cisco ccna module 6

50
1 © 2004, Cisco Systems, Inc. All rights reserved. Module 6 Ethernet Fundamentals

Upload: anjar-septiawan

Post on 05-Dec-2014

858 views

Category:

Technology


8 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Cisco CCNA module 6

1© 2004, Cisco Systems, Inc. All rights reserved.

Module 6Ethernet Fundamentals

Page 2: Cisco CCNA module 6

222© 2004, Cisco Systems, Inc. All rights reserved.

www.pnj.ac.idObjectives

Page 3: Cisco CCNA module 6

333© 2004, Cisco Systems, Inc. All rights reserved.

www.pnj.ac.idEthernet

• Ethernet is a bus network in which multiple computers share a single transmission medium. While one computer transmits a frame to another. All other computers must wait.

• Ethernet is the dominant LAN technology in the world.

• Ethernet is not one technology but a family of LAN technologies.( E- FE-GE)

Page 4: Cisco CCNA module 6

444© 2004, Cisco Systems, Inc. All rights reserved.

www.pnj.ac.idIntroduction to Ethernet

• Most of the traffic on the Internet originates and ends with Ethernet connections.

• Competing and fighting to access the media -------Original idea for Ethernet was developed in early 1970s at the University of Hawaii .

• 1970’s Alohanet was the basis Ethernet access method known as CSMA/CD.

• DIX-1980 Robert Metcalfe+ The first LAN in the world. That is the original version of Ethernet.

• 1985—IEEE---The Institute of Electrical and Electronics Engineers published standards for LANs. These standards start with the number 802. The standard for Ethernet is 802.3. (IEEE –must be compatible to OSI model). The standard for Ethernet is 802.3.

• Essentially, Ethernet and IEEE 802.3 are the same standards ( some small modification )

• In 1995, IEEE announced a standard for a 100-Mbps Ethernet (called Fast Ethernet).

• In 1998 and 1999 standards for gigabit per second (Gbps, 1 billion bits per second)

• The bandwidth of the network could be increased many times without changing the underlying Ethernet technology

Page 5: Cisco CCNA module 6

555© 2004, Cisco Systems, Inc. All rights reserved.

www.pnj.ac.idThe Success of Ethernet

The success of Ethernet is due to the following factors:

• Simplicity and ease of maintenance

• Ability to incorporate new technologies

• Reliability

• Low cost of installation and upgrade

Together, Ethernet and IEEE 802.3 currently maintain the greatest market share of any LAN protocol

Page 6: Cisco CCNA module 6

666© 2004, Cisco Systems, Inc. All rights reserved.

www.pnj.ac.id

Inventor of Ethernet – Out of the Ether

Page 7: Cisco CCNA module 6

777© 2004, Cisco Systems, Inc. All rights reserved.

www.pnj.ac.idIntroduction to Ethernet

Ethernet was originally developed to operate over radio in the Hawaiian islands

Page 8: Cisco CCNA module 6

888© 2004, Cisco Systems, Inc. All rights reserved.

www.pnj.ac.idDefining Standard

• "The nice thing about standards is that there's so many to choose from."

Page 9: Cisco CCNA module 6

999© 2004, Cisco Systems, Inc. All rights reserved.

www.pnj.ac.idOSI Model

Page 10: Cisco CCNA module 6

101010© 2004, Cisco Systems, Inc. All rights reserved.

www.pnj.ac.idThe Physical layer

Layer 1 involves interfacing with:

• media, signals, bit streams that travel on the media

• components that put signals on media, and various topologies.

Page 11: Cisco CCNA module 6

111111© 2004, Cisco Systems, Inc. All rights reserved.

www.pnj.ac.idData Link Layer

• Data link layer provides reliable transit of data across a physical link by using the Media Access Control (MAC) addresses.

• Data link layer is concerned with physical (as opposed to network, or logical) addressing.

Page 12: Cisco CCNA module 6

121212© 2004, Cisco Systems, Inc. All rights reserved.

www.pnj.ac.idData link layer– Two Parts (sub-layers)

Logical link Control (LLC) : (IEEE 802.2)

• The Logical Link Control (LLC) sublayer remains relatively independent of the physical equipment

• Provides an interface between the MAC layer and the Network layer which is independent of the hardware

Media Access Control (MAC): (part of IEEE 802.3)

• The MAC sub-layer is concerned with the physical components that will be used to communicate the information..

• WHO can access the network when multiple computers are trying to access it simultaneously.

• physical addressing (MAC addresses) and access control methods.

Page 13: Cisco CCNA module 6

131313© 2004, Cisco Systems, Inc. All rights reserved.

www.pnj.ac.idEthernet and the OSI Model

• Ethernet operates in two areas of the OSI model, the lower half of the data link layer, known as the MAC sub layer and the physical layer

• Trick question

Page 14: Cisco CCNA module 6

141414© 2004, Cisco Systems, Inc. All rights reserved.

www.pnj.ac.idEthernet and the OSI Model

Page 15: Cisco CCNA module 6

151515© 2004, Cisco Systems, Inc. All rights reserved.

www.pnj.ac.idIEEE Ethernet Standards

IEEE 802 Committee Standards:

• 802.1 - Standards introduction

• 802.2 - Logical Link Control (LLC)to prevent senders from overwhelming receivers (ACK)

• 802.3 – EthernetCSMA/CD, multiple media access methods, and packet (frame) format.

• 802.4 - Token Bus - 75 ohm CATV coax or Fibre

• 802.5 - Token Ring - physical standard and media access sublayer

• 802.6 - MAN (Metropolitan Area Network) - similar to FDDI

• 802.7 - Broadband

• 802.8 - Fiber Optics

• 802.9 - Integrated Voice and Data

• 802.10 - LAN Security

• 802.11 - Wireless

• 802.12 -100 VG AnyLAN

Page 16: Cisco CCNA module 6

161616© 2004, Cisco Systems, Inc. All rights reserved.

www.pnj.ac.idEthernet and the OSI Model

Page 17: Cisco CCNA module 6

171717© 2004, Cisco Systems, Inc. All rights reserved.

www.pnj.ac.idEthernet and the OSI Model

Page 18: Cisco CCNA module 6

181818© 2004, Cisco Systems, Inc. All rights reserved.

www.pnj.ac.idNaming – The MAC or Hardware Address

• A 48-bit address burned onto the NIC.

• It is a unique way of identifying each computer on a network.

• Flat Address

All devices that are connected to the Ethernet LAN have MAC addressed interfaces including workstations, printers, routers, and switches.

Page 19: Cisco CCNA module 6

191919© 2004, Cisco Systems, Inc. All rights reserved.

www.pnj.ac.idNaming – MAC Address Format

The MAC address consists of 12 hex digits (48 bits)

The first six digits (assigned by the IEEE) represent the Organizational Unique Identifier (OUI) which identifies the manufacturer

The last six are assigned by the manufacturer and represent a unique hardware ID number for the NIC

Page 20: Cisco CCNA module 6

202020© 2004, Cisco Systems, Inc. All rights reserved.

www.pnj.ac.idFraming

• Framing is the Layer 2 encapsulation process.

• Bit streams (data) 010101 alone can not be sent between devices.

• We must divide the data up and add:

a bit pattern to flag the start of each frame

relevant MAC addresses

a block of data

some bits for error detection

a bit pattern to flag the end of the frame

• A frame is the Layer 2 protocol data unit (PDU).

Page 21: Cisco CCNA module 6

212121© 2004, Cisco Systems, Inc. All rights reserved.

www.pnj.ac.idLayer 2 Framing

Page 22: Cisco CCNA module 6

222222© 2004, Cisco Systems, Inc. All rights reserved.

www.pnj.ac.idLayer 2 Framing

Page 23: Cisco CCNA module 6

232323© 2004, Cisco Systems, Inc. All rights reserved.

www.pnj.ac.idEthernet Frame Structures

Page 24: Cisco CCNA module 6

242424© 2004, Cisco Systems, Inc. All rights reserved.

www.pnj.ac.idEthernet Frame Structure

Page 25: Cisco CCNA module 6

252525© 2004, Cisco Systems, Inc. All rights reserved.

www.pnj.ac.idIEEE 802.3 Frame Structure

Page 26: Cisco CCNA module 6

262626© 2004, Cisco Systems, Inc. All rights reserved.

www.pnj.ac.idIEEE 802.3 Preamble (Start Frame Field)

Page 27: Cisco CCNA module 6

272727© 2004, Cisco Systems, Inc. All rights reserved.

www.pnj.ac.idEthernet - IEEE802.3 Frame Field Comparison

Page 28: Cisco CCNA module 6

282828© 2004, Cisco Systems, Inc. All rights reserved.

www.pnj.ac.id Layer 2 Technologies

• Token Ring - logical ring topology (in other words, information flow is controlled in a ring) and a physical star topology (in other words, it is wired as a star)

• FDDI - logical ring topology (information flow is controlled in a ring) and physical dual ring topology (wired as a dual ring)

• Ethernet - logical bus topology (information flow is on a linear bus) and physical star or extended star (wired as a star)

Page 29: Cisco CCNA module 6

292929© 2004, Cisco Systems, Inc. All rights reserved.

www.pnj.ac.idMedia Access Control (MAC)

• MAC refers to Protocols that determine which computer on a shared-medium environment, or collision domain, is allowed to transmit the data.

• MAC, with LLC, comprises the IEEE version of the OSI Layer 2.

• There are two broad categories of Media Access Control

1. Deterministic

taking turns

2. Non-deterministic

first come, first served).

Page 30: Cisco CCNA module 6

303030© 2004, Cisco Systems, Inc. All rights reserved.

www.pnj.ac.idEthernet

•Ethernet performs three functions:

• Transmitting and receiving data packets

• Decoding data packets and checking them for valid MAC addresses before passing them to the upper layers of the OSI model

• detecting errors within data packets or on the network

In the CSMA/CD access method, networking devices with data to transmit over the networking media work in a listen-before-transmit mode.

Page 31: Cisco CCNA module 6

313131© 2004, Cisco Systems, Inc. All rights reserved.

www.pnj.ac.idMAC Rules and Collision Detection/Backoff

Page 32: Cisco CCNA module 6

323232© 2004, Cisco Systems, Inc. All rights reserved.

www.pnj.ac.idMAC Rules and Collision Detection/Backoff

Page 33: Cisco CCNA module 6

333333© 2004, Cisco Systems, Inc. All rights reserved.

www.pnj.ac.id

CSMA/CDNon-Deterministic

1. Listen then transmit

1 2

3 4

2. Collision occurs

3. Broadcast jam signal

4. Devices back off appropriate amount of time, goes back to listen then transmit and then retransmit

Ethernet is a broadcast transmission medium. This means that all devices on a network can see all data that passes along the networking media.

When a device has verified the destination MAC address carried by the data, it then checks the data packet for transmission errors. If the device detects errors, the data packet is discarded.

The destination device will not notify the source device, regardless of whether the packet arrived successfully.

Ethernet is a connectionless network architecture and is referred to as a best-effort delivery system.

Page 34: Cisco CCNA module 6

343434© 2004, Cisco Systems, Inc. All rights reserved.

www.pnj.ac.idEthernet Timing

Page 35: Cisco CCNA module 6

353535© 2004, Cisco Systems, Inc. All rights reserved.

www.pnj.ac.idInterframe Spacing and Backoff

Page 36: Cisco CCNA module 6

363636© 2004, Cisco Systems, Inc. All rights reserved.

www.pnj.ac.idEthernet Timing

• Slot time – the longest time taken to do a round trip of the largest legal network

– 512 Bits = 64 Bytes

• Interframe spacing

– 96 bit times for 10, 100, 1000 Mbps networks

Page 37: Cisco CCNA module 6

373737© 2004, Cisco Systems, Inc. All rights reserved.

www.pnj.ac.idError Handling

Page 38: Cisco CCNA module 6

383838© 2004, Cisco Systems, Inc. All rights reserved.

www.pnj.ac.idTypes of Collisions

• What is a Runt frame ?

Page 39: Cisco CCNA module 6

393939© 2004, Cisco Systems, Inc. All rights reserved.

www.pnj.ac.idAnswer

• Any frame which is received and which is less than 64 bytes is illegal, and is called a "runt".

(14 bytes + 46+ 4)

• A receiver must discard all runt frames

Page 40: Cisco CCNA module 6

404040© 2004, Cisco Systems, Inc. All rights reserved.

www.pnj.ac.idTypes of Collisions

Page 41: Cisco CCNA module 6

414141© 2004, Cisco Systems, Inc. All rights reserved.

www.pnj.ac.idEthernet Errors

Page 42: Cisco CCNA module 6

424242© 2004, Cisco Systems, Inc. All rights reserved.

www.pnj.ac.idEthernet Errors

Page 43: Cisco CCNA module 6

434343© 2004, Cisco Systems, Inc. All rights reserved.

www.pnj.ac.idFCS Errors

Page 44: Cisco CCNA module 6

444444© 2004, Cisco Systems, Inc. All rights reserved.

www.pnj.ac.idTransmission Errors

Collision or runt – Simultaneous transmission occurring before slot time has elapsed

Late collision – Simultaneous transmission occurring after slot time (512 bits = 64 Bytes)has elapsed

Jabber, long frame and range errors – Excessively or illegally long transmission  (jabber 20000-50000 octets)

Short frame, collision fragment or runt – Illegally short transmission

FCS error – Corrupted transmission

Page 45: Cisco CCNA module 6

454545© 2004, Cisco Systems, Inc. All rights reserved.

www.pnj.ac.idEthernet Auto-Negotiation

• NLP – Network Link Pulses (10 Mbps)Pulses sent by NIC every 16 ms

Convey information about the capabilities of the card or device

• FLP (100Mbps-1000Mbps)Mandatory

Made up of NLPs so 10 Mbps cards can exist with 100 and 1000 Mbps

Page 46: Cisco CCNA module 6

464646© 2004, Cisco Systems, Inc. All rights reserved.

www.pnj.ac.idEthernet Auto-Negotiation

Page 47: Cisco CCNA module 6

474747© 2004, Cisco Systems, Inc. All rights reserved.

www.pnj.ac.idEthernet Auto-Negotiation

Page 48: Cisco CCNA module 6

484848© 2004, Cisco Systems, Inc. All rights reserved.

www.pnj.ac.idTransmission Priority Rank

Page 49: Cisco CCNA module 6

494949© 2004, Cisco Systems, Inc. All rights reserved.

www.pnj.ac.idIEEE Ethernet Naming Rules

Page 50: Cisco CCNA module 6

505050© 2004, Cisco Systems, Inc. All rights reserved.

www.pnj.ac.idWhy was Ethernet Successful

• Ethernet has been the most successful LAN technology largely because of its simplicity of implementation compared to other technologies.

• Ethernet has also been successful because it has been a flexible technology that has evolved to meet changing needs and media capabilities