SlideShare ist ein Scribd-Unternehmen logo
1 von 56
Downloaden Sie, um offline zu lesen
Introduction to Networks v5.1
Chapter 5: Ethernet
Jupriyadi
Juli 2020
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 2
5.0 Introduction
5.1 Ethernet Protocol
5.2 LAN Switches
5.3 Address Resolution Protocol
5.4 Summary
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 3
Upon completion of this section, you should be able to:
• Explain how the Ethernet sublayers are related to the frame fields.
• Describe the Ethernet MAC address.
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 4
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 6
Ethernet
• Most widely used LAN technology
• Operates in the data link layer and the physical layer
• Family of networking technologies that are defined in the IEEE 802.2
and 802.3 standards
• Supports data bandwidths of 10, 100, 1000, 10,000, 40,000, and
100,000 Mbps (100 Gbps)
Ethernet standards
• Define Layer 2 protocols and Layer 1 technologies
• Two separate sub layers of the data link layer to operate - Logical link
control (LLC) and the MAC sublayers
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 7
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 8
Primary responsibilities:
• Data encapsulation
• Media access control
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 9
Ethernet II Frame Structure and Field Size
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 10
• Minimum Ethernet frame size is 64 bytes (Collision Frame or Runt)
• Maximum Ethernet frame size is 1518 bytes (Jumbo or Baby Giant)
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 11
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 12
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 14
• Layer 2 Ethernet MAC address
is a 48-bit binary value
expressed as 12 hexadecimal
digits.
• IEEE requires a vendor to
follow two simple rules:
Must use that vendor's assigned OUI
as the first three bytes.
All MAC addresses with the same
OUI must be assigned a unique
value in the last three bytes.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 15
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 16
• The NIC views information to see if the destination MAC address in the
frame matches the device’s physical MAC address stored in RAM.
• If there is no match, the device discards the frame.
• If there is a match, the NIC passes the frame up the OSI layers, where
the de-encapsulation process takes place.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 17
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 18
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 20
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 21
Upon completion of this section, you should be able to:
• Explain how a switch operates.
• Explain how a switch builds its MAC address table and forwards frames.
• Describe switch forwarding methods.
• Describe the types of port settings available for Layer 2 switches.
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 22
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 23
• An Ethernet Switch is a Layer 2 device.
• It uses MAC addresses to make forwarding decisions.
• The MAC address table is sometimes referred to as a content
addressable memory (CAM) table.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 26
PC-D sends a frame back to PC-A and the switch learns PC-D’s MAC address.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 27
Since the Switch MAC Address table contains PC-A’s MAC Address, it sends the
frame out only port 1.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 28
PC-A sends another frame to PC-D. The switch’s table now contains PC-D’s
MAC address, so it sends the frame out only port 4.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 29
• A switch can have multiple MAC addresses associated with a single port.
• This occurs when the switch is connected to another switch.
• See VIDEO DEMONSTRATION
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 30
• When a device has an IP address that is on a remote network, the
Ethernet frame cannot be sent directly to the destination device.
• The Ethernet frame is sent to the MAC address of the default gateway,
which is the router.
• See VIDEO DEMONSTRATION
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 31
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 32
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 33
Fast-forward switching:
• Lowest level of latency immediately forwards a packet after reading
the destination address.
• Typical cut-through method of switching.
Fragment-free switching:
• Switch stores the first 64 bytes of the
frame before forwarding.
• Most network errors and collisions
occur during the first 64 bytes.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 34
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 35
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 36
• Full-duplex – Both ends of the connection can send and receive
simultaneously.
• Half-duplex – Only one end of the connection can send at a time.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 37
A common cause of performance issues on 10/100 Mb/s Ethernet links is
when one port on the link operates at half-duplex and the other on full-
duplex.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 39
Upon completion of this section, you should be able to:
• Compare the roles of the MAC address and the IP address.
• Describe the purpose of ARP.
• Explain how ARP requests impact network and host performance.
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 40
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 41
There are two primary addresses assigned to a device on an Ethernet
LAN:
• Physical address (the MAC address) – Used for Ethernet NIC to
Ethernet NIC communications on the same network.
• Logical address (the IP address) –
Used to send the packet from the original
source to the final destination.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 42
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 43
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 44
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 45
ARP Table
• Used to find the MAC address that is mapped to the destination IPv4
address.
• If the destination IPv4 address is on the same network as the source
IPv4, the device will search the ARP table for the destination IPv4
address.
• If the destination IPv4 address is on a different network, the device will
search for the IPv4 address of the default gateway.
• If the device locates the IPv4 address, its corresponding MAC address is
used as the destination MAC address in the frame.
• If no entry is found, then an ARP request is sent.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 46
• Sent when a device needs a MAC address associated with an IPv4
address, and it does not have an entry in its ARP table.
• The ARP request message includes:
Target IPv4 address – This is the IPv4 address that requires a corresponding MAC
address.
Target MAC address – This is the unknown MAC address and will be empty in the ARP
request message.
• The ARP request is encapsulated in an Ethernet frame using the
following header information:
Destination MAC address – This is a broadcast address requiring all Ethernet NICs on
the LAN to accept and process the ARP request.
Source MAC address – This is the sender’s MAC address.
Type – ARP messages have a type field of 0x806.
• See VIDEO DEMONSTRATION
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 47
• The device with the target IPv4 address in the ARP request will respond
with an ARP reply. The ARP reply message includes:
Sender’s IPv4 address – This is the IPv4 address of the sender, the device whose MAC
address was requested.
Sender’s MAC address – This is the MAC address of the sender, the MAC address
needed by the sender of the ARP request.
• The ARP reply is encapsulated in an Ethernet frame using the following
header information:
Destination MAC address – This is the MAC address of the sender.
Source MAC address – This is the sender of the ARP reply’s MAC address.
Type – ARP messages have a type field of 0x806.
• See VIDEO DEMONSTRATION
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 48
• When the destination IPv4 address is not on the same network as the
source IPv4 address, the source device needs to send the frame to its
default gateway.
• The source checks its ARP table for an entry with the IPv4 address of
the default gateway.
• If there is not an entry, it uses the ARP process to determine the MAC
address of the default gateway.
• See VIDEO DEMONSTRATION
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 49
• ARP cache timer removes ARP entries that have not been used for a
specified period of time.
• Commands may also be used to manually remove all or some of the
entries in the ARP table.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 50
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 51
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 52
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 53
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 54
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 55
Chapter Objectives:
• Explain the operation of Ethernet.
• Explain how a switch operates.
• Explain how the address resolution protocol enables communication on
a network.
Thank you.

Weitere ähnliche Inhalte

Was ist angesagt?

CCNA3 Verson6 Chapter2
CCNA3 Verson6 Chapter2CCNA3 Verson6 Chapter2
CCNA3 Verson6 Chapter2Chaing Ravuth
 
CCNA RSE Routing concept
CCNA RSE Routing conceptCCNA RSE Routing concept
CCNA RSE Routing conceptnewbie2019
 
Ccna rse chp6 VLAN
Ccna rse chp6 VLANCcna rse chp6 VLAN
Ccna rse chp6 VLANnewbie2019
 
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07Irsandi Hasan
 
Ccna rse chp7 Access Control List (ACL)
Ccna rse chp7 Access Control List (ACL)Ccna rse chp7 Access Control List (ACL)
Ccna rse chp7 Access Control List (ACL)newbie2019
 
Ccna rse dynamic routing
Ccna rse dynamic routingCcna rse dynamic routing
Ccna rse dynamic routingnewbie2019
 
CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09Irsandi Hasan
 
ether channel_hsrp
ether channel_hsrpether channel_hsrp
ether channel_hsrpnewbie2019
 
Sca nv6 instructorppt_chapter2
Sca nv6 instructorppt_chapter2Sca nv6 instructorppt_chapter2
Sca nv6 instructorppt_chapter2newbie2019
 
CCNA4 Verson6 Chapter3
CCNA4 Verson6 Chapter3CCNA4 Verson6 Chapter3
CCNA4 Verson6 Chapter3Chaing Ravuth
 
CCNA3 Verson6 Chapter9
CCNA3 Verson6 Chapter9CCNA3 Verson6 Chapter9
CCNA3 Verson6 Chapter9Chaing Ravuth
 
CCNA2 Verson6 Chapter2
CCNA2 Verson6 Chapter2CCNA2 Verson6 Chapter2
CCNA2 Verson6 Chapter2Chaing Ravuth
 
CCNA Routing Fundamentals - EIGRP, OSPF and RIP
CCNA  Routing Fundamentals -  EIGRP, OSPF and RIPCCNA  Routing Fundamentals -  EIGRP, OSPF and RIP
CCNA Routing Fundamentals - EIGRP, OSPF and RIPsushmil123
 
CCNP Switching Chapter 4
CCNP Switching Chapter 4CCNP Switching Chapter 4
CCNP Switching Chapter 4Chaing Ravuth
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 3
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 3CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 3
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 3Waqas Ahmed Nawaz
 
Como definir un esquema de direcciones IPv6
Como definir un esquema de direcciones IPv6Como definir un esquema de direcciones IPv6
Como definir un esquema de direcciones IPv6Edgardo Scrimaglia
 
CCNA3 Verson6 Chapter7
CCNA3 Verson6 Chapter7CCNA3 Verson6 Chapter7
CCNA3 Verson6 Chapter7Chaing Ravuth
 

Was ist angesagt? (20)

CCNA3 Verson6 Chapter2
CCNA3 Verson6 Chapter2CCNA3 Verson6 Chapter2
CCNA3 Verson6 Chapter2
 
CCNA RSE Routing concept
CCNA RSE Routing conceptCCNA RSE Routing concept
CCNA RSE Routing concept
 
Ccna rse chp6 VLAN
Ccna rse chp6 VLANCcna rse chp6 VLAN
Ccna rse chp6 VLAN
 
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05
 
CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07
 
Ccna rse chp7 Access Control List (ACL)
Ccna rse chp7 Access Control List (ACL)Ccna rse chp7 Access Control List (ACL)
Ccna rse chp7 Access Control List (ACL)
 
Ccna rse dynamic routing
Ccna rse dynamic routingCcna rse dynamic routing
Ccna rse dynamic routing
 
CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 09
 
ether channel_hsrp
ether channel_hsrpether channel_hsrp
ether channel_hsrp
 
Sca nv6 instructorppt_chapter2
Sca nv6 instructorppt_chapter2Sca nv6 instructorppt_chapter2
Sca nv6 instructorppt_chapter2
 
CCNA4 Verson6 Chapter3
CCNA4 Verson6 Chapter3CCNA4 Verson6 Chapter3
CCNA4 Verson6 Chapter3
 
CCNA3 Verson6 Chapter9
CCNA3 Verson6 Chapter9CCNA3 Verson6 Chapter9
CCNA3 Verson6 Chapter9
 
CCNP ROUTE V7 CH1
CCNP ROUTE V7 CH1CCNP ROUTE V7 CH1
CCNP ROUTE V7 CH1
 
CCNA2 Verson6 Chapter2
CCNA2 Verson6 Chapter2CCNA2 Verson6 Chapter2
CCNA2 Verson6 Chapter2
 
CCNA Routing Fundamentals - EIGRP, OSPF and RIP
CCNA  Routing Fundamentals -  EIGRP, OSPF and RIPCCNA  Routing Fundamentals -  EIGRP, OSPF and RIP
CCNA Routing Fundamentals - EIGRP, OSPF and RIP
 
CCNP Switching Chapter 4
CCNP Switching Chapter 4CCNP Switching Chapter 4
CCNP Switching Chapter 4
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 3
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 3CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 3
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 3
 
CCNA/Networking
CCNA/NetworkingCCNA/Networking
CCNA/Networking
 
Como definir un esquema de direcciones IPv6
Como definir un esquema de direcciones IPv6Como definir un esquema de direcciones IPv6
Como definir un esquema de direcciones IPv6
 
CCNA3 Verson6 Chapter7
CCNA3 Verson6 Chapter7CCNA3 Verson6 Chapter7
CCNA3 Verson6 Chapter7
 

Ähnlich wie Ethernet Protocol, ARP, and Switching Explained

CCNA (R & S) Module 01 - Introduction to Networks - Chapter 5
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 5CCNA (R & S) Module 01 - Introduction to Networks - Chapter 5
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 5Waqas Ahmed Nawaz
 
ITN_Module_9.pptx
ITN_Module_9.pptxITN_Module_9.pptx
ITN_Module_9.pptxFhKh5
 
Chapter 3 Network Protocol and Communications
Chapter 3 Network Protocol and CommunicationsChapter 3 Network Protocol and Communications
Chapter 3 Network Protocol and Communicationsnewbie2019
 
SRWE_Module_16.pptx
SRWE_Module_16.pptxSRWE_Module_16.pptx
SRWE_Module_16.pptxRobinRohit2
 
SRWE_Module_16.pptx
SRWE_Module_16.pptxSRWE_Module_16.pptx
SRWE_Module_16.pptxRobinRohit2
 
CN L7 — копия.ppt
CN L7 — копия.pptCN L7 — копия.ppt
CN L7 — копия.pptAssemNazirova2
 
IP Address & Subneting.pdf
IP Address & Subneting.pdfIP Address & Subneting.pdf
IP Address & Subneting.pdfHirdesh Sharma
 
CCNAS :Multi Area OSPF
CCNAS :Multi Area OSPFCCNAS :Multi Area OSPF
CCNAS :Multi Area OSPFrooree29
 
ITN_Module_8.pptx
ITN_Module_8.pptxITN_Module_8.pptx
ITN_Module_8.pptxAliJrboy
 
Ethernet, Point-to-Point Protocol, ARP
Ethernet, Point-to-Point Protocol, ARP Ethernet, Point-to-Point Protocol, ARP
Ethernet, Point-to-Point Protocol, ARP Rubal Sagwal
 
Internet Protocol.pdf
Internet Protocol.pdfInternet Protocol.pdf
Internet Protocol.pdfBIT DURG
 
Net essentials6e ch5
Net essentials6e ch5Net essentials6e ch5
Net essentials6e ch5APSU
 
КЛМ_Урок 5
КЛМ_Урок 5КЛМ_Урок 5
КЛМ_Урок 5RaynaITSTEP
 
Ccnav5.org ccna 1-v50_itn_practice_final_exam_answers
Ccnav5.org ccna 1-v50_itn_practice_final_exam_answersCcnav5.org ccna 1-v50_itn_practice_final_exam_answers
Ccnav5.org ccna 1-v50_itn_practice_final_exam_answersĐồng Quốc Vương
 
CN L8 — копия.ppt
CN L8 — копия.pptCN L8 — копия.ppt
CN L8 — копия.pptAssemNazirova2
 

Ähnlich wie Ethernet Protocol, ARP, and Switching Explained (20)

Itn instructor ppt_chapter5_ethernet
Itn instructor ppt_chapter5_ethernetItn instructor ppt_chapter5_ethernet
Itn instructor ppt_chapter5_ethernet
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 5
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 5CCNA (R & S) Module 01 - Introduction to Networks - Chapter 5
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 5
 
ITN_Module_9.pptx
ITN_Module_9.pptxITN_Module_9.pptx
ITN_Module_9.pptx
 
CCNA_ITN_Chp5.pptx
CCNA_ITN_Chp5.pptxCCNA_ITN_Chp5.pptx
CCNA_ITN_Chp5.pptx
 
ITN_Module_9.pptx
ITN_Module_9.pptxITN_Module_9.pptx
ITN_Module_9.pptx
 
Chapter 3 Network Protocol and Communications
Chapter 3 Network Protocol and CommunicationsChapter 3 Network Protocol and Communications
Chapter 3 Network Protocol and Communications
 
SRWE_Module_16.pptx
SRWE_Module_16.pptxSRWE_Module_16.pptx
SRWE_Module_16.pptx
 
SRWE_Module_16.pptx
SRWE_Module_16.pptxSRWE_Module_16.pptx
SRWE_Module_16.pptx
 
CN L7 — копия.ppt
CN L7 — копия.pptCN L7 — копия.ppt
CN L7 — копия.ppt
 
Cisco CCNA module 10
Cisco CCNA module 10Cisco CCNA module 10
Cisco CCNA module 10
 
IP Address & Subneting.pdf
IP Address & Subneting.pdfIP Address & Subneting.pdf
IP Address & Subneting.pdf
 
CCNAS :Multi Area OSPF
CCNAS :Multi Area OSPFCCNAS :Multi Area OSPF
CCNAS :Multi Area OSPF
 
ITN_Module_8.pptx
ITN_Module_8.pptxITN_Module_8.pptx
ITN_Module_8.pptx
 
Ethernet, Point-to-Point Protocol, ARP
Ethernet, Point-to-Point Protocol, ARP Ethernet, Point-to-Point Protocol, ARP
Ethernet, Point-to-Point Protocol, ARP
 
Internet Protocol.pdf
Internet Protocol.pdfInternet Protocol.pdf
Internet Protocol.pdf
 
Net essentials6e ch5
Net essentials6e ch5Net essentials6e ch5
Net essentials6e ch5
 
КЛМ_Урок 5
КЛМ_Урок 5КЛМ_Урок 5
КЛМ_Урок 5
 
Ccnav5.org ccna 1-v50_itn_practice_final_exam_answers
Ccnav5.org ccna 1-v50_itn_practice_final_exam_answersCcnav5.org ccna 1-v50_itn_practice_final_exam_answers
Ccnav5.org ccna 1-v50_itn_practice_final_exam_answers
 
ADDRESSING PADA TCP IP
ADDRESSING PADA TCP IPADDRESSING PADA TCP IP
ADDRESSING PADA TCP IP
 
CN L8 — копия.ppt
CN L8 — копия.pptCN L8 — копия.ppt
CN L8 — копия.ppt
 

Mehr von newbie2019

Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedurenewbie2019
 
Fundamental digital forensik
Fundamental digital forensikFundamental digital forensik
Fundamental digital forensiknewbie2019
 
Pendahuluan it forensik
Pendahuluan it forensikPendahuluan it forensik
Pendahuluan it forensiknewbie2019
 
Chapter 15 incident handling
Chapter 15 incident handlingChapter 15 incident handling
Chapter 15 incident handlingnewbie2019
 
Chapter 14 sql injection
Chapter 14 sql injectionChapter 14 sql injection
Chapter 14 sql injectionnewbie2019
 
Chapter 13 web security
Chapter 13 web securityChapter 13 web security
Chapter 13 web securitynewbie2019
 
NIST Framework for Information System
NIST Framework for Information SystemNIST Framework for Information System
NIST Framework for Information Systemnewbie2019
 
Nist.sp.800 37r2
Nist.sp.800 37r2Nist.sp.800 37r2
Nist.sp.800 37r2newbie2019
 
Iso iec 27000_2018
Iso iec 27000_2018Iso iec 27000_2018
Iso iec 27000_2018newbie2019
 
Chapter 12 iso 27001 awareness
Chapter 12 iso 27001 awarenessChapter 12 iso 27001 awareness
Chapter 12 iso 27001 awarenessnewbie2019
 
Chapter 10 security standart
Chapter 10 security standartChapter 10 security standart
Chapter 10 security standartnewbie2019
 
Chapter 8 cryptography lanjutan
Chapter 8 cryptography lanjutanChapter 8 cryptography lanjutan
Chapter 8 cryptography lanjutannewbie2019
 
Pertemuan 7 cryptography
Pertemuan 7  cryptographyPertemuan 7  cryptography
Pertemuan 7 cryptographynewbie2019
 
Chapter 6 information hiding (steganography)
Chapter 6 information hiding (steganography)Chapter 6 information hiding (steganography)
Chapter 6 information hiding (steganography)newbie2019
 
Vulnerability threat and attack
Vulnerability threat and attackVulnerability threat and attack
Vulnerability threat and attacknewbie2019
 
Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack newbie2019
 
Chapter 3 security principals
Chapter 3 security principalsChapter 3 security principals
Chapter 3 security principalsnewbie2019
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanannewbie2019
 
Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1newbie2019
 

Mehr von newbie2019 (20)

Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedure
 
Fundamental digital forensik
Fundamental digital forensikFundamental digital forensik
Fundamental digital forensik
 
Pendahuluan it forensik
Pendahuluan it forensikPendahuluan it forensik
Pendahuluan it forensik
 
Chapter 15 incident handling
Chapter 15 incident handlingChapter 15 incident handling
Chapter 15 incident handling
 
Chapter 14 sql injection
Chapter 14 sql injectionChapter 14 sql injection
Chapter 14 sql injection
 
Chapter 13 web security
Chapter 13 web securityChapter 13 web security
Chapter 13 web security
 
NIST Framework for Information System
NIST Framework for Information SystemNIST Framework for Information System
NIST Framework for Information System
 
Nist.sp.800 37r2
Nist.sp.800 37r2Nist.sp.800 37r2
Nist.sp.800 37r2
 
Iso iec 27000_2018
Iso iec 27000_2018Iso iec 27000_2018
Iso iec 27000_2018
 
Chapter 12 iso 27001 awareness
Chapter 12 iso 27001 awarenessChapter 12 iso 27001 awareness
Chapter 12 iso 27001 awareness
 
Chapter 10 security standart
Chapter 10 security standartChapter 10 security standart
Chapter 10 security standart
 
Chapter 8 cryptography lanjutan
Chapter 8 cryptography lanjutanChapter 8 cryptography lanjutan
Chapter 8 cryptography lanjutan
 
Pertemuan 7 cryptography
Pertemuan 7  cryptographyPertemuan 7  cryptography
Pertemuan 7 cryptography
 
Chapter 6 information hiding (steganography)
Chapter 6 information hiding (steganography)Chapter 6 information hiding (steganography)
Chapter 6 information hiding (steganography)
 
Vulnerability threat and attack
Vulnerability threat and attackVulnerability threat and attack
Vulnerability threat and attack
 
Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack
 
C02
C02C02
C02
 
Chapter 3 security principals
Chapter 3 security principalsChapter 3 security principals
Chapter 3 security principals
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1
 

Kürzlich hochgeladen

What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxnelietumpap1
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 

Kürzlich hochgeladen (20)

What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 

Ethernet Protocol, ARP, and Switching Explained

  • 1. Introduction to Networks v5.1 Chapter 5: Ethernet Jupriyadi Juli 2020
  • 2. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 2 5.0 Introduction 5.1 Ethernet Protocol 5.2 LAN Switches 5.3 Address Resolution Protocol 5.4 Summary
  • 3. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 3 Upon completion of this section, you should be able to: • Explain how the Ethernet sublayers are related to the frame fields. • Describe the Ethernet MAC address.
  • 4. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 4
  • 5. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
  • 6. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 6 Ethernet • Most widely used LAN technology • Operates in the data link layer and the physical layer • Family of networking technologies that are defined in the IEEE 802.2 and 802.3 standards • Supports data bandwidths of 10, 100, 1000, 10,000, 40,000, and 100,000 Mbps (100 Gbps) Ethernet standards • Define Layer 2 protocols and Layer 1 technologies • Two separate sub layers of the data link layer to operate - Logical link control (LLC) and the MAC sublayers
  • 7. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 7
  • 8. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 8 Primary responsibilities: • Data encapsulation • Media access control
  • 9. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 9 Ethernet II Frame Structure and Field Size
  • 10. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 10 • Minimum Ethernet frame size is 64 bytes (Collision Frame or Runt) • Maximum Ethernet frame size is 1518 bytes (Jumbo or Baby Giant)
  • 11. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 11
  • 12. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 12
  • 13. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
  • 14. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 14 • Layer 2 Ethernet MAC address is a 48-bit binary value expressed as 12 hexadecimal digits. • IEEE requires a vendor to follow two simple rules: Must use that vendor's assigned OUI as the first three bytes. All MAC addresses with the same OUI must be assigned a unique value in the last three bytes.
  • 15. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 15
  • 16. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 16 • The NIC views information to see if the destination MAC address in the frame matches the device’s physical MAC address stored in RAM. • If there is no match, the device discards the frame. • If there is a match, the NIC passes the frame up the OSI layers, where the de-encapsulation process takes place.
  • 17. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 17
  • 18. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 18
  • 19. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
  • 20. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 20
  • 21. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 21 Upon completion of this section, you should be able to: • Explain how a switch operates. • Explain how a switch builds its MAC address table and forwards frames. • Describe switch forwarding methods. • Describe the types of port settings available for Layer 2 switches.
  • 22. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 22
  • 23. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 23 • An Ethernet Switch is a Layer 2 device. • It uses MAC addresses to make forwarding decisions. • The MAC address table is sometimes referred to as a content addressable memory (CAM) table.
  • 24. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
  • 25. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
  • 26. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 26 PC-D sends a frame back to PC-A and the switch learns PC-D’s MAC address.
  • 27. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 27 Since the Switch MAC Address table contains PC-A’s MAC Address, it sends the frame out only port 1.
  • 28. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 28 PC-A sends another frame to PC-D. The switch’s table now contains PC-D’s MAC address, so it sends the frame out only port 4.
  • 29. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 29 • A switch can have multiple MAC addresses associated with a single port. • This occurs when the switch is connected to another switch. • See VIDEO DEMONSTRATION
  • 30. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 30 • When a device has an IP address that is on a remote network, the Ethernet frame cannot be sent directly to the destination device. • The Ethernet frame is sent to the MAC address of the default gateway, which is the router. • See VIDEO DEMONSTRATION
  • 31. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 31
  • 32. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 32
  • 33. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 33 Fast-forward switching: • Lowest level of latency immediately forwards a packet after reading the destination address. • Typical cut-through method of switching. Fragment-free switching: • Switch stores the first 64 bytes of the frame before forwarding. • Most network errors and collisions occur during the first 64 bytes.
  • 34. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 34
  • 35. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 35
  • 36. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 36 • Full-duplex – Both ends of the connection can send and receive simultaneously. • Half-duplex – Only one end of the connection can send at a time.
  • 37. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 37 A common cause of performance issues on 10/100 Mb/s Ethernet links is when one port on the link operates at half-duplex and the other on full- duplex.
  • 38. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
  • 39. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 39 Upon completion of this section, you should be able to: • Compare the roles of the MAC address and the IP address. • Describe the purpose of ARP. • Explain how ARP requests impact network and host performance.
  • 40. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 40
  • 41. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 41 There are two primary addresses assigned to a device on an Ethernet LAN: • Physical address (the MAC address) – Used for Ethernet NIC to Ethernet NIC communications on the same network. • Logical address (the IP address) – Used to send the packet from the original source to the final destination.
  • 42. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 42
  • 43. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 43
  • 44. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 44
  • 45. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 45 ARP Table • Used to find the MAC address that is mapped to the destination IPv4 address. • If the destination IPv4 address is on the same network as the source IPv4, the device will search the ARP table for the destination IPv4 address. • If the destination IPv4 address is on a different network, the device will search for the IPv4 address of the default gateway. • If the device locates the IPv4 address, its corresponding MAC address is used as the destination MAC address in the frame. • If no entry is found, then an ARP request is sent.
  • 46. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 46 • Sent when a device needs a MAC address associated with an IPv4 address, and it does not have an entry in its ARP table. • The ARP request message includes: Target IPv4 address – This is the IPv4 address that requires a corresponding MAC address. Target MAC address – This is the unknown MAC address and will be empty in the ARP request message. • The ARP request is encapsulated in an Ethernet frame using the following header information: Destination MAC address – This is a broadcast address requiring all Ethernet NICs on the LAN to accept and process the ARP request. Source MAC address – This is the sender’s MAC address. Type – ARP messages have a type field of 0x806. • See VIDEO DEMONSTRATION
  • 47. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 47 • The device with the target IPv4 address in the ARP request will respond with an ARP reply. The ARP reply message includes: Sender’s IPv4 address – This is the IPv4 address of the sender, the device whose MAC address was requested. Sender’s MAC address – This is the MAC address of the sender, the MAC address needed by the sender of the ARP request. • The ARP reply is encapsulated in an Ethernet frame using the following header information: Destination MAC address – This is the MAC address of the sender. Source MAC address – This is the sender of the ARP reply’s MAC address. Type – ARP messages have a type field of 0x806. • See VIDEO DEMONSTRATION
  • 48. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 48 • When the destination IPv4 address is not on the same network as the source IPv4 address, the source device needs to send the frame to its default gateway. • The source checks its ARP table for an entry with the IPv4 address of the default gateway. • If there is not an entry, it uses the ARP process to determine the MAC address of the default gateway. • See VIDEO DEMONSTRATION
  • 49. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 49 • ARP cache timer removes ARP entries that have not been used for a specified period of time. • Commands may also be used to manually remove all or some of the entries in the ARP table.
  • 50. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 50
  • 51. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 51
  • 52. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 52
  • 53. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 53
  • 54. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 54
  • 55. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 55 Chapter Objectives: • Explain the operation of Ethernet. • Explain how a switch operates. • Explain how the address resolution protocol enables communication on a network.