CCNA 1 Chapter 5 Ethernet Fundamentals

Slides:



Advertisements
Similar presentations
Chapter 7 Data Link Layer
Advertisements

DCN286 INTRODUCTION TO DATA COMMUNICATION TECHNOLOGY Ethernet Fundamentals.
1 Version 3.0 Module 6 Ethernet Fundamentals. 2 Version 3.0 Why is Ethernet so Successful? In 1973, it could carry data at 3 Mbps Now, it can carry data.
CCNA 1 v3.1 Module 6 Review. 2 What 3 things happen on an Ethernet network after a collision occurs? A backoff algorithm is invoked and transmission is.
Chapter 6 Ethernet Fundamentals By: Steven P. Luse.
Institute of Technology Sligo - Dept of Computing Naming & Framing Ch. 6–Layer 2 Concepts Paul Flynn.
1 Computer Networks Local Area Networks. 2 A LAN is a network: –provides Connectivity of computers, mainframes, storage devices, etc. –spans limited geographical.
Module 6 Chapter 5. Ethernet Ethernet is now the dominant LAN technology in the world. Ethernet is not one technology but a family of LAN technologies.
The Saigon CTT Semester 1 CHAPTER 6. The Saigon CTT  Content LAN Standards. Hexadecimal Numbers. MAC Addressing. Framing. Media Access Control (MAC).
CISCO NETWORKING ACADEMY PROGRAM (CNAP) Ethernet Fundamentals
Local Area Network local area network (LAN) is a computer network that is designed for a limited geographic area such as a building or a campus. Although.
Ethernet.
Ethernet Fundamentals
Ethernet, MAC podvrstva
Introduction to IT and Communications Technology Justin Champion C208 – 3292 Ethernet Fundamentals CE
Wired LANs: Ethernet In Chapter 1, we learned that a local area network (LAN) is a computer network that is designed for a limited geographic area such.
Naming & Framing Ch. 6–Layer 2 Concepts By: Allan Johnson.
Copyright Objectives: Chapter 3: Layer 2 Ethernet  Ethernet Fundamentals Ethernet Operations Carrier Sense Multiple Access/Collision.
Ethernet Fundamentals Sem1 Module 6 – Part 2. Layer 2 framing.
Copyright CCNA 1 Chapter 5 Ethernet Fundamentals By Your Name.
1 Layer 2: Concepts Honolulu Community College Cisco Academy Training Center Semester 1 Version
1 Ethernet & IEEE Cisco Section 7.3 Stephanie Hutter October 2000.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Data Link Layer Dr. Muazzam A. Khan.
Ethernet Fundamentals. The success of Ethernet is due to the following factors: Simplicity and ease of maintenance Ability to incorporate new technologies.
CCNA1 v3 Module 1 v3 CCNA 1 Module 6 JEOPARDY K. Martin.
1 Semester 1 CHAPTER 6 REVIEW JEOPARDY Frames Data Link LayerMACAddressingHexadecimalsMiscellaneous
CCNA 1 v3.0 Module 6 Ethernet Fundamentals. Objectives.
Version 4.0 Ethernet Network Fundamentals – Chapter 9 Sandra Coleman, CCNA, CCAI.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Ethernet Network Fundamentals – Chapter 9.
Chapter 1 - Local Area Network Technologies. How IP Datagrams are Encapsulated IP datagrams are found at the OSI Network layer IP datagrams are sent to.
Semester 1 Module 6 Ethernet Fundamentals
Chapter 6 – Layer 2 MAC, Frames, Hex, etc.. Layer 1 / Layer 2 Layer 1 Signals, media, bit streams Layer 2 –Communicates with upper layers using Logical.
Enterprise network 8.1:Introduction 8.2:LANs 8.3:Ethernet / IEEE :Token ring 8.5:Bridges.
The Saigon CTT Semester 1 CHAPTER 6 Le Chi Trung.
Copyright 2002Cisco Press: CCNA Instructor’s Manual Year 2 - Chapter 16/Cisco 4 - Module 9 CCNA Certification Exam Review By Your Name.
Ethernet Overview it the IEEE standard for Ethernet.
Data Link Layer and Ethernet COM211 Communications and Networks CDA College Theodoros Christophides
Naming & Framing Ch. 6–Layer 2 Concepts. Layer 2’s Job For every limitation of Layer 1, Layer 2 has a solution. Layer 1 cannot name computers. How does.
Chapter 7 OSI Data Link Layer.
Semester 1 v CCNA 1 Module 6: Ethernet Fundamentals.
+ Lecture#2: Ethernet Asma ALOsaimi. + Objectives In this chapter, you will learn to: Describe the operation of the Ethernet sublayers. Identify the major.
Chapter Objectives After completing this chapter you will be able to: Describe in detail the following Local Area Network (LAN) technologies: Ethernet.
ETHERNET Yash Vaidya. Introduction Ethernet is a family of computer networking technologies for local area networks (LANs). Ethernet was commercially.
Slide จาก St. Clair College in Windsor, อาจารย์ ดร. ชัชวิน นามมั่น Twitter :
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 OSI data link layer CCNA Exploration Semester 1 Chapter 7.
1 Kyung Hee University Chapter 13 Wired LANs: Ethernet.
Jaringan Komputer_D3 TT
Introduction to Networks v6.0
Instructor Materials Chapter 5: Ethernet
DATA COMMUNICATION Lecture-42.
Underlying Technology
Data Link Layer Dr. Muazzam A. Khan.
Ct1403 Lecture#2: DATA LINK LAYER
Instructor: Mr. Malik Zaib
Ethernet and Token Ring LAN Networks
Part 1 Ethernet Fundamentals
Ethernet and Token Ring LAN Networks
Chapter 12 Local Area Networks
Physical and Logical Topologies
Protocol layering and data
CCNA 1 v3 JEOPARDY Module 6 CCNA1 v3 Module 6 K. Martin.
Instructor: Mr. Malik Zaib
Chapter 12 Local Area Networks
Protocol layering and data
Chapter 12 Local Area Networks
Chaithra Ashwin Sanjana
LAN Addresses and ARP IP address: drives the packet to destination network LAN (or MAC or Physical) address: drives the packet to the destination node’s.
Ethernet and Token Ring LAN Networks
Chapter 13 Wired LANs: Ethernet
Presentation transcript:

CCNA 1 Chapter 5 Ethernet Fundamentals By Your Name

Objectives Ethernet fundamentals Ethernet operation

Introduction to Ethernet The success of Ethernet is due to its simplicity and ease of maintenance, as well as its ability to incorporate new technologies, reliability, and low cost of installation and upgrade.

Comparing LAN Standards

OSI Layer 1 and 2 Together Are the Access Protocols These are the delivery system protocols. Independent of: Network OS Upper-level protocols TCP/IP, IPX/SPX Sometimes called: Access methods Access protocols Access technologies Media access LAN protocols WAN protocols Ethernet, Fast Ethernet, Gigabit Ethernet, Token Ring, FDDI, Frame Relay, ATM, PPP, HDLC, and so on

IEEE Standard Divided OSI Layer 2 into two sublayers Media Access Control (MAC) – Traditional L2 features Transitions down to media Logical link control (LLC) – New L2 features Transitions up to the network layer

Logical Link Control (LLC) Allows part of the data link layer to function independent of LAN access technologies (protocols / methods) Provides services to network layer protocols, while communicating with access technologies below it LAN access technologies: Ethernet Token Ring FDDI

Logical Link Control (LLC) Participates in the data encapsulation process LLC PDU between Layer 3 and MAC sublayer. Adds control information to the network layer data to help deliver the packet. It adds two fields: Destination Service Access Point (DSAP) Source Service Access Point (SSAP) Supports both connectionless and connection-oriented upper-layer protocols. Allows multiple higher-layer protocols to share a single physical data link.

Naming Ethernet uses MAC addresses that are 48 bits in length and expressed as 12 hexadecimal digits. The first 6 hexadecimal digits, which are administered by the IEEE, identify the manufacturer or vendor and thus comprise the organizational unique identifier (OUI). The remaining 6 hexadecimal digits represent the interface serial number, or another value administered by the specific equipment manufacturer.

Layer 2 Framing Framing is the Layer 2 encapsulation process; a frame is the Layer 2 protocol data unit. A single generic frame has sections called fields, and each field is composed of bytes.

Framing Why framing is necessary Frame format diagram Generic frame format

Why Framing Is Necessary Binary data is a stream of 1s and 0s. Framing breaks the stream into decipherable groupings: Start and stop indicator fields Naming or addressing fields Data fields Quality-control fields Framing is the Layer 2 encapsulation process. A frame is the Layer 2 protocol data unit.

Generic Frame Format Start Frame field Address fields (source and destination MAC) Type/Length field Data field FCS (Frame Check Sequence) field Frame Stop field

Ethernet Frame Fields Some of the fields permitted or required in an 802.3 Ethernet frame are as follows: Preamble Start Frame Delimiter Destination Address Source Address Length/Type Data and Pad Frame Check Sequence (FCS) Extension

Ethernet Operation

Media Access Control (MAC) Provides MAC addressing (naming) Depending on access technology (Ethernet, Token Ring, FDDI), provides the following: Data transmission control Collision resolution (retransmission) Layer 2 frame preparation (data framing) Frame check sequence (FCS)

Media Access Control (MAC) Protocols Ethernet (IEEE 802.3) Logical bus topology Physical star or extended star Nondeterministic First-come, first-served Token Ring (IEEE 802.5) Logical ring Physical star topology Deterministic Token controls traffic Older declining technology FDDI (IEEE 802.5) Logical ring topology Physical dual-ring topology Near-end-of-life technology

Ethernet (CSMA/CD) Carrier sense multiple access with collision detection

Ethernet Timing Any station on an Ethernet network wanting to transmit a message first “listens” to ensure that no other station is currently transmitting. If the cable is quiet, the station begins transmitting immediately.

Interframe Spacing and Backoff

Error Handling Collisions are the mechanism for resolving contention for network access. Collisions result in network bandwidth loss that is equal to the initial transmission and the collision jam signal. This affects all network nodes, possibly causing significant reduction in network throughput.

Types of Collisions Three types of collisions are: Local Remote Late

Ethernet Errors The following are the sources of Ethernet error: Simultaneous transmission occurring before slot time has elapsed (collision or runt) Simultaneous transmission occurring after slot time has elapsed (late collision) Excessively or illegally long transmission (jabber, long frame and range errors) Illegally short transmission (short frame, collision fragment or runt) Corrupted transmission (FCS error) Insufficient or excessive number of bits transmitted (alignment error) Actual and reported number of octets in frame don't match (range error) Unusually long preamble or jam event (ghost or jabber)

FCS and Beyond A received frame that has a bad frame check sequence, also referred to as a checksum or CRC error, differs from the original transmission by at least 1 bit.

Ethernet Autonegotiation A process called autonegotiation (of speeds at half or full duplex) was developed. This process defines how two link partners may automatically negotiate a configuration offering the best common performance level. It has the additional advantage of only involving the lowest part of the physical layer.

Link Establishment There are only two ways to achieve a full-duplex link: Through a completed cycle of autonegotiation Or, by administratively forcing both link partners to full duplex