the predominant LAN technology in
use today.
 Ethernet operates in the lower two layers of the OSI
model: the MAC sublayer of the Data Link layer and
the Physical layer.
 The Institute of Electrical and Electronics Engineers
(IEEE) standard for Ethernet is 802.3.
–The IEEE 802.2 standard describes the LLC sublayer
functions
–The IEEE 802.3 standard describes the MAC sublayer
and the Physical layer functions.
3
More on Ethernet…
 Most of the traffic on the Internet originates and ends with
Ethernet connections
 The success of Ethernet is due to the following factors:
–Simplicity and ease of maintenance
–Ability to incorporate new technologies
–Reliability
–Low cost of installation and upgrade

 The introduction of Gigabit Ethernet has extended the


original LAN technology to distances that make Ethernet a
Metropolitan Area Network (MAN) and WAN standard
 Today's Ethernet networks use primarily UTP copper cables
and optical fiber to interconnect network devices via
intermediary devices such as hubs and switches. 4
Ethernet Layer 1 & Layer 2

5
The Ethernet Logical Link Control Sublayer
 LLC is implemented in software, and its implementation is independent
of the physical equipment.

6
The Ethernet Media Access Control Sublayer
 Media Access Control is implemented by hardware, typically in the
computer Network Interface Card (NIC)

7
Early Ethernet Media and Topology

 The early
versions of
Ethernet
incorporated the
media access
method of Thicknet (500 m) and Thinnet (185 m)
CSMA/CD

 Early versions of
Ethernet used
coaxial cable and
were known as
Thicknet,
(10BASE5) and
Thinnet
(10BASE2)

Legacy Ethernet 10Base-T (100 m) 8


MAC in Ethernet

9
Ethernet Hubs
 Hubs concentrate connections

 Hubs take a group of nodes and


allow the network to see them as
a single unit
 When a frame arrives at one
port, it is copied to the other
ports so that all the segments
on the LAN receive the frame
 Using hubs increased network
reliability by allowing any single
cable to fail without disrupting
the entire network
 However, repeating the frame to
all other ports did not solve the
issue of collisions
10
Migration From Hubs to Ethernet Switches
 Switches can control the
flow of data by isolating
each port and sending a
frame only to its proper
destination (if the
destination is known),
rather than send every
frame to every device.
 Switches manage
collisions on Ethernet-
based networks
 Corresponded with the
development of
100BASE-TX
 Introduction of Full
Duplex capabilities led to
development of 1 Gig
Ethernet
11
The Ethernet Frame
 The Ethernet frame structure adds headers and trailers around the Layer
3 PDU to encapsulate the message being sent.
 Each section of the frame is called a field
 Two styles of Ethernet framing:

Revised

Original

12
Ethernet Frame Size
 The original Ethernet standard…
–Minimum frame size 64 bytes
–Maximum as 1518 bytes

 Includes all bytes from the Destination MAC Address


field through the Frame Check Sequence (FCS) field
–Preamble and Start Frame Delimiter fields are not included

 The IEEE 802.3ac standard, released in 1998, extended


the maximum allowable frame size to 1522 bytes
–Frame size was increased to accommodate a technology
called Virtual Local Area Network (VLAN)

13
The Ethernet MAC Address
 IEEE requires NIC vendors to follow two rules:
–All MAC addresses assigned to a NIC or other Ethernet device must use that
vendor's assigned OUI as the first 3 bytes.
–All MAC addresses with the same OUI must be assigned a unique value
(serial number) in the last 3 bytes.
 Also referred to as a BIA (Burned-in-Address), Hardware Address,
Physical Address, Adapter Address, Ethernet Address

The MAC Address


is copied into RAM
when the device is
booted

14
The MAC Address & Network Devices
 All devices connected to an Ethernet LAN have MAC-addressed
interfaces
 MAC addresses are assigned to workstations, servers, printers,
switches, and routers - any device that must originate and/or receive
data on the network.
 MAC addresses have different hexadecimal formats such as 00-05-9A-
3C-78-00, 00:05:9A:3C:78:00, or 0005.9A3C.7800
 When a source device sends data through an Ethernet network, it must
have a destination MAC address in the frame header.
 When a device receives a frame, it checks the destination MAC address
against its physical address
 If there is no match, the device discards the frame

 If there is a match, the NIC passes the frame up the OSI layers, where the
decapsulation process take place.
15
The Hexadecimal Numbering System
 Hexadecimal ("Hex") is a convenient way to represent binary
values
–Decimal is a base ten numbering system (10 symbols)
–Binary is base two (2 symbols)
–Hexadecimal is a base sixteen system (16 symbols)

 Hexadecimal numbering system uses 16 symbols:


10 11 12 13 14 15
0, 1, 2, 3, 4, 5, 6 ,7, 8, 9 and A, B, C, D, E, F
 0x precedes number to indicate hex
hex 5D may be written as 0x5D
hex 10 may be written as 0x10
 All possible combinations of 4 binary digits can be converted
to only 1 hex symbol (4 bits = 1 hex digit = a nibble) 16
Concerting Binary to Hexadecimal
1. Take the 8-bit binary number and split it in half
2. Write the first 4 binary place values above each set of four binary digits
3. Convert the four bits to decimal (this number will equal 15 or less)
4. Express this decimal number as its equivalent hex digit

Example: Convert Binary 10011101 into Hex

8 4 2 1 8 4 2 1
1 0 0 1 1 1 0 1
=8+1 =8+4+1
= 9 Decimal = 13 Decimal
= 9 Hex = D Hex
Answer = 9D Hexadecimal or 0x9D 17
Hexadecimal Numbering and Addressing

18
CONVERTING HEXADECIMAL TO DECIMAL
 Ex) Convert Hexadecimal 2AE to Decimal

(163) (162) (161) (160)


4096 256 16 1
2 A E

(2x256) + (Ax16) + (Ex1) =


(2x256) + (10x16) + (14x1) =

512 + 160 + 14 = 686 Decimal


19
Different Layers of Addressing

20
Viewing the MAC Address

OUI (Organizational Unique Identifier)

Serial Number
21
A Unicast Message

22
A Broadcast Message

23
A Multicast Message

24
Ethernet Timing

Latency refers to the time it takes for a signal to


travel from source to destination

25
How CSMA/CD Works…
 In the CSMA/CD access method, all network devices that have messages
to send must listen before transmitting.
 If a device detects a signal from another device, it will wait for a specified
amount of time before attempting to transmit.
 When there is no traffic detected, a device will transmit its message. While
this transmission is occurring, the device continues to listen for traffic or
collisions on the LAN. After the message is sent, the device returns to its
default listening mode.
 If another device tries to send at the same time it results in a collision (the
signals mix and the message is destroyed)
 Once the collision is detected by the transmitting devices, they send out a
jamming signal
 The jamming signal causes devices to invoke a backoff algorithm (all
devices to stop transmitting for a random amount of time)
 After the delay has expired on a device, the device goes back into the
"listening before transmit" mode.
 NOTE: Nodes involved in a collision DO NOT have priority to
retransmit. 26
More on The Jam Signal…
 As soon as a collision is detected, the sending devices
transmit a 32-bit "jam" signal that will enforce the
collision (ensures all devices in the LAN detect the
collision)

 The most commonly observed data pattern for a jam


signal is a repeating 1, 0, 1, 0 pattern

 The corrupted, partially transmitted messages are often


referred to as collision fragments or runts
– they are normally less than 64 octets in length and therefore
fail both the minimum length and the FCS tests, making
them easy to identify.
27
The Collision Domain
 Hubs and repeaters are intermediary devices that extend the
distance that Ethernet cables can reach
 Hubs and repeaters operate at the Physical layer, dealing only
with the signals on the media
–collisions can occur between the devices they connect and
within the hubs themselves.
 Connected devices that access a common media via a hub or
series of directly connected hubs make up what is known as a
collision domain.
–A collision domain is also referred to as a network segment
 Hubs and repeaters therefore have the effect of increasing the
size of the collision domain.
 A bigger collision domain may lead to an increased number of
collisions which reduces the network's efficiency and effectiveness
28
Legacy Ethernet – Using Hubs

29
The Extended Star Topology & Collision Domains

30
Switched Ethernet Environment
•In a switched network, traffic is filtered based on the MAC address.
•Switches create smaller collision domains

31
Ethernet Slot and Bit Times
 Bit Time – the
time it takes for
the bit to be
placed and
sensed on the
media

 Slot Time – twice


the time it takes
for a pulse to
travel the length
of the theoretical
distance between
two nodes on a
network (only
relevant in half-
duplex)

 These timing
considerations
are important in
minimizing the
risk of collisions… 32
Interframe Spacing
 Ethernet requires a minimum spacing between two non-colliding frames
–gives the media time to stabilize after the transmission of the previous frame
–time for the devices to process the frame

33
The Ethernet Physical Layer

10Base-T

100Base-TX

100Base-FX

34
10Base-T Ethernet
 10 Mbps Ethernet is
considered to be Classic or
Legacy Ethernet
 Physical star topology
 Manchester-encoding
 Uses two pairs of a four-pair
UTP cable (Cat 3 or later)
 Max cable distance 100 m
 Uses an 8-pin RJ-45
connector
 The pair connected to pins 1
and 2 are used for
transmitting
 The pair connected to pins 3
and 6 are used for receiving
 The 10BASE-T links
connected to a switch can
support either half-duplex
or full-duplex operation. 35
100 Mbps Ethernet
 Known as Fast Ethernet,
can be implemented
using twisted-pair copper
wire or fiber media.

 100BASE-TX uses Cat5


or later UTP

–uses the same two


pairs and pinouts of UTP
as 10BASE-T

–Uses 4B/5B encoding

–100 m max cable length

 100BASE-FX uses fiber-


optic cable
36
1000 Mbps - Gigabit Ethernet
 Gigabit Ethernet has specifications for UTP copper, single-mode
fiber, and multimode fiber
 Gigabit Ethernet over copper wire (1000BASE-T Ethernet)
provides full-duplex transmission using all four pairs in
Category 5 or later UTP cable
–Enables an increase from 100 Mbps per wire pair to 125 Mbps per
wire pair
–125 x 4 = 500 Mbps for the four pairs
–Each wire pair signals in full duplex, doubling the 500 Mbps to 1000
Mbps
–100 max cable length
–1000BASE-T uses 4D-PAM5 line encoding
 The fiber versions of Gigabit Ethernet - 1000BASE-SX and 1000BASE-LX
- offer the following advantages over UTP: noise immunity, small physical
size, and increased unrepeated distances and bandwidth. 37
10GbE and Faster…
 10-Gigabit Ethernet (10GbE) has evolved for use not only in
LANs, but also for use in WANs and MANs.

 10Gbps compared to other varieties of Ethernet:


–Frame format is the same, allowing interoperability between
all varieties of legacy, fast, gigabit, and 10 gigabit Ethernet, with
no reframing or protocol conversions necessary.

–Bit time is now 0.1 ns

–Because only full-duplex fiber connections are used, there


is no media contention and CSMA/CD is not necessary.

 10-Gigabit Ethernet Alliance are working on 40-, 100-, or


even 160-Gbps standards.
38
Switches and Selective Forwarding
 Switches only forward frames to the port to which the
destination node is attached
 Any node operating in full-duplex mode can transmit anytime it has
a frame, without regard to the availability of the receiving node
 If the destination port is busy, the LAN switch will buffer the
incoming frame and then forward it to the proper port when that
port is idle (known as store and forward)
–With store and forward switching, the switch receives the entire
frame, checks the FSC for errors, and forwards the frame to the
appropriate port for the destination node

 Because the nodes do not have to wait for the media to be idle,
the nodes can send and receive at full media speed without losses
due to collisions or the overhead associated with managing
collisions.
39
The MAC Table
 Frame forwarding is based on the Destination MAC
 The switch maintains a table, called a MAC table that
matches a destination MAC address with the port used to
connect to a node.
 For each incoming frame, the destination MAC address in
the frame header is compared to the list of addresses in the
MAC table
–If a match is found, the port number in the table that is paired
with the MAC address is used as the exit port for the frame
–If no match is found, the frame is flooded out all ports

 The MAC table can be referred to by many different names


including:
–switch table
–bridge table 40
How Frame Forward Works…

41
The Five Base Operations of LAN Switches
 Learning-The MAC table must be populated with MAC addresses and
their corresponding ports. As each frame enters the switch, the switch
examines the source MAC address. If no entry exists for that MAC
address, the switch creates a new entry
 Aging -The entries in the MAC table acquired by the Learning process
are time stamped. Old entries are aged out of the MAC table after a
certain amount of time.
 Flooding - If the switch does not know to which port to send a frame
because the destination MAC address is not in the MAC table, the switch
sends the frame to all ports except the port on which the frame arrived.
Flooding is also used for frames sent to the broadcast MAC address.
 Selective Forwarding - Selective forwarding is the process of examining
a frame's destination MAC address and forwarding it out the appropriate
port. This is the central function of the switch.
 Filtering - In some cases, a frame is not forwarded. This process is called
frame filtering. A switch will drop a corrupt frame if a frame fails a CRC
check. A switch also has security settings for blocking frames to and/or
from selective MAC addresses or specific ports.
42
The ARP Table
 For a frame to be placed on the LAN media, it must have a
destination MAC address.

 When a packet is sent to the Data Link layer to be encapsulated into a


frame, the node refers to a table in its memory to find the Data Link layer
address that is associated (or mapped) to the destination IPv4 address.

 This table is called the ARP table or the ARP cache (ARP table is
stored in the RAM of the device)

 Each entry, or row, of the ARP table has a pair of values: an IP


Address and a corresponding MAC address

 The ARP table is maintained dynamically


 There are two ways that a device can gather MAC addresses
–monitor the traffic that occurs on the local network segment
–broadcast an ARP request
43
Address Resolution Protocol (ARP)
 ARP maps IP addresses to MAC Addresses

44
ARP – Destinations Outside the Local Network

45
THE END

Network
Fundamentals

Chapter 9:
Ethernet

ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 46

You might also like