SlideShare a Scribd company logo
1 of 50
1© 2004, Cisco Systems, Inc. All rights reserved.
Module 6
Ethernet Fundamentals
222© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Objectives
333© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Ethernet
• Ethernet is a bus network in which
multiple computers share a single
transmission medium. While one
computer transmits a frame to another. All
other computers must wait.
• Ethernet is the dominant LAN technology
in the world.
• Ethernet is not one technology but a
family of LAN technologies.( E- FE-GE)
444© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Introduction to Ethernet
• Most of the traffic on the Internet originates and ends with Ethernet
connections.
• Competing and fighting to access the media -------Original idea for
Ethernet was developed in early 1970s at the University of Hawaii .
• 1970’s Alohanet was the basis Ethernet access method known as
CSMA/CD.
• DIX-1980 Robert Metcalfe+ The first LAN in the world. That is the
original version of Ethernet.
• 1985—IEEE---The Institute of Electrical and Electronics Engineers
published standards for LANs. These standards start with the number
802. The standard for Ethernet is 802.3. (IEEE –must be compatible to
OSI model). The standard for Ethernet is 802.3.
• Essentially, Ethernet and IEEE 802.3 are the same standards ( some
small modification )
• In 1995, IEEE announced a standard for a 100-Mbps Ethernet (called
Fast Ethernet).
• In 1998 and 1999 standards for gigabit per second (Gbps, 1 billion bits
per second)
• The bandwidth of the network could be increased many times without
changing the underlying Ethernet technology
555© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
The Success of Ethernet
The success of Ethernet is due to the following factors:
• Simplicity and ease of maintenance
• Ability to incorporate new technologies
• Reliability
• Low cost of installation and upgrade
Together, Ethernet and IEEE 802.3 currently maintain the
greatest market share of any LAN protocol
666© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Inventor of Ethernet – Out of the Ether
777© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Introduction to Ethernet
Ethernet was originally developed to operate over radio in the
Hawaiian islands
888© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Defining Standard
• "The nice thing about standards is
that there's so many to choose
from."
999© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
OSI Model
101010© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
The Physical layer
Layer 1 involves interfacing with:
• media, signals, bit streams that travel on the
media
• components that put signals on media, and
various topologies.
111111© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Data Link Layer
• Data link layer provides reliable transit of data
across a physical link by using the Media
Access Control (MAC) addresses.
• Data link layer is concerned with physical (as
opposed to network, or logical) addressing.
121212© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Data link layer– Two Parts (sub-layers)
Logical link Control (LLC) : (IEEE 802.2)
• The Logical Link Control (LLC) sublayer remains relatively
independent of the physical equipment
• Provides an interface between the MAC layer and the Network
layer which is independent of the hardware
Media Access Control (MAC): (part of IEEE 802.3)
• The MAC sub-layer is concerned with the physical components
that will be used to communicate the information..
• WHO can access the network when multiple computers are
trying to access it simultaneously.
• physical addressing (MAC addresses) and access control
methods.
131313© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Ethernet and the OSI Model
• Ethernet operates in two areas of the
OSI model, the lower half of the data
link layer, known as the MAC sub
layer and the physical layer
• Trick question
141414© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Ethernet and the OSI Model
151515© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
IEEE Ethernet Standards
IEEE 802 Committee Standards:
• 802.1 - Standards introduction
• 802.2 - Logical Link Control (LLC)
to prevent senders from overwhelming receivers (ACK)
• 802.3 – Ethernet
CSMA/CD, multiple media access methods, and packet (frame) format.
• 802.4 - Token Bus - 75 ohm CATV coax or Fibre
• 802.5 - Token Ring - physical standard and media access sublayer
• 802.6 - MAN (Metropolitan Area Network) - similar to FDDI
• 802.7 - Broadband
• 802.8 - Fiber Optics
• 802.9 - Integrated Voice and Data
• 802.10 - LAN Security
• 802.11 - Wireless
• 802.12 -100 VG AnyLAN
161616© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Ethernet and the OSI Model
171717© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Ethernet and the OSI Model
181818© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Naming – The MAC or Hardware Address
• A 48-bit address
burned onto the NIC.
• It is a unique way of
identifying each
computer on a
network.
• Flat Address
All devices that are
connected to the
Ethernet LAN have
MAC addressed
interfaces including
workstations,
printers, routers, and
switches.
191919© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Naming – MAC Address Format
The MAC address consists of 12 hex digits (48 bits)
The first six digits (assigned by the IEEE) represent the Organizational
Unique Identifier (OUI) which identifies the manufacturer
The last six are assigned by the manufacturer and represent a unique
hardware ID number for the NIC
202020© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Framing
• Framing is the Layer 2 encapsulation process.
• Bit streams (data) 010101 alone can not be sent between devices.
• We must divide the data up and add:
a bit pattern to flag the start of each frame
relevant MAC addresses
a block of data
some bits for error detection
a bit pattern to flag the end of the frame
• A frame is the Layer 2 protocol data unit (PDU).
212121© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Layer 2 Framing
222222© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Layer 2 Framing
232323© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Ethernet Frame Structures
242424© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Ethernet Frame Structure
252525© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
IEEE 802.3 Frame Structure
262626© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
IEEE 802.3 Preamble (Start Frame Field)
272727© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Ethernet - IEEE802.3 Frame Field Comparison
282828© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Layer 2 Technologies
• Token Ring - logical ring topology
(in other words, information flow
is controlled in a ring) and a
physical star topology (in other
words, it is wired as a star)
• FDDI - logical ring topology
(information flow is controlled in a
ring) and physical dual ring
topology (wired as a dual ring)
• Ethernet - logical bus topology
(information flow is on a linear
bus) and physical star or
extended star (wired as a star)
292929© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Media Access Control (MAC)
• MAC refers to Protocols that determine
which computer on a shared-medium
environment, or collision domain, is
allowed to transmit the data.
• MAC, with LLC, comprises the IEEE
version of the OSI Layer 2.
• There are two broad categories of Media
Access Control
1. Deterministic
taking turns
2. Non-deterministic
first come, first served).
303030© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Ethernet
•Ethernet performs three functions:
• Transmitting and receiving data packets
• Decoding data packets and checking them for valid
MAC addresses before passing them to the upper
layers of the OSI model
• detecting errors within data packets or on the
network
In the CSMA/CD access method, networking devices with data
to transmit over the networking media work in a listen-before-
transmit mode.
313131© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
MAC Rules and Collision Detection/Backoff
323232© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
MAC Rules and Collision Detection/Backoff
333333© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
CSMA/CD
Non-Deterministic
1. Listen then transmit
1 2
3 4
2. Collision occurs
3. Broadcast jam signal
4. Devices back off
appropriate amount of
time, goes back to listen
then transmit and then
retransmit
Ethernet is a broadcast transmission medium. This means that all devices on a network can see all
data that passes along the networking media.
When a device has verified the destination MAC address carried by the data, it then checks the
data packet for transmission errors. If the device detects errors, the data packet is discarded.
The destination device will not notify the source device, regardless of whether the packet arrived
successfully.
Ethernet is a connectionless network architecture and is referred to as a best-effort delivery
system.
343434© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Ethernet Timing
353535© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Interframe Spacing and Backoff
363636© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Ethernet Timing
• Slot time – the longest time taken to do a round
trip of the largest legal network
– 512 Bits = 64 Bytes
• Interframe spacing
– 96 bit times for 10, 100, 1000 Mbps networks
373737© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Error Handling
383838© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Types of Collisions
• What is a Runt frame ?
393939© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Answer
• Any frame which is received and which is less
than 64 bytes is illegal, and is called a "runt".
(14 bytes + 46+ 4)
• A receiver must discard all runt frames
404040© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Types of Collisions
414141© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Ethernet Errors
424242© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Ethernet Errors
434343© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
FCS Errors
444444© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Transmission Errors
Collision or runt – Simultaneous transmission occurring
before slot time has elapsed
Late collision – Simultaneous transmission occurring after
slot time (512 bits = 64 Bytes)has elapsed
Jabber, long frame and range errors – Excessively or
illegally long transmission (jabber 20000-50000 octets)
Short frame, collision fragment or runt – Illegally short
transmission
FCS error – Corrupted transmission
454545© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Ethernet Auto-Negotiation
• NLP – Network Link Pulses (10 Mbps)
Pulses sent by NIC every 16 ms
Convey information about the capabilities of the card or
device
• FLP (100Mbps-1000Mbps)
Mandatory
Made up of NLPs so 10 Mbps cards can exist with 100
and 1000 Mbps
464646© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Ethernet Auto-Negotiation
474747© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Ethernet Auto-Negotiation
484848© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Transmission Priority Rank
494949© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
IEEE Ethernet Naming Rules
505050© 2004, Cisco Systems, Inc. All rights reserved.
www.pnj.ac.id
Why was Ethernet Successful
• Ethernet has been the most successful
LAN technology largely because of its
simplicity of implementation compared to
other technologies.
• Ethernet has also been successful
because it has been a flexible technology
that has evolved to meet changing needs
and media capabilities

More Related Content

What's hot

(Latest) topic 5 field_effect_transistors
(Latest) topic 5 field_effect_transistors(Latest) topic 5 field_effect_transistors
(Latest) topic 5 field_effect_transistorsGabriel O'Brien
 
Internet of things
Internet of thingsInternet of things
Internet of thingsNaiyer Khan
 
Societal impacts of it
Societal impacts of itSocietal impacts of it
Societal impacts of itSamrat Sikri
 
Analytical Modeling of Tunneling Field Effect Transistor (TFET)
Analytical Modeling of Tunneling Field Effect Transistor (TFET)Analytical Modeling of Tunneling Field Effect Transistor (TFET)
Analytical Modeling of Tunneling Field Effect Transistor (TFET)Abu Obayda
 
Computer Science Engineering - Better Career Opportunities
Computer Science Engineering - Better Career OpportunitiesComputer Science Engineering - Better Career Opportunities
Computer Science Engineering - Better Career Opportunitiesachaljain11
 
Comparative Study and Performance Analysis of different Modulation Techniques...
Comparative Study and Performance Analysis of different Modulation Techniques...Comparative Study and Performance Analysis of different Modulation Techniques...
Comparative Study and Performance Analysis of different Modulation Techniques...Souvik Das
 
Strip lines
Strip linesStrip lines
Strip linesrakeshkk
 
IoT Tutorial for Beginners | Internet of Things (IoT) | IoT Training | IoT Te...
IoT Tutorial for Beginners | Internet of Things (IoT) | IoT Training | IoT Te...IoT Tutorial for Beginners | Internet of Things (IoT) | IoT Training | IoT Te...
IoT Tutorial for Beginners | Internet of Things (IoT) | IoT Training | IoT Te...Edureka!
 
Report on In Band On Channel
Report on In Band On Channel Report on In Band On Channel
Report on In Band On Channel Vishal Kumar
 
Modeling ion sensitive field effect transistors for biosensor applications
Modeling ion sensitive field effect transistors for biosensor applicationsModeling ion sensitive field effect transistors for biosensor applications
Modeling ion sensitive field effect transistors for biosensor applicationsiaemedu
 
Future of biomedical instrumentation
Future of biomedical instrumentationFuture of biomedical instrumentation
Future of biomedical instrumentationFida Fidai
 
EC8791 Requirement-Specifications-Quality assurance techniques
EC8791 Requirement-Specifications-Quality assurance techniquesEC8791 Requirement-Specifications-Quality assurance techniques
EC8791 Requirement-Specifications-Quality assurance techniquesRajalakshmiSermadurai
 
Science and technologies
Science and technologiesScience and technologies
Science and technologiesGayathrimonica2
 
MOSFET_Scaling5012.ppt
MOSFET_Scaling5012.pptMOSFET_Scaling5012.ppt
MOSFET_Scaling5012.pptmohan134666
 

What's hot (20)

(Latest) topic 5 field_effect_transistors
(Latest) topic 5 field_effect_transistors(Latest) topic 5 field_effect_transistors
(Latest) topic 5 field_effect_transistors
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Societal impacts of it
Societal impacts of itSocietal impacts of it
Societal impacts of it
 
Analytical Modeling of Tunneling Field Effect Transistor (TFET)
Analytical Modeling of Tunneling Field Effect Transistor (TFET)Analytical Modeling of Tunneling Field Effect Transistor (TFET)
Analytical Modeling of Tunneling Field Effect Transistor (TFET)
 
Mini project slide show
Mini project slide showMini project slide show
Mini project slide show
 
Computer Science Engineering - Better Career Opportunities
Computer Science Engineering - Better Career OpportunitiesComputer Science Engineering - Better Career Opportunities
Computer Science Engineering - Better Career Opportunities
 
Comparative Study and Performance Analysis of different Modulation Techniques...
Comparative Study and Performance Analysis of different Modulation Techniques...Comparative Study and Performance Analysis of different Modulation Techniques...
Comparative Study and Performance Analysis of different Modulation Techniques...
 
Charge transport in mos
Charge transport in mosCharge transport in mos
Charge transport in mos
 
Inductive transducer
Inductive transducerInductive transducer
Inductive transducer
 
Strip lines
Strip linesStrip lines
Strip lines
 
IoT Tutorial for Beginners | Internet of Things (IoT) | IoT Training | IoT Te...
IoT Tutorial for Beginners | Internet of Things (IoT) | IoT Training | IoT Te...IoT Tutorial for Beginners | Internet of Things (IoT) | IoT Training | IoT Te...
IoT Tutorial for Beginners | Internet of Things (IoT) | IoT Training | IoT Te...
 
Report on In Band On Channel
Report on In Band On Channel Report on In Band On Channel
Report on In Band On Channel
 
Modeling ion sensitive field effect transistors for biosensor applications
Modeling ion sensitive field effect transistors for biosensor applicationsModeling ion sensitive field effect transistors for biosensor applications
Modeling ion sensitive field effect transistors for biosensor applications
 
Basics Of VLSI
Basics Of VLSIBasics Of VLSI
Basics Of VLSI
 
Future of biomedical instrumentation
Future of biomedical instrumentationFuture of biomedical instrumentation
Future of biomedical instrumentation
 
EC8791 Requirement-Specifications-Quality assurance techniques
EC8791 Requirement-Specifications-Quality assurance techniquesEC8791 Requirement-Specifications-Quality assurance techniques
EC8791 Requirement-Specifications-Quality assurance techniques
 
Societal Impact Of IT
Societal Impact Of IT Societal Impact Of IT
Societal Impact Of IT
 
Science and technologies
Science and technologiesScience and technologies
Science and technologies
 
IT.pptx
IT.pptxIT.pptx
IT.pptx
 
MOSFET_Scaling5012.ppt
MOSFET_Scaling5012.pptMOSFET_Scaling5012.ppt
MOSFET_Scaling5012.ppt
 

Similar to Cisco CCNA module 6

Ccna v5-S1-Chapter 5
Ccna v5-S1-Chapter 5Ccna v5-S1-Chapter 5
Ccna v5-S1-Chapter 5Hamza Malik
 
CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5Irsandi Hasan
 
CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10Irsandi Hasan
 
CCNA 1 Routing and Switching v5.0 Chapter 5
CCNA 1 Routing and Switching v5.0 Chapter 5CCNA 1 Routing and Switching v5.0 Chapter 5
CCNA 1 Routing and Switching v5.0 Chapter 5Nil Menon
 
CCNAv5 - S1: Chapter 5 - Ethernet
CCNAv5 - S1: Chapter 5 - EthernetCCNAv5 - S1: Chapter 5 - Ethernet
CCNAv5 - S1: Chapter 5 - EthernetVuz Dở Hơi
 
Chapter 05 - Ethernet
Chapter 05 - EthernetChapter 05 - Ethernet
Chapter 05 - EthernetYaser Rahmati
 
Chapter 5 : Ethernet
Chapter 5 : EthernetChapter 5 : Ethernet
Chapter 5 : Ethernetteknetir
 
Chapter 03 - Network Protocols and Communications
Chapter 03 - Network Protocols and CommunicationsChapter 03 - Network Protocols and Communications
Chapter 03 - Network Protocols and CommunicationsYaser Rahmati
 
CCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communicationsCCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communicationsVuz Dở Hơi
 
Chapter 3 : Network protocols and communications
Chapter 3 : Network protocols and communicationsChapter 3 : Network protocols and communications
Chapter 3 : Network protocols and communicationsteknetir
 
CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9Irsandi Hasan
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPTAIRTEL
 
ITN_Module_6.pptx
ITN_Module_6.pptxITN_Module_6.pptx
ITN_Module_6.pptxargost1003
 

Similar to Cisco CCNA module 6 (20)

Ccna v5-S1-Chapter 5
Ccna v5-S1-Chapter 5Ccna v5-S1-Chapter 5
Ccna v5-S1-Chapter 5
 
CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5
 
CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 10
 
CCNA 1 Routing and Switching v5.0 Chapter 5
CCNA 1 Routing and Switching v5.0 Chapter 5CCNA 1 Routing and Switching v5.0 Chapter 5
CCNA 1 Routing and Switching v5.0 Chapter 5
 
CCNAv5 - S1: Chapter 5 - Ethernet
CCNAv5 - S1: Chapter 5 - EthernetCCNAv5 - S1: Chapter 5 - Ethernet
CCNAv5 - S1: Chapter 5 - Ethernet
 
Chapter 05 - Ethernet
Chapter 05 - EthernetChapter 05 - Ethernet
Chapter 05 - Ethernet
 
Chapter 5 : Ethernet
Chapter 5 : EthernetChapter 5 : Ethernet
Chapter 5 : Ethernet
 
Chapter 03 - Network Protocols and Communications
Chapter 03 - Network Protocols and CommunicationsChapter 03 - Network Protocols and Communications
Chapter 03 - Network Protocols and Communications
 
CCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communicationsCCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communications
 
Chapter 3 : Network protocols and communications
Chapter 3 : Network protocols and communicationsChapter 3 : Network protocols and communications
Chapter 3 : Network protocols and communications
 
Ethernet
EthernetEthernet
Ethernet
 
Ccna routing and_switching_chapter-4-5
Ccna routing and_switching_chapter-4-5Ccna routing and_switching_chapter-4-5
Ccna routing and_switching_chapter-4-5
 
CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 9
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPT
 
ITN_Module_6.pptx
ITN_Module_6.pptxITN_Module_6.pptx
ITN_Module_6.pptx
 
6 osi vimp
6 osi vimp6 osi vimp
6 osi vimp
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Ccna day 1
Ccna day 1Ccna day 1
Ccna day 1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 

More from Anjar Septiawan

More from Anjar Septiawan (9)

Cisco CCNA module 10
Cisco CCNA module 10Cisco CCNA module 10
Cisco CCNA module 10
 
Cisco CCNA module 9
Cisco CCNA module 9Cisco CCNA module 9
Cisco CCNA module 9
 
Cisco CCNA module 7
Cisco CCNA module 7Cisco CCNA module 7
Cisco CCNA module 7
 
Cisco CCNA module 5
Cisco CCNA module 5Cisco CCNA module 5
Cisco CCNA module 5
 
Cisco CCNA module 4
Cisco CCNA module 4Cisco CCNA module 4
Cisco CCNA module 4
 
Cisco CCNA module 3
Cisco CCNA module 3Cisco CCNA module 3
Cisco CCNA module 3
 
Cisco CCNA module 2
Cisco CCNA module 2Cisco CCNA module 2
Cisco CCNA module 2
 
Cisco CCNA module 1
Cisco CCNA module 1Cisco CCNA module 1
Cisco CCNA module 1
 
Cisco CCNA module 8
Cisco CCNA module 8Cisco CCNA module 8
Cisco CCNA module 8
 

Recently uploaded

DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 

Recently uploaded (20)

DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 

Cisco CCNA module 6

  • 1. 1© 2004, Cisco Systems, Inc. All rights reserved. Module 6 Ethernet Fundamentals
  • 2. 222© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Objectives
  • 3. 333© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Ethernet • Ethernet is a bus network in which multiple computers share a single transmission medium. While one computer transmits a frame to another. All other computers must wait. • Ethernet is the dominant LAN technology in the world. • Ethernet is not one technology but a family of LAN technologies.( E- FE-GE)
  • 4. 444© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Introduction to Ethernet • Most of the traffic on the Internet originates and ends with Ethernet connections. • Competing and fighting to access the media -------Original idea for Ethernet was developed in early 1970s at the University of Hawaii . • 1970’s Alohanet was the basis Ethernet access method known as CSMA/CD. • DIX-1980 Robert Metcalfe+ The first LAN in the world. That is the original version of Ethernet. • 1985—IEEE---The Institute of Electrical and Electronics Engineers published standards for LANs. These standards start with the number 802. The standard for Ethernet is 802.3. (IEEE –must be compatible to OSI model). The standard for Ethernet is 802.3. • Essentially, Ethernet and IEEE 802.3 are the same standards ( some small modification ) • In 1995, IEEE announced a standard for a 100-Mbps Ethernet (called Fast Ethernet). • In 1998 and 1999 standards for gigabit per second (Gbps, 1 billion bits per second) • The bandwidth of the network could be increased many times without changing the underlying Ethernet technology
  • 5. 555© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id The Success of Ethernet The success of Ethernet is due to the following factors: • Simplicity and ease of maintenance • Ability to incorporate new technologies • Reliability • Low cost of installation and upgrade Together, Ethernet and IEEE 802.3 currently maintain the greatest market share of any LAN protocol
  • 6. 666© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Inventor of Ethernet – Out of the Ether
  • 7. 777© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Introduction to Ethernet Ethernet was originally developed to operate over radio in the Hawaiian islands
  • 8. 888© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Defining Standard • "The nice thing about standards is that there's so many to choose from."
  • 9. 999© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id OSI Model
  • 10. 101010© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id The Physical layer Layer 1 involves interfacing with: • media, signals, bit streams that travel on the media • components that put signals on media, and various topologies.
  • 11. 111111© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Data Link Layer • Data link layer provides reliable transit of data across a physical link by using the Media Access Control (MAC) addresses. • Data link layer is concerned with physical (as opposed to network, or logical) addressing.
  • 12. 121212© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Data link layer– Two Parts (sub-layers) Logical link Control (LLC) : (IEEE 802.2) • The Logical Link Control (LLC) sublayer remains relatively independent of the physical equipment • Provides an interface between the MAC layer and the Network layer which is independent of the hardware Media Access Control (MAC): (part of IEEE 802.3) • The MAC sub-layer is concerned with the physical components that will be used to communicate the information.. • WHO can access the network when multiple computers are trying to access it simultaneously. • physical addressing (MAC addresses) and access control methods.
  • 13. 131313© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Ethernet and the OSI Model • Ethernet operates in two areas of the OSI model, the lower half of the data link layer, known as the MAC sub layer and the physical layer • Trick question
  • 14. 141414© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Ethernet and the OSI Model
  • 15. 151515© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id IEEE Ethernet Standards IEEE 802 Committee Standards: • 802.1 - Standards introduction • 802.2 - Logical Link Control (LLC) to prevent senders from overwhelming receivers (ACK) • 802.3 – Ethernet CSMA/CD, multiple media access methods, and packet (frame) format. • 802.4 - Token Bus - 75 ohm CATV coax or Fibre • 802.5 - Token Ring - physical standard and media access sublayer • 802.6 - MAN (Metropolitan Area Network) - similar to FDDI • 802.7 - Broadband • 802.8 - Fiber Optics • 802.9 - Integrated Voice and Data • 802.10 - LAN Security • 802.11 - Wireless • 802.12 -100 VG AnyLAN
  • 16. 161616© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Ethernet and the OSI Model
  • 17. 171717© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Ethernet and the OSI Model
  • 18. 181818© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Naming – The MAC or Hardware Address • A 48-bit address burned onto the NIC. • It is a unique way of identifying each computer on a network. • Flat Address All devices that are connected to the Ethernet LAN have MAC addressed interfaces including workstations, printers, routers, and switches.
  • 19. 191919© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Naming – MAC Address Format The MAC address consists of 12 hex digits (48 bits) The first six digits (assigned by the IEEE) represent the Organizational Unique Identifier (OUI) which identifies the manufacturer The last six are assigned by the manufacturer and represent a unique hardware ID number for the NIC
  • 20. 202020© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Framing • Framing is the Layer 2 encapsulation process. • Bit streams (data) 010101 alone can not be sent between devices. • We must divide the data up and add: a bit pattern to flag the start of each frame relevant MAC addresses a block of data some bits for error detection a bit pattern to flag the end of the frame • A frame is the Layer 2 protocol data unit (PDU).
  • 21. 212121© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Layer 2 Framing
  • 22. 222222© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Layer 2 Framing
  • 23. 232323© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Ethernet Frame Structures
  • 24. 242424© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Ethernet Frame Structure
  • 25. 252525© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id IEEE 802.3 Frame Structure
  • 26. 262626© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id IEEE 802.3 Preamble (Start Frame Field)
  • 27. 272727© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Ethernet - IEEE802.3 Frame Field Comparison
  • 28. 282828© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Layer 2 Technologies • Token Ring - logical ring topology (in other words, information flow is controlled in a ring) and a physical star topology (in other words, it is wired as a star) • FDDI - logical ring topology (information flow is controlled in a ring) and physical dual ring topology (wired as a dual ring) • Ethernet - logical bus topology (information flow is on a linear bus) and physical star or extended star (wired as a star)
  • 29. 292929© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Media Access Control (MAC) • MAC refers to Protocols that determine which computer on a shared-medium environment, or collision domain, is allowed to transmit the data. • MAC, with LLC, comprises the IEEE version of the OSI Layer 2. • There are two broad categories of Media Access Control 1. Deterministic taking turns 2. Non-deterministic first come, first served).
  • 30. 303030© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Ethernet •Ethernet performs three functions: • Transmitting and receiving data packets • Decoding data packets and checking them for valid MAC addresses before passing them to the upper layers of the OSI model • detecting errors within data packets or on the network In the CSMA/CD access method, networking devices with data to transmit over the networking media work in a listen-before- transmit mode.
  • 31. 313131© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id MAC Rules and Collision Detection/Backoff
  • 32. 323232© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id MAC Rules and Collision Detection/Backoff
  • 33. 333333© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id CSMA/CD Non-Deterministic 1. Listen then transmit 1 2 3 4 2. Collision occurs 3. Broadcast jam signal 4. Devices back off appropriate amount of time, goes back to listen then transmit and then retransmit Ethernet is a broadcast transmission medium. This means that all devices on a network can see all data that passes along the networking media. When a device has verified the destination MAC address carried by the data, it then checks the data packet for transmission errors. If the device detects errors, the data packet is discarded. The destination device will not notify the source device, regardless of whether the packet arrived successfully. Ethernet is a connectionless network architecture and is referred to as a best-effort delivery system.
  • 34. 343434© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Ethernet Timing
  • 35. 353535© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Interframe Spacing and Backoff
  • 36. 363636© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Ethernet Timing • Slot time – the longest time taken to do a round trip of the largest legal network – 512 Bits = 64 Bytes • Interframe spacing – 96 bit times for 10, 100, 1000 Mbps networks
  • 37. 373737© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Error Handling
  • 38. 383838© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Types of Collisions • What is a Runt frame ?
  • 39. 393939© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Answer • Any frame which is received and which is less than 64 bytes is illegal, and is called a "runt". (14 bytes + 46+ 4) • A receiver must discard all runt frames
  • 40. 404040© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Types of Collisions
  • 41. 414141© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Ethernet Errors
  • 42. 424242© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Ethernet Errors
  • 43. 434343© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id FCS Errors
  • 44. 444444© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Transmission Errors Collision or runt – Simultaneous transmission occurring before slot time has elapsed Late collision – Simultaneous transmission occurring after slot time (512 bits = 64 Bytes)has elapsed Jabber, long frame and range errors – Excessively or illegally long transmission (jabber 20000-50000 octets) Short frame, collision fragment or runt – Illegally short transmission FCS error – Corrupted transmission
  • 45. 454545© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Ethernet Auto-Negotiation • NLP – Network Link Pulses (10 Mbps) Pulses sent by NIC every 16 ms Convey information about the capabilities of the card or device • FLP (100Mbps-1000Mbps) Mandatory Made up of NLPs so 10 Mbps cards can exist with 100 and 1000 Mbps
  • 46. 464646© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Ethernet Auto-Negotiation
  • 47. 474747© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Ethernet Auto-Negotiation
  • 48. 484848© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Transmission Priority Rank
  • 49. 494949© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id IEEE Ethernet Naming Rules
  • 50. 505050© 2004, Cisco Systems, Inc. All rights reserved. www.pnj.ac.id Why was Ethernet Successful • Ethernet has been the most successful LAN technology largely because of its simplicity of implementation compared to other technologies. • Ethernet has also been successful because it has been a flexible technology that has evolved to meet changing needs and media capabilities