Cisco Module 5
Cisco Module 5
Module 5
Development of Ethernet
Grew out of Alohanet developed at University of Hawaii in 70s. Multiple access to shared radio frequency
Formed basis for Ethernet MAC method CSMA/CD (Carrier Sense Multiple Access / Collision Detect
IEEE Standards
IEEE standardized original Ethernet standards
IEEE official Ethernet standards are 802.3
802.3 standard has been supplemented as improvements in physical media have occurred. Still remains 802.3
Reason Ethernet is scalable
IEEE
Standards making organization Goals
Supply information to build devices to comply with Ethernet standard Not stifle innovation
Layer 2 comparisons
Layer 1 Limitation Layer 2 Solution
Cannot communicate with the Communicates with upperupper-level layers level layers via the LLC sub layer Can only describe stream of bits Cannot identify computers Cannot decide which computer will Tx data from group of computers trying to TX at same time Uses framing to organize or group bits. (makes bits have meaning Identifies computer using MAC Addressing Uses MAC sublayer to accomplish decisions
MAC Addressing
All computers on a network must be able to be uniquely identified in order for frame delivery Media Access Control (MAC) address is located on NIC
Hardware address NIC address Layer 2 address Ethernet address
OUI 00 60 2F Cisco
Broadcast LANs
Ethernet and 802.3 are Broadcast Networks
All stations see all frames
Each station checks every frame to determine if frame is destined for that station
Framing
Framing allows essential information to encoded into the bit stream
Which computer is talking to which computer Where data starts, stops, what protocol to use
Generic Frames
Different types of frames described by different standards Generic Frame Fields
Frame Start Address Length / Type / Control Data Frame Check Sequence (FCS)
Frame Fields
Frame Start Address
Tells NIC where frame starts Source and Destination MAC Addresses If required describes length of the frame and protocol type Contains data being Tx
Number based on data in frame. Sending computer calculates the value and places it in FCS. Rx computer calculates number and checks it against FCS value
Any length > 64 octets and < 1518 octets that does not exceed Maximum Transmission Unit (MTU)
Ethernet Operation
Carrier Sense Multiple Access / Collision Domain (CSMA/CD)
Provides media access control strategies
Media Access Control protocols that determine which computer on a shared domain (collision domain) is allowed to Tx.
Nondeterministic (probalistic)
Ethernet / 802.3
Topologies
Ethernet
Logical bus, physical star, extended star
Token Ring
Logical ring, physical star
FDDI
Logical ring, physical dual-ring
Ethernet Broadcast
Broadcast every host on net receives every packet
Only device that has matching MAC address will pay attention to packet. Remaining devices drop the packet Ethernet not concerned with Layer 3 Checks packet for errors Detects error packet is dropped Destination does not notify Source of dropped packet Connectionless architecture Best-effort delivery system
Ethernet Timing
Types of collisions
Single collisions
A collision detected while trying to transmit a frame
Multiple collisions
Same frame collided repeatedly before being successfully Tx
Deferred Tx
No collision frame was delayed in being Tx because of busy medium
Result of Collisions
As a result of collisions, corrupted or partial frames can occur
<64 octets and invalid FCS called collision fragments (runts)
Remote collision
Typically a frame that is a runt and FCS is invalid
Results from collisions on far side of a repeated connection
Late Collision
Occurs after the first 64 octets of Tx have been sent.
Theoretical limits of network propagation have been exceeded by that point 802.3 allows automatic retransmission of late collided frames, but not required Explicitly denies automatic retransmission in Gigabit Ethernet Occurs after slot time has elapsed and on far side of a repeater
Ethernet Errors
Late collisions are considered to be errors
Collision or runt Late collision
Frequency of errors will indicate urgency of problem Simultaneous Tx before slot time Simultaneous Tx after slot time Excessively or Illegally Tx Illegally short Tx Corrupted Tx
FCS error Jabber, long frame, range errors Short Frame, Collision fragment, runt
Insufficient or Excessive Number of Bits Tx Mismatch of actual or reported number of Octets in frame Unusually long preamble or jam event
Ghost or jabber Range error Alignment error
Jabber
Tx of at least 20,000 to 50,000 bittimes in duration
More properly called Long frame May or may not have valid FCS
Long Frame
Greater than maximum legal size
Takes into account if frame is tagged
Does not count as an error if frame is 802.1Q tagged
Short Frame
< minimum 64 octets and good FCS Sometimes called runts
FCS Errors
FCS Error occurs when Checksum values differ by 1 or more bits from what was Tx.
High number from single station indicates faulty NIC, bad drivers, bad cabling at station Errors associated with many hosts usually indicates: bad cabling, bad drivers, faulty hub port, induced noise
Alignment Error
Data does not end at octet boundary has extra bits left over
Extra bits truncated and if FCS fails then error reported
Usually caused by:
Bad drivers or collision Read/Write error in software Can overload router CPU leading to crash
Range Error
Legal value in field length but doesnt match actual number of octets in data field
Ghost
Noise on the cable that appears to be a frame, but isnt
>= 72 octets long
Ghosting network is slow for no apparent reason
Autonegotiation
Allows interfaces to match Tx and Rx speeds with other interfaces
10BASE-T required a link pulse every 16 ms. Turned into Normal Link Pulse (NLP) Series of NLP Tx called Fast Link Pulse (FLP) FLP consists of 33 NLP bursts = 16 bit data code Pages can be added representing additional more sophisticated negotiation and link parameters
After decoding an FLP an acknowledgement is sent. Communicating partners can keep moving up pages to establish best link parameters
Extended shared-media
Networking devices have extended networking to longer cable lengths or more hosts
Point-to-Point
One device only connected to one device
Packet-switched
Segmentation
Layer 2 and 3 devices segment large collision domains into more, smaller collision domains
Decisions based on MAC addresses
Signals only propagated to correct segment
Less traffic on segment Increased bandwidth for hosts on segment
Layer 2 Broadcasts
When node needs to communicate with all hosts on network, sends broadcast with MAC destination address 0xFFFFFFFFFFFF. Every NIC must recognize this address. Layer 2 devices must forward all broadcast traffic to all segments Accumulation of broadcast and multicast traffic called broadcast radiation.
Layer 2 Broadcasts
3 sources of broadcast traffic
Workstations broadcast ARP requests in order to locate MAC address Routers broadcast routing protocol updates periodically to keep routing tables corrects RIP broadcasts updates every 30 seconds IP multicasts send streaming multimedia data. Unless Layer 3 is used, is sent to all segments
Broadcast domains
Grouping of collision domains connected by Layer 2 devices.
Must be controlled at Layer 3
Layer 3 devices do not forward broadcasts to other segments Layer 3 forwarding based on IP address, not MAC address
Data Flow
Layer 1 devices always forward a frame Layer 2 devices forward frame unless prevented Layer 3 devices block frames unless told to forward
Network Segment
Segment can have different meanings when referring to networking
Layer 4 context means breaking up data stream from Layer 5 Network context means a section of a network bounded by bridges, switches, and routers LAN topology means continuous circuit often connected to other segments by repeaters