Ethernet Fundamentals. The success of Ethernet is due to the following factors: Simplicity and ease of maintenance Ability to incorporate new technologies.

Slides:



Advertisements
Similar presentations
Topic 7 Local Area Networks (LAN)
Advertisements

Ethernet “dominant” LAN technology: cheap $20 for 100Mbs!
Chapter 7 Data Link Layer
DCN286 INTRODUCTION TO DATA COMMUNICATION TECHNOLOGY Ethernet Fundamentals.
CompTIA Network+ Chapter 2
Chapter 7- Data Link Layer
1 Version 3.0 Module 6 Ethernet Fundamentals. 2 Version 3.0 Why is Ethernet so Successful? In 1973, it could carry data at 3 Mbps Now, it can carry data.
CCNA 1 v3.1 Module 6 Review. 2 What 3 things happen on an Ethernet network after a collision occurs? A backoff algorithm is invoked and transmission is.
Chapter 6 Ethernet Fundamentals By: Steven P. Luse.
Institute of Technology Sligo - Dept of Computing Naming & Framing Ch. 6–Layer 2 Concepts Paul Flynn.
1 Computer Networks Local Area Networks. 2 A LAN is a network: –provides Connectivity of computers, mainframes, storage devices, etc. –spans limited geographical.
OSI Data Link Layer Network Fundamentals Chapter 7.
Module 6 Chapter 5. Ethernet Ethernet is now the dominant LAN technology in the world. Ethernet is not one technology but a family of LAN technologies.
Distributed Systems Module 1 -Basic networking Teaching unit 1 – LAN standards Ernesto Damiani University of Bozen-Bolzano Lesson 3 – Introduction to Ethernet.
The Saigon CTT Semester 1 CHAPTER 6. The Saigon CTT  Content LAN Standards. Hexadecimal Numbers. MAC Addressing. Framing. Media Access Control (MAC).
Local Area Network local area network (LAN) is a computer network that is designed for a limited geographic area such as a building or a campus. Although.
Ethernet Fundamentals
IP Network Basics. For Internal Use Only ▲ Internal Use Only ▲ Course Objectives Grasp the basic knowledge of network Understand network evolution history.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 OSI Data Link Layer Network Fundamentals – Chapter 7.
Wired LANs: Ethernet In Chapter 1, we learned that a local area network (LAN) is a computer network that is designed for a limited geographic area such.
Semester 1 CHAPTER 3 Le Chi Trung
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
Naming & Framing Ch. 6–Layer 2 Concepts By: Allan Johnson.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 16.
Network Technologies Chapter 2. Approaches to Network Communication Connection-Oriented –Circuit-switched –A dedicated connection (circuit) is formed.
Copyright Objectives: Chapter 3: Layer 2 Ethernet  Ethernet Fundamentals Ethernet Operations Carrier Sense Multiple Access/Collision.
Copyright CCNA 1 Chapter 5 Ethernet Fundamentals By Your Name.
1 Layer 2: Concepts Honolulu Community College Cisco Academy Training Center Semester 1 Version
1 Ethernet & IEEE Cisco Section 7.3 Stephanie Hutter October 2000.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Data Link Layer Dr. Muazzam A. Khan.
Access to Shared Media - Media Access Control protocols RD-CSY10171.
CCNA1 v3 Module 1 v3 CCNA 1 Module 6 JEOPARDY K. Martin.
Ethernet Term Paper Introduced by: Almarshood, Yosef Bahaitham, Ahmed Alrashudi, Ahmed.
Local Area Networks: Ethernet. IEEE Background Institution of Electrical and Electronic Engineering (IEEE) A professional non-profit organization Project.
1 Semester 1 CHAPTER 6 REVIEW JEOPARDY Frames Data Link LayerMACAddressingHexadecimalsMiscellaneous
CCNA 1 v3.0 Module 6 Ethernet Fundamentals. Objectives.
Version 4.0 Ethernet Network Fundamentals – Chapter 9 Sandra Coleman, CCNA, CCAI.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Ethernet Network Fundamentals – Chapter 9.
Chapter 6 – Layer 2 MAC, Frames, Hex, etc.. Layer 1 / Layer 2 Layer 1 Signals, media, bit streams Layer 2 –Communicates with upper layers using Logical.
The Saigon CTT Semester 1 CHAPTER 6 Le Chi Trung.
Chabot College ELEC Layer 2 - Highlights.
Copyright 2002Cisco Press: CCNA Instructor’s Manual Year 2 - Chapter 16/Cisco 4 - Module 9 CCNA Certification Exam Review By Your Name.
Ethernet Overview it the IEEE standard for Ethernet.
Data Link Layer and Ethernet COM211 Communications and Networks CDA College Theodoros Christophides
Computer Networks Syed Md. Ashraful Karim Lecturer, CSE BU.
Naming & Framing Ch. 6–Layer 2 Concepts. Layer 2’s Job For every limitation of Layer 1, Layer 2 has a solution. Layer 1 cannot name computers. How does.
Chapter 7 OSI Data Link Layer.
Rehab AlFallaj.  Standards determine:  Techniques used in the networks.  Its protocols.  Network specifications and features.
CNAP AT VCC Semester 1 CHAPTER 7 Wael Yousif Connecting The Internet Generation.
Semester 1 v CCNA 1 Module 6: Ethernet Fundamentals.
2016/3/11 1 Data Link Layer. 2016/3/11 2 Two basic services of Data Link Allows the upper layers to access the media using techniques such as framing.
Introduction to Ethernet In 1985, the Institute of Electrical and Electronics Engineers (IEEE) published standards for LANs. These standards start with.
+ Lecture#2: Ethernet Asma ALOsaimi. + Objectives In this chapter, you will learn to: Describe the operation of the Ethernet sublayers. Identify the major.
Introduction to Communication Lecture (10) 1. 2 Wired LANs: Ethernet IEEE Project 802 defines the LLC and MAC sublayers for all LANs including Ethernet.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 OSI data link layer CCNA Exploration Semester 1 Chapter 7.
1 Kyung Hee University Chapter 13 Wired LANs: Ethernet.
Introduction to Networks v6.0
Ethernet and Token Ring LAN Networks
Ethernet and Token Ring LAN Networks
Chapter 12 Local Area Networks
Protocol layering and data
CCNA 1 Chapter 5 Ethernet Fundamentals
CCNA 1 v3 JEOPARDY Module 6 CCNA1 v3 Module 6 K. Martin.
Chapter 12 Local Area Networks
Protocol layering and data
Chapter 12 Local Area Networks
Chaithra Ashwin Sanjana
LAN Addresses and ARP IP address: drives the packet to destination network LAN (or MAC or Physical) address: drives the packet to the destination node’s.
Ethernet and Token Ring LAN Networks
Presentation transcript:

Ethernet Fundamentals

The success of Ethernet is due to the following factors: Simplicity and ease of maintenance Ability to incorporate new technologies Reliability Low cost of installation and upgrade Bandwidth can be increased without changing underlying technology Introduction to Ethernet Essentially, Ethernet and IEEE are the same standards. The original idea for Ethernet grew out of the problem of allowing two or more hosts to use the same medium and prevent the signals from interfering with each other. This problem of multiple user access to a shared medium was studied in the early 1970s at the University of Hawaii

A drawing of the first Ethernet system by Bob Metcalfe of Xerox

IEEE Ethernet naming rules In BASE band signaling, the data signal is transmitted directly over the transmission medium. In BROADband signaling, not used by Ethernet, a carrier signal is modulated by the data signal and the modulated carrier signal is transmitted.

Layer 1 vs. Layer 2 Layer 1 –Cannot communicate with the upper-layer protocols –Cannot name or identify computers –Can describe only streams of bits –Cannot decide which computer will transmit data from a group in which all are trying to transmit at the same time Layer 2 –Communicates with upper-layer protocols using logical link control (LLC) –Provides an addressing (or naming) process –Uses framing to organize or group the bits –Uses a system called Media Access Control (MAC) to control transmissions Layer 2 deals with the limitations of Layer 1

IEEE Standard Divided OSI Layer 2 into two sublayers –Media Access Control (MAC) – traditional L2 features Transitions down to media –Logical link control (LLC) – new L2 features Transitions up to the network layer

Comparing LAN Standards

OSI Layer 1 and 2 Together Are the Access Protocols These are the delivery system protocols Independent of: –Network OS –Upper-level protocols TCP/IP, IPX/SPX Sometimes called: –Access methods –Access protocols –Access technologies –Media access –LAN protocols –WAN protocols Ethernet, Fast Ethernet, Gigabit Ethernet, Token Ring, FDDI, Frame Relay, ATM, PPP, and so on

Logical Link Control (LLC) LLC allows part of the data link layer to function independent of LAN access technologies (protocols / methods) –Provides services to network layer protocols, while communicating with access technologies below it. LAN access technologies: –Ethernet –Token Ring –FDDI

Logical Link Control (LLC) Participates in the data encapsulation process. –LLC PDU between Layer 3 and the MAC sublayer –Adds control information to the network layer data to help deliver the packet. It adds two fields: Destination Service Access Point (DSAP) Source Service Access Point (SSAP) Supports both connectionless and connection- oriented upper-layer protocols Allows multiple higher layer protocols to share a single physical data link

Media Access Control (MAC) Provides MAC Addressing (naming) Depending on access Technology (Ethernet, Token Ring, FDDI), Provides: –Data transmission control –Collision resolution (retransmission) –Layer 2 frame preparation (data framing) –Frame Check Sequence (FCS – frame error detection )

Media Access Control (MAC) Protocols Ethernet (IEEE 802.3) –Logical bus topology –Physical star or extended star –Nondeterministic First-come, first-served Token Ring (IEEE 802.5) –Logical ring –Physical star topology –Deterministic Token controls traffic –Older declining technology FDDI (IEEE 802.5) –Logical ring topology –Physical dual-ring topology –Deterministic Token controls traffic

Ethernet and the OSI model:

The Media Access Control (MAC) sublayer is concerned with the physical components that will be used to communicate the information. The Logical Link Control (LLC) sublayer remains relatively independent of the physical equipment that will be used for the communication process to upper layers.

Naming: The NIC uses the MAC address to assess whether the message should be passed onto the upper layers of the OSI model. The NIC makes this assessment without using CPU processing time. The MAC address is burned into ROM on the NIC card 48 bits or 12 Hex

How the NIC Uses MAC Addresses Legacy (Broadcast) Ethernet: –Source host builds a Layer 2 data frame. Its own MAC is the source address. The MAC of the target is the destination address. –All devices on the segment see the frame. –Only the target’s NIC recognizes its MAC address in the Destination Address field. –Target host copies and processes the frame. –Non-target hosts dispose of or ignore of the frame.

Layer 2 Address Encapsulation and De-encapsulation Source and Destination MAC address fields are part of the frame header.

Framing The following slides address the following topics: Why framing is necessary Frame format diagram Generic frame format

Why Framing Is Necessary Binary data is a stream of 1s and 0s. Framing breaks the stream into decipherable groupings: –Start and stop indicator fields –Naming or addressing fields –Data fields –Quality-control fields (FCS or CRC) Framing is the Layer 2 encapsulation process. A frame is the Layer 2 protocol data unit (PDU).

Generic Frame Format Start Frame Field (multiple bytes in size – preamble + SFD) Address Fields (Source & Destination MAC addresses) Type / Length Field (depending on Ethernet standard) Data Field ( bytes) FCS (Frame Check Sequence) Field Frame Stop Field (unique value)

Media Access Control (MAC): Non-Deterministic (1 st come 1 st served) Collisions occur and slow transmission Deterministic (taking turns) No Collisions

MAC rules and collision detection/backoff (JAM) When a collision occurs, each node that is transmitting will continue to transmit for a short time to ensure that all devices see the collision. (transmit 32-bit jam signal) The devices that were involved in the collision do not have priority to transmit data. Networking devices detect a collision has occurred when the amplitude of the signal on the networking media increases.

MAC rules and collision detection/backoff : 1.Host wants to transmit 2.Is carrier sensed? 3.Assemble Frame 4.Start Transmitting 5.Is a Collision detected? 6.Keep Transmitting 7.Is the transmission done? 8.Transmission complete 9.Broadcast jam signal 10.Attempts = Attempts Attempts > Too many? 12.Too many collisions; abort transmission 13.Algorithm calculates backoff 14.Wait for t microseconds

Chapter #6 Test Next Week This Class: –Chapter 5 Labs due! –Finish Labs: Chapter 5  no Labs for Chapter 6! –Wall Outlet – Layout & cut –Cable, Panel installation next week