0% found this document useful (0 votes)
11 views46 pages

Chapter - 4 - 2022 - Edited

The document summarizes Ethernet switching and data link layer protocols. It discusses layer 1 and 2 intermediary devices like switches. It describes Ethernet protocols including CSMA/CD and CSMA/CA which are used for media access control on shared media networks and wireless networks respectively. It explains how switches learn and store MAC addresses to filter and forward frames efficiently in full-duplex mode without collisions.

Uploaded by

Geez Design
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views46 pages

Chapter - 4 - 2022 - Edited

The document summarizes Ethernet switching and data link layer protocols. It discusses layer 1 and 2 intermediary devices like switches. It describes Ethernet protocols including CSMA/CD and CSMA/CA which are used for media access control on shared media networks and wireless networks respectively. It explains how switches learn and store MAC addresses to filter and forward frames efficiently in full-duplex mode without collisions.

Uploaded by

Geez Design
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 46

CHAPTER 4

ETHERNET SWITCHING AND DATA LINK


LAYER PROTOCOL

4.1 Layer 1 and 2 Intermediary


devices
4.2 Data Link Layer Protocols
(Ethernet)
4.2.1 CSMA/CD
4.2.2 CSMA/CA
4.1 Layer 1 and 2 Intermediary

devices
Introduction
Ethernet –
• Most widely used LAN technology in the world
• Operates in the data link layer and the physical
layer
• Family of networking technologies that are
defined in the IEEE 802.2 and 802.3 standards
Ethernet evolution timeline
Continued…
Continued…
Continued…
Ethernet Protocol
Ethernet standards –
• Define Layer 2
protocols and Layer 1
technologies
• Two separate sub
layers of the data link
layer to operate –
 Logical link control
(LLC) and

 The MAC sub layers


LLC and MAC Sublayers
(IEEE 802 LAN Data Link Sublayers)

LLC sublayer
• Handles communication between upper and lower layers
• Takes the network protocol data and adds control
information to help deliver the packet to the destination
• Example: It places information in the frame that identifies
which network layer protocol is being used for the frame
(such as IPv4 and IPv6 )
• LLC is implemented in software. In a computer, the LLC
can be considered the driver software for the NIC.
MAC sublayer
• Constitutes the lower sublayer of the data link layer
• Implemented by hardware, typically in the computer NIC
Ethernet Frame fields/attributes
 Each section of the frame is called a field
 Ethernet frame structure adds headers and trailers around the
Layer 3 PDU to encapsulate the message being sent

Ethernet II is the
Ethernet frame
format used in
TCP/IP networks.

Preamble something that leads


Ethernet Frame Size

 Ethernet II and IEEE 802.3 standards define the minimum


frame size as 64 bytes and the maximum as 1518 bytes
 Less than 64 bytes in length is considered a "collision
fragment" or "runt frame”
 Frames with more than 1500 bytes of data are considered
“jumbo” or “baby giant frames”.
 If size of a transmitted frame is less than the minimum or
greater than the maximum, the receiving device drops the
frame
Note: Jumbo frames are usually supported by most Fast
Ethernet and Gigabit Ethernet switches and NICs.
The Ethernet Frame fields

Length/Type Data and


Preamble and Field Pad Fields
Start Frame Defines the exact Contain the
Delimiter Fields length of the encapsulated
Used for frame's data field/ data from a
synchronization describes which higher layer,
between the protocol is an IPv4
sending and implemented packet
receiving devices Ethernet II / 802.3
frames
Ethernet Frame fields ……

Frame Check Sequence Field


Used to detect errors in a frame with cyclic
redundancy check (4 bytes), if calculations match at
source and receiver, no error occurred.
MAC/BIA/physical Address: Ethernet Identity

• BIA  burned-in address


• MAC addresses must be globally unique
• The Ethernet MAC address structure shown below
• IEEE-enforced rules for vendors address
• burned into ROM (Read-Only Memory) on the NIC
How do you see the
MAC address of
switch and router
interfaces, end
devices?
MAC Address OUI Lookup
www.macvendorlookup.com
HEX TO BINARY CONVERSION TABLE
MAC Address Representations
Types of Ethernet MAC

Recall the three Message Delivery


Options
1.Unicast MAC Address
2.Broadcast MAC Address
3.Multicast MAC Address
i. Unicast MAC Address
ii. Broadcast MAC Address
iii. Multicast MAC Address
converting the lower 23 bits of the IP multicast
group address into 6 hexadecimal characters.

Multicast MAC address is a


Range of IPV4 multicast addresses
special value that begins with
is 224.0.0.0 to 239.255.255.255
01-00-5E in hexadecimal
Identify the MAC address type
The question that must be answered….
Layer 1 Intermediary
Devices
Layer 2 Intermediary
Devices
MAC address table creation process
• When a switch is turned on, the MAC address
table is empty

•Note: The MAC address table is sometimes


referred to as a content addressable memory
(CAM) table.
• By default, most Ethernet switches keep an
entry in the table for 5 minutes.
Switch MAC Address Table
• Step 1
Examine the Source MAC Address (Learn)
and updates the refresh timer to 5 minutes

• Step 2
• Step 3
Step 4
• Step 5
Find the Destination MAC
• Step 6 Address (Forward)
Filtering Frames
When the MAC address table of the switch
contains the destination MAC address, it is able
to filter the frame and forward out a single port.
Example: Packet Tracer Demonstration
4.2 Data Link Layer Protocols

(Ethernet)
4.2.1 CSMA/CD
Dem04
Carrier Sense (CS)
Multiple Access (MA)
Dem05
Collision detection (CD)
The CSMA/CD process
• Anode listens to the network activity for a carrier
signal (CS) that indicates the network is in use/quiet. If
a node hears a signal, the node defers/postpone for a
random amount of time.

• Hearing no carrier signal (CS), a node sends its frame


onto the network and monitor the channel to make
certain there are no collisions.

• Because of the multiple access (MA) property, another


node may have done the same thing, so that the two
frames are moving along the cable at the same time.
• In such a case, a collision occurs. The frames are
garbled/distorted. The node closest to the collision
detects it and sends out a Jamming signal, notifying all
nodes that a collision has taken place. A node involved
in a collision backs off for a randomly determined
amount of time before trying again to access the
network.

• On a busy network, such an attempt may be repeated


many times before the transmission is successful. If
collisions are still detected after many attempts, the
user may be informed that the network is too busy to
transmit.
Note
• It is a slow-access method.
• CSMA/CD works best when most network activity is
light.
• To use this access method , a node must be able to
detect network activity (carrier sense (CS)) and to detect
collisions (Collision detection (CD).
• Both of these capabilities are implemented in hardware
on board of the NIC.
• It is a probabilistic and contention access method
Question
• with today’s intermediate devices, collisions do not
occur and the processes utilized by CSMA/CD are
really unnecessary. What is the reason for this?
Answer
• Legacy Ethernet using a bus topology or hubs, is a
shared, half-duplex medium. Ethernet over a half-
duplex medium uses a contention-based access
method (CSMA/CD).
• Ethernet LANs of today use switches that operate in
full-duplex. Full-duplex communications with
Ethernet switches do not require access control
through CSMA/CD
4.2.2 . CSMA/CA
The CSMA/CA process

• Anode listens to the network activity for a carrier


signal (CS) that indicates the network is in use/quiet. If
a node hears a signal, the node defers for a random
amount of time.
• Hearing no CS, a node sends its intent or a request to
send (RTS) signal onto the network.
• If it is sending to a particular node (directed
transmission), the sender waits for a clear to send
(CTS) reply. If no reply is received within a predefined
time, the node assumes there is a collision and backs
off for a random amount of time.
• If a CTS is received, or if the message is intended as a
broadcast transmission, the node begins sending its
frame(s).
Note: In the case of a broadcast transmission, the node
doesn’t wait for CTS reply.
Note
• Broadcasting the intent (i.e. RTS) to transmit
data increases the amount of traffic on the
cable and slows down network performance.
Used by 802.11 wireless networking
technologies
CS and CA are implemented on the NIC
• It is a probabilistic and contention access
method

You might also like