6 Ethernet Basics

  • Upload
    arjun

  • View
    221

  • Download
    0

Embed Size (px)

Citation preview

  • 8/12/2019 6 Ethernet Basics

    1/25

    Objectives

    Ethernet fundamentals

    Ethernet operation

  • 8/12/2019 6 Ethernet Basics

    2/25

    Introduction to Ethernet

    The success of Ethernet is due to its simplicity

    and ease of maintenance, as well as its ability to

    incorporate new technologies, reliability, and low

    cost of installation and upgrade.

  • 8/12/2019 6 Ethernet Basics

    3/25

    Comparing LAN Standards

  • 8/12/2019 6 Ethernet Basics

    4/25

    OSI Layer 1 and 2 Together Are the

    Access Protocols

    These are the deliverysystem protocols.

    Independent of:

    Network OS

    Upper-level protocols TCP/IP, IPX/SPX

    Sometimes called:

    Access methods

    Access protocols

    Access technologies

    Media access

    LAN protocols

    WAN protocols

    Ethernet, Fast Ethernet, GigabitEthernet, Token Ring, FDDI, FrameRelay, ATM, PPP, HDLC, and so on

  • 8/12/2019 6 Ethernet Basics

    5/25

    IEEE Standard

    Divided OSI Layer 2 into two sublayers Media Access Control (MAC)Traditional L2 features Transitions down to media

    Logical link control (LLC)New L2 features Transitions up to the network layer

  • 8/12/2019 6 Ethernet Basics

    6/25

    Logical Link Control (LLC)

    Allows part of the data link layer to function

    independent of LAN access technologies

    (protocols / methods)

    Provides services to network layer protocols, whilecommunicating with access technologies below it

    LAN access technologies: Ethernet

    Token Ring FDDI

  • 8/12/2019 6 Ethernet Basics

    7/25

    Logical Link Control (LLC)

    Participates in the data encapsulation process LLC PDU between Layer 3 and MAC sublayer.

    Adds control information to the network layer data to

    help deliver the packet. It adds two fields:

    Destination Service Access Point (DSAP)

    Source Service Access Point (SSAP)

    Supports both connectionless and connection-

    oriented upper-layer protocols.

    Allows multiple higher-layer protocols to share a

    single physical data link.

  • 8/12/2019 6 Ethernet Basics

    8/25

    Naming

    Ethernet uses MAC addresses that are 48 bits inlength and expressed as 12 hexadecimal digits.

    The first 6 hexadecimal digits, which are

    administered by the IEEE, identify themanufacturer or vendor and thus comprise theorganizational unique identifier (OUI).

    The remaining 6 hexadecimal digits represent

    the interface serial number, or another valueadministered by the specific equipmentmanufacturer.

  • 8/12/2019 6 Ethernet Basics

    9/25

    Layer 2 Framing

    Framing is the Layer

    2 encapsulation

    process; a frame is

    the Layer 2 protocoldata unit.

    A single generic

    frame has sections

    called fields, andeach field is

    composed of bytes.

  • 8/12/2019 6 Ethernet Basics

    10/25

    Framing

    Why framing is necessary

    Frame format diagram

    Generic frame format

  • 8/12/2019 6 Ethernet Basics

    11/25

  • 8/12/2019 6 Ethernet Basics

    12/25

  • 8/12/2019 6 Ethernet Basics

    13/25

    Ethernet Frame Fields

    Some of the fields permitted or required in an

    802.3 Ethernet frame are as follows:

    Preamble

    Start Frame Delimiter Destination Address

    Source Address

    Length/Type

    Data and Pad

    Frame Check Sequence (FCS)

    Extension

  • 8/12/2019 6 Ethernet Basics

    14/25

    Ethernet Operation

  • 8/12/2019 6 Ethernet Basics

    15/25

    Media Access Control (MAC)

    Provides MAC addressing (naming)

    Depending on access technology (Ethernet,Token Ring, FDDI), provides the following: Data transmission control

    Collision resolution (retransmission)

    Layer 2 frame preparation (data framing)

    Frame check sequence (FCS)

  • 8/12/2019 6 Ethernet Basics

    16/25

    Media Access Control (MAC)

    Protocols Ethernet (IEEE 802.3)

    Logical bus topology Physical star or extended star Nondeterministic

    First-come, first-served

    Token Ring (IEEE 802.5) Logical ring Physical star topology Deterministic

    Token controls traffic Older declining technology

    FDDI (IEEE 802.5)

    Logical ring topology Physical dual-ring topology Deterministic

    Token controls traffic Near-end-of-life technology

  • 8/12/2019 6 Ethernet Basics

    17/25

    Ethernet (CSMA/CD)

    Carrier sense multiple access with collision detection

  • 8/12/2019 6 Ethernet Basics

    18/25

    Ethernet Timing

    Any station on an Ethernet network wanting to

    transmit a message first listens to ensure that

    no other station is currently transmitting.

    If the cable is quiet, the station beginstransmitting immediately.

  • 8/12/2019 6 Ethernet Basics

    19/25

    Interframe Spacing and Backoff

  • 8/12/2019 6 Ethernet Basics

    20/25

    Error Handling

    Collisions are the mechanism for resolving

    contention for network access.

    Collisions result in network bandwidth loss that

    is equal to the initial transmission and thecollision jam signal. This affects all network

    nodes, possibly causing significant reduction in

    network throughput.

  • 8/12/2019 6 Ethernet Basics

    21/25

    Types of Collisions

    Three types of collisions are:

    Local

    Remote

    Late

  • 8/12/2019 6 Ethernet Basics

    22/25

    Ethernet Errors

    The following are the sources of Ethernet error: Simultaneous transmission occurring before slot time haselapsed (collision or runt)

    Simultaneous transmission occurring after slot time haselapsed (late collision)

    Excessively or illegally long transmission (jabber, longframe and range errors)

    Illegally short transmission (short frame, collision fragmentor runt)

    Corrupted transmission (FCS error)

    Insufficient or excessive number of bits transmitted(alignment error)

    Actual and reported number of octets in frame don't match(range error)

    Unusually long preamble or jam event (ghostor jabber)

  • 8/12/2019 6 Ethernet Basics

    23/25

  • 8/12/2019 6 Ethernet Basics

    24/25

    Ethernet Auto negotiation

    A process called autonegotiation (of speeds at

    half or full duplex) was developed.

    This process defines how two link partners may

    automatically negotiate a configuration offeringthe best common performance level.

    It has the additional advantage of only involving

    the lowest part of the physical layer.

  • 8/12/2019 6 Ethernet Basics

    25/25

    Link Establishment

    There are only two ways to achieve a full-duplex

    link:

    Through a completed cycle of autonegotiation

    Or, by administratively forcing both link partners to fullduplex