SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Ethernet Error Descriptions


The following sections describe the main error types that can be captured through a protocol analysis session.


                                              Local Collisions
 A local collision is an Ethernet packet that usually is less than 64 bytes in length and may contain a garbled
Cyclic Redundancy Check (CRC) field. A local collision will be on the local segment. Collisions on a network are
 considered normal, especially in the CSMA/CD access method. Stations are supposed to collide, and when
 transmissions collide, they are supposed to listen and wait to retransmit. But certain levels are considered
       problems. When collisions are more than one percent of overall traffic, it is considered an issue.

Normally, if no problems exist on a network, a minor collision rate from one station does not indicate a major
 problem in general network communications. If, however, the collision rate is more then one percent of all
traffic on an Ethernet, the NIC addre ss captured should be recorded, and the adapter should be troubleshot.

Although a high collision rate from one particular station can be a minor component of overall traffic levels, it
 should be addressed immediately. From a troubleshooting standpoint, if a high collision rate is transmitted
from one station that is more than the one percent traffic level of the overall bandwidth utilized, that station
    card should be replaced or the connector should be checked within that particular station. Check the
 connections on the cabling connectors first, then actually replace the NIC board. The network should be re-
                  analyzed to determine whether the error is still present on the network.

  Excessive collisions from stations on a network can consume bandwidth and cause a transmission problem
  across a complete network. In such cases, it is important that the collision problem be troubleshot and the
  cause corrected. High collision rates from multiple stations on the Ethernet network may indicate cabling,
   transceiver or repeater problems; the complete network segment should be analyzed and troubleshot.

If one area of a network has multiple adapters transmitting CRC or collision errors in composite, that particular
  area of the network usually has a common factor such as a repeater or wiring hub module. This is where the
trial-and-error method takes place, but a protocol analyzer is invaluable because it picks up the addresses with
    the collision rates. At that point, if those addresses are itemized and found to be in the same area of the
                          network, any common device should be located and replaced.
Remote Collisions
A remote collision is a collision packet usually less than 64 bytes in size with a corrupted CRC field value. These
   are packets that have filtered over from another segment. This may indicate that a specific node's NIC or
                             transceiver on another side of a repeater has a problem.

A bridge or router isolates all collisions to their res pective local segment. Most protocol analyzers can detect
when a collision is not local if the address fields are valid and not local. Sometimes false readings can occur in
                                                      this area.

  If a valid high remote collision is detected with an analyzer, you are going to have a tough troubleshooting
  session. If the cause of a node and segment problem is to be located specifically, it will require systematic
troubleshooting by checking all the Ethernet segments attached to a repeater for their individual health at the
 physical layer. When a local collision is found on a particular segment, the next step is to locate the bad node
                                 and follow the replace-and-reanalyze approach.


                                               Late Collisions
   A late collision is a collision packet usually larger than 64 bytes with a corrupted CRC field value. This is a
packet that will be on the local segment. If a collision occurs with less than the normal 64 bytes of transmission
 of a particular station generation, this means that there is a normal collision occurrence upon transmission.

If, however, the collision occurs with greater than 64 bytes of data on an Ethernet station transmission, this is
  considered "late" because it did not occur before the 64-byte transmission ratio. Late collisions can cause a
high number of bytes to be transmitted in a train fashion because more bytes are on the network than with a
   normal collision under 64 bytes. More often this indicates that the station's NIC transmitting the collision
     cannot hear properly to stop its transmission and will continue to broadcast high collision rates on the
 network. This also may be captured as a form of excessive jamming. This usually is a problem with a network
                 interface card, and the card should be replaced and the network re-analyzed.

                                           CRC/Alignment Errors
 On any Ethernet network, a CRC error can be captured in an analysis session. A CRC error is picked up by a
    protocol analyzer when the Ethernet packet has a byte-posi tioning problem. The Ethernet packet is
responsible for checking its transfer from station to station through general network communications with a
CRC field. The CRC field is a math algorithm field used for calculating an Ethernet's packet contents for proper
                                    communication from station to station.

  Normally, a sending station sends out a packet that has a CRC pattern in it that is supposedly standard. The
receiving or destination station within an Ethernet network recalculates the frame contents to correlate
 whether it matches the proper CRC value. If a problem occurs in the error calculation and a difference arises,
 the packet possibly is corrupted and a CRC error may be generated by the station onto the network. If a CRC
error generation is picked up, the analyzer usually records that CRC error and indicates that the sending station
                       or the destination station has a corruption in packet transmission.

At times, CRC and alignment errors may be recorded as the same type of error. This is because they both really
  indicate a byte-alignment problem in transmissions. If CRC errors are recorded in a protocol analysis session
     above the two to three percent level of overall traffic on a network, they are considered excessive. It is
    possible that the group of stations involved in a transfer, on occurrence of a specific node sending of CRC
 transmissions, has a problem. All the addresses of transmitting nodes captured in a trace with frames in front
 and after the CRC error frame should be noted for the record. The problem may be in the group of stations. It
is possible that a node NIC, transceiver, respective cabling or even a connected repeater or wiring hub port has
          failed. But relax, usually the station sending the CRC error will have a bad NIC or transceiver.

  If CRC errors are high on a particular Ethernet segment, cable connections may have problems or improper
   grounding may exist throughout the network. The cabling and connections should be checked first. If th e
 problem is still present, the NIC should be replaced. The BNC T-connector, the tap connector and transceivers
also can be one of the primary causes for this type of problem. But the most probable cause is the NIC sending
the CRC. After checking the cabling infrastructure, replace the NIC. Next, the network should be re-analyzed to
   check for any errors related to the new NIC address. If problems are still present, multiport repeaters and
                        wiring hubs also should be checked as a cause for the CRC errors.

It is possible to attribute this problem to one particular network station's NIC. The surest way to isolate this is
      through a protocol analysis session. Look very closely for a high number of CRC errors, because a high
                          frequency indicates a definite problem for the sending station.

                                          Long and Short Packets
As mentioned earlier, the Ethernet frame types have certain rules. Depending on the packet type, frames can
  be from 64 bytes to 1,518 bytes in length. With the proper protocol analyzer, you can pick up two types of
   packets called short frames (runts) and long packets. A short or runt packet is any packet smaller than 64
  bytes. Long packets are those larger than 1,518 bytes. These are considered problems on a network and an
analyst should use a protocol analyzer to capture multiple transmissions of the occurrence. It is possible for a
    NIC, transceiver or even a corrupted LAN driver to generate long and short frames. The cause is usually
isolated to the failing network interface card. Captured long or short packets may not include reliable address
                                                     fields.

 The analyst should identify the addresses attempting to communicate in the trace that are right before and
after the long or short packets. Next, one by one remove the suspect nodes and re-analyze the network until
      the problem subsides. After the node area is located, the NIC, transceiver and NIC driver should be
                                                 troubleshot.


                                                     Jabber
At times, Ethernet network interface card s and external transceivers also generate a problem called jabbering.
 This is when garbled bits of data are emitted within the frame sequence in a continuous transmission fashion.
The packet length is usually more than 1,518 bytes. This can be identified by a protocol analyzer as a CRC error.
 As mentioned earlier, when nodes detect collisions they emit a normal JAM signal on the network segment to
    clear transmission. Sometimes certain nodes attempt to keep jamming the network due to excessive high
  collision rates; this also can be captured as high CRC or late collision error rate. The cause can be overloaded
   traffic levels. If the bandwidth- utilization levels are normal or low for the particular Ethernet segment, it is
    possible that the collision detection pair of a jamming node's NIC or transceiver cannot hear the network
         signal and may not know a collision has stopped. If this occurs, it continues to jam the network.

     If a certain node on an Ethernet segment emits a lot of jabber, the node's NIC and transceiver should be
                          troubleshot through consecutive replacement and re-analysis.
If an Ethernet network has intermittent high network bandwidth usage that causes performance problems, the
cause can be re-created by loading the network with traffic-generation features in a protocol analyzer. But you
    must be careful when using this technique. First, be aware of the current network usage and any possible
    impacts to the network-user community. Second, you really have to understand all the Ethernet network
   bandwidth considerations discussed earlier, including the actual maximum bandwidth available, the overall
   network bandwidth baseline view and individual Ethernet node bandwidth consumption. Make sure that a
                    proper baseline is performed on the lower and upper layers of the Ethernet.

                                               November 15, 1996

Weitere Àhnliche Inhalte

Was ist angesagt?

A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKSA THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKScsandit
 
TCP over wireless slides
TCP over wireless slidesTCP over wireless slides
TCP over wireless slidesMahesh Rajawat
 
Mobile transport layer
 Mobile transport layer Mobile transport layer
Mobile transport layerSonaliAjankar
 
A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...
A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...
A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...IJERD Editor
 
Mobile transportlayer
Mobile transportlayerMobile transportlayer
Mobile transportlayerRahul Hada
 
Controller area network
Controller area networkController area network
Controller area networkDivi1597
 
Mobile transport layer - traditional TCP
Mobile transport layer - traditional TCPMobile transport layer - traditional TCP
Mobile transport layer - traditional TCPVishal Tandel
 
Mobile Transpot Layer
Mobile Transpot LayerMobile Transpot Layer
Mobile Transpot LayerMaulik Patel
 
UnIT VIII manet
UnIT VIII manetUnIT VIII manet
UnIT VIII manetsangusajjan
 
AODV protocol
AODV protocolAODV protocol
AODV protocolRaj Sikarwar
 
Advanced Networking on GloMoSim
Advanced Networking on GloMoSimAdvanced Networking on GloMoSim
Advanced Networking on GloMoSimKathirvel Ayyaswamy
 
link layer
link layerlink layer
link layerGS Kosta
 
Computer networks high speed swan,atm,frame realy
Computer networks high speed swan,atm,frame realyComputer networks high speed swan,atm,frame realy
Computer networks high speed swan,atm,frame realyDeepak John
 
3a data link layer
3a data link layer 3a data link layer
3a data link layer kavish dani
 
Routing in Wireless Sensor Networks
Routing in Wireless Sensor NetworksRouting in Wireless Sensor Networks
Routing in Wireless Sensor Networkssashar86
 
Selective watchdog technique for intrusion detection in mobile ad hoc network
Selective watchdog technique for intrusion detection in mobile ad hoc networkSelective watchdog technique for intrusion detection in mobile ad hoc network
Selective watchdog technique for intrusion detection in mobile ad hoc networkgraphhoc
 

Was ist angesagt? (20)

A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKSA THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
 
TCP over wireless slides
TCP over wireless slidesTCP over wireless slides
TCP over wireless slides
 
Lecture24
Lecture24Lecture24
Lecture24
 
Mobile transport layer
 Mobile transport layer Mobile transport layer
Mobile transport layer
 
A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...
A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...
A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...
 
Mobile transportlayer
Mobile transportlayerMobile transportlayer
Mobile transportlayer
 
Controller area network
Controller area networkController area network
Controller area network
 
Mobile transport layer - traditional TCP
Mobile transport layer - traditional TCPMobile transport layer - traditional TCP
Mobile transport layer - traditional TCP
 
Mobile Transpot Layer
Mobile Transpot LayerMobile Transpot Layer
Mobile Transpot Layer
 
UnIT VIII manet
UnIT VIII manetUnIT VIII manet
UnIT VIII manet
 
AODV protocol
AODV protocolAODV protocol
AODV protocol
 
Advanced Networking on GloMoSim
Advanced Networking on GloMoSimAdvanced Networking on GloMoSim
Advanced Networking on GloMoSim
 
link layer
link layerlink layer
link layer
 
Computer networks high speed swan,atm,frame realy
Computer networks high speed swan,atm,frame realyComputer networks high speed swan,atm,frame realy
Computer networks high speed swan,atm,frame realy
 
Ethernet
EthernetEthernet
Ethernet
 
3a data link layer
3a data link layer 3a data link layer
3a data link layer
 
Data link layer
Data link layerData link layer
Data link layer
 
Framing Protocols
Framing ProtocolsFraming Protocols
Framing Protocols
 
Routing in Wireless Sensor Networks
Routing in Wireless Sensor NetworksRouting in Wireless Sensor Networks
Routing in Wireless Sensor Networks
 
Selective watchdog technique for intrusion detection in mobile ad hoc network
Selective watchdog technique for intrusion detection in mobile ad hoc networkSelective watchdog technique for intrusion detection in mobile ad hoc network
Selective watchdog technique for intrusion detection in mobile ad hoc network
 

Andere mochten auch

2015_itSMF_India_Conference_presentation_Gagan
2015_itSMF_India_Conference_presentation_Gagan2015_itSMF_India_Conference_presentation_Gagan
2015_itSMF_India_Conference_presentation_GaganGagan Deep Jain
 
 Entrepreneurial and Professional Opportunities in the Green Tech Space
	Entrepreneurial and Professional Opportunities in the Green Tech Space	Entrepreneurial and Professional Opportunities in the Green Tech Space
 Entrepreneurial and Professional Opportunities in the Green Tech Spacehnaquin
 
Programme guide en
Programme guide enProgramme guide en
Programme guide enHĂ©lder Silva
 
Targeting change efforts at organizational subsystems
Targeting change efforts at organizational subsystemsTargeting change efforts at organizational subsystems
Targeting change efforts at organizational subsystemsSharon Johnson
 
Slide set 7 faith integration in business - stage perspectives
Slide set 7   faith integration in business - stage perspectivesSlide set 7   faith integration in business - stage perspectives
Slide set 7 faith integration in business - stage perspectivesSharon Johnson
 
Kapital Business Partners | Istanbul
Kapital Business Partners | IstanbulKapital Business Partners | Istanbul
Kapital Business Partners | IstanbulShinesquad
 
Learn Ruby 2011 - Session 1
Learn Ruby 2011 - Session 1Learn Ruby 2011 - Session 1
Learn Ruby 2011 - Session 1James Thompson
 
Een Muur Met Brieven
Een Muur Met BrievenEen Muur Met Brieven
Een Muur Met Brievenguest3f5eaf
 
4 studyoverseasnewcomersankhtuyabelendalai25112012
4 studyoverseasnewcomersankhtuyabelendalai251120124 studyoverseasnewcomersankhtuyabelendalai25112012
4 studyoverseasnewcomersankhtuyabelendalai25112012Gegeen Australia
 
PART II.2 - Modern Physics
PART II.2 - Modern PhysicsPART II.2 - Modern Physics
PART II.2 - Modern PhysicsMaurice R. TREMBLAY
 
Cgpkcin2014conf 160416035350
Cgpkcin2014conf 160416035350Cgpkcin2014conf 160416035350
Cgpkcin2014conf 160416035350Safucon
 
PART I.2 - Physical Mathematics
PART I.2 - Physical MathematicsPART I.2 - Physical Mathematics
PART I.2 - Physical MathematicsMaurice R. TREMBLAY
 
Mathematics Of Life
Mathematics Of LifeMathematics Of Life
Mathematics Of Lifeguest6067361
 
Slide set 4 some fundamentals of business
Slide set 4   some fundamentals of businessSlide set 4   some fundamentals of business
Slide set 4 some fundamentals of businessSharon Johnson
 
Wrapping an api with a ruby gem
Wrapping an api with a ruby gemWrapping an api with a ruby gem
Wrapping an api with a ruby gemJames Thompson
 

Andere mochten auch (20)

Kongu engineering
Kongu engineeringKongu engineering
Kongu engineering
 
2015_itSMF_India_Conference_presentation_Gagan
2015_itSMF_India_Conference_presentation_Gagan2015_itSMF_India_Conference_presentation_Gagan
2015_itSMF_India_Conference_presentation_Gagan
 
 Entrepreneurial and Professional Opportunities in the Green Tech Space
	Entrepreneurial and Professional Opportunities in the Green Tech Space	Entrepreneurial and Professional Opportunities in the Green Tech Space
 Entrepreneurial and Professional Opportunities in the Green Tech Space
 
Programme guide en
Programme guide enProgramme guide en
Programme guide en
 
Targeting change efforts at organizational subsystems
Targeting change efforts at organizational subsystemsTargeting change efforts at organizational subsystems
Targeting change efforts at organizational subsystems
 
Slide set 7 faith integration in business - stage perspectives
Slide set 7   faith integration in business - stage perspectivesSlide set 7   faith integration in business - stage perspectives
Slide set 7 faith integration in business - stage perspectives
 
Naadam09Sydney
Naadam09SydneyNaadam09Sydney
Naadam09Sydney
 
Kapital Business Partners | Istanbul
Kapital Business Partners | IstanbulKapital Business Partners | Istanbul
Kapital Business Partners | Istanbul
 
Learn Ruby 2011 - Session 1
Learn Ruby 2011 - Session 1Learn Ruby 2011 - Session 1
Learn Ruby 2011 - Session 1
 
Een Muur Met Brieven
Een Muur Met BrievenEen Muur Met Brieven
Een Muur Met Brieven
 
4 studyoverseasnewcomersankhtuyabelendalai25112012
4 studyoverseasnewcomersankhtuyabelendalai251120124 studyoverseasnewcomersankhtuyabelendalai25112012
4 studyoverseasnewcomersankhtuyabelendalai25112012
 
Mutual funds
Mutual fundsMutual funds
Mutual funds
 
PART II.2 - Modern Physics
PART II.2 - Modern PhysicsPART II.2 - Modern Physics
PART II.2 - Modern Physics
 
Anger 1 1
Anger 1  1Anger 1  1
Anger 1 1
 
Communication skills
Communication skillsCommunication skills
Communication skills
 
Cgpkcin2014conf 160416035350
Cgpkcin2014conf 160416035350Cgpkcin2014conf 160416035350
Cgpkcin2014conf 160416035350
 
PART I.2 - Physical Mathematics
PART I.2 - Physical MathematicsPART I.2 - Physical Mathematics
PART I.2 - Physical Mathematics
 
Mathematics Of Life
Mathematics Of LifeMathematics Of Life
Mathematics Of Life
 
Slide set 4 some fundamentals of business
Slide set 4   some fundamentals of businessSlide set 4   some fundamentals of business
Slide set 4 some fundamentals of business
 
Wrapping an api with a ruby gem
Wrapping an api with a ruby gemWrapping an api with a ruby gem
Wrapping an api with a ruby gem
 

Ähnlich wie Networking

A427 nic card
A427 nic cardA427 nic card
A427 nic cardsurajbhai
 
Can network development using arm cortex m3
Can network development using arm cortex m3Can network development using arm cortex m3
Can network development using arm cortex m3Ankur Rastogi
 
Can network development using arm cortex m3
Can network development using arm cortex m3Can network development using arm cortex m3
Can network development using arm cortex m3Ankur Rastogi
 
TLS in manet
TLS in manetTLS in manet
TLS in manetJay Patel
 
Direct Link Lan
Direct Link LanDirect Link Lan
Direct Link Lanyanhul
 
A throughput analysis of tcp in adhoc networks
A throughput analysis of tcp in adhoc networksA throughput analysis of tcp in adhoc networks
A throughput analysis of tcp in adhoc networkscsandit
 
Chapter-10.pptx
Chapter-10.pptxChapter-10.pptx
Chapter-10.pptxMuneebZahid10
 
Answer sheet of switching & routing
Answer sheet of switching & routingAnswer sheet of switching & routing
Answer sheet of switching & routingMd. Mashiur Rahman
 
Jaimin chp-3 - data-link layer- 2011 batch
Jaimin   chp-3 - data-link layer- 2011 batchJaimin   chp-3 - data-link layer- 2011 batch
Jaimin chp-3 - data-link layer- 2011 batchJaimin Jani
 
Ch6.ppt
Ch6.pptCh6.ppt
Ch6.pptBezaAlem2
 
Some of the terms about Computer Networking
Some of the terms about Computer NetworkingSome of the terms about Computer Networking
Some of the terms about Computer NetworkingRuchita Tomar
 
A Performance Comparison of TCP Protocols
A Performance Comparison of TCP Protocols A Performance Comparison of TCP Protocols
A Performance Comparison of TCP Protocols Servio Fernando Lima Reina
 

Ähnlich wie Networking (20)

A427 nic card
A427 nic cardA427 nic card
A427 nic card
 
CAN BUS.ppt
CAN BUS.pptCAN BUS.ppt
CAN BUS.ppt
 
CAN BUS.pptx
CAN BUS.pptxCAN BUS.pptx
CAN BUS.pptx
 
pbchwp
pbchwppbchwp
pbchwp
 
Can network development using arm cortex m3
Can network development using arm cortex m3Can network development using arm cortex m3
Can network development using arm cortex m3
 
Can network development using arm cortex m3
Can network development using arm cortex m3Can network development using arm cortex m3
Can network development using arm cortex m3
 
TLS in manet
TLS in manetTLS in manet
TLS in manet
 
can bus theory solution
can bus theory solutioncan bus theory solution
can bus theory solution
 
Direct Link Lan
Direct Link LanDirect Link Lan
Direct Link Lan
 
A throughput analysis of tcp in adhoc networks
A throughput analysis of tcp in adhoc networksA throughput analysis of tcp in adhoc networks
A throughput analysis of tcp in adhoc networks
 
CS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKSCS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKS
 
Chapter-10.pptx
Chapter-10.pptxChapter-10.pptx
Chapter-10.pptx
 
Computer Network
Computer NetworkComputer Network
Computer Network
 
Answer sheet of switching & routing
Answer sheet of switching & routingAnswer sheet of switching & routing
Answer sheet of switching & routing
 
Jaimin chp-3 - data-link layer- 2011 batch
Jaimin   chp-3 - data-link layer- 2011 batchJaimin   chp-3 - data-link layer- 2011 batch
Jaimin chp-3 - data-link layer- 2011 batch
 
Ba25315321
Ba25315321Ba25315321
Ba25315321
 
Ch6.ppt
Ch6.pptCh6.ppt
Ch6.ppt
 
Mac
MacMac
Mac
 
Some of the terms about Computer Networking
Some of the terms about Computer NetworkingSome of the terms about Computer Networking
Some of the terms about Computer Networking
 
A Performance Comparison of TCP Protocols
A Performance Comparison of TCP Protocols A Performance Comparison of TCP Protocols
A Performance Comparison of TCP Protocols
 

Mehr von Resty Shane Amora

Mehr von Resty Shane Amora (8)

Resty Shane 1
Resty  Shane 1Resty  Shane 1
Resty Shane 1
 
Resty Shane 1
Resty Shane 1Resty Shane 1
Resty Shane 1
 
Resty Shane 1
Resty Shane 1Resty Shane 1
Resty Shane 1
 
Resty Shane 1
Resty Shane 1Resty Shane 1
Resty Shane 1
 
project in DBMS
project in DBMSproject in DBMS
project in DBMS
 
Resty Shane 1
Resty  Shane 1Resty  Shane 1
Resty Shane 1
 
Resty Shane 1
Resty  Shane 1Resty  Shane 1
Resty Shane 1
 
Resty Shane 1
Resty Shane 1Resty Shane 1
Resty Shane 1
 

KĂŒrzlich hochgeladen

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

KĂŒrzlich hochgeladen (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

Networking

  • 1. Ethernet Error Descriptions The following sections describe the main error types that can be captured through a protocol analysis session. Local Collisions A local collision is an Ethernet packet that usually is less than 64 bytes in length and may contain a garbled Cyclic Redundancy Check (CRC) field. A local collision will be on the local segment. Collisions on a network are considered normal, especially in the CSMA/CD access method. Stations are supposed to collide, and when transmissions collide, they are supposed to listen and wait to retransmit. But certain levels are considered problems. When collisions are more than one percent of overall traffic, it is considered an issue. Normally, if no problems exist on a network, a minor collision rate from one station does not indicate a major problem in general network communications. If, however, the collision rate is more then one percent of all traffic on an Ethernet, the NIC addre ss captured should be recorded, and the adapter should be troubleshot. Although a high collision rate from one particular station can be a minor component of overall traffic levels, it should be addressed immediately. From a troubleshooting standpoint, if a high collision rate is transmitted from one station that is more than the one percent traffic level of the overall bandwidth utilized, that station card should be replaced or the connector should be checked within that particular station. Check the connections on the cabling connectors first, then actually replace the NIC board. The network should be re- analyzed to determine whether the error is still present on the network. Excessive collisions from stations on a network can consume bandwidth and cause a transmission problem across a complete network. In such cases, it is important that the collision problem be troubleshot and the cause corrected. High collision rates from multiple stations on the Ethernet network may indicate cabling, transceiver or repeater problems; the complete network segment should be analyzed and troubleshot. If one area of a network has multiple adapters transmitting CRC or collision errors in composite, that particular area of the network usually has a common factor such as a repeater or wiring hub module. This is where the trial-and-error method takes place, but a protocol analyzer is invaluable because it picks up the addresses with the collision rates. At that point, if those addresses are itemized and found to be in the same area of the network, any common device should be located and replaced.
  • 2. Remote Collisions A remote collision is a collision packet usually less than 64 bytes in size with a corrupted CRC field value. These are packets that have filtered over from another segment. This may indicate that a specific node's NIC or transceiver on another side of a repeater has a problem. A bridge or router isolates all collisions to their res pective local segment. Most protocol analyzers can detect when a collision is not local if the address fields are valid and not local. Sometimes false readings can occur in this area. If a valid high remote collision is detected with an analyzer, you are going to have a tough troubleshooting session. If the cause of a node and segment problem is to be located specifically, it will require systematic troubleshooting by checking all the Ethernet segments attached to a repeater for their individual health at the physical layer. When a local collision is found on a particular segment, the next step is to locate the bad node and follow the replace-and-reanalyze approach. Late Collisions A late collision is a collision packet usually larger than 64 bytes with a corrupted CRC field value. This is a packet that will be on the local segment. If a collision occurs with less than the normal 64 bytes of transmission of a particular station generation, this means that there is a normal collision occurrence upon transmission. If, however, the collision occurs with greater than 64 bytes of data on an Ethernet station transmission, this is considered "late" because it did not occur before the 64-byte transmission ratio. Late collisions can cause a high number of bytes to be transmitted in a train fashion because more bytes are on the network than with a normal collision under 64 bytes. More often this indicates that the station's NIC transmitting the collision cannot hear properly to stop its transmission and will continue to broadcast high collision rates on the network. This also may be captured as a form of excessive jamming. This usually is a problem with a network interface card, and the card should be replaced and the network re-analyzed. CRC/Alignment Errors On any Ethernet network, a CRC error can be captured in an analysis session. A CRC error is picked up by a protocol analyzer when the Ethernet packet has a byte-posi tioning problem. The Ethernet packet is responsible for checking its transfer from station to station through general network communications with a CRC field. The CRC field is a math algorithm field used for calculating an Ethernet's packet contents for proper communication from station to station. Normally, a sending station sends out a packet that has a CRC pattern in it that is supposedly standard. The
  • 3. receiving or destination station within an Ethernet network recalculates the frame contents to correlate whether it matches the proper CRC value. If a problem occurs in the error calculation and a difference arises, the packet possibly is corrupted and a CRC error may be generated by the station onto the network. If a CRC error generation is picked up, the analyzer usually records that CRC error and indicates that the sending station or the destination station has a corruption in packet transmission. At times, CRC and alignment errors may be recorded as the same type of error. This is because they both really indicate a byte-alignment problem in transmissions. If CRC errors are recorded in a protocol analysis session above the two to three percent level of overall traffic on a network, they are considered excessive. It is possible that the group of stations involved in a transfer, on occurrence of a specific node sending of CRC transmissions, has a problem. All the addresses of transmitting nodes captured in a trace with frames in front and after the CRC error frame should be noted for the record. The problem may be in the group of stations. It is possible that a node NIC, transceiver, respective cabling or even a connected repeater or wiring hub port has failed. But relax, usually the station sending the CRC error will have a bad NIC or transceiver. If CRC errors are high on a particular Ethernet segment, cable connections may have problems or improper grounding may exist throughout the network. The cabling and connections should be checked first. If th e problem is still present, the NIC should be replaced. The BNC T-connector, the tap connector and transceivers also can be one of the primary causes for this type of problem. But the most probable cause is the NIC sending the CRC. After checking the cabling infrastructure, replace the NIC. Next, the network should be re-analyzed to check for any errors related to the new NIC address. If problems are still present, multiport repeaters and wiring hubs also should be checked as a cause for the CRC errors. It is possible to attribute this problem to one particular network station's NIC. The surest way to isolate this is through a protocol analysis session. Look very closely for a high number of CRC errors, because a high frequency indicates a definite problem for the sending station. Long and Short Packets As mentioned earlier, the Ethernet frame types have certain rules. Depending on the packet type, frames can be from 64 bytes to 1,518 bytes in length. With the proper protocol analyzer, you can pick up two types of packets called short frames (runts) and long packets. A short or runt packet is any packet smaller than 64 bytes. Long packets are those larger than 1,518 bytes. These are considered problems on a network and an analyst should use a protocol analyzer to capture multiple transmissions of the occurrence. It is possible for a NIC, transceiver or even a corrupted LAN driver to generate long and short frames. The cause is usually isolated to the failing network interface card. Captured long or short packets may not include reliable address fields. The analyst should identify the addresses attempting to communicate in the trace that are right before and
  • 4. after the long or short packets. Next, one by one remove the suspect nodes and re-analyze the network until the problem subsides. After the node area is located, the NIC, transceiver and NIC driver should be troubleshot. Jabber At times, Ethernet network interface card s and external transceivers also generate a problem called jabbering. This is when garbled bits of data are emitted within the frame sequence in a continuous transmission fashion. The packet length is usually more than 1,518 bytes. This can be identified by a protocol analyzer as a CRC error. As mentioned earlier, when nodes detect collisions they emit a normal JAM signal on the network segment to clear transmission. Sometimes certain nodes attempt to keep jamming the network due to excessive high collision rates; this also can be captured as high CRC or late collision error rate. The cause can be overloaded traffic levels. If the bandwidth- utilization levels are normal or low for the particular Ethernet segment, it is possible that the collision detection pair of a jamming node's NIC or transceiver cannot hear the network signal and may not know a collision has stopped. If this occurs, it continues to jam the network. If a certain node on an Ethernet segment emits a lot of jabber, the node's NIC and transceiver should be troubleshot through consecutive replacement and re-analysis. If an Ethernet network has intermittent high network bandwidth usage that causes performance problems, the cause can be re-created by loading the network with traffic-generation features in a protocol analyzer. But you must be careful when using this technique. First, be aware of the current network usage and any possible impacts to the network-user community. Second, you really have to understand all the Ethernet network bandwidth considerations discussed earlier, including the actual maximum bandwidth available, the overall network bandwidth baseline view and individual Ethernet node bandwidth consumption. Make sure that a proper baseline is performed on the lower and upper layers of the Ethernet. November 15, 1996