You are on page 1of 66

Ethernet

 The term Ethernet refers to the family of local-area


network (LAN) products covered by the IEEE 802.3
standard. Three data rates are currently defined for
operation over optical fiber and twisted-pair cables:
 10 Mbps—10Base-T Ethernet
 100 Mbps—Fast Ethernet
 1000 Mbps—Gigabit Ethernet

 10-Gigabit Ethernet is under development and will likely


be published as the IEEE 802.3ae supplement to the
IEEE 802.3 base standard in late 2001 or early 2002

Ethernet
The Ethernet MAC Sublayer

 The MAC sublayer has two primary


responsibilities:
 Data encapsulation, including frame
assembly before transmission, and frame
parsing/error detection during and after
reception
 Media access control, including initiation of
frame transmission and recovery from
transmission failure
Ethernet
Frame Format
Preamble (PRE)—Consists of 7 bytes. The PRE is an alternating pattern
of ones and zeros that tells receiving stations that a frame is coming, and
that provides a means to synchronize the frame-reception portions of
receiving physical layers with the incoming bit stream.
Start-of-frame delimiter (SOF)—Consists of 1 byte. The SOF is an
alternating pattern of ones and zeros, ending with two consecutive 1-bits
indicating that the next bit is the left-most bit in the left-most byte of the
destination address.
Destination address (DA)—Consists of 6 bytes. The DA field identifies
which station(s) should receive the frame. The left-most bit in the DA field
indicates whether the address is an individual address (indicated by a 0)
or a group address (indicated by a 1). The second bit from the left
indicates whether the DA is globally administered (indicated by a 0) or
locally administered (indicated by a 1). The remaining 46 bits are a
uniquely assigned value that identifies a single station, a defined group of
stations, or all stations on the network.

Ethernet
Frame Format
Source addresses (SA)—Consists of 6 bytes. The SA field
identifies the sending station. The SA is always an individual
address and the left-most bit in the SA field is always 0.

Length/Type—Consists of 2 bytes (0600<=type-Eth,


0600>length-802.3).
# 0 - 1500 length field (IEEE 802.3 and/or 802.2)
# 0x0800 IP(v4), Internet Protocol version 4
# 0x0806 ARP, Address Resolution Protocol
# 0x8137 IPX, Internet Packet eXchange (Novell)
# 0x86dd IPv6, Internet Protocol version 6

Ethernet
Ethernet Frame Format
Data—Is a sequence of n bytes of any value, where n is less
than or equal to 1500. If the length of the Data field is less
than 46, the Data field must be extended by adding a filler (a
pad) sufficient to bring the Data field length to 46 bytes.
Frame check sequence (FCS)—Consists of 4 bytes. This
sequence contains a 32-bit cyclic redundancy check (CRC)
value, which is created by the sending MAC and is
recalculated by the receiving MAC to check for damaged
frames. The FCS is generated over the DA, SA, Length/Type,
and Data fields.

Ethernet
ARP
and
RARP
Introduction
A computer connected to an IP/Ethernet has
two addresses
Address of network card (MAC address)
• Globally unique and unchangeable address stored on
the network card.
• Ethernet header contains the MAC address of the
source and the destination computer.
–IP address
• Each computer on a network must have a unique IP
address to communicate.
• Virtual and assigned by software.
Figure 7-1

ARP and RARP


Figure 7-2

Position of ARP and RARP


in TCP/IP protocol suite
• How ARP functions:
1. Get IP address of target.
2. Create a request ARP message
– Fill sender physical address
– Fill sender IP address
– Fill target IP address
– Target physical address is filled with 0
3. The message is passed to the data link layer
where it is encapsulated in a frame.
– Source address: physical address of the sender.
– Destination address: broadcast address.
1. Every host or router on the LAN receives the
frame.
– All stations pass it to ARP.
– All machines except the one targeted drop the
packet.
2. The target machine replies with an ARP
message that contains its physical address.
– A unicast message.
3. The sender receives the reply message and
knows the physical address of the target
machine.
Figure 7-3
ARP operation
Figure 7-4

ARP packet
Figure 7-5

Encapsulation of ARP packet


Figure 7-6:a

Four cases using ARP


Figure 7-6:b

Four cases using ARP


Figure 7-6:c

Four cases using ARP


Figure 7-6:d

Four cases using ARP


An ARP request is broadcast;
an ARP reply is unicast.
Figure 7-7: request

Example 1
Figure 7-7: reply

Example 1 (Continued)
Figure 7-8

Proxy ARP
Figure 7-10
RARP
operation
The RARP request packets are
broadcast;
the RARP reply packets are
unicast.
Figure 7-11

RARP packet
Figure 7-12

Encapsulation of RARP packet


Networking Devices
Hubs
 Multiport repeater containing multiple ports to
interconnect multiple devices
Bridges
Like a repeater, a
bridge has a single
input and single
output port
Unlike a repeater,
it can interpret the
data it retransmits
Bridges
Filtering database
 Collection of data created and used by a bridge that
correlates the MAC addresses of connected workstations
with their locations
 Also known as a forwarding table
Bridges
Spanning tree algorithm
 Routine that can detect circular traffic patterns and modify
the way multiple bridges work together, in order to avoid
such patterns
Transparent bridging
 Method used on many Ethernet networks
Switches
Subdivide a network into smaller
logical pieces
Create multiple, smaller collision
domains
In a half duplex switched network
there are only two devices in each
collision domain.
In a full-duplex switched
environment there is only 1 device
in each collision domain (0 %
chance of collision)
Cut-Through Mode and
Store and Forward Mode
Cut-through mode
 Switching mode in which

switch reads a frame’s


header and decides where
to forward the data before it
receives the entire packet
 Cut-through switches can

detect runts, or packet


fragments
Store and forward mode
 Switching mode in which

switch reads the entire data


frame into its memory and
checks it for accuracy
before transmitting the
information
Higher-Layer Switches
Switch capable of interpreting Layer 3 data is
called a Layer 3 switch
Switch capable of interpreting Layer 4 data is
called a Layer 4 switch
These higher-layer switches may also be called
routing switches or application switches
Routers
 Multiport connectivity device
 Can integrate LANs and WANs running at
different transmission speeds and using a
variety of protocols
 Routers operate at the Network layer (Layer 3)
of the OSI Model
Agenda
 Packet Tracer Exercise and Project Questions
 Routers and Routing protocols
 Routing LAB
 Remember to Bring the cable kit next week
Router Features and Functions
Modular router
 Router with
multiple slots that
can hold different
interface cards or
other devices
Router Features and Functions
Filter out broadcast transmission to
alleviate network congestion
Prevent certain types of traffic from getting
to a network
Support simultaneous local and remote
activity
Router Features and Functions
 Static routing
 Technique in which a network administrator programs a
router to use a specified paths between nodes
 Dynamic routing
 Automatically calculates best path between nodes and
accumulates this information in a routing table
 Hop
 Term used in networking to describe each trip data take
from one connectivity device to another
Router Features and Functions
Routing Protocols
To determine the best path, routers communicate
with each other through routing protocols
In addition to its ability to find the best path, a routing
protocol can be characterized according to its
convergence time and bandwidth overhead
 Convergence time
The time it takes for a router to recognize a best path in the event of
a change or outage
 Bandwidth overhead
Burden placed on an underlying network to support the routing
protocol
Routing Protocols
 The four most common routing protocols:
 RIP (Routing Information Protocol) for IP and IPX
 OSPF (Open Shortest Path First) for IP
 EIGRP (Enhanced Interior Gateway Routing
Protocol) for IP, IPX, and AppleTalk
 BGP (Border Gateway Protocol) for IP
Gateways
Combination of networking hardware and software
that connects two dissimilar kinds of networks
 Popular types of gateways include:
 E-mail gateways
 IBM host gateways
 Internet gateways
 LAN gateways
Ethernet Encapsulation

RFC 894
Ethernet
 The term Ethernet generally refers to a standard
published in 1982 by Digital Equipment Corp., Intel
Corp., and Xerox Corp.
 It is the predominant form of Local Area Networks
technology used with TCP/IP today.
 It uses an access method called CSMA/CD, which
stands for Carrier Sense, Multiple Access with
Collision Detection.
 It operates at 10 Mbits /sec and uses 48-bit
addresses
Ethernet Encapsulation
 48-bit (6bytes) source and destination addresses. These are
what we call hardware addresses.
 The Ethernet type field identifies the type of data that follows.
 The data field is the actual payload and must be at least 46
bytes
 If needed (frames with less than 46 bytes of payload), Pad
bytes are inserted to assure that the frame is long enough.
 The CRC field is a cyclic Redundancy check (a checksum)
that detects errors in the frame. (This is also called FCS or
Frame Check Sequence)
Ethernet and MTU
 As you can see there is a limit on the size of
an Ethernet frame.
 This limits the number of bytes of data to 1500
bytes.
 This characteristics of the data link layer is
called MTU, or Maximum Transmission Unite
Typical MTUs

Network MTU (bytes)

16 Mbits /sec token ring 17914


(IBM)

FDDI 4352

Ethernet 1500

Frame Relay 1500


Ethernet and MTU
 When two hosts on the same network are
communicating with each other, it is the MTU of the
network that is important.
 But, when two hosts are communicating across
multiple networks, each link can have a different
MTU. The important numbers are the MTUs of the
two networks to which the two hosts connect, but
rather the smallest MTU of any data link that packets
traverse between the two hosts.
Internet Protocol (IP)
 Provides information about how and where data
should be delivered
 Subprotocol that enables TCP/IP to
internetwork
 To internetwork is to traverse more than one LAN
segment and more than one type of network through
a router
 In an internetwork, the individual networks that are
joined together are called subnetworks
Internet Protocol (IP)

 IP datagram
 IP portion of TCP/IP frame that acts as an envelope for data
 Contains information necessary for routers to transfer data between
subnets
IP header format
IP header format: Version

• 4 bits.
• Indicates the version of IP
currently used.
– IPv4 : 0100
– IPv6 : 0110
IP header format: Header length

• 4 bits.
• IP header length : Indicates the
datagram header length in 32 bit
words (4 bits), and thus points to the
beginning of the data.
IP header format: Service type

• 8 bits.
• Specifies the level of importance that
has been assigned by a particular
upper-layer protocol.
• Precedence.
• Reliability.
• Speed.
IP header format: Total length

• 16 bits.
• Specifies the length of the
entire IP packet, including
data and header, in bytes.
IP header format: Identification

• 16 bits.
• Identification contains an integer that
identifies the current datagram.
• Assigned by the sender to aid in
assembling the fragments of a
datagram.
IP header format: Flags

• 3 bits.
• The second bit specifying whether the packet
can be fragmented .
• The last bit specifying whether the packet is the
last fragment in a series of fragmented packets.
IP header format: Fragment offset

• 13 bits.
• The field that is used to help piece together
datagram fragments.
• The fragment offset is measured in units of 8
octets (64 bits).
• The first fragment has offset zero.
IP header format: Time to Live

• 8 bits.
• Time-to-Live maintains a counter that gradually
decreases to zero, at which point the datagram
is discarded, keeping the packets from looping
endlessly.
IP header format: Protocol

• 8 bits.
• Indicates which upper-layer protocol receives
incoming packets after IP processing has been
completed
• 06 : TCP
• 17 : UDP
IP header format: Header checksum

• 16 bits.
• A checksum on the header only, helps
ensure IP header integrity.
IP header format: Addresses

• 32 bits each.
• Source IP Address
• Destination IP Address
IP header format: Options

• Variable length.
• Allows IP to support various options, such
as security, route, error report ...
IP header format: Padding

• The header padding is used to ensure that


the internet header ends on a 32 bit
boundary.

You might also like