CCNA Chapter 7401
CCNA Chapter 7401
Ethernet
Introduction
Ethernet is the most commonly used LAN technology in the world. The
Ethernet standard spans across both the data link layer and physical layer. Because
the role of the data link layer is to control the physical layer, physical layer
technology must have matching software at the data Link layer. Ethernet is
therefore a good technology to illustrate how the data Link layer and physical layer
work together. It also has a very practical importance because just about anyone
working with networks will use Ethernet.
Define the following key terms: Ethernet, bus topology, Thinnet, Thicknet, GIbabit
Ethernet and MAN.
Describe Ethernet and understand how it works.
Explain the past and future of Ethernet.
Module 9– Ethernet
What is Ethernet?
Ethernet protocol is the most commonly used LAN technology in the world. Ethernet
is a combination of Data Link layer software and Physical layer hardware, because the
Physical and Data Link layers are tightly coupled.
Ethernet is a standardized protocol, and therefore, has well-defined rules for how it
operates and well-defined rules for the structure of the Data Link layer frames and Physical
layer signals it uses.
History of Ethernet
The predecessor of Ethernet had its roots in Alohanet in Hawaii in 1970 (a radio-
based network). Ethernet was developed in 1973 by Robert Metcalfe. It was published as an
open standard in 1980 by an industry consortium and then adopted as a formal standard by
IEEE as 802.3. The original version used coaxial cable but today it uses twisted pair and
fiber optic cable. Today‟s wireless LANs might even be called a version of
Ethernet.dddddddddddddddddddddddddddddddddddddddddddddddddddddd
Ethernet operates in the lower two layers of the OSI model: the Data Link layer
and the Physical layer. Ethernet performs the Data Link layer functions of framing,
addressing, media access control, and error detection. It also has physical hardware (media
and devices) that perform the functions of the Physical layer. Because Ethernet is so
popular, there are many different types of physical cabling and network devices (hubs and
switches) that it can use.
Ethernet Data Link layer today has two main parts. The LLC sublayer links Ethernet
to the upper layers, while the MAC sublayer controls the hardware.
Logical Link Control (LLC) – 802.2: It is used to communicate with the Network
Layer.
Media Access Control (MAC) – 802.3 : It handles MAC addressing, framing and
communication with the Physical Layer
o Creates the frame and addresses the frame with the source and destination
MAC address.
o Checks for any errors using the FCS field.
o Controls the assignment of frames on the media.
o Controls the recovery of the media due to collisions.
o Implemented mainly in hardware.
Module in CCNA 101 – CISCO 1 45
Module 9– Ethernet
Physical Implementations
• Most of the traffic on the Internet originates and ends with Ethernet connections.
• When optical fiber media was introduced, Ethernet adapted to this new technology.
o Reliability
The introduction of Gigabit Ethernet has extended the original LAN technology to
distances that make Ethernet a Metropolitan Area Network (MAN) and WAN
standard.
In today's networks, Ethernet uses UTP copper cables and optical fiber to
interconnect network devices via intermediary devices such as hubs and switches.
With all of the various media types that Ethernet supports, the Ethernet frame
structure remains consistent across all of its physical implementations. It is for this
reason that it can evolve to meet today's networking requirements.
a. Historical Ethernet
The foundation for Ethernet technology was first established in 1970 with a program
called Alohanet. Alohanet was a digital radio network designed to transmit
information over a shared radio frequency between the Hawaiian Islands.
for using a shared medium in this way were later applied to wired technology in the
form of Ethernet.
The first versions of Ethernet used coaxial cable to connect computers in a bus
topology. Each computer was directly connected to the backbone. These early
versions of Ethernet were known as Thicknet, (10BASE5) and Thinnet (10BASE2).
o 10BASE5, or Thicknet, used a thick coaxial that allowed for cabling distances
of up to 500 meters before the signal required a repeater.
o 10BASE2, or Thinnet, used a thin coaxial cable that was smaller in diameter
and more flexible than Thicknet and allowed for cabling distances of 185
meters.
The original thick coaxial and thin coaxial physical media were replaced by early
categories of UTP cables. Compared to the coaxial cables, the UTP cables were
easier to work with, lightweight, and less expensive.
The physical topology was also changed to a star topology using hubs. Hubs
concentrate connections. In other words, they take a group of nodes and allow the
network to see them as a single unit. When a frame arrives at one port, it is copied
to the other ports so that all the segments on the LAN receive the frame.
Module in CCNA 101 – CISCO 1 47
Module 9– Ethernet
b. Legacy Ethernet
In 10BASE-T networks, typically the central point of the network segment was a
hub. This created a shared media. Because the media is shared, only one station
could successfully transmit at a time. This type of connection is described as a
half-duplex communication.
c. Current Ethernet
100BASE-TX Ethernet
Switches can control the flow of data by isolating each port and sending frame
only to its proper destination (if the destination is known)
o Each device attached to switch only receives frames destined for that
device.
No Collisions.
Figure 9.7
Switched-Based
Networks
Built on the full-duplex capability and the UTP and fiber-optic media
technologies of earlier Ethernet.
1. What are the Ethernet Layer 2 functions that overcome the limitations of
Ethernet Layer 1?
Define the following key terms: error detection, FCS, BIA, OUI, hexadecimal number
system, collision, latency, asynchronous communication, synchronous
communication, slot time, interframe spacing, jam signal and back off timing.
Describe the fields of an Ethernet frame.
Understand MAC address and hexadecimal addressing.
Explain the CSMA/CD process.
Ethernet Frame
o The sender performs a calculation on the frame and sends the result of the
calculation in the Frame Check Sequence (FCS) in the message trailer; the
receiver performs the same calculation and compares the result to the value
in the FCS. Ethernet uses a technique call Cyclic Redundancy Check (CRC) to
calculate the FCS, which essentially divides the data by a preset number
(using binary division) and uses the remainder as the 32-bit FCS. If it finds
an error, Ethernet simply discards the frame, so it is up to TCP to recognize
that data was lost and re-send it.
• Used to synchronize the NIC with the media in preparation for receiving a
frame.
• A receiving device compares its MAC address to the contents of this field.
Length defines the exact length of the frame‟s data field. It will be used by
FCS. If the value is equal to or greater than 0x0600 hexadecimal or 1536
decimal (to enable Ethernet stations to identify the used Ethernet variant –
DIX or IEEE standard), then the contents of the Data fields are decoded
according to the protocol indicated.
If the total frame length is less than 64 bytes, the field is padded to the right
with enough null characters to meet the minimum frame length.
The result of a Cyclic Redundancy Check (CRC) is placed in the frame by the
sending node.
The receiving node performs the same CRC and compares the values….they
should be equal.
• A unique address is permanently programmed into ROM in each NIC ("burned in“ )
when it is manufactured. Because of this, the MAC Address is often referred to as
the burned in (BIA) address or physical address of a machine.
o 48 bits in length.
o Expressed as 12 hexadecimal digits.
o The first 6 hexadecimal digits, which are administered by the IEEE, identify
the manufacturer or vendor and thus comprise the Organizational Unique
Identifier (OUI).
o The remaining 6 hexadecimal digits comprise the interface serial number, or
another value administered by the specific vendor.
Figure 9.10
The MAC Address
• The OUI and the sequential number ensure that the assigned MAC addresses remain
unique. You will see them expressed in different ways.
00-60-2F-3A-07-BC 00-20-E0-6B-17-62
00:60:2F:3A:07:BC 00:20:E0:6B:17:62
0060.2F3A.07BC 0020.E06B.1762
• When a network device matches the destination address to the address in the NIC,
the NIC passes the frame up the OSI layers where the decapsulation process takes
place.
• A big problem with the binary system was verbosity. In order to represent the
number 202:
When representing large numbers, the binary system quickly becomes unwieldy. We
can also convert from decimal to binary but the conversion is not a trivial task.
o It is compact.
o Because of this most of the computers in use today use the hexadecimal
system.
• You can expect to see hex numbers represented in documents and the web in
different ways:
o 23A916 2eb6H 0FCDh „7b‟
o 0xE0 0x23facb92 %0a000c834a >34ce
o 10-00-5a-29-16-ab (NIC – e.g. ipconfig –all)
o 00:00:0C:48:8C:11 (NIC – e.g. router MAC display
o #FFFFFF (Web RGB Colour Code)
o 1080:0:0:0:8:800:200C:417A (IP Version 6 Address)
Hex 0 1 2 3 4 5 6 7 8 9 A B C D E F
Decimal 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
Bit No. 3 2 1 0
Value 8 4 2 1
Bit No. 7 6 5 4 3 2 1 0
Value 128 64 32 16 8 4 2 1
Use the command ipconfig /all at the command prompt to view the MAC
address/physical address of a device.
o MAC addresses are non-hierarchical. They have no meaning outside the local
network media.
o Network address is needed to forward packets to destination network.
o MAC address is used in local network only.
Special Addresses
• Collisions are the cost that Ethernet pays to get the low overhead associated with
each transmission.
• Ethernet uses Carrier Sense Multiple Access with Collision Detection (CSMA/CD) to
detect and handle collisions and manage the resumption of communications.
• It can happen that two devices will determine that it is safe to transmit at exactly
the same time. In that case, both will transmit their frame. It will result in a collision.
Module in CCNA 101 – CISCO 1 58
Module 9– Ethernet
• Both devices detect the collision and send out a jamming signal. The jamming signal
is detected by all devices and all devices now know that a collision has occurred on
the network.
• The jamming signal causes each device to invoke a backoff algorithm. Devices wait a
random amount of time before returning to listening mode. The random time
ensures that the original devices that caused the collision won‟t repeat it.
Figure 9.15
CSMA/CD: The Process
• Latency
o Every network device encountered in the path adds to the delay or increases
the latency of the transmission.
Bit time
o The period of time required for a bit to be placed and sensed on the media.
Slot Time
o It is the time for an electronic pulse to travel the length of the maximum
theoretical distance between two nodes. It is also the time a transmitting
wait before attempting to retransmit following a collision.
Interframe Spacing
Jam Signal:
o As soon as a collision is detected, the sending devices transmit a 32-bit "jam"
signal - simply a repeating 1, 0, 1, 0 pattern.
Backoff Timing:
o If a collision occurs, all devices wait a random amount of time before
listening again.
o If media congestion results in the MAC layer unable to send the frame after
16 attempts, it gives up and generates an error to the Network layer.
1. What is the Frame Check Sequence (FCS)? What is the algorithm used in
determining the value of the FCS?
3. What is the difference between physical (Network Layer) and logical (Data Link
Layer) addressing?
Define the following key terms: collision domain, broadcast domain, learning, aging,
flooding, selective forwarding and filtering.
Review the Ethernet-specific cables.
Describe switches and hubs.
Explain Address Resolution Protocol (ARP) and its process.
a. 10 Mbps Ethernet
100 Mbps Ethernet implemented using twisted-pair copper wire or fiber media.
o Either two pairs of Category 5 UTP copper wire or two strands of optical
fiber.
o 100BASE-FX uses Low Cost Fiber Interface Connectors (commonly called the
duplex SC connector).
Two computers
Because the higher frequency signals used in Fast Ethernet are more susceptible to
noise, two separate encoding steps are used by 100-Mbps Ethernet to enhance
signal integrity.
With signals occurring in less time, the bits become more susceptible to noise, and
therefore timing is critical.
o More efficient to use codes that represent the binary bit stream.
o Synchronization.
1000BASE-T Ethernet:
o Full-duplex transmission using all four pairs in Category 5 or later UTP cable.
o Gigabit Ethernet over copper wire enables an increase from 100 Mbps per
wire pair to 125 Mbps per wire pair.
o Each wire pair signals in full duplex, doubling the 500 Mbps to 1000 Mbps.
o The hybrid circuits detecting the signals use sophisticated techniques such
as:
Echo cancellation.
o Advantages over UTP: Noise immunity, small physical size and increased
unrepeated distances and bandwidth.
• Collision Domain: The area of a network where collisions can occur. It includes a hub
and all connected devices. Each port on a switch is considered a separate collision
domain even if there is only one device attached to the port.
• Broadcast Domain: The area of a network where connected devices can receive a
broadcast.It usually includes Layer 1 and 2 devices. A collection of collision domains.
A router (Layer 3 device) is the usual boundary since routers block broadcasts.
• Adding devices to the network or extend the size of LAN using hubs will reduce the
network‟s efficiency and effectiveness.
• So, what does a hub do when it receives information? Remember, a hub is nothing
more than a multiport repeater.
• The hub will flood it out all ports except for the incoming port.
• A hub is a Layer 1 device and does NOT look at Layer 2 addresses, so it is fast in
transmitting data.
o More Collision Domains – Network with larger number of nodes on the same
segment has a larger collision domain and typically has more traffic. As the
amount of traffic in the network increases, the likelihood of collision
increases.
o Wasted Bandwidth
o Availability – Early Ethernet networks used UTP hubs and many of them
remain in operation today.
• A switch has a source address table in cache (RAM) where it stores source MAC
addresses for each port.
• Switch receives an Ethernet frame. It searches the source address table for the
destination MAC address
• If it finds a match, it forwards the frame by only sending it out that port (selective
forwarding). If the destination address is not in the table, it floods it out all ports.
• Flooding : Sends a frame out all ports except incoming port if destination is
unknown.
o Corrupted frame.
o Security is set
All frames must be delivered to a node on the local network segment. What if the
destination host IS NOT on the local network?
MAC address:
o Layer 2 address
Network Address:
o Layer 3 address
Physical (MAC):
o The physical address uniquely identifies the host from all other hosts on all
other networks at Layer 2.
o This is the address that is absolutely necessary to get the information into
the host. The IP address by itself won't accomplish that.
• Logical (IP):
o The logical address uniquely identifies the host and the network to which it
belongs at Layer 3.
o Routers base their decisions on the IP address when determining the best
path for the packet.
Devices, (hosts, routers, servers, etc.) use IP addresses to reach other devices
within their own network/subnet or across different networks/subnets.
The Layer 3 IP addresses in the packet consist of both the original source and the
final destination address.
Data Link layer addresses, such as Ethernet MAC addresses are used to get the IP
packet from one hop to the next.
If the sender and the receiver are on different networks (or subnets) the data link
address in the data link frame will be modified to reflect the new data link address
source and destination.
IP hosts and routers use Address Resolution Protocol (ARP) to resolve a known IP
address to the corresponding MAC address.
o Usually minimal but can be significant if all users and devices were to power
up and start using network services at the same time.
Security
o ARP spoofing, or ARP poisoning, is a technique used by an attacker to inject
the wrong MAC address association into a network by issuing fake ARP
requests.
o An attacker forges the MAC address of a device and then frames can be sent
to the wrong destination.
ARP is a separate protocol residing at Layer 3 of the OSI Model and does not use the
services of IP since ARP requests are never routed.
3. What are the three reasons that bandwidth increases dramatically when each
device is connected to a switch port?
Module 9 Quiz
Directions. On the space provided before each number, write the letter of the correct
answer.
_________2. Ethernet is now operated on networks with physical topology that is a star or
extended star. What is the underlying logical topology?
A. Extended star C. Ring
B. Multi-access bus D. Mesh
_________4. What was the advantage of replacing a physical bus topology with a physical
star topology using hubs?
A. The cables are no longer shared media
B. There are no collisions
C. A fault in one cable will not bring down the entire network
D. It allowed cheaper coaxial cable to be used
_________10. What is the name for the time taken for a host to put one bit on the
medium?
A. Bit time C. Propagation delay
B. Slot time D. Interframe spacing
_________11. A host needs to find the MAC address corresponding to a known IP address.
What can it do?
A. Send an ARP request using a level 3 broadcast.
B. Send an ARP request using a level 2 broadcast.
C. Send a DHCP request to the local server
D. Send a MAC request to the switch
_________ 13. What is the name for the minimum time between the end of one frame and
the start of the next?
A. Bit time C. Propagation Delay
B. Slot time D. Interframe Spacing
_________ 14. Which MAC address is used for broadcasts on Ethernet networks?
A. 00:00:00:00:00:00 C. FF:FF:FF:FF:FF:FF
B. 99:99:99:99:99:99 D. 255.255.255.255
_________ 15. What happens if you add PCs to a network, connecting them using hubs?
A. You get more collision domains.
B. You increase the size of the collision domain.
C. You get more bandwidth per host.
D. You need to use full duplex operation.