Repeaters can Mix 802.3 PHY Standards Repeater NIC BNC AUI Connectors RJ-45 UTPDrop Cables 10Base5 Trunk Cable 10Base2 10Base-T.

Slides:



Advertisements
Similar presentations
CCNA3: Switching Basics and Intermediate Routing v3.0 CISCO NETWORKING ACADEMY PROGRAM Switching Concepts Introduction to Ethernet/802.3 LANs Introduction.
Advertisements

Ethernet “dominant” LAN technology: cheap $20 for 100Mbs!
University of Calgary – CPSC 441.  Ethernet, defined under IEEE 802.3, is one of today's most widely used data communications standards  It finds its.
COS 338 Day 7. DAY 7 Agenda Questions? Capstone Proposal must be approved by OCT 6 Submit at any time (prior to Oct 6) using format specified in Capstone.
Ethernet Risanuri Hidayat. Ethernet The term Ethernet refers to the family of local-area network (LAN) products covered by the IEEE standard. Three.
The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
DCN286 INTRODUCTION TO DATA COMMUNICATION TECHNOLOGY Ethernet Fundamentals.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—1-1 Building a Simple Network Understanding Ethernet.
CIM 2465 Fundamentals of Ethernet1 Fundamentals of Ethernet (Topic 3) Textbook: Networking Basics, CCNA 1 Companion Guide, Cisco Press Cisco Networking.
1 Version 3.0 Module 6 Ethernet Fundamentals. 2 Version 3.0 Why is Ethernet so Successful? In 1973, it could carry data at 3 Mbps Now, it can carry data.
CCNA 1 v3.1 Module 6 Review. 2 What 3 things happen on an Ethernet network after a collision occurs? A backoff algorithm is invoked and transmission is.
1 Computer Networks Local Area Networks. 2 A LAN is a network: –provides Connectivity of computers, mainframes, storage devices, etc. –spans limited geographical.
Network Concepts. Networks LAN WAN Main Concepts n Protocol n Media n Topology.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
5-1 Data Link Layer r Today, we will study the data link layer… r This is the last layer in the network protocol stack we will study in this class…
Ethernet By far, the dominant standard for guided media for the internet is Ethernet. How does it work?
Understanding Network Architecture Access Methods –CSMA/CD Carrier Sense Multiple Access/Collision Detect –CSMA/CA Carrier Sense Multiple Access/Collision.
1 LAN Topologies, Access methods (Week 1, Wednesday 1/10/2007) © Abdou Illia, Spring 2007.
Introduction to Media Access Control Protocols Yerang Hur and Jiaxiang Zhou System Design Research Lab. Dept. of Computer and Information Science.
Enhanced CSMA Additional improvement  Use CSMA access  Listen while transmitting  Stop immediately if collision sensed  Called collision detection.
Chapter 1-3 The Ethernet LAN. Ethernet The networking protocol used in most modern computer networks is Ethernet. Ethernet is a CSMA/CD LAN protocol.
1 10Base-T Ethernet LAN. 2 LANs u Local Area Networks u Limited Geographical Area –Single office –Single building –University campus or industrial park.
Small Ethernet LANs Chapter 7 Copyright 2001 Prentice Hall Revision 2: July 2001.
Small Ethernet LANs Chapter 7 Copyright 2001 Prentice Hall Revision 2: July 2001.
Ethernet Two nodes transmit at the same time
Ethernet, MAC podvrstva
Chapter 13 Wired LANs: Ethernet
Introduction1-1 Data Communications and Computer Networks Chapter 5 CS 3830 Lecture 27 Omar Meqdadi Department of Computer Science and Software Engineering.
Packet Transmission (Part III) Local Area Networks (LANs)
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
Ch. 16 High-Speed LANs The Emergence of High- Speed LANs Trends –Computing power of PCs has continued to grow. –MIS organizations recognize the.
NUS.SOC.CS2105 Ooi Wei Tsang Application Transport Network Link Physical you are here.
Ethernet Fundamentals Sem1 Module 6 – Part 2. Layer 2 framing.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 14 Local Area Networks: Ethernet.
Ethernet Fundamentals. The success of Ethernet is due to the following factors: Simplicity and ease of maintenance Ability to incorporate new technologies.
1 Data Link Layer Lecture 22 Imran Ahmed University of Management & Technology.
Secured Network Design
Chapter 3 Data Link Layer With special focus on Ethernet.
1 Semester 1 CHAPTER 6 REVIEW JEOPARDY Frames Data Link LayerMACAddressingHexadecimalsMiscellaneous
Chapter 1 - Local Area Network Technologies. How IP Datagrams are Encapsulated IP datagrams are found at the OSI Network layer IP datagrams are sent to.
1Ethernet Lecture # 12 Computer Communication & Networks.
1 CS4550: Computer Networks II Review Data Link Layer.
17 - Winter 2005 ECE ECE 766 Computer Interfacing and Protocols 1 Local Area Networks Need for high performance communications for physically close devices.
Chapter 6 – Layer 2 MAC, Frames, Hex, etc.. Layer 1 / Layer 2 Layer 1 Signals, media, bit streams Layer 2 –Communicates with upper layers using Logical.
Enterprise network 8.1:Introduction 8.2:LANs 8.3:Ethernet / IEEE :Token ring 8.5:Bridges.
1 Ethernet LAN. 2 LANs u Local Area Networks u Limited Geographical Area –Single office –Single building –University campus or industrial park u Generally,
Suntorn Witosurapot Communication networks and networking for managers Suntorn Witosurapot Contact Address: Phone: or
Ethernet Overview it the IEEE standard for Ethernet.
Data Link Layer and Ethernet COM211 Communications and Networks CDA College Theodoros Christophides
Department of Computer Science, University of Peshawar Multiple Access.
Chapter 14 Local Area Networks
Rehab AlFallaj.  Standards determine:  Techniques used in the networks.  Its protocols.  Network specifications and features.
Chapter Objectives After completing this chapter you will be able to: Describe in detail the following Local Area Network (LAN) technologies: Ethernet.
Local Area Networks: Topologies. 2 Packet Identification & MAC Addresses Each packet specifies an intended recipient with an identifier. – Demultiplexing.
Data Communication Networks Lec 18. Wired LAN:Ethernet Datalink layer – Logical link control(LLC) – MAC Physical layer.
Ch. 16 Ethernet Traditional Ethernet IEEE Medium Access Control –Carrier Sense Multiple Access with Collision Detection (CSMA/CD) –The most.
ETHERNET Yash Vaidya. Introduction Ethernet is a family of computer networking technologies for local area networks (LANs). Ethernet was commercially.
Slide จาก St. Clair College in Windsor, อาจารย์ ดร. ชัชวิน นามมั่น Twitter :
1 Kyung Hee University Chapter 13 Wired LANs: Ethernet.
Local Area Networks: Topologies
CS 457 – Lecture 6 Ethernet Spring 2012.
Introduction to Networks Ethernet CNET 124 – Introduction to Networks/Week 3 Week 5 – Objectives Chapter 5-Ethernet Ethernet Protocol Address.
CT1303 LAN Rehab AlFallaj.
Chapter 12 Local Area Networks
Data Link Issues Relates to Lab 2.
Protocol layering and data
Chapter 12 Local Area Networks
Protocol layering and data
Chapter 12 Local Area Networks
Chaithra Ashwin Sanjana
Presentation transcript:

Repeaters can Mix PHY Standards Repeater NIC BNC AUI Connectors RJ-45 UTPDrop Cables 10Base5 Trunk Cable 10Base2 10Base-T

802.3 MAC Layer: Access Control Media Access Control (MAC) Layer –Control over when a station may transmit –Only one station may transmit at a time with a hub –Otherwise, their signals would be scrambled Hub

802.3 MAC Layer: Access Control Access Control in Ethernet: CSMA/CD Carrier Sense Multiple Access (CSMA) –Carrier sense = listen to traffic –Multiple access = control multiple stations

802.3 MAC Layer: Access Control Access Control in Ethernet: CSMA/CD CSMA Operation –If no one else is transmitting, NIC may transmit –If anyone else is transmitting, NIC must wait until nobody is transmitting If Incoming Traffic, wait If No Incoming Traffic, send

802.3 MAC Layer: Access Control CSMA/CD Collision Detection (CD) –If two stations transmit at the same time, each hears the other –Both stop, wait random amounts of time –Transmit after wait, but only if the line is free

802.3 MAC Layer: Access Control CSMA/CD Collision Detection –If there is another collision –Stations back off a longer random time period –After 16 collisions, discard the frame

802.3 MAC Layer: Access Control Switches Do Not Need CSMA/CD –No danger of collision –Can even work in full duplex (802.3x), with NICs sending and receiving at the same time However, Ordinary NICs Can Work With Switches –Only hear other traffic if the traffic is directed at them, so waits to transmit are rare and brief

802.3 Ethernet MAC Layer Frame MAC Standard Also Defines Ethernet MAC Frame –Header –Data Field –Trailer Header Has Multiple Fields –Measure size in octets (bytes) TrailerData Field Header Fields Ethernet Frame

802.3 Ethernet MAC Layer Frame Preamble and Start of Frame Delimiter –To synchronize receiver’s clock –Preamble is 56-bit alternating … pattern –SFD is to end the synchronization –Together, 64-bit synchronizing pattern PreSFDDASALenDataPADFCS Ethernet MAC Layer Frame

802.3 Ethernet MAC Layer Frame Destination Address Field –Address of destination device (receiver) Source Address Field –Address of source device (sender) 48-bit MAC Addresses –Must be unique –All NICs are sold with unique MAC addresses PreSFDDASALenDataPADFCS

802.3 Ethernet MAC Layer Frame Source and Destination Addresses are Expressed in Hexadecimal Notation (hex) –Base 16 –48 bits are divided into twelve 4-bit units –Each unit is represented by a hex symbol (0-9, A-F) –Grouped in pairs of symbols, followed by a lower-case h for Hex PreSFDDASALenDataPADFCS A1-BD-23-0C-09-C3 h

802.3 Ethernet MAC Layer Frame Hex Symbols BitsHex Symbol BitsHex Symbol A B C D E F

802.3 Ethernet MAC Layer Frame Length Field (2 Octets) –Length of the Data Field, not of the entire frame –Maximum data file size is 1500 octets LenDataPAD

802.3 Ethernet MAC Layer Frame Data Field –Frame of next higher layer, LLC PAD Field –46-octet minimum size for MAC data field plus PAD –If Data Field is smaller, add PAD field to bring data field plus PAD to 46 octets LenDataPAD

802.3 Ethernet MAC Layer Frame Frame Check Sequence Field (2 Octets) –Error checking information –Sending computer computes FCS number and places it in FCS field –Uses cyclical redundancy check (CRC) method PreSFDDASALenDataPADFCS

802.3 Ethernet MAC Layer Frame Frame Check Sequence (2 Octets) –Receiving NIC recomputes FCS number –If disagrees with transmitted FCS field, discards the frame! –Does not ask for a retransmission –A higher layer must do this PreSFDDASALenDataPADFCS

802.3 Ethernet MAC Layer Frame Tag Fields Being Added –Added after address fields –To designate priority (frames with higher priority go first if there is congestion) –To designate VLANs (Ch. 8) –802.1Q standardizes overall structure –802.1p standardizes priority levels PreSFDDASALenDataPADFCSTPIDTCI

802.3 Ethernet MAC Layer Frame Tag Protocol ID (TPID) (2 Octets) –Located where length field normally goes –Identifies frame as tagged –If a length field, must be less than 1500, because the maximum length of the data field is 1500 octets –TPID field is given the value hex (33,024 decimal) PreSFDDASALenDataPADFCSTPIDTCI

802.3 Ethernet MAC Layer Frame Tag Control Information (TCI) (2 Octets) –Gives specific tagging information –Three priority bits (000 to 111) –Eight priority levels, with 111 being high –12-bit VLAN ID (see Chapter 8) –One bit canonical form indicator (rarely used) PreSFDDASALenDataPADFCSTPIDTCI

Processing an Incoming MAC Frame Receiving NIC reads Preamble and SFD –Synchronizes itself to the incoming bit stream Receiving NIC reads Source and Destination Address –Discards frame if destination address is not its own –Saves addresses in RAM

Processing an Incoming MAC Frame Reads Next two Octets –If Length field (values <= 1500), sets aside room in RAM for data field –If TPID, handles TCI information, then goes on and reads Length Field –Note: reads next two octets; Not “the length field” Places Data Field in RAM Discards PAD if Present –Note: sender adds the PAD, not the receiver

Processing an Incoming MAC Frame Examines Frame Check Sequence –Recomputes the Value based on bits in other fields If same value as transmitted, the frame is good –Passes deencapsulated data field to LLC layer If different value than transmitted, frame is bad –Discards the frame –There is no error correction (retransmission)