Chapter 9 Ethernet Part 1

Similar documents
Objectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet

CCNA Exploration Network Fundamentals. Chapter 09 Ethernet

CS 43: Computer Networks Switches and LANs. Kevin Webb Swarthmore College December 5, 2017

Raj Jain. The Ohio State University Columbus, OH

Part3. Local Area Networks (LAN)

Chapter 9. Ethernet. Part II

Overview of Ethernet Networking

Lecture (04) Network Layer (Physical/Data link) 2

LAN PROTOCOLS. Beulah A AP/CSE

NT1210 Introduction to Networking. Unit 5:

Networking Technologies and Applications

Local Area Networks. Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring

Interface The exit interface a packet will take when destined for a specific network.

Computer Networks. Lecture 8 Local Area Network, IEEE 802.x

Lecture 4b. Local Area Networks and Bridges

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

ROYAL INSTITUTE OF INFORMATION & MANAGEMENT

Lecture (04 & 05) Data link layer fundamental

Lecture (04) Network Access layer fundamentals I

Lecture (04) Network Access layer fundamentals I

Zarządzanie sieciami telekomunikacyjnymi

Lecture (04) Data link layer

Ethernet Basics. based on Chapter 4 of CompTIA Network+ Exam Guide, 4 th ed., Mike Meyers

Data Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies

Data Link Layer, Part 3 Medium Access Control. Preface

Principles behind data link layer services

IEEE standards for local area networks

Ethernet Hub. Campus Network Design. Hubs. Sending and receiving Ethernet frames via a hub

EE-379 Embedded Systems and Applications Introduction to Ethernet

IEEE 802 LANs SECTION C

Link Layer and Ethernet

Fundamentals of Networking. OSI & TCP/IP Model. Kuldeep Sonar 1

Link Layer and Ethernet

Chapter 5 Reading Organizer After completion of this chapter, you should be able to:

CSCD 330 Network Programming Spring 2017

Imi :... Data:... Nazwisko:... Stron:...

Layering in Networked computing. OSI Model TCP/IP Model Protocols at each layer

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

Medium Access Protocols

Internet Architecture and Protocol

CSCD 330 Network Programming Winter 2016

Data Link Layer, Part 5. Medium Access Control

A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers,

Data Link Layer -2- Network Access

Summary of MAC protocols

Cisco Cisco Certified Network Associate (CCNA)

The Internet software layers

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Internetworking is connecting two or more computer networks with some sort of routing device to exchange traffic back and forth, and guide traffic on

Ethernet. Networks: Ethernet 1

Principles behind data link layer services:

Copyleft 2005, Binnur Kurt. Objectives

Chapter 2. Switch Concepts and Configuration. Part I

10- and 100-Mbps Ethernet

Data and Computer Communications

Principles behind data link layer services:

Principles behind data link layer services:

Solved MCQ of Computer networking. Set-1

Data Link Layer -2- Network Access

LAN. CS 4/55231 Internet Engineering. Kent State University Dept. of Computer Science

Chapter 5: Ethernet. Introduction to Networks - R&S 6.0. Cisco Networking Academy. Mind Wide Open

Question 7: What are Asynchronous links?

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

Internetwork Basic. Possible causes of LAN traffic congestion are

Defining Networks with the OSI Model. Module 2

The Link Layer and LANs: Ethernet and Swiches

Chapter 6: DataLink Layer - Ethernet Olivier Bonaventure (2010)

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Interconnecting Networks with TCP/IP. 2000, Cisco Systems, Inc. 8-1

Introduction to LAN Protocols

Lecture 05 Chapter 16 High Speed LANs

Introduction to LAN Protocols

Network Security Fundamentals. Network Security Fundamentals. Roadmap. Security Training Course. Module 2 Network Fundamentals

SYSTEMS ADMINISTRATION USING CISCO (315)

Section 3 Understanding Ethernet and Switch Operations

2. LAN Topologies Gilbert Ndjatou Page 1

CHAPTER 2 SINGLE SEGMENT NETWORKS

CHAPTER 2 - NETWORK DEVICES

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

BABU MADHAV INSTITUTE OF INFORMATION TECHNOLOGY, UTU 2017

Introductory to Computer Networks Local Area Networks. Lecture 16 Fall Isfahan University of technology Dr.

Chapter 4. DataLink Layer. Reference: Computer Networking: A Top Down Approach 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007.

1. Data Link Layer (Layer 2)

Introduction to Networking Devices

LAN Protocols. Required reading: Forouzan 13.1 to 13.5 Garcia 6.7, 6.8. CSE 3213, Fall 2015 Instructor: N. Vlajic

CCNA Exploration1 Chapter 7: OSI Data Link Layer

ET4254 Communications and Networking 1

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

CSCD 330 Network Programming Winter Lecture 17b Link Layer Protocols Who is this? Reading: Chapter 5

Data Communication and Network. Introducing Networks

Computer Networks Principles LAN - Ethernet

ECE4110 Internetwork Programming. Introduction and Overview

Chapter 4 NETWORK HARDWARE

CS 455/555 Intro to Networks and Communications. Link Layer Addressing, Ethernet, and a Day in the Life of a Web Request

OSI Model. Teran Subasinghe MBCS, Bsc.(Hons) in Computer Science - University of Greenwich, UK

ก ก Information Technology II

CISCO SYSTEM ADMINISTRATION (41)

Local Area Networks. Ethernet LAN

Communicating over the Network

EECS Introduction to Computer Networking. Local Area Networks / Ethernet. Hub

Transcription:

Chapter 9 Ethernet Part 1

Introduction to Ethernet

Ethernet Local Area Networks (LANs) LAN (Local Area Network) - A computer network connected through a wired or wireless medium by networking devices (s, switches, routers) and administered by a single organization. Ethernet A family of Layer 2 Data Link protocols for Local Area Networks. 3

IEEE Standards Brief History: 1970 s - Robert Metcalfe and his coworkers at Xerox PARC 1980 - Ethernet protocol published by Digital Equipment Corporation, Intel, and Xerox (DIX) 1985 - Institute of Electrical and Electronics Engineers (IEEE) published IEEE 802.2 and 802.3 4

Data Link Sublayers IEEE 802 Extension to the OSI Model LLC (Logical Link Control) MAC (Media Access Control) The Institute of Electrical and Electronic Engineers (IEEE) is a professional organization that defines network standards. IEEE 802.3 Ethernet is the predominant and best known LAN standards, along with 802.11 (WLAN). The IEEE divides the OSI data link layer into two separate sublayers. Recognized IEEE sublayers are: Media Access Control (MAC) (transitions down to media) Logical Link Control (LLC) (transitions up to the network layer) 5

LLC Logical Link Sublayer Logical Link Control (LLC) defined in the IEEE 802.2 specification Provides versatility in services to network layer protocols that are above it, while communicating effectively with the variety of technologies below it. The LLC, as a sublayer, participates in the encapsulation process. 6

802.2 LLC IPX IP APPLETALK Layer 3 LLC Layer 2 - LLC MAC &Layer 1 Ethernet * Token Ring * FDDI 7

MAC Media Access Control Sublayer The Media Access Control (MAC) sublayer deals with the protocols that a host follows in order to access the physical media. Defined in IEEE 802.3 specification Responsible for the actual framing Builds the 1s and 0s to hand off to the physical layer. Responsible for media access (CSMA/CD) 8

The IEEE Working Groups 802.1 Networking Overview and Architecture 802.2 Logical Link Control 802.3 Ethernet 802.4 Token Bus 802.5 Token Ring 802.6 MANs 802.7 Broadband 802.8 Fiber Optic 802.9 Isochronous LAN 802.11 Wireless LAN...and more! 9

Network Interface Card (NIC) 10

Network Interface Card (NIC) Network Interface Card (NIC) Layer 2, Data Link Layer, device Connects the device (computer) to the LAN Responsible for the local Layer 2 address Common Layer 2 NICs: Ethernet Token Ring Common Bandwidth 10 Mbps, 10/100 Mbps, 10/100/1000 Mbps 11

Tracing the Physical Connection NIC (Network Interface Card) 12

Connecting the NIC to a Hub or Switch 13

From PC to Ethernet Port 14

From Ethernet Port to Patch Panel Back View Front View 15

From Patch Panel to Switch (or ) 16

From PC to Switch 17

All of that is the same as these! 18

The MAC Address Part of the Ethernet protocol includes the MAC (Media Access Control) coming Every Ethernet NIC card has a unique MAC address. MAC addresses provide a way for computers to identify themselves. They give hosts a permanent, unique name. 19

The MAC Address MAC addresses are: 48 bits in length Expressed as 12 hexadecimal digits. The first 6 hexadecimal digits, which are administered by the IEEE, identify the manufacturer or vendor and thus comprise the Organizational Unique Identifier (OUI). The remaining 6 hexadecimal digits comprise the interface serial number, or another value administered by the specific vendor. MAC addresses are sometimes referred to as burned-in addresses (BIAs) because they are burned into read-only memory (ROM) and are copied into random-access memory (RAM) when the NIC initializes 20

The MAC Address MAC Address MAC Address The Ethernet protocol uses MAC addresses to identify the source of the Ethernet frame and the destination of the Ethernet frame. Whenever is computer sends an Ethernet frame, it includes the MAC address on its NIC as the Source MAC Address. 21

Decimal, Binary, Hex Dec Bin Hex 0 = 0000 = 0 1 = 0001 = 1 2 = 0010 = 2 3 = 0011 = 3 4 = 0100 = 4 5 = 0101 = 5 6 = 0110 = 6 7 = 0111 = 7 Dec Bin Hex 8 = 1000 = 8 9 = 1001 = 9 10 = 1010 = A 11 = 1011 = B 12 = 1100 = C 13 = 1101 = D 14 = 1110 = E 15 = 1111 = F 22

MAC Address Format Dec Bin Hex 0 = 0000 = 0 1 = 0001 = 1 2 = 0010 = 2 3 = 0011 = 3 4 = 0100 = 4 5 = 0101 = 5 6 = 0110 = 6 7 = 0111 = 7 Dec Bin Hex 8 = 1000 = 8 9 = 1001 = 9 10 = 1010 = A 11 = 1011 = B 12 = 1100 = C 13 = 1101 = D 14 = 1110 = E 15 = 1111 = F OUI unique An Intel MAC address: 00-20-E0-6B-17-62 0000 0000-0010 0000 1110 0000-0110 1011 0001 0111 0110 0010 23

What is the Address on my NIC? 24

MAC Addresses Are Flat MAC addresses provide a way for computers to identify themselves. They give hosts a permanent, unique name. The number of possible MAC addresses is 16^12 (or over 2 trillion!). 25

Serial vs Multiaccess Network Serial Multiaccess 26

27

Ethernet: Multiaccess Network 28

Bus Topology A bus topology uses a single backbone segment (length of cable) that all the hosts connect to directly. Original Ethernet used a bus topology. By the way, Ethernet s work the same as a bus. 29

Sending and receiving Ethernet frames on a bus 1111 2222 3333 nnnn Abbreviated MAC Addresses 3333 1111 When an Ethernet frame is sent out on the bus all devices on the bus receive it. What do they do with it? 30

Sending and receiving Ethernet frames on a bus Nope 1111 2222 Hey, that s me! 3333 Nope nnnn Abbreviated MAC Addresses 3333 1111 When information (frame) is transmitted, every PC/NIC on the shared media copies part of the transmitted frame to see if the destination address matches the address of the NIC. If there is a match, the rest of the frame is copied If there is NOT a match the rest of the frame is ignored. Unless you are running a protocol analyzer program such as Ethereal. 31

Sending and receiving Ethernet frames on a bus 1111 2222 3333 nnnn Abbreviated MAC Addresses So, what happens when multiple computers try to transmit at the same time? 32

Sending and receiving Ethernet frames on a bus 1111 2222 3333 nnnn Abbreviated MAC Addresses X Collision! 33

CSMA/CD (Carrier Sense Multiple Access with Collision Detection) CSMA/CD Common contention method used with Ethernet and IEEE 802.3 Let everyone have access whenever they want and we will work it out somehow. 34

CSMA/CD and Collisions CSMA/CD (Carrier Sense Multiple Access with Collision Detection) Listens to the network s shared media to see if any other users on on the line by trying to sense a neutral electrical signal or carrier. If no transmission is sensed, then multiple access allows anyone onto the media without any further permission required. If two PCs detect a neutral signal and access the shared media at the exact same time, a collision occurs and is detected. The PCs sense the collision by being unable to deliver the entire frame onto the network. When a collision occurs, a jamming signal is sent out by the first PC to detect the collision. Using either a priority or random backoff scheme, the PCs wait certain amount of time before retransmitting. If collisions continue to occur, the PCs random interval is doubled, lessening the chances of a collision. 35

Sending and receiving Ethernet frames via a Hub or Only one device on the can communicate at a time, otherwise collisions occur. 10 Mbps ports are the most common. 100/1000 Mbps also available. The acts the same as a bus. 36

Sending and receiving Ethernet frames via a 3333 1111 1111? 2222 So, what does a do when it receives information? A is nothing more than a multiport repeater. 5555 3333 4444 37

Repeaters Signals can only travel so far through media before they weaken, and become garbled. This weakening of signals is called attenuation. Attenuation increases when: Media distances are lengthened Nodes are added to the media Repeaters: take in weakened signals clean them up regenerate them send them on their way along the network 38

Repeater: Layer 1 Device Signal come in signal go out. (after I amplify it) Repeaters are Layer 1 devices. They do NOT look at: Layer 2, Data Link (MAC, Ethernet) addresses Layer 3, IP Addresses. 39

Hub Hub is nothing but a multiport repeater. Hubs are Layer 1 devices. Data that comes in one port is sent out all other ports, except for the port it came in on. 40

Hubs Hubs allow computers and other network devices to communicate with each other, and use a star topology. Like a repeater, a regenerates the signal. Hubs have the same disadvantage as a repeater, anything it receives on one port, it FLOODS out all other ports. Wherever possible, s should be replace by switches. 41

Sending and receiving Ethernet frames via a 3333 1111 1111 2222 Nope 5555 Nope 3333 For me! 4444 Nope The will flood it out all ports except for the incoming port. Hub is a layer 1 device. A does NOT look at layer 2 addresses, so it is fast in transmitting data. Disadvantage with s: A or series of s is a single collision domain (coming) A collision will occur if any two or more devices transmit at the same time within the collision domain. 42

Sending and receiving Ethernet frames via a 2222 1111 1111 2222 For me! 5555 Nope 3333 Nope 4444 Nope Another disadvantage with s is that is take up unnecessary bandwidth on other links. Wasted bandwidth 43

Sending and receiving Ethernet frames via a 2222 1111 1111 2222 4444 3333? 5555 3333 4444 What happens when two host on the same, or when multiple s are connected, transmit at the same time? 44

Sending and receiving Ethernet frames via a 2222 1111 1111 Collision 2222 4444 3333 X 5555 3333 4444 Collision occurs. Although, s have little latency, CSMA/CD requires resending of frames and adds latency. 45

Half-duplex (Introduction) Half-duplex Hubs operate only in Half-duplex. Half-duplex means that only one end can send at a time. With half-duplex NICs, a host can only transmit or receive, not both at the same time, or a collision will occur. When multiple devices are connected to a or series of s, only one device can transmit. Uses CSMA/CD. If the a carrier is detected, then the NIC will not transmit. Ethernet s and repeaters can only operate in half-duplex mode. 46

Half-Duplex mode All of these Ethernet NICs and ports on the s are operating in Half-Duplex mode. When multiple devices are connected to a or series of s, only one device can transmit. 47

Collision Domain: Shared Access Collision domain (Wikipedia): A group of Ethernet or Fast Ethernet devices in a CSMA/ CD LAN that are connected by repeaters/s and compete for access on the network. Only one device in the collision domain may transmit at any one time, and the other devices in the domain listen to the network in order to avoid data collisions. A collision domain is sometimes referred to as an Ethernet segment. If you connect several computers to a single medium that is only connected by repeaters and s (Layer 1 devices), you have a shared-access situation, and you have a single collision domain. 48

Full-duplex Full-duplex is allows simultaneous communication between a pair of stations or devices. Full-duplex allows devices to send and receive at the same time. Both ends of the link must be in full-duplex mode. Most switches operate at either full-duplex but can operate in half-duplex. If a is connected to a switch, the switch port must be in half-duplex. The collision domain will end at the switch port. 49

Where are the collision domains? What would be the duplex settings? router 50

Where are the collision domains? Single Collision Domain router 51

What would be the duplex settings? Half-duplex router Half-duplex 52

Where are the collision domains? What would be the duplex settings? router switch switch 53

Where are the collision domains? What would be the duplex settings? router switch Collision Domains switch Collision Domains 54

What would be the duplex settings? Half-duplex Full-duplex router switch switch Half-duplex 55

Where are the collision domains? What would be the duplex settings? router switch switch switch switch switch switch 56

Where are the collision domains? router switch switch switch switch switch switch Collision Domains 57

What would be the duplex settings? Half-duplex Full-duplex router switch switch switch switch switch switch switch Full-duplex 58

Chapter 9 Ethernet Part 2

Generic Data Link Frame Format Preamble and Start Field used for synchronization between the sending and receiving devices. Beginning signaling sequence of bytes. the first few bytes tell the receivers to get ready to receive a new frame. 60

Generic Data Link Frame Format Address Field We saw how IEEE 802.3 uses Destination and Source Addresses. Ethernet: Unicast address MAC address of a single device Broadcast address All devices (All 1 bits, All F s in Hex) Multicast address Specific group of devices 61

Unicast, Multicast, Broadcast Destination Addresses Unicast address: A single Ethernet frame to be received by a single station. Unknown Unicast: This is from the perspective of a switch, when the unicast address is not in its MAC Address Table Multicast address: A single Ethernet frame to be received by a group of stations. Broadcast address: Special case of a multicast address, which is all 1 s. This is an Ethernet frame to be received by all stations. 62

Generic Data Link Frame Format Length/Type Field Usually information indicating the layer 3 protocols in the data field, I.e. IP Packet. Type field values of particular note for IEEE 802.3 frames include: 0x0600 XNS (Xerox) 0x0800 IP (Internet protocol) 0x8137 Novell NetWare packet formatted for Ethernet II 0x0806 ARP Message 63

Generic Data Link Frame Format Data Field Included along with this data, you must also send a few other bytes. They are called padding bytes, and are sometimes added so that the frames have a minimum length for timing purposes. 64

Sending and receiving Ethernet frames via a switch Layer 2 device (also includes layer 1) which examines and bases its decisions on the information in layer 2 frames Switch ports typically operate in full-duplex. Multiple devices on the switch can communicate at a time, otherwise collisions occur. 10/100 Mbps ports are the most common. 1000 Mbps also are also common, usually connecting to another switch or router. 65

Full-duplex Full-duplex is allows simultaneous communication between a pair of stations or devices. Full-duplex allows devices to send and receive at the same time. Both ends of the link must be in full-duplex mode. If a is connected to a switch, the switch port must be in half-duplex. The collision domain will end at the switch port. 66

Learning Switches: Learns Source MAC Address MAC Address Table Port Source MAC Add. 1 1111 Port Source MAC Add. 3333 1111 switch 1111 3333 Abbreviated MAC addresses 2222 4444 Switches are also known as learning bridges or learning switches. A switch has a source address table (or MAC Address Table) in cache (RAM) where it stores a source MAC address after it learns about them. How does it learn source MAC addresses? Whenever a frame enters a switch, it will first see if the Source Address (1111) is in it s table. If it is, it resets the timer If it is NOT in the table it adds 67 it, with the port number.

Destination MAC Address: Filter or Flood MAC Address Table Port Source MAC Add. 1 1111 Port Source MAC Add. 3333 1111 Next, the switch examines the source address table for the Destination MAC address. If it finds a match, it filters the frame by only sending it out that port. If there is not a match if floods it out all ports. In this scenario, the switch will flood the frame out all other ports, because the Destination Address is not in the source address table. switch 1111 3333 Abbreviated MAC addresses 2222 4444 68

Learning Switches: Learns, Filter or Flood MAC Address Table Port Source MAC Add. 1 1111 Port Source MAC Add. 6 3333 Most communications involve some sort of client-server relationship or exchange of information. Now 3333 sends data back to 1111. The switch sees if it has the Source Address stored. It does NOT so it adds it. (This will help next time 1111 sends to 3333.) Next, it checks the Destination Address and in our case it can filter the frame, by sending it only out port 1. switch 1111 1111 3333 3333 Abbreviated MAC addresses 2222 4444 69

Destination Address in table, Filter MAC Address Table Port Source MAC Add. 1 1111 Port Source MAC Add. 6 3333 3333 1111 switch 1111 3333 Now, because both MAC addresses are in the switch s table, any information exchanged between 1111 and 3333 can be sent (filtered) out the appropriate port. 1111 3333 Abbreviated MAC addresses 2222 4444 What happens when two devices send to same destination? What if this was a? Where is (are) the collision domain(s) in this example? 70

No Collisions in Switch, Buffering MAC Address Table Port Source MAC Add. 1 1111 9 4444 Port Source MAC Add. 6 3333 3333 1111 switch 3333 4444 1111 Unlike a, a collision does NOT occur, which would cause the two PCs to have to retransmit the frames. Collision domains end at the switch Instead the switch buffers the frames and sends them out port #6 one at a time. The sending PCs have no idea that their was another PC wanting to send to the same destination. 3333 Abbreviated MAC addresses 2222 4444 71

MAC Duplex No collisions MAC Address Table Port Source MAC Add. 1 1111 9 4444 Port Source MAC Add. 6 3333 3333 1111 No Collision Domains switch 3333 4444 1111 When there is only one device on a switch port, the collision domain is only between the PC and the switch, which is non-existent with full-duplex. With a full-duplex PC and switch port, there will be no collision, since the devices and the medium can send and receive at the same time. 3333 Abbreviated MAC addresses 2222 4444 72

Other Information MAC Address Table Port Source MAC Add. 1 1111 9 4444 Port Source MAC Add. 6 3333 switch 1111 3333 Abbreviated MAC addresses 2222 4444 How long are addresses kept in the Source Address Table? 5 minutes is common on most vendor switches. How do computers know the Destination MAC address? ARP Caches and ARP Requests How many addresses can be kept in the table? Depends on the size of the cache, but 1,024 addresses is common. What about Layer 2 broadcasts? Layer 2 broadcasts (DA = all 1 s) is flooded out all ports. 73

What happens here? MAC Address Table Port Source MAC Add. 1 1111 1 2222 Port Source MAC Add. 6 3333 1 5555 1111 3333 Notice the Source Address Table has multiple entries for port #1. 3333 1111 2222 5555 74

What happens here? MAC Address Table Port Source MAC Add. 1 1111 1 2222 Filter Port Source MAC Add. 6 3333 Reset timer 1 5555 1111 3333 The switch resets the 5 minute timer on the source port entry. The switch filters the frame out port #1. But the is only a layer 1 device, so a floods it out all ports. Where is the collision domain? 3333 1111 2222 5555 75

What happens here? Source Address Table Port Source MAC Add. Port Source MAC Add. 1 1111 6 3333 1 2222 1 5555 1111 3333 Collision Domain 3333 1111 2222 5555 76

Unshielded Twisted Pair (UTP) Straight-through Cross-over Rollover www.cisco.com/warp/ public/701/14.html 77

UTP Straight-through Cable Hub or Switch Host or Router The cable that connects from the switch port to the computer NIC port is called a straight-through cable. Connects unlike devices. 78

UTP Straight-through Cable Hub or Switch Host or Router 79

UTP Cross-over Cable Hub or Switch Hub or Switch The cable that connects from one switch port to another switch port is called a crossover cable. Connects like devices. 80

Cabling Show the straight-through and crossover cables router switch switch 81

Cabling Show the straight-through and crossover cables Straight-through cable Cross-over cable router switch switch 82

Configuring Speed and Duplex Negotiation between NIC and switch port. Duplex: Full-duplex or Half-duplex Speed: 10/100/1000 Mbps Autonegotiation Both sides of a link should have auto-negotiation on, or both sides should have it off. 83

Evolution of Ethernet and Half-Duplex (CSMA/CD)

Ethernet is Best Effort Delivery Ethernet is best-effort delivery, no guarantee. Like a trucking service, it doesn t really know or care about the what it is carrying. 85

IEEE Identifiers Early Standards Older Fiber Standards 100 Mbps Media 1000 Mbps Media 10BASE5 10BASE-F 100BASE-T 1000BASE-X 10BASE2 10BASE-FB 100BASE-X 1000BASE-SX FOIRL 10BASE-FP 100BASE-TX 1000BASE-LX 10BROAD36 10BASE-FL 100BASE-FX 1000BASE-CX 1BASE5 100BASE-T4 1000BASE-T 10BASE-T 100BASE-T2 Many of these standards were short lived or never implemented 3 part identifier Speed in Mbps Type of signaling used (Baseband or Broadband) Distance or Medium Early days: Cable Distance in meters, rounded to the nearest 100 meters Later days: Physical medium used 86

IEEE Identifiers 10BASE5 (Thick Ethernet) 10 refers to 10 Mbps Baseband: Dedicated to carrying one type of service Broadband: (Cable television) Designed to deliver multiple channels 5 refers to 500 meter maximum distance 100BASE-TX (Most widely used variety of Fast Ethernet) 100 refers to 100 Mbps TX Two pairs of Category 5 Twisted-pair cable 87

IFG Interframe Gap Ethernet Frame IFG Ethernet Frame IFG Ethernet Frame IFG Ethernet Frame IFG Ethernet devices must allow a minimum idle period between transmission of frames known as the interframe gap (IFG) or interpacket gap (IPG). Note: Both half and full-duplex It provides a brief recovery time between frames to allow devices to prepare for reception of the next frame. The minimum interframe gap is: 10 Mbps Ethernet: 96 bit times, which is 9.6 microseconds (millionths of a second) 100 Mbps, Fast Ethernet: 960 nanoseconds (billionths of a second) 1000 Mbps, Gigabit Ethernet: 96 nanoseconds 88

Collisions, Slot time and Minimum Frame Size Notes Original Ethernet (802.3) designed as Half-duplex CSMA/CD is based on half-duplex and is NOT part of full-duplex Collisions are part of CSMA/CD and half-duplex Ethernet Collisions are a normal part of operation and are NOT errors Collisions are NOT part of full-duplex Ethernet 89

Collision Domain Collision Domain: Refers to a single half-duplex Ethernet system whose elements (cables, repeaters, s, station interfaces and other network hardware) are all part of the same signal timing domain. If two or more devices transmit at the same time a collision will occur. If a collision is detected, the station will continue to transmit 32 bits called the collision enforcement jam signal. 90

Collision Domain Switches do not forward collision signals 91

Slot Time The slot time ensures that if a collision is going to occur, it will be detected within the first 512 bits (4096 for Gigabit Ethernet) of the frame transmission. The 512-bit slot time establishes the minimum size of an Ethernet frame as 64 bytes. Any frame less than 64 bytes in length is considered a "collision fragment" or "runt frame" and is automatically discarded by receiving stations. The slot time establishes a limit on the maximum size of a network's segments. If 92 the network grows too big, late collisions can occur.

Chapter 9 ARP

TCP/IP and ARP The TCP/IP Suite of Protocols Application Transport Internet/Network Network Interface (Link Layer) File Transfer: FTP, TFTP, NFS, HTTP Email: SMTP Remote Login: Telnet, rlogin Network Management: SNMP, BootP Name Management: DNS, DHCP TCP, UDP IP, ICMP, IGMP, ARP, RARP Not Specified: Ethernet, 802.3, Token Ring, 802.5, FDDI, ATM, ARP is a layer 3 protocol, one of many protocols within the TCP/IP suite of protocols. 94

Why do devices have a MAC Address and an IP Address? 00-0D-178A-F1-32 IP addresses: Original source address of the sending device Final destination address of the intended recipient. do not change Data Link addresses, such as Ethernet MAC addresses are used to get the IP packet from one hop to the next, within the same network. Next hop is either: A router on this network The final destination of the packet (Destination IP address) 95

Layer 2 Data Link Frame Dest. Dest.MAC Add MAC 0B-31 FF-FF 0B-20 00-10 Source MAC Add 0A-10 00-20 0C-22 Layer 3 IP Packet Type 800 Dest. IP 192.168.4.10 Source IP 192.168.1.10 IP fields Data Trailer The sending host builds message with multiple encapsulations. Data Link Header IP Header TCP Header HTTP Header Data Data Link Trailer The receiving host receives the message with multiple decapsulations. Data Link Header IP Header TCP Header HTTP Header Data Data Link Trailer 96

Destination MAC Address What does the Ethernet Destination MAC Address do? Allows the transmission of the data (e.g. IP packet) to a device on the same LAN (also has an Ethernet NIC). Hosts, printers, etc. with that belong to the same IP network. Default gateway, Router, which also has an IP address on the same network. 97

Destination MAC Address 00-0C-0438-44-AA Same network What would the Destination MAC address be for IP packets sent within the same LAN, network? The Destination MAC address would be that of the device that we are sending the IP packet to. The device s Destination MAC address would be associated with the Destination IP address. 98

Destination MAC Address 00-0D-178A-F1-32 Different network What would the Destination MAC address for IP packets sent outside the LAN, on a different network? The destination MAC address will be the MAC address associated with the IP Address of the Default Gateway. The host must know the IP address of the Default Gateway to communicate with devices outside its own network. 99

Destination MAC Address? Same network? Same Network: Destination IP Address s MAC Address Different Network: The Default Gateway s MAC Address The Destination MAC Address will always be one of two addresses. Same network: The MAC address associated with the device s Destination IP Address. Different network: The MAC address associated with the IP Address of the Default Gateway. 100

ARP: Address Resolution Protocol The ARP Table or ARP Cache The TCP/IP Suite of Protocols Application Transport Internet/Network Network Interface (Link Layer) File Transfer: FTP, TFTP, NFS, HTTP Email: SMTP Remote Login: Telnet, rlogin Network Management: SNMP, BootP Name Management: DNS, DHCP TCP, UDP IP, ICMP, IGMP, ARP, RARP Not Specified: Ethernet, 802.3, Token Ring, 802.5, FDDI, ATM, IP Address to MAC Address Mappings 101

Same network 00-0C-0417-91-CC 00-0C-0438-44-AA Destination MAC Address??? ARP Table IP Address MAC Address 172.16.10.3 00-0C-04-32-14-A1 172.16.10.25 00-0C-04-38-44-AA 172.16.10.19 00-0C-14-02-00-19 172.16.10.33 00-0C-A6-19-46-C1 It will look for it in it s ARP Table or ARP Cache. The ARP Table maintains IP Address to MAC Address mappings. Every device that participates in Ethernet and IP will have such a table, including hosts and routers. Host Stevens 172.16.10.10 255.255.255.0 MAC 00-0C-04-17-91-CC Host Cerf 172.16.10.25 255.255.255.0 MAC 00-0C-04-38-44-AA Source Destination 172.16.10.0/24 Router A Ethernet 0 172.16.10.1 255.255.255.0 MAC 03-0D-17-8A-F1-32 102

Same network 00-0C-0417-91-CC Destination MAC Address??? No Match IP Address 172.16.10.3 172.16.10.19 172.16.10.33 ARP Table MAC Address 00-0C-04-32-14-A1 00-0C-14-02-00-19 00-0C-A6-19-46-C1 What if the Destination IP Address is not in the ARP Table? How does it get in there? The host must issue an ARP Request. Host Stevens 172.16.10.10 255.255.255.0 MAC 00-0C-04-17-91-CC Host Cerf 172.16.10.25 255.255.255.0 MAC 00-0C-04-38-44-AA Source Destination 172.16.10.0/24 Router A Ethernet 0 172.16.10.1 255.255.255.0 MAC 03-0D-17-8A-F1-32 103

ARP: A quick look Destination MAC Address??? IP Address 172.16.10.3 172.16.10.19 172.16.10.33 ARP Table MAC Address 00-0C-04-32-14-A1 00-0C-14-02-00-19 00-0C-A6-19-46-C1 00-0C04-3844-AA 00-0C04-1791-CC Hey that s me! 172.16.10.25 00-0C-04-38-44-AA Host Stevens L2 Broadcast to all 172.16.10.10 ARP Request: Who has IP Address 255.255.255.0 172.16.10.25? Please send me your devices on network MAC 00-0C-04-17-91-CC MAC Address. Source I will add that to my ARP Table. I will now use the MAC Address to forward the frame. IP Packet no putlonger on hold on hold Host Cerf ARP Reply: Here is 172.16.10.25 my MAC Address 255.255.255.0 MAC 00-0C-04-38-44-AA L2 Unicast only to sender of ARP Request Destination IP Packet now sent to Destination 172.16.10.0/24 Router A Ethernet 0 172.16.10.1 255.255.255.0 MAC 03-0D-17-8A-F1-32 104