SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Ethernet Error Descriptions


The following sections describe the main error types that can be captured through a protocol analysis session.


                                              Local Collisions
 A local collision is an Ethernet packet that usually is less than 64 bytes in length and may contain a garbled
Cyclic Redundancy Check (CRC) field. A local collision will be on the local segment. Collisions on a network are
 considered normal, especially in the CSMA/CD access method. Stations are supposed to collide, and when
 transmissions collide, they are supposed to listen and wait to retransmit. But certain levels are considered
       problems. When collisions are more than one percent of overall traffic, it is considered an issue.

Normally, if no problems exist on a network, a minor collision rate from one station does not indicate a major
 problem in general network communications. If, however, the collision rate is more then one percent of all
traffic on an Ethernet, the NIC addre ss captured should be recorded, and the adapter should be troubleshot.

Although a high collision rate from one particular station can be a minor component of overall traffic levels, it
 should be addressed immediately. From a troubleshooting standpoint, if a high collision rate is transmitted
from one station that is more than the one percent traffic level of the overall bandwidth utilized, that station
    card should be replaced or the connector should be checked within that particular station. Check the
 connections on the cabling connectors first, then actually replace the NIC board. The network should be re-
                  analyzed to determine whether the error is still present on the network.

  Excessive collisions from stations on a network can consume bandwidth and cause a transmission problem
  across a complete network. In such cases, it is important that the collision problem be troubleshot and the
  cause corrected. High collision rates from multiple stations on the Ethernet network may indicate cabling,
   transceiver or repeater problems; the complete network segment should be analyzed and troubleshot.

If one area of a network has multiple adapters transmitting CRC or collision errors in composite, that particular
  area of the network usually has a common factor such as a repeater or wiring hub module. This is where the
trial-and-error method takes place, but a protocol analyzer is invaluable because it picks up the addresses with
    the collision rates. At that point, if those addresses are itemized and found to be in the same area of the
                          network, any common device should be located and replaced.
Remote Collisions
A remote collision is a collision packet usually less than 64 bytes in size with a corrupted CRC field value. These
   are packets that have filtered over from another segment. This may indicate that a specific node's NIC or
                             transceiver on another side of a repeater has a problem.

A bridge or router isolates all collisions to their res pective local segment. Most protocol analyzers can detect
when a collision is not local if the address fields are valid and not local. Sometimes false readings can occur in
                                                      this area.

  If a valid high remote collision is detected with an analyzer, you are going to have a tough troubleshooting
  session. If the cause of a node and segment problem is to be located specifically, it will require systematic
troubleshooting by checking all the Ethernet segments attached to a repeater for their individual health at the
 physical layer. When a local collision is found on a particular segment, the next step is to locate the bad node
                                 and follow the replace-and-reanalyze approach.


                                               Late Collisions
   A late collision is a collision packet usually larger than 64 bytes with a corrupted CRC field value. This is a
packet that will be on the local segment. If a collision occurs with less than the normal 64 bytes of transmission
 of a particular station generation, this means that there is a normal collision occurrence upon transmission.

If, however, the collision occurs with greater than 64 bytes of data on an Ethernet station transmission, this is
  considered "late" because it did not occur before the 64-byte transmission ratio. Late collisions can cause a
high number of bytes to be transmitted in a train fashion because more bytes are on the network than with a
   normal collision under 64 bytes. More often this indicates that the station's NIC transmitting the collision
     cannot hear properly to stop its transmission and will continue to broadcast high collision rates on the
 network. This also may be captured as a form of excessive jamming. This usually is a problem with a network
                 interface card, and the card should be replaced and the network re-analyzed.

                                           CRC/Alignment Errors
 On any Ethernet network, a CRC error can be captured in an analysis session. A CRC error is picked up by a
    protocol analyzer when the Ethernet packet has a byte-posi tioning problem. The Ethernet packet is
responsible for checking its transfer from station to station through general network communications with a
CRC field. The CRC field is a math algorithm field used for calculating an Ethernet's packet contents for proper
                                    communication from station to station.

  Normally, a sending station sends out a packet that has a CRC pattern in it that is supposedly standard. The
receiving or destination station within an Ethernet network recalculates the frame contents to correlate
 whether it matches the proper CRC value. If a problem occurs in the error calculation and a difference arises,
 the packet possibly is corrupted and a CRC error may be generated by the station onto the network. If a CRC
error generation is picked up, the analyzer usually records that CRC error and indicates that the sending station
                       or the destination station has a corruption in packet transmission.

At times, CRC and alignment errors may be recorded as the same type of error. This is because they both really
  indicate a byte-alignment problem in transmissions. If CRC errors are recorded in a protocol analysis session
     above the two to three percent level of overall traffic on a network, they are considered excessive. It is
    possible that the group of stations involved in a transfer, on occurrence of a specific node sending of CRC
 transmissions, has a problem. All the addresses of transmitting nodes captured in a trace with frames in front
 and after the CRC error frame should be noted for the record. The problem may be in the group of stations. It
is possible that a node NIC, transceiver, respective cabling or even a connected repeater or wiring hub port has
          failed. But relax, usually the station sending the CRC error will have a bad NIC or transceiver.

  If CRC errors are high on a particular Ethernet segment, cable connections may have problems or improper
   grounding may exist throughout the network. The cabling and connections should be checked first. If th e
 problem is still present, the NIC should be replaced. The BNC T-connector, the tap connector and transceivers
also can be one of the primary causes for this type of problem. But the most probable cause is the NIC sending
the CRC. After checking the cabling infrastructure, replace the NIC. Next, the network should be re-analyzed to
   check for any errors related to the new NIC address. If problems are still present, multiport repeaters and
                        wiring hubs also should be checked as a cause for the CRC errors.

It is possible to attribute this problem to one particular network station's NIC. The surest way to isolate this is
      through a protocol analysis session. Look very closely for a high number of CRC errors, because a high
                          frequency indicates a definite problem for the sending station.

                                          Long and Short Packets
As mentioned earlier, the Ethernet frame types have certain rules. Depending on the packet type, frames can
  be from 64 bytes to 1,518 bytes in length. With the proper protocol analyzer, you can pick up two types of
   packets called short frames (runts) and long packets. A short or runt packet is any packet smaller than 64
  bytes. Long packets are those larger than 1,518 bytes. These are considered problems on a network and an
analyst should use a protocol analyzer to capture multiple transmissions of the occurrence. It is possible for a
    NIC, transceiver or even a corrupted LAN driver to generate long and short frames. The cause is usually
isolated to the failing network interface card. Captured long or short packets may not include reliable address
                                                     fields.

 The analyst should identify the addresses attempting to communicate in the trace that are right before and
after the long or short packets. Next, one by one remove the suspect nodes and re-analyze the network until
      the problem subsides. After the node area is located, the NIC, transceiver and NIC driver should be
                                                 troubleshot.


                                                     Jabber
At times, Ethernet network interface card s and external transceivers also generate a problem called jabbering.
 This is when garbled bits of data are emitted within the frame sequence in a continuous transmission fashion.
The packet length is usually more than 1,518 bytes. This can be identified by a protocol analyzer as a CRC error.
 As mentioned earlier, when nodes detect collisions they emit a normal JAM signal on the network segment to
    clear transmission. Sometimes certain nodes attempt to keep jamming the network due to excessive high
  collision rates; this also can be captured as high CRC or late collision error rate. The cause can be overloaded
   traffic levels. If the bandwidth- utilization levels are normal or low for the particular Ethernet segment, it is
    possible that the collision detection pair of a jamming node's NIC or transceiver cannot hear the network
         signal and may not know a collision has stopped. If this occurs, it continues to jam the network.

     If a certain node on an Ethernet segment emits a lot of jabber, the node's NIC and transceiver should be
                          troubleshot through consecutive replacement and re-analysis.
If an Ethernet network has intermittent high network bandwidth usage that causes performance problems, the
cause can be re-created by loading the network with traffic-generation features in a protocol analyzer. But you
    must be careful when using this technique. First, be aware of the current network usage and any possible
    impacts to the network-user community. Second, you really have to understand all the Ethernet network
   bandwidth considerations discussed earlier, including the actual maximum bandwidth available, the overall
   network bandwidth baseline view and individual Ethernet node bandwidth consumption. Make sure that a
                    proper baseline is performed on the lower and upper layers of the Ethernet.

                                               November 15, 1996

Weitere ähnliche Inhalte

Was ist angesagt?

A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKSA THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKScsandit
 
TCP over wireless slides
TCP over wireless slidesTCP over wireless slides
TCP over wireless slidesMahesh Rajawat
 
Mobile transport layer
 Mobile transport layer Mobile transport layer
Mobile transport layerSonaliAjankar
 
A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...
A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...
A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...IJERD Editor
 
Mobile transportlayer
Mobile transportlayerMobile transportlayer
Mobile transportlayerRahul Hada
 
Controller area network
Controller area networkController area network
Controller area networkDivi1597
 
Mobile transport layer - traditional TCP
Mobile transport layer - traditional TCPMobile transport layer - traditional TCP
Mobile transport layer - traditional TCPVishal Tandel
 
Mobile Transpot Layer
Mobile Transpot LayerMobile Transpot Layer
Mobile Transpot LayerMaulik Patel
 
link layer
link layerlink layer
link layerGS Kosta
 
Computer networks high speed swan,atm,frame realy
Computer networks high speed swan,atm,frame realyComputer networks high speed swan,atm,frame realy
Computer networks high speed swan,atm,frame realyDeepak John
 
3a data link layer
3a data link layer 3a data link layer
3a data link layer kavish dani
 
Routing in Wireless Sensor Networks
Routing in Wireless Sensor NetworksRouting in Wireless Sensor Networks
Routing in Wireless Sensor Networkssashar86
 
Selective watchdog technique for intrusion detection in mobile ad hoc network
Selective watchdog technique for intrusion detection in mobile ad hoc networkSelective watchdog technique for intrusion detection in mobile ad hoc network
Selective watchdog technique for intrusion detection in mobile ad hoc networkgraphhoc
 

Was ist angesagt? (20)

A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKSA THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
 
TCP over wireless slides
TCP over wireless slidesTCP over wireless slides
TCP over wireless slides
 
Lecture24
Lecture24Lecture24
Lecture24
 
Mobile transport layer
 Mobile transport layer Mobile transport layer
Mobile transport layer
 
A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...
A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...
A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...
 
Mobile transportlayer
Mobile transportlayerMobile transportlayer
Mobile transportlayer
 
Controller area network
Controller area networkController area network
Controller area network
 
Mobile transport layer - traditional TCP
Mobile transport layer - traditional TCPMobile transport layer - traditional TCP
Mobile transport layer - traditional TCP
 
Mobile Transpot Layer
Mobile Transpot LayerMobile Transpot Layer
Mobile Transpot Layer
 
UnIT VIII manet
UnIT VIII manetUnIT VIII manet
UnIT VIII manet
 
AODV protocol
AODV protocolAODV protocol
AODV protocol
 
Advanced Networking on GloMoSim
Advanced Networking on GloMoSimAdvanced Networking on GloMoSim
Advanced Networking on GloMoSim
 
link layer
link layerlink layer
link layer
 
Computer networks high speed swan,atm,frame realy
Computer networks high speed swan,atm,frame realyComputer networks high speed swan,atm,frame realy
Computer networks high speed swan,atm,frame realy
 
Ethernet
EthernetEthernet
Ethernet
 
3a data link layer
3a data link layer 3a data link layer
3a data link layer
 
Data link layer
Data link layerData link layer
Data link layer
 
Framing Protocols
Framing ProtocolsFraming Protocols
Framing Protocols
 
Routing in Wireless Sensor Networks
Routing in Wireless Sensor NetworksRouting in Wireless Sensor Networks
Routing in Wireless Sensor Networks
 
Selective watchdog technique for intrusion detection in mobile ad hoc network
Selective watchdog technique for intrusion detection in mobile ad hoc networkSelective watchdog technique for intrusion detection in mobile ad hoc network
Selective watchdog technique for intrusion detection in mobile ad hoc network
 

Andere mochten auch

2015_itSMF_India_Conference_presentation_Gagan
2015_itSMF_India_Conference_presentation_Gagan2015_itSMF_India_Conference_presentation_Gagan
2015_itSMF_India_Conference_presentation_GaganGagan Deep Jain
 
 Entrepreneurial and Professional Opportunities in the Green Tech Space
	Entrepreneurial and Professional Opportunities in the Green Tech Space	Entrepreneurial and Professional Opportunities in the Green Tech Space
 Entrepreneurial and Professional Opportunities in the Green Tech Spacehnaquin
 
Targeting change efforts at organizational subsystems
Targeting change efforts at organizational subsystemsTargeting change efforts at organizational subsystems
Targeting change efforts at organizational subsystemsSharon Johnson
 
Slide set 7 faith integration in business - stage perspectives
Slide set 7   faith integration in business - stage perspectivesSlide set 7   faith integration in business - stage perspectives
Slide set 7 faith integration in business - stage perspectivesSharon Johnson
 
Kapital Business Partners | Istanbul
Kapital Business Partners | IstanbulKapital Business Partners | Istanbul
Kapital Business Partners | IstanbulShinesquad
 
Learn Ruby 2011 - Session 1
Learn Ruby 2011 - Session 1Learn Ruby 2011 - Session 1
Learn Ruby 2011 - Session 1James Thompson
 
Een Muur Met Brieven
Een Muur Met BrievenEen Muur Met Brieven
Een Muur Met Brievenguest3f5eaf
 
4 studyoverseasnewcomersankhtuyabelendalai25112012
4 studyoverseasnewcomersankhtuyabelendalai251120124 studyoverseasnewcomersankhtuyabelendalai25112012
4 studyoverseasnewcomersankhtuyabelendalai25112012Gegeen Australia
 
Cgpkcin2014conf 160416035350
Cgpkcin2014conf 160416035350Cgpkcin2014conf 160416035350
Cgpkcin2014conf 160416035350Safucon
 
Mathematics Of Life
Mathematics Of LifeMathematics Of Life
Mathematics Of Lifeguest6067361
 
Slide set 4 some fundamentals of business
Slide set 4   some fundamentals of businessSlide set 4   some fundamentals of business
Slide set 4 some fundamentals of businessSharon Johnson
 
Wrapping an api with a ruby gem
Wrapping an api with a ruby gemWrapping an api with a ruby gem
Wrapping an api with a ruby gemJames Thompson
 

Andere mochten auch (20)

Kongu engineering
Kongu engineeringKongu engineering
Kongu engineering
 
2015_itSMF_India_Conference_presentation_Gagan
2015_itSMF_India_Conference_presentation_Gagan2015_itSMF_India_Conference_presentation_Gagan
2015_itSMF_India_Conference_presentation_Gagan
 
 Entrepreneurial and Professional Opportunities in the Green Tech Space
	Entrepreneurial and Professional Opportunities in the Green Tech Space	Entrepreneurial and Professional Opportunities in the Green Tech Space
 Entrepreneurial and Professional Opportunities in the Green Tech Space
 
Programme guide en
Programme guide enProgramme guide en
Programme guide en
 
Targeting change efforts at organizational subsystems
Targeting change efforts at organizational subsystemsTargeting change efforts at organizational subsystems
Targeting change efforts at organizational subsystems
 
Slide set 7 faith integration in business - stage perspectives
Slide set 7   faith integration in business - stage perspectivesSlide set 7   faith integration in business - stage perspectives
Slide set 7 faith integration in business - stage perspectives
 
Naadam09Sydney
Naadam09SydneyNaadam09Sydney
Naadam09Sydney
 
Kapital Business Partners | Istanbul
Kapital Business Partners | IstanbulKapital Business Partners | Istanbul
Kapital Business Partners | Istanbul
 
Learn Ruby 2011 - Session 1
Learn Ruby 2011 - Session 1Learn Ruby 2011 - Session 1
Learn Ruby 2011 - Session 1
 
Een Muur Met Brieven
Een Muur Met BrievenEen Muur Met Brieven
Een Muur Met Brieven
 
4 studyoverseasnewcomersankhtuyabelendalai25112012
4 studyoverseasnewcomersankhtuyabelendalai251120124 studyoverseasnewcomersankhtuyabelendalai25112012
4 studyoverseasnewcomersankhtuyabelendalai25112012
 
Mutual funds
Mutual fundsMutual funds
Mutual funds
 
PART II.2 - Modern Physics
PART II.2 - Modern PhysicsPART II.2 - Modern Physics
PART II.2 - Modern Physics
 
Anger 1 1
Anger 1  1Anger 1  1
Anger 1 1
 
Communication skills
Communication skillsCommunication skills
Communication skills
 
Cgpkcin2014conf 160416035350
Cgpkcin2014conf 160416035350Cgpkcin2014conf 160416035350
Cgpkcin2014conf 160416035350
 
PART I.2 - Physical Mathematics
PART I.2 - Physical MathematicsPART I.2 - Physical Mathematics
PART I.2 - Physical Mathematics
 
Mathematics Of Life
Mathematics Of LifeMathematics Of Life
Mathematics Of Life
 
Slide set 4 some fundamentals of business
Slide set 4   some fundamentals of businessSlide set 4   some fundamentals of business
Slide set 4 some fundamentals of business
 
Wrapping an api with a ruby gem
Wrapping an api with a ruby gemWrapping an api with a ruby gem
Wrapping an api with a ruby gem
 

Ähnlich wie Networking

A427 nic card
A427 nic cardA427 nic card
A427 nic cardsurajbhai
 
Can network development using arm cortex m3
Can network development using arm cortex m3Can network development using arm cortex m3
Can network development using arm cortex m3Ankur Rastogi
 
Can network development using arm cortex m3
Can network development using arm cortex m3Can network development using arm cortex m3
Can network development using arm cortex m3Ankur Rastogi
 
TLS in manet
TLS in manetTLS in manet
TLS in manetJay Patel
 
Direct Link Lan
Direct Link LanDirect Link Lan
Direct Link Lanyanhul
 
A throughput analysis of tcp in adhoc networks
A throughput analysis of tcp in adhoc networksA throughput analysis of tcp in adhoc networks
A throughput analysis of tcp in adhoc networkscsandit
 
Answer sheet of switching & routing
Answer sheet of switching & routingAnswer sheet of switching & routing
Answer sheet of switching & routingMd. Mashiur Rahman
 
Jaimin chp-3 - data-link layer- 2011 batch
Jaimin   chp-3 - data-link layer- 2011 batchJaimin   chp-3 - data-link layer- 2011 batch
Jaimin chp-3 - data-link layer- 2011 batchJaimin Jani
 
Some of the terms about Computer Networking
Some of the terms about Computer NetworkingSome of the terms about Computer Networking
Some of the terms about Computer NetworkingRuchita Tomar
 

Ähnlich wie Networking (20)

A427 nic card
A427 nic cardA427 nic card
A427 nic card
 
CAN BUS.ppt
CAN BUS.pptCAN BUS.ppt
CAN BUS.ppt
 
CAN BUS.pptx
CAN BUS.pptxCAN BUS.pptx
CAN BUS.pptx
 
pbchwp
pbchwppbchwp
pbchwp
 
Can network development using arm cortex m3
Can network development using arm cortex m3Can network development using arm cortex m3
Can network development using arm cortex m3
 
Can network development using arm cortex m3
Can network development using arm cortex m3Can network development using arm cortex m3
Can network development using arm cortex m3
 
TLS in manet
TLS in manetTLS in manet
TLS in manet
 
can bus theory solution
can bus theory solutioncan bus theory solution
can bus theory solution
 
Direct Link Lan
Direct Link LanDirect Link Lan
Direct Link Lan
 
A throughput analysis of tcp in adhoc networks
A throughput analysis of tcp in adhoc networksA throughput analysis of tcp in adhoc networks
A throughput analysis of tcp in adhoc networks
 
CS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKSCS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKS
 
Chapter-10.pptx
Chapter-10.pptxChapter-10.pptx
Chapter-10.pptx
 
Computer Network
Computer NetworkComputer Network
Computer Network
 
Answer sheet of switching & routing
Answer sheet of switching & routingAnswer sheet of switching & routing
Answer sheet of switching & routing
 
Jaimin chp-3 - data-link layer- 2011 batch
Jaimin   chp-3 - data-link layer- 2011 batchJaimin   chp-3 - data-link layer- 2011 batch
Jaimin chp-3 - data-link layer- 2011 batch
 
Ba25315321
Ba25315321Ba25315321
Ba25315321
 
Ch6.ppt
Ch6.pptCh6.ppt
Ch6.ppt
 
Mac
MacMac
Mac
 
Some of the terms about Computer Networking
Some of the terms about Computer NetworkingSome of the terms about Computer Networking
Some of the terms about Computer Networking
 
A Performance Comparison of TCP Protocols
A Performance Comparison of TCP Protocols A Performance Comparison of TCP Protocols
A Performance Comparison of TCP Protocols
 

Mehr von Resty Shane Amora (8)

Resty Shane 1
Resty  Shane 1Resty  Shane 1
Resty Shane 1
 
Resty Shane 1
Resty Shane 1Resty Shane 1
Resty Shane 1
 
Resty Shane 1
Resty Shane 1Resty Shane 1
Resty Shane 1
 
Resty Shane 1
Resty Shane 1Resty Shane 1
Resty Shane 1
 
project in DBMS
project in DBMSproject in DBMS
project in DBMS
 
Resty Shane 1
Resty  Shane 1Resty  Shane 1
Resty Shane 1
 
Resty Shane 1
Resty  Shane 1Resty  Shane 1
Resty Shane 1
 
Resty Shane 1
Resty Shane 1Resty Shane 1
Resty Shane 1
 

Kürzlich hochgeladen

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 

Kürzlich hochgeladen (20)

E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 

Networking

  • 1. Ethernet Error Descriptions The following sections describe the main error types that can be captured through a protocol analysis session. Local Collisions A local collision is an Ethernet packet that usually is less than 64 bytes in length and may contain a garbled Cyclic Redundancy Check (CRC) field. A local collision will be on the local segment. Collisions on a network are considered normal, especially in the CSMA/CD access method. Stations are supposed to collide, and when transmissions collide, they are supposed to listen and wait to retransmit. But certain levels are considered problems. When collisions are more than one percent of overall traffic, it is considered an issue. Normally, if no problems exist on a network, a minor collision rate from one station does not indicate a major problem in general network communications. If, however, the collision rate is more then one percent of all traffic on an Ethernet, the NIC addre ss captured should be recorded, and the adapter should be troubleshot. Although a high collision rate from one particular station can be a minor component of overall traffic levels, it should be addressed immediately. From a troubleshooting standpoint, if a high collision rate is transmitted from one station that is more than the one percent traffic level of the overall bandwidth utilized, that station card should be replaced or the connector should be checked within that particular station. Check the connections on the cabling connectors first, then actually replace the NIC board. The network should be re- analyzed to determine whether the error is still present on the network. Excessive collisions from stations on a network can consume bandwidth and cause a transmission problem across a complete network. In such cases, it is important that the collision problem be troubleshot and the cause corrected. High collision rates from multiple stations on the Ethernet network may indicate cabling, transceiver or repeater problems; the complete network segment should be analyzed and troubleshot. If one area of a network has multiple adapters transmitting CRC or collision errors in composite, that particular area of the network usually has a common factor such as a repeater or wiring hub module. This is where the trial-and-error method takes place, but a protocol analyzer is invaluable because it picks up the addresses with the collision rates. At that point, if those addresses are itemized and found to be in the same area of the network, any common device should be located and replaced.
  • 2. Remote Collisions A remote collision is a collision packet usually less than 64 bytes in size with a corrupted CRC field value. These are packets that have filtered over from another segment. This may indicate that a specific node's NIC or transceiver on another side of a repeater has a problem. A bridge or router isolates all collisions to their res pective local segment. Most protocol analyzers can detect when a collision is not local if the address fields are valid and not local. Sometimes false readings can occur in this area. If a valid high remote collision is detected with an analyzer, you are going to have a tough troubleshooting session. If the cause of a node and segment problem is to be located specifically, it will require systematic troubleshooting by checking all the Ethernet segments attached to a repeater for their individual health at the physical layer. When a local collision is found on a particular segment, the next step is to locate the bad node and follow the replace-and-reanalyze approach. Late Collisions A late collision is a collision packet usually larger than 64 bytes with a corrupted CRC field value. This is a packet that will be on the local segment. If a collision occurs with less than the normal 64 bytes of transmission of a particular station generation, this means that there is a normal collision occurrence upon transmission. If, however, the collision occurs with greater than 64 bytes of data on an Ethernet station transmission, this is considered "late" because it did not occur before the 64-byte transmission ratio. Late collisions can cause a high number of bytes to be transmitted in a train fashion because more bytes are on the network than with a normal collision under 64 bytes. More often this indicates that the station's NIC transmitting the collision cannot hear properly to stop its transmission and will continue to broadcast high collision rates on the network. This also may be captured as a form of excessive jamming. This usually is a problem with a network interface card, and the card should be replaced and the network re-analyzed. CRC/Alignment Errors On any Ethernet network, a CRC error can be captured in an analysis session. A CRC error is picked up by a protocol analyzer when the Ethernet packet has a byte-posi tioning problem. The Ethernet packet is responsible for checking its transfer from station to station through general network communications with a CRC field. The CRC field is a math algorithm field used for calculating an Ethernet's packet contents for proper communication from station to station. Normally, a sending station sends out a packet that has a CRC pattern in it that is supposedly standard. The
  • 3. receiving or destination station within an Ethernet network recalculates the frame contents to correlate whether it matches the proper CRC value. If a problem occurs in the error calculation and a difference arises, the packet possibly is corrupted and a CRC error may be generated by the station onto the network. If a CRC error generation is picked up, the analyzer usually records that CRC error and indicates that the sending station or the destination station has a corruption in packet transmission. At times, CRC and alignment errors may be recorded as the same type of error. This is because they both really indicate a byte-alignment problem in transmissions. If CRC errors are recorded in a protocol analysis session above the two to three percent level of overall traffic on a network, they are considered excessive. It is possible that the group of stations involved in a transfer, on occurrence of a specific node sending of CRC transmissions, has a problem. All the addresses of transmitting nodes captured in a trace with frames in front and after the CRC error frame should be noted for the record. The problem may be in the group of stations. It is possible that a node NIC, transceiver, respective cabling or even a connected repeater or wiring hub port has failed. But relax, usually the station sending the CRC error will have a bad NIC or transceiver. If CRC errors are high on a particular Ethernet segment, cable connections may have problems or improper grounding may exist throughout the network. The cabling and connections should be checked first. If th e problem is still present, the NIC should be replaced. The BNC T-connector, the tap connector and transceivers also can be one of the primary causes for this type of problem. But the most probable cause is the NIC sending the CRC. After checking the cabling infrastructure, replace the NIC. Next, the network should be re-analyzed to check for any errors related to the new NIC address. If problems are still present, multiport repeaters and wiring hubs also should be checked as a cause for the CRC errors. It is possible to attribute this problem to one particular network station's NIC. The surest way to isolate this is through a protocol analysis session. Look very closely for a high number of CRC errors, because a high frequency indicates a definite problem for the sending station. Long and Short Packets As mentioned earlier, the Ethernet frame types have certain rules. Depending on the packet type, frames can be from 64 bytes to 1,518 bytes in length. With the proper protocol analyzer, you can pick up two types of packets called short frames (runts) and long packets. A short or runt packet is any packet smaller than 64 bytes. Long packets are those larger than 1,518 bytes. These are considered problems on a network and an analyst should use a protocol analyzer to capture multiple transmissions of the occurrence. It is possible for a NIC, transceiver or even a corrupted LAN driver to generate long and short frames. The cause is usually isolated to the failing network interface card. Captured long or short packets may not include reliable address fields. The analyst should identify the addresses attempting to communicate in the trace that are right before and
  • 4. after the long or short packets. Next, one by one remove the suspect nodes and re-analyze the network until the problem subsides. After the node area is located, the NIC, transceiver and NIC driver should be troubleshot. Jabber At times, Ethernet network interface card s and external transceivers also generate a problem called jabbering. This is when garbled bits of data are emitted within the frame sequence in a continuous transmission fashion. The packet length is usually more than 1,518 bytes. This can be identified by a protocol analyzer as a CRC error. As mentioned earlier, when nodes detect collisions they emit a normal JAM signal on the network segment to clear transmission. Sometimes certain nodes attempt to keep jamming the network due to excessive high collision rates; this also can be captured as high CRC or late collision error rate. The cause can be overloaded traffic levels. If the bandwidth- utilization levels are normal or low for the particular Ethernet segment, it is possible that the collision detection pair of a jamming node's NIC or transceiver cannot hear the network signal and may not know a collision has stopped. If this occurs, it continues to jam the network. If a certain node on an Ethernet segment emits a lot of jabber, the node's NIC and transceiver should be troubleshot through consecutive replacement and re-analysis. If an Ethernet network has intermittent high network bandwidth usage that causes performance problems, the cause can be re-created by loading the network with traffic-generation features in a protocol analyzer. But you must be careful when using this technique. First, be aware of the current network usage and any possible impacts to the network-user community. Second, you really have to understand all the Ethernet network bandwidth considerations discussed earlier, including the actual maximum bandwidth available, the overall network bandwidth baseline view and individual Ethernet node bandwidth consumption. Make sure that a proper baseline is performed on the lower and upper layers of the Ethernet. November 15, 1996