Module 6 Chapter 5. Ethernet Ethernet is now the dominant LAN technology in the world. Ethernet is not one technology but a family of LAN technologies.

Slides:



Advertisements
Similar presentations
Ethernet “dominant” LAN technology: cheap $20 for 100Mbs!
Advertisements

Ethernet Risanuri Hidayat. Ethernet The term Ethernet refers to the family of local-area network (LAN) products covered by the IEEE standard. Three.
1 Version 3.0 Module 6 Ethernet Fundamentals. 2 Version 3.0 Why is Ethernet so Successful? In 1973, it could carry data at 3 Mbps Now, it can carry data.
CCNA 1 v3.1 Module 6 Review. 2 What 3 things happen on an Ethernet network after a collision occurs? A backoff algorithm is invoked and transmission is.
Chapter 6 Ethernet Fundamentals By: Steven P. Luse.
Institute of Technology Sligo - Dept of Computing Naming & Framing Ch. 6–Layer 2 Concepts Paul Flynn.
Ethernet: CSMA/CD (Carrier Sense Multiple Access with Collision Detection) Access method: method of controlling how network nodes access communications.
WXES2106 Network Technology Semester /2005
The Saigon CTT Semester 1 CHAPTER 6. The Saigon CTT  Content LAN Standards. Hexadecimal Numbers. MAC Addressing. Framing. Media Access Control (MAC).
CISCO NETWORKING ACADEMY PROGRAM (CNAP) Ethernet Fundamentals
Ethernet.
Ethernet Fundamentals
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
SIMS-201 LAN Basics, MANs, WANs.
Enhanced CSMA Additional improvement  Use CSMA access  Listen while transmitting  Stop immediately if collision sensed  Called collision detection.
1 Chapter 2: LAN Standards, Physical Connectivity, and Media Access.
Ethernet, MAC podvrstva
Chapter 13 Wired LANs: Ethernet
Introduction to IT and Communications Technology Justin Champion C208 – 3292 Ethernet Fundamentals CE
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
Naming & Framing Ch. 6–Layer 2 Concepts By: Allan Johnson.
Copyright Objectives: Chapter 3: Layer 2 Ethernet  Ethernet Fundamentals Ethernet Operations Carrier Sense Multiple Access/Collision.
Ethernet Fundamentals Sem1 Module 6 – Part 2. Layer 2 framing.
Copyright CCNA 1 Chapter 5 Ethernet Fundamentals By Your Name.
1 Layer 2: Concepts Honolulu Community College Cisco Academy Training Center Semester 1 Version
Jaringan Komputer Dasar Ethernet Aurelio Rahmadian.
Ethernet Fundamentals. The success of Ethernet is due to the following factors: Simplicity and ease of maintenance Ability to incorporate new technologies.
Access to Shared Media - Media Access Control protocols RD-CSY10171.
CCNA1 v3 Module 1 v3 CCNA 1 Module 6 JEOPARDY K. Martin.
Ethernet Term Paper Introduced by: Almarshood, Yosef Bahaitham, Ahmed Alrashudi, Ahmed.
1 Semester 1 CHAPTER 6 REVIEW JEOPARDY Frames Data Link LayerMACAddressingHexadecimalsMiscellaneous
CCNA 1 v3.0 Module 6 Ethernet Fundamentals. Objectives.
Version 4.0 Ethernet Network Fundamentals – Chapter 9 Sandra Coleman, CCNA, CCAI.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Ethernet Network Fundamentals – Chapter 9.
Chapter 1 - Local Area Network Technologies. How IP Datagrams are Encapsulated IP datagrams are found at the OSI Network layer IP datagrams are sent to.
Ethernet Fundamentals CCNA Semester 1 Chapter 6 V. 3.0 Prepared by: Terren L. Bichard.
Semester 1 Module 6 Ethernet Fundamentals
1Ethernet Lecture # 12 Computer Communication & Networks.
Chapter 6 – Layer 2 MAC, Frames, Hex, etc.. Layer 1 / Layer 2 Layer 1 Signals, media, bit streams Layer 2 –Communicates with upper layers using Logical.
The Saigon CTT Semester 1 CHAPTER 6 Le Chi Trung.
Ch 13. Wired LANs: Ethernet IEEE Standards Project 802 launched in 1985 – To set standards to enable intercommunication among equipment from a variety.
Ethernet Overview it the IEEE standard for Ethernet.
Data Link Layer and Ethernet COM211 Communications and Networks CDA College Theodoros Christophides
Naming & Framing Ch. 6–Layer 2 Concepts. Layer 2’s Job For every limitation of Layer 1, Layer 2 has a solution. Layer 1 cannot name computers. How does.
IEEE STANDARDS IEEE STANDARDS In 1985, the Computer Society of the IEEE started a project, called Project 802, to set standards to enable intercommunication.
CCNA3 Module 4 Brierley Module 4. CCNA3 Module 4 Brierley Topics LAN congestion and its effect on network performance Advantages of LAN segmentation in.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.0 Module 6 Ethernet Fundamentals.
Semester 1 v CCNA 1 Module 6: Ethernet Fundamentals.
Introduction to Ethernet In 1985, the Institute of Electrical and Electronics Engineers (IEEE) published standards for LANs. These standards start with.
+ Lecture#2: Ethernet Asma ALOsaimi. + Objectives In this chapter, you will learn to: Describe the operation of the Ethernet sublayers. Identify the major.
Chapter Objectives After completing this chapter you will be able to: Describe in detail the following Local Area Network (LAN) technologies: Ethernet.
Introduction to Communication Lecture (10) 1. 2 Wired LANs: Ethernet IEEE Project 802 defines the LLC and MAC sublayers for all LANs including Ethernet.
Lec # 23 Data communucation Muhammad Waseem Iqbal 1ethernet.
Slide จาก St. Clair College in Windsor, อาจารย์ ดร. ชัชวิน นามมั่น Twitter :
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 OSI data link layer CCNA Exploration Semester 1 Chapter 7.
1 Kyung Hee University Chapter 13 Wired LANs: Ethernet.
Introduction to Networks v6.0
Instructor Materials Chapter 5: Ethernet
Ethernet and Token Ring LAN Networks
Part 1 Ethernet Fundamentals
Ethernet and Token Ring LAN Networks
Chapter 12 Local Area Networks
Protocol layering and data
CCNA 1 Chapter 5 Ethernet Fundamentals
CCNA 1 v3 JEOPARDY Module 6 CCNA1 v3 Module 6 K. Martin.
Chapter 12 Local Area Networks
Protocol layering and data
Chapter 12 Local Area Networks
Chaithra Ashwin Sanjana
Ethernet and Token Ring LAN Networks
Presentation transcript:

Module 6 Chapter 5

Ethernet Ethernet is now the dominant LAN technology in the world. Ethernet is not one technology but a family of LAN technologies Ethernet specifications support different media, bandwidths, and other Layer 1 and 2 variations

Ethernet The success of Ethernet is due to the following factors: –Simplicity and ease of maintenance –Ability to incorporate new technologies –Reliability –Low cost of installation and upgrade

Ethernet Institute of Electrical and Electronics Engineers (IEEE) standards These standards start with the number 802 The standard for Ethernet is IEEE wanted to make sure that its standards were compatible with the International Standards Organization Essentially, Ethernet and IEEE are the same standards

Standards Standards guarantee: –minimum bandwidth –operability by specifying the maximum number of stations per segment, –maximum segment length –maximum number of repeaters between stations

Ethernet Ethernet speeds can be 10, 100, 1000, or 10,000 Mbps The basic frame format remain consistent across all forms of Ethernet

LLC & MAC Ethernet relies on base band signaling, which uses the entire bandwidth of the transmission medium Ethernet operates in two areas of the OSI model, the lower half of the data link layer, known as the MAC sub layer and the physical layer

MAC Address Ethernet MAC addresses: –MAC addresses are sometimes referred to as burned-in addresses (BIA) –MAC addresses are burned into read-only memory (ROM) and –MAC addresses are copied from ROM into random-access memory (RAM) when the NIC initializes.

MAC Address Ethernet MAC addresses: –48 bits in length –Expressed as twelve hexadecimal digits –The first six hexadecimal digits, which are administered by the IEEE

Mac Address Ethernet MAC addresses: –The first six hexadecimal digits identify the manufacturer This portion of the MAC address is known as the Organizational Unique Identifier (OUI) –The remaining six hexadecimal digits represent the interface serial number, or a value administered by the specific equipment manufacturer

Layer 2 Framing A single generic frame has sections called fields The names of the fields are as follows: –Start frame field –Address field –Length / type field –Data field –Frame check sequence field

Frame Fields Start frame field All frames, regardless of technology, have a beginning signaling sequence of bytes Address field All frames contain naming information, such as the name of the source node (MAC address) and the name of the destination node (MAC address

Frame Fields Length / type field A length field specifies the exact length of a frame in bytes Some frames have a type field, which specifies the Layer 3 protocol making the sending request The field labeled Length/Type was only listed as –Length in the early IEEE versions –Type in the DIX version –These two uses of the field were officially combined in a later IEEE version Data field The data package has two parts, the user application data and the encapsulated bytes to be sent to the destination computer

Frame Fields Frame check sequence field The Frame Check Sequence (FCS) field contains a number that is calculated by the source node based on the data in the frame This FCS is then added to the end of the frame that is being sent When the destination node receives the frame the FCS number is recalculated and compared with the FCS number included in the frame

Media Access Control There are two broad categories of Media Access Control –Deterministic (taking turns) Token Ring and FDDI –Token Ring is a collision less environment as only one host is able to transmit at any given time –Non-deterministic (first come, first served) CSMA/CD –The NIC listens for an absence of a signal on the media and starts transmitting. If two nodes transmit at the same time a collision occurs and none of the nodes are able to transmit

CSMA/CD CSMA/CD used in Ethernet performs three functions: –Transmitting and receiving data packets –Decoding data packets and checking them for valid addresses before passing them to the upper layers of the OSI model –Detecting errors within data packets or on the network

CSMA/CD

A collision has occurred when the amplitude of the signal on the networking media increases Each node that is transmitting will continue to transmit for a short time to ensure that all devices see the collision All the devices have detected the collision a back off algorithm is invoked and transmission is stopped Nodes stop transmitting for a random period of time When the delay period expires, all devices on the network can attempt to gain access to the networking media

Slot Time For all speeds of Ethernet transmission at or below 1000 Mbps Half duplex –A transmission may be no smaller than the slot time Slot time is calculated assuming maximum cable lengths on the network The calculated slot time is just longer than the theoretical amount of time required to travel to the furthest point Collide with another transmission at the last possible instant Then have the collision fragments return to the sending station and be detected

Slot Time Half duplex is not permitted in 10-Gigabit Ethernet –Because an entire minimum-sized frame would be transmitted before the first bit reached the end of the first 100 meters of UTP cable Full-duplex eliminates the concept of slot time –Because the timing restriction for collision detection is removed

Slot Time Slot Time only applies to half duplex Ethernet links

Interframe Spacing The minimum spacing between two non-colliding frames is called the interframe spacing Interframe spacing is measured from the FCS field of the first frame to the preamble of the second frame

Interframe Spacing If the MAC layer is unable to send the frame after sixteen attempts it gives an error to the network layer. This would happen: –During heavy network loads –When a physical problem exists on the network

Ethernet Errors Collision or runt –Simultaneous transmission occurring before slot time has elapsed Late collision –Simultaneous transmission occurring after slot time has elapsed Jabber, long frame and range errors –Excessively or illegally long transmission Short frame, collision fragment or runt –Illegally short transmission

Ethernet Errors FCS error –Corrupted transmission Alignment error –Insufficient or excessive number of bits transmitted Range error –Actual and reported number of octets in frame do not match Ghost or jabber –Unusually long Preamble or Jam event

THE END Take a Break !