Download presentation
Presentation is loading. Please wait.
Published byErin Holmes Modified over 8 years ago
1
CCNA 1 v3.0 Module 6 Ethernet Fundamentals
2
Objectives
3
Introduction to Ethernet Ethernet is not one technology but a family of LAN technologies and may be best understood by using the OSI reference model.
4
IEEE Ethernet Naming Rules
5
Ethernet and the OSI Model
6
The success of Ethernet is due to the following factors: Simplicity and ease of maintenance Ability to incorporate new technologies Reliability Low cost of installation and upgrade
7
Ethernet and the OSI Model
11
Naming
12
A system called Alohanet was developed to allow various stations on the Hawaiian Islands structured access to the shared radio frequency band in the atmosphere. This work later formed the basis for the Ethernet access method known as CSMA/CD.
13
Naming
14
Ethernet standard were sold during the early 1980s. Ethernet transmitted at up to 10 Mbps over thick coaxial cable up to a distance of two kilometers. This type of coaxial cable was referred to as thicknet
15
Ethernet relies on baseband signaling, which uses the entire bandwidth of the transmission medium. The data signal is transmitted directly over the transmission medium. In broadband signaling, not used by Ethernet, the data signal is never placed directly on the transmission medium. An analog signal (carrier signal) is modulated by the data signal and the modulated carrier signal is transmitted. Radio broadcasts and cable TV use broadband signaling.
16
Layer 2 Framing
17
Ethernet Frame A voltage vs. time graph could be used to visualize bits. However, when dealing with larger units of data, addressing and control information, a voltage vs. time graph could become large and confusing. Another type of diagram that could be used is the frame format diagram,
18
Layer 2 Framing
19
Ethernet Frame Structures
22
Most frames have some specialized fields. In some technologies, a length field specifies the exact length of a frame in bytes. Some frames have a type field, which specifies the Layer 3 protocol making the sending request.
23
Ethernet Frame Fields
25
MAC refers to protocols that determine which computer on a shared-medium environment, or collision domain, is allowed to transmit the data. MAC, with LLC, comprises the IEEE version of the OSI Layer 2. MAC and LLC are sublayers of Layer 2. There are two broad categories of Media Access Control, deterministic (taking turns) and non- deterministic (first come, first served).
26
Media Access Control (MAC)
27
Non-deterministic MAC protocols use a first-come, first-served approach. CSMA/CD is a simple system. The NIC listens for an absence of a signal on the media and starts transmitting. If two nodes transmit at the same time a collision occurs and none of the nodes are able to transmit.
28
MAC Rules and Collision Detection/Backoff
30
Ethernet Timing
31
The actual calculated slot time is just longer than the theoretical amount of time required to travel between the furthest points of the collision domain, collide with another transmission at the last possible instant, and then have the collision fragments return to the sending station and be detected.
32
Interframe Spacing and Backoff
33
The minimum spacing between two non-colliding frames is also called the interframe spacing. This is measured from the last bit of the FCS field of the first frame to the first bit of the preamble of the second frame.
34
Interframe Spacing and Backoff
35
Error Handling
36
Types of Collisions
38
Ethernet Errors
40
FCS Errors
41
FCS There are three primary ways to calculate the Frame Check Sequence number: Cyclic Redundancy Check (CRC) – performs calculations on the data. Two-dimensional parity – adds an 8th bit that makes an 8 bit sequence have an odd or even number of binary 1s. Internet checksum – adds the values of all of the data bits to arrive at a sum.
42
Ethernet Auto-Negotiation
44
Transmission Priority Rank
45
Summary
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.