Professional Documents
Culture Documents
Ethernet
Introduction to Networks
Presentation_ID
Cisco Confidential
Cisco Confidential
5.1
Ethernet Protocol
Presentation_ID
Historic Ethernet
The foundation for Ethernet technology was first
established in 1970 with a program called Alohanet.
Alohanet was a digital radio network designed to
transmit information over a shared radio frequency
between the Hawaiian Islands. Alohanet required all
stations to follow a protocol in which an
unacknowledged transmission required re-transmitting
after a short period of waiting.
Cisco Confidential
Ethernet Operation
Ethernet standards
Two separate sub layers of the data link layer to operate - Logical
link control (LLC) and the MAC sublayers
Presentation_ID
Cisco Confidential
Ethernet Operation
Presentation_ID
Cisco Confidential
Ethernet Operation
Data encapsulation
Presentation_ID
Cisco Confidential
Ethernet Operation
MAC Sublayer
Presentation_ID
Example: 100Base T
Cisco Confidential
Ethernet Operation
MAC Sublayer
Data encapsulation
MAC layer adds a header and trailer to the network layer PDU
Presentation_ID
Cisco Confidential
Ethernet Operation
MAC Sublayer
Media Access Control
Presentation_ID
Cisco Confidential
Cisco Confidential
10
Ethernet Operation
Presentation_ID
Ethernet Operation
Presentation_ID
Cisco Confidential
11
Ethernet Operation
Device examines the media for the presence of data signal - if the
media is free, the device sends a notification across the media of its
intent to use it
Presentation_ID
Cisco Confidential
12
Ethernet Operation
Presentation_ID
Cisco Confidential
13
Cisco Confidential
14
Ethernet MAC
Presentation_ID
Ethernet Operation
Frame Processing
MAC addresses assigned to workstations, servers, printers, switches,
and routers
Example MACs: 00-05-9A-3C-78-00, 00:05:9A:3C:78:00, or
0005.9A3C.7800.
Forwarded message to an Ethernet network, attaches header
information to the packet, contains the source and destination MAC
address
Each NIC views information to see if the destination MAC address in
the frame matches the devices physical MAC address stored in RAM
No match, the device discards the frame
Matches the destination MAC of the frame, the NIC passes the frame
up the OSI layers, where the decapsulation process takes place
Presentation_ID
Cisco Confidential
15
Ethernet Encapsulation
Early versions of Ethernet were relatively slow at 10 Mbps
Now operate at 10 Gigabits per second and faster
Ethernet frame structure adds headers and trailers around the Layer 3
PDU (packet) to encapsulate the message being sent
Ethernet II is the
Ethernet frame
format used in
TCP/IP networks.
Presentation_ID
Cisco Confidential
16
Presentation_ID
Ethernet Header = 14
Source MAC = 6
Dest. MAC = 6
Type = 2
1518:
Max Data=1460
TCP Header = 20
IP Header=20
Ethernet Header = 14
Ethernet Trailer = 4
Cisco Confidential
17
Presentation_ID
Cisco Confidential
18
Preamble
Start of Destination
Frame
MAC
Delimiter
Address
46 1500
Source
MAC
Address
Length
or
Type
FCS
Header
Trailer
Presentation_ID
19
Cisco Confidential
Preamble
Start of Destination
Frame
MAC
Delimiter
Address
46 1500
Source
MAC
Address
Length
or
Type
FCS
Presentation_ID
Cisco Confidential
20
10
Preamble
Start of Destination
MAC
Frame
Address
Delimiter
46 1500
Source
MAC
Address
Length
or
Type
FCS
21
Cisco Confidential
Preamble
Start of Destination
Frame
MAC
Delimiter
Address
46 1500
Source
MAC
Address
Length
or
Type
FCS
Presentation_ID
Cisco Confidential
22
11
Preamble
Start of Destination
Frame
MAC
Delimiter
Address
46 1500
Source
MAC
Address
Length
or
Type
FCS
Presentation_ID
23
Cisco Confidential
Preamble
Start of Destination
Frame
MAC
Delimiter
Address
46 1500
Source
MAC
Address
Length
or
Type
FCS
Presentation_ID
Cisco Confidential
24
12
Preamble
Start of Destination
Frame
MAC
Delimiter
Address
46 1500
Source
MAC
Address
Length
or
Type
FCS
25
Cisco Confidential
L E N G T H O FMAC
F I E L DAddress
IN BYTES
Ethernet
7
Preamble
Start of Destination
MAC
Frame
Address
Delimiter
46 1500
Source
MAC
Address
Length
or
Type
FCS
Cisco Confidential
26
13
Ethernet MAC
Presentation_ID
Cisco Confidential
27
Cisco Confidential
28
Ethernet Unicast
Presentation_ID
14
Ethernet Broadcast
Presentation_ID
Cisco Confidential
29
Cisco Confidential
30
Ethernet Multicast
15
MAC and IP
MAC and IP
MAC address
IP address
Similar to the address of a person, Based on where the host is actually located
Both the physical MAC and logical IP addresses are required for a computer
to communicate just like both the name and address of a person are required
to send a letter.
Cisco Confidential
31
Ethernet MAC
Presentation_ID
Cisco Confidential
32
16
ARP
Introduction to ARP
ARP Purpose
Sending node needs a way to find the MAC address of the
destination for a given Ethernet link
Presentation_ID
Cisco Confidential
33
ARP
ARP Functions/Operation
ARP Table
Used to find the data link layer address that is mapped to the
destination IPv4 address
As a node receives frames from the media, it records the source IP
and MAC address as a mapping in the ARP table
ARP request
Layer 2 broadcast to all devices on the Ethernet LAN
The node that matches the IP address in the broadcast will reply
If no device responds to the ARP request, the packet is dropped
because a frame cannot be created
Cisco Confidential
34
17
ARP
Introduction to ARP
Presentation_ID
Cisco Confidential
35
ARP
Introduction to ARP
Cisco Confidential
36
18
ARP
Introduction to ARP
H1 now knows H4 MAC and can
now communicate. It will also store
H4s MAC in its ARP Cache.
Cisco Confidential
37
ARP
Presentation_ID
Cisco Confidential
38
19
ARP
Presentation_ID
Cisco Confidential
39
Cisco Confidential
40
ARP Issues
Presentation_ID
20
5.3
LAN Switches
Presentation_ID
Cisco Confidential
41
Switching
Presentation_ID
Cisco Confidential
42
21
Switching
Port
MAC
aa
2
3
bb
MAC=aa
1. The switch receives a broadcast frame from PC 1 on Port 1.
2. The switch enters the source MAC address and the switch port that
received the frame into the address table.
3. Because the destination address is a broadcast, the switch floods the
frame to all ports, except the port on which it received the frame.
4. PC2 replies to the broadcast with a unicast frame addressed to PC 1.
5. The switch enters the source MAC address of PC 2 and the port number
of the switch port that received the frame into the address table. The
destination address of the frame and its associated port is found in the
MAC address table.
6. The switch can now forward frames between source and destination
devices without flooding, because it has entries in the address table that
identify the associated ports.
Presentation_ID
Cisco Confidential
43
Cisco Confidential
44
Switching
Duplex Settings
Presentation_ID
22
Switching
Auto-MDIX
Presentation_ID
Cisco Confidential
45
Switching
SLOW
Presentation_ID
Cisco Confidential
46
23
Switching
Cut-through Switching
Two variants:
Fast-forward switching:
Lowest level of latency,
immediately forwards a
packet after reading the
destination address,
typical cut-through
method of switching
Fragment-free switching:
Switch stores the first
64 bytes of the frame
before forwarding, most
network errors and
collisions occur during
the first 64 bytes
Presentation_ID
Cisco Confidential
47
Fixed or Modular
Presentation_ID
Cisco Confidential
48
24
Fixed or Modular
Presentation_ID
Cisco Confidential
49
Fixed or Modular
Presentation_ID
Cisco Confidential
50
25
Layer 3 Switching
Cisco Confidential
51
Layer 3 Switching
Cisco Confidential
52
26
Layer 3 Switching
Presentation_ID
Cisco Confidential
53
Layer 3 Switching
Cisco Confidential
54
27
Presentation_ID
Cisco Confidential
55
28