Presentation is loading. Please wait.

Presentation is loading. Please wait.

CCNA1-1 Chapter 9-2 Chapter 9 Ethernet Part II. CCNA1-2 Chapter 9-2 Note for Instructors These presentations are the result of a collaboration among the.

Similar presentations


Presentation on theme: "CCNA1-1 Chapter 9-2 Chapter 9 Ethernet Part II. CCNA1-2 Chapter 9-2 Note for Instructors These presentations are the result of a collaboration among the."— Presentation transcript:

1 CCNA1-1 Chapter 9-2 Chapter 9 Ethernet Part II

2 CCNA1-2 Chapter 9-2 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor, Ontario. These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor, Ontario. Thanks must go out to Rick Graziani of Cabrillo College. His material and additional information was used as a reference in their creation. Thanks must go out to Rick Graziani of Cabrillo College. His material and additional information was used as a reference in their creation. If anyone finds any errors or omissions, please let me know at: If anyone finds any errors or omissions, please let me know at: tdame@stclaircollege.ca.tdame@stclaircollege.ca.

3 CCNA1-3 Chapter 9-2 Ethernet Ethernet Physical Layer

4 CCNA1-4 Chapter 9-2 Ethernet Physical Layer The differences between standard Ethernet, Fast Ethernet, Gigabit Ethernet, and 10 Gigabit Ethernet occur at the Physical layer. The differences between standard Ethernet, Fast Ethernet, Gigabit Ethernet, and 10 Gigabit Ethernet occur at the Physical layer. Ethernet is covered by the IEEE 802.3 standards. Ethernet is covered by the IEEE 802.3 standards. Four data rates over fiber and twisted pair: Four data rates over fiber and twisted pair: 10 Mbps - 10Base-T Ethernet10 Mbps - 10Base-T Ethernet 100 Mbps - Fast Ethernet100 Mbps - Fast Ethernet 1000 Mbps - Gigabit Ethernet1000 Mbps - Gigabit Ethernet 10 Gbps - 10 Gigabit Ethernet10 Gbps - 10 Gigabit Ethernet

5 CCNA1-5 Chapter 9-2 Ethernet Physical Layer Ethernet TypeBandwidthCable TypeMaximum Distance (m) 10BASE510 MbpsThick Coax500 10BASE210 MbpsThin Coax185 10BASE-T10 MbpsCat3/Cat5 UTP100 100BASE-TX100 MbpsCat5 UTP100 100BASE-FX100 MbpsMM or SM Fiber400/2000 1000BASE-T1 GbpsCat5e UTP100 1000BASE-TX1 GbpsCat6 UTP100 1000BASE-SX1 GbpsMM Fiber550 1000BASE-LX1 GbpsSM Fiber2000 10GBASE-T10 GbpsCat6a/Cat7 UTP100 10GBASE-LX410 GbpsMM Fiber300 10GBASE-LX410GbpsSM Fiber10,000

6 CCNA1-6 Chapter 9-2 10 Mbps Ethernet 10BASE5 using Thicknet coaxial cable. 10BASE5 using Thicknet coaxial cable. 10BASE2 using Thinnet coaxial cable. 10BASE2 using Thinnet coaxial cable. Early implementations and no longer supported under 802.3 standard.Early implementations and no longer supported under 802.3 standard.

7 CCNA1-7 Chapter 9-2 10 Mbps Ethernet 10BASE-T using Cat3/Cat5 unshielded twisted-pair cable. 10BASE-T using Cat3/Cat5 unshielded twisted-pair cable. Considered to be classic Ethernet.Considered to be classic Ethernet. Physical star topology.Physical star topology. Up to 100 meters in length.Up to 100 meters in length. 10BASE-T uses two pairs of a four-pair cable terminated with an RJ-45 jack.10BASE-T uses two pairs of a four-pair cable terminated with an RJ-45 jack. Pins 1 and 2 – Transmit Pins 3 and 6 - ReceivePins 1 and 2 – Transmit Pins 3 and 6 - Receive Generally not chosen for new LAN installations.Generally not chosen for new LAN installations. There are still many 10BASE-T Ethernet networks in existence today.There are still many 10BASE-T Ethernet networks in existence today. Links connected to a switch can support either half- duplex or full-duplex operation.Links connected to a switch can support either half- duplex or full-duplex operation.

8 CCNA1-8 Chapter 9-2 100 Mbps: Fast Ethernet 100 Mbps Ethernet implemented using twisted-pair copper wire or fiber media. 100 Mbps Ethernet implemented using twisted-pair copper wire or fiber media. 100BASE-TX using Cat5 or later UTP100BASE-TX using Cat5 or later UTP 100BASE-FX using fiber-optic cable100BASE-FX using fiber-optic cable Because the higher frequency signals used in Fast Ethernet are more susceptible to noise, two separate encoding steps are used by 100-Mbps Ethernet to enhance signal integrity.Because the higher frequency signals used in Fast Ethernet are more susceptible to noise, two separate encoding steps are used by 100-Mbps Ethernet to enhance signal integrity.

9 CCNA1-9 Chapter 9-2 100 Mbps: Fast Ethernet 100BASE-TX: 100BASE-TX: Either two pairs of Category 5 UTP copper wire or two strands of optical fiber.Either two pairs of Category 5 UTP copper wire or two strands of optical fiber. Uses the same two pairs of UTP as 10BASE-T.Uses the same two pairs of UTP as 10BASE-T. Pins 1 and 2 – Transmit Pins 3 and 6 – ReceivePins 1 and 2 – Transmit Pins 3 and 6 – Receive Requires Category 5 or later UTP.Requires Category 5 or later UTP. Physical star topology.Physical star topology. 100BASE-TX networks typically use a switch at the center of the star instead of a hub.100BASE-TX networks typically use a switch at the center of the star instead of a hub.

10 CCNA1-10 Chapter 9-2 100 Mbps: Fast Ethernet 100BASE-FX: 100BASE-FX: Uses the same signaling procedure as 100BASE-TX.Uses the same signaling procedure as 100BASE-TX. Uses optical fiber media rather than UTP copper.Uses optical fiber media rather than UTP copper. 100BASE-FX uses Low Cost Fiber Interface Connectors (commonly called the duplex SC connector).100BASE-FX uses Low Cost Fiber Interface Connectors (commonly called the duplex SC connector). Fiber implementations are point-to-point connections:Fiber implementations are point-to-point connections: Two computersTwo computers A computer and a switchA computer and a switch Between two switches.Between two switches.

11 CCNA1-11 Chapter 9-2 1000 Mbps: Gigabit Ethernet The development of Gigabit Ethernet standards resulted in specifications for UTP copper, single-mode fiber, and multimode fiber. The development of Gigabit Ethernet standards resulted in specifications for UTP copper, single-mode fiber, and multimode fiber. With signals occurring in less time, the bits become more susceptible to noise, and therefore timing is critical. With signals occurring in less time, the bits become more susceptible to noise, and therefore timing is critical. Gigabit Ethernet uses two separate encoding steps. Gigabit Ethernet uses two separate encoding steps. More efficient to use codes that represent the binary bit stream.More efficient to use codes that represent the binary bit stream. Synchronization.Synchronization. Efficient usage of bandwidth.Efficient usage of bandwidth. Improved tolerance to noise.Improved tolerance to noise.

12 CCNA1-12 Chapter 9-2 1000 Mbps: Gigabit Ethernet 1000BASE-T Ethernet: 1000BASE-T Ethernet: Full-duplex transmission using all four pairs in Category 5 or later UTP cable.Full-duplex transmission using all four pairs in Category 5 or later UTP cable. Gigabit Ethernet over copper wire enables an increase from 100 Mbps per wire pair to 125 Mbps per wire pair.Gigabit Ethernet over copper wire enables an increase from 100 Mbps per wire pair to 125 Mbps per wire pair. 500 Mbps for the four pairs.500 Mbps for the four pairs. Each wire pair signals in full duplex, doubling the 500 Mbps to 1000 Mbps.Each wire pair signals in full duplex, doubling the 500 Mbps to 1000 Mbps.

13 CCNA1-13 Chapter 9-2 1000 Mbps: Gigabit Ethernet 1000BASE-T Ethernet: 1000BASE-T Ethernet: Allows the transmission and reception of data in both directions - on the same wire and at the same time.Allows the transmission and reception of data in both directions - on the same wire and at the same time. This traffic flow creates permanent collisions on the wire pairs.This traffic flow creates permanent collisions on the wire pairs. The hybrid circuits detecting the signals use sophisticated techniques such as:The hybrid circuits detecting the signals use sophisticated techniques such as: Echo cancellation.Echo cancellation. Layer 1 Forward Error Correction (FEC).Layer 1 Forward Error Correction (FEC). Selection of varying voltage levels.Selection of varying voltage levels.

14 CCNA1-14 Chapter 9-2 1000 Mbps: Gigabit Ethernet 1000BASE-SX and 1000BASE-LX: 1000BASE-SX and 1000BASE-LX: Advantages over UTP:Advantages over UTP: Noise immunity, small physical size and increased unrepeated distances and bandwidth.Noise immunity, small physical size and increased unrepeated distances and bandwidth. Support full-duplex binary transmission at 1250 Mbps over two strands of optical fiber.Support full-duplex binary transmission at 1250 Mbps over two strands of optical fiber.

15 CCNA1-15 Chapter 9-2 Ethernet Hubs and Switches

16 CCNA1-16 Chapter 9-2 Hubs and Switches Collision Domain: Collision Domain: The area of a network where collisions can occur.The area of a network where collisions can occur. Includes a hub and all connected devices.Includes a hub and all connected devices. Each port on a switch is considered a separate collision domain even if there is only one device attached to the port.Each port on a switch is considered a separate collision domain even if there is only one device attached to the port. Broadcast Domain: Broadcast Domain: The area of a network where connected devices can receive a broadcast.The area of a network where connected devices can receive a broadcast. Usually includes Layer 1 and 2 devices.Usually includes Layer 1 and 2 devices. A collection of collision domains.A collection of collision domains. A router (Layer 3 device) is the usual boundary since routers block broadcasts.A router (Layer 3 device) is the usual boundary since routers block broadcasts.

17 CCNA1-17 Chapter 9-2 Legacy Ethernet: Using Hubs

18 CCNA1-18 Chapter 9-2 Legacy Ethernet: Using Hubs So, what does a hub do when it receives information? So, what does a hub do when it receives information? Remember, a hub is nothing more than a multiport repeater. Remember, a hub is nothing more than a multiport repeater.

19 CCNA1-19 Chapter 9-2 Legacy Ethernet: Using Hubs The hub will flood it out all ports except for the incoming port. The hub will flood it out all ports except for the incoming port. A hub is a Layer 1 device and does NOT look at Layer 2 addresses, so it is fast in transmitting data. A hub is a Layer 1 device and does NOT look at Layer 2 addresses, so it is fast in transmitting data. A hub or series of hubs is called a single Collision Domain. A hub or series of hubs is called a single Collision Domain.

20 CCNA1-20 Chapter 9-2 Legacy Ethernet: Using Hubs Disadvantages:Disadvantages: Collision DomainsCollision Domains Wasted BandwidthWasted Bandwidth All ports of the hub share the total available bandwidth.All ports of the hub share the total available bandwidth. Limited ScalabilityLimited Scalability Increased LatencyIncreased Latency Wasted Bandwidth

21 CCNA1-21 Chapter 9-2 Legacy Ethernet: Using Hubs Where is the collision domain?

22 CCNA1-22 Chapter 9-2 Legacy Ethernet: Using Hubs When a node wishes to communicate with ALL hosts on the network, it sends a BROADCAST frame with a destination MAC address of 0xFFFFFFFFFFFF. When a node wishes to communicate with ALL hosts on the network, it sends a BROADCAST frame with a destination MAC address of 0xFFFFFFFFFFFF. All nodes on the network recognize that they should look at the contents of the frame. All nodes on the network recognize that they should look at the contents of the frame. Broadcasts are used in the Address Resolution Protocol (ARP), the Dynamic Host Configuration Protocol (DHCP) and other areas. (More Later!) Broadcasts are used in the Address Resolution Protocol (ARP), the Dynamic Host Configuration Protocol (DHCP) and other areas. (More Later!)

23 CCNA1-23 Chapter 9-2 Legacy Ethernet: Using Hubs Broadcasts cannot be entirely avoided if you are to have a dynamic network. Broadcasts cannot be entirely avoided if you are to have a dynamic network. However, too many broadcasts can create a lot of unnecessary traffic on a network and they should be minimized as much as possible.However, too many broadcasts can create a lot of unnecessary traffic on a network and they should be minimized as much as possible. Layer 1 and Layer 2 devices (repeaters, hubs, bridges and switches) must forward a broadcast. Layer 1 and Layer 2 devices (repeaters, hubs, bridges and switches) must forward a broadcast. Layer 1 devices have no choice because they do not look at MAC addresses.Layer 1 devices have no choice because they do not look at MAC addresses. Layer 2 devices have no other choice because they cannot learn the 0xFFFFFFFFFFFF address.Layer 2 devices have no other choice because they cannot learn the 0xFFFFFFFFFFFF address.

24 CCNA1-24 Chapter 9-2 Legacy Ethernet: Using Hubs Host 1111 sends a broadcast to all nodes on the network.Host 1111 sends a broadcast to all nodes on the network. All hosts recognize the MAC broadcast address and act on the information in the frame.All hosts recognize the MAC broadcast address and act on the information in the frame. Where is the Broadcast Domain?Where is the Broadcast Domain?

25 CCNA1-25 Chapter 9-2 Ethernet: Using Switches

26 CCNA1-26 Chapter 9-2 Ethernet: Using Switches Switches are also known as learning bridges or learning switches. Switches are also known as learning bridges or learning switches. A switch has a source address table in cache (RAM) where it stores source MAC addresses for each port. A switch has a source address table in cache (RAM) where it stores source MAC addresses for each port.

27 CCNA1-27 Chapter 9-2 Ethernet: Using Switches Switch receives an Ethernet frame. Switch receives an Ethernet frame. Searches the source address table for the destination MAC address. Searches the source address table for the destination MAC address.

28 CCNA1-28 Chapter 9-2 Ethernet: Using Switches If it finds a match, it forwards the frame by only sending it out that port (selective forwarding). If it finds a match, it forwards the frame by only sending it out that port (selective forwarding). If the destination address is not in the table, it floods it out all ports. If the destination address is not in the table, it floods it out all ports.

29 CCNA1-29 Chapter 9-2 How does a switch learn an address? First, the switch will see if the SA (1111) is in it’s table. First, the switch will see if the SA (1111) is in it’s table. If it is, it resets a timer. If it is, it resets a timer. If it is NOT in the table it adds it, with the port number. If it is NOT in the table it adds it, with the port number. Next the switch will flood the frame out all other ports, because the DA is not in the source address table. Next the switch will flood the frame out all other ports, because the DA is not in the source address table.

30 CCNA1-30 Chapter 9-2 How does a switch learn an address? Most communications involve some sort of client-server relationship or exchange of information. Most communications involve some sort of client-server relationship or exchange of information. Now 3333 sends data back to 1111. Now 3333 sends data back to 1111. The switch sees if it has the SA stored. It does NOT so it adds it. The switch sees if it has the SA stored. It does NOT so it adds it. Next, it checks the DA and sends it out port 1. Next, it checks the DA and sends it out port 1.

31 CCNA1-31 Chapter 9-2 How does a switch learn an address? Now, with both MAC addresses in the table, any information between 1111 and 3333 can be sent (selectively forwarded) out the appropriate port. Now, with both MAC addresses in the table, any information between 1111 and 3333 can be sent (selectively forwarded) out the appropriate port.

32 CCNA1-32 Chapter 9-2 Multiple Transmissions - No Collisions Unlike a hub, a collision does NOT occur, which would cause the two PCs to have to retransmit the frames. Unlike a hub, a collision does NOT occur, which would cause the two PCs to have to retransmit the frames. The switch buffers the frames and sends them out port #6 one at a time. The switch buffers the frames and sends them out port #6 one at a time. The sending PCs have no idea that there was another PC wanting to send to the same destination. The sending PCs have no idea that there was another PC wanting to send to the same destination.

33 CCNA1-33 Chapter 9-2 Collision Domains When there is only one device on a switch port, the collision domain is only between the PC and the switch. When there is only one device on a switch port, the collision domain is only between the PC and the switch. With a full-duplex PC and switch port, there will be no collision, since the devices and the medium can send and receive at the same time. With a full-duplex PC and switch port, there will be no collision, since the devices and the medium can send and receive at the same time.

34 CCNA1-34 Chapter 9-2 What happens here? Notice the Source Address Table has multiple entries for port 1. Notice the Source Address Table has multiple entries for port 1. The switch selectively forwards the frame out port #1. The switch selectively forwards the frame out port #1.

35 CCNA1-35 Chapter 9-2 What happens here? But the hub is only a layer 1 device, so a hub floods it out all ports. But the hub is only a layer 1 device, so a hub floods it out all ports. How many collision domains exist?

36 CCNA1-36 Chapter 9-2 What happens here? Notice the Source Address Table has multiple entries for port 1. Notice the Source Address Table has multiple entries for port 1. Does that matter in this case? Does that matter in this case?

37 CCNA1-37 Chapter 9-2 What happens here? The switch is a Layer 2 device so the broadcast frame is sent out all of the ports. The switch is a Layer 2 device so the broadcast frame is sent out all of the ports. The hubs are Layer 1 devices and also forward the frame. The hubs are Layer 1 devices and also forward the frame. Broadcast Domain

38 CCNA1-38 Chapter 9-2 Switches: Five Basic Operations Learning: Learning: Adds source MAC address/port to the table. Adds source MAC address/port to the table. Aging: Aging: Addresses will be cleared after a specific length of inactivity. Addresses will be cleared after a specific length of inactivity. Flooding: Flooding: Sends a frame out all ports if the SA is not in the table. Sends a frame out all ports if the SA is not in the table. Forwarding: Forwarding: Sends a frame out the proper port on a match. Sends a frame out the proper port on a match. Filtering: Filtering: Will not forward a frame out the received port. Will not forward a frame out the received port. Drops corrupt frames. Drops corrupt frames.

39 CCNA1-39 Chapter 9-2 Ethernet Address Resolution Protocol (ARP)

40 CCNA1-40 Chapter 9-2 Resolving IPv4 addresses to MAC Addresses Two address types: Two address types: MAC address:MAC address: Physical address of the hostPhysical address of the host Burned in to the NICBurned in to the NIC Layer 2 addressLayer 2 address Network Address:Network Address: Logical address of the hostLogical address of the host Assigned by network administratorAssigned by network administrator Layer 3 addressLayer 3 address

41 CCNA1-41 Chapter 9-2 Resolving IPv4 addresses to MAC Addresses Physical (MAC): Physical (MAC): The physical address uniquely identifies the host from all other hosts on all other networks at Layer 2.The physical address uniquely identifies the host from all other hosts on all other networks at Layer 2. This is the address that is absolutely necessary to get the information into the host. The IP address by itself won't accomplish that.This is the address that is absolutely necessary to get the information into the host. The IP address by itself won't accomplish that.

42 CCNA1-42 Chapter 9-2 Resolving IPv4 addresses to MAC Addresses Logical (IP): Logical (IP): The logical address uniquely identifies the host and the network to which it belongs at Layer 3.The logical address uniquely identifies the host and the network to which it belongs at Layer 3. Routers base their decisions on the IP address when determining the best path for the packet.Routers base their decisions on the IP address when determining the best path for the packet.

43 CCNA1-43 Chapter 9-2 Resolving IPv4 addresses to MAC Addresses So…..How do we obtain both addresses to build the packets and frames? So…..How do we obtain both addresses to build the packets and frames? MAC Address: ARP (Address Resolution Protocol)MAC Address: ARP (Address Resolution Protocol) IP Address: Static and DynamicIP Address: Static and Dynamic

44 CCNA1-44 Chapter 9-2 Resolving IPv4 addresses to MAC Addresses Address Resolution Protocol (ARP): Address Resolution Protocol (ARP): Binds an IP address to a MAC address. Binds an IP address to a MAC address. Devices, (hosts, routers, servers, etc.) use IP addresses to reach other devices within their own network/subnet or across different networks/subnets. Devices, (hosts, routers, servers, etc.) use IP addresses to reach other devices within their own network/subnet or across different networks/subnets. The Layer 3 IP addresses in the packet consist of both the original source and the final destination address. The Layer 3 IP addresses in the packet consist of both the original source and the final destination address. Once the packet is sent, these addresses do not change. Once the packet is sent, these addresses do not change.

45 CCNA1-45 Chapter 9-2 Resolving IPv4 addresses to MAC Addresses Address Resolution Protocol (ARP): Address Resolution Protocol (ARP): Data Link layer addresses, such as Ethernet MAC addresses are used to get the IP packet from one hop to the next. If the sender and the receiver are on different networks (or subnets) the data link address in the data link frame will be modified to reflect the new data link address source and destination. Again, The IP addresses in the Layer 3 packet do not change.

46 CCNA1-46 Chapter 9-2 Resolving IPv4 addresses to MAC Addresses Address Resolution Protocol (ARP): Address Resolution Protocol (ARP): Why do devices need to map a MAC address to an IP address? There is no built-in connection or relationship between the MAC (physical) address and the assigned IP (logical) address. IP hosts and routers use Address Resolution Protocol (ARP) to resolve a known IP address to the corresponding MAC address.

47 CCNA1-47 Chapter 9-2 The ARP Process: The Same Subnet

48 CCNA1-48 Chapter 9-2 The ARP Process: Different Subnet

49 CCNA1-49 Chapter 9-2 The ARP Process: Removing Mappings

50 CCNA1-50 Chapter 9-2 The ARP Process: Issues Overhead on the Media: Overhead on the Media: As a broadcast frame, an ARP request is received and processed by every device on the local network. As a broadcast frame, an ARP request is received and processed by every device on the local network. Usually minimal but can be significant if all users and devices were to power up and start using network services at the same time. Usually minimal but can be significant if all users and devices were to power up and start using network services at the same time.

51 CCNA1-51 Chapter 9-2 The ARP Process: Issues Security: Security: ARP spoofing, or ARP poisoning, is a technique used by an attacker to inject the wrong MAC address association into a network by issuing fake ARP requests. ARP spoofing, or ARP poisoning, is a technique used by an attacker to inject the wrong MAC address association into a network by issuing fake ARP requests. An attacker forges the MAC address of a device and then frames can be sent to the wrong destination. An attacker forges the MAC address of a device and then frames can be sent to the wrong destination.

52 CCNA1-52 Chapter 9-2 The ARP Process: One Final Note Ethernet encapsulates an ARP packet in the same manner as an IP packet as it travels on the physical network from one computer to another. Ethernet encapsulates an ARP packet in the same manner as an IP packet as it travels on the physical network from one computer to another. ARP is a separate protocol residing at Layer 3 of the OSI Model and does not use the services of IP since ARP requests are never routed. ARP is a separate protocol residing at Layer 3 of the OSI Model and does not use the services of IP since ARP requests are never routed.


Download ppt "CCNA1-1 Chapter 9-2 Chapter 9 Ethernet Part II. CCNA1-2 Chapter 9-2 Note for Instructors These presentations are the result of a collaboration among the."

Similar presentations


Ads by Google