Welcome to CAVI, the Cisco Academy for the Vision Impaired. Course Fees Linux Wiki HTML Wiki Documentation Index PmWiki FAQ |
Main /
Chapter 5 - Ethernet5.0 Ethernet5.0.1 Introduction >5.0.1.1 IntroductionUpon completion of this chapter you will be able to:
5.0.1 Introduction >5.0.1.2 Activity – Join My Social Circle!How are the communications groups identified? The figure on this page shows a small world map with people from different countries communicating with each other using tablets, video conferencing, cell phones and gaming systems. 5.1 Ethernet Protocol5.1.1 Ethernet Operation >5.1.1.1 L L C and MAC sublayersFigure 1 on this page shows the seven layers of the OSI model with the lower two shaded. This figure demonstrates that Ethernet spans layers 1 and 2. 8 0 2.3 covers layer 1, Physical layer and the lower half (MAC) of layer 2, Data Link layer. 8 0 2.2 covers the upper half of layer 2, LLC. Figure 2 on this page shows a different representation of how the different implementations of Ethernet span the layers. In this figure, we see that Ethernet, Fast Ethernet and Gigabit Ethernet spans layer 1 and the lower half of layer 2. These are the 8 0 2.3 specifications. 5.1.1 Ethernet Operation >5.1.1.2 MAC SublayerThe Ethernet MAC sublayer has the following two primary responsibilities: Data Encapsulation
Media Access Control
The table on this page shows the physical layer and how it connects to the MAC. sublayer of layer 2. There is a highlighted border surrounding the physical layer and he MAC. sublayer. This table also shows how the MAC. sublayer is split into signaling standards as well as physical media standards. The table is as follows:
5.1.1 Ethernet Operation >5.1.1.3 Media Access ControlThe image on this page shows three computers in a contention-based access system connected to shared media. Two computers are sending frames. All three computers have a callout that says "I try to send when I am ready." The table on this page shows that CSMA is usually implemented in conjunction with a method for resolving media contention. The table is as follows:
5.1.1 Ethernet Operation >5.1.1.4 MAC Address: Ethernet IdentityThe table on this page shows how a MAC address is divided into two 24 bit halves. The first 24 bits represent the Organizationally Unique Identifier (OUI) and the second 24 bits represent the unique device (network interface). The following table shows the Ethernet MAC Address Structure:
5.1.1 Ethernet Operation >5.1.1.5 Frame ForwardingThe animation on this page shows how a frame is forwarded. Computer H1, MAC address AA:AA:AA:AA:AA:AA has a callout that says, "I need to send information to computer H3." There are four computers on shared media. Each has a different MAC address as shown in the following table:
Computer H1 sends a frame to Computer H3 using the correct MAC addresses for source and destination. The following table shows the frame addressing:
The frame is forwarded to all of the computers. Computers H2 and H4 ignore the frame since the destination MAC address does not match their own. They have callouts saying, "This is not addressed to me. I shall ignore it." Computer H3 has a callout saying, "This is mine." 5.1.1 Ethernet Operation >5.1.1.6 Activity – MAC and LLC sublayersColumn 1 in the three column table on this page lists the following descriptions of the MAC and LLC sublayers:
The other two columns have column headings of:
The user is asked to match each description to the correct sublayer. 5.1.2 Ethernet Frame Attributes >5.1.2.1 Ethernet EncapsulationFigure 1 on this page is a table displaying a timeline with Ethernet standards from 1973 to 2006. As you move the slider closer to 2006, you see the newer standards and their descriptions. At the same time, there is a graphic that represents bandwidth and it grows in size as the slider moves closer to two thousand six. The following table shows the Ethernet Evolution Timeline:
Figure 2 on this page shows the structure for the two styles of Ethernet framing, 8 0 2.3 and Ethernet 2. The following table shows the comparison of 8 0 2.3 and Ethernet 2 frame structure and field size in bytes:
5.1.2 Ethernet Frame Attributes >5.1.2.2 Ethernet Frame SizeThe figure on this page shows how the Ethernet frame was modified to include an extra four bytes for QOS (Quality of Service) and V. LAN ID. The following table shows the fields in IEEE 8 0 2.3a frame:
The following table shows the fields in the 8 0 2.1Q VLAN tag:
V LAN ID (12 Bits) || 5.1.2 Ethernet Frame Attributes >5.1.2.3 Introduction to the Ethernet FrameThe figure on this page shows the following descriptions for the field in an 8 0 2.3 Ethernet frame and size:
5.1.2 Ethernet Frame Attributes >5.1.2.4 Activity – Ethernet Frame FieldsFigure 1 on this page lists the following Ethernet frame field names:
Figure 1 also lists the following 8 0 2.3 Ethernet frame field descriptions:
The user is asked to match the Ethernet frame fields with their descriptions. Figure 2 on this page lists the following Ethernet frame field names:
Figure 2 also lists the following field sizes in bytes:
The user is asked to match the Ethernet frame fields with their size. 5.1.3 Ethernet MAC >5.1.3.1 MAC Addresses and HexadecimalTable 1 on this page displays Decimal values between 0 and 15 with the Binary and Hexadecimal equivalents. This table demonstrates why Hexadecimal has letters A through F along with numbers zero through nine. The following table lists the values:
Table 2 on this page displays Decimal values between 0 and 255 with the Binary and Hexadecimal equivalents. This table only shows nineteen examples: The following table lists the examples:
5.1.3 Ethernet MAC >5.1.3.2 MAC Address RepresentationsFigure 1 on this page shows the output of The output of the
Figure 2 on this page shows that a MAC address can be represented with dashes, colons or periods. The following table shows the different representations:
5.1.3 Ethernet MAC >5.1.3.3 Unicast MAC AddressThe animation on this page shows several computers connected to a switch. Host 1 wants to send a packet to a server (a unicast). The diagram shows the MAC address and IP address of both host 1 and the server. The graphic also shows the frame with source and destination MAC address and the encapsulated packet with source and destination IP address. When the animation plays, Host 1 has a callout that says, "I need to send this frame to the server". The frame travels from host 1 to the server since the switch forwards the frame based on MAC address and knows where the server is located. The following table lists the IP and MAC address for the Source Host and the Server:
The Ethernet frame is displayed in the following table:
The Source IP,the Dest IP, and the User Data make up the encapsulated IP Packet. The description for this animation is, "Unicast IP and MAC destination addresses are used by the source to forward a packet." 5.1.3 Ethernet MAC >5.1.3.4 Broadcast MAC AddressThe animation on this page shows several computers connected to a switch. Host 1 wants to send a packet to all other hosts (a broadcast). The diagram shows the MAC address and IP address of host 1. The graphic also shows the frame with source and destination MA.C address and the encapsulated packet with source and destination IP address. The destination MAC address is formed by all Fs (the broadcast MAC address). When the animation plays, Host 1 has a callout that says, "I need to send data to all hosts on the network". The frame travels from host 1 to all other hosts connected to the switch. The following table lists the IP and MAC address for the Source Host and the Server:
The Ethernet frame is displayed in the following table:
The description for this animation is, "Broadcast IP and broadcast MAC destination addresses are used by the source to forward a packet to all hosts on the network." 5.1.3 Ethernet MAC >5.1.3.5 Multicast MAC AddressThe animation on this page shows several computers connected to a switch. Host one wants to send a packet to a group of computers (a multicast). The diagram shows the MAC address and IP address of host 1. The graphic also shows the frame with source and destination MAC address and the encapsulated packet with source and destination IP address. The destination IP address is a multicast address (224 dot 0 dot 0 dot 200) and the destination MAC address is special. It starts with 0 1 dash 0 0 dash 5E and ends with the hexadecimal equivalent of the last three octets of the IP multicast address, 0 0 dash 0 0 dash C8. When the animation plays, Host 1 has a callout that says, "I need to send to a group of hosts on the network". the frame travels from host 1 to the selected hosts that are listening to the multicast address. The following table lists the IP and MAC address for the Source Host and the Server:
The Ethernet frame is displayed in the following table:
IThe description for this animation is, "Multicast IP and MAC destination addresses deliver packet/frame to specific group of member hosts." 5.1.3 Ethernet MAC >5.1.3.6 Lab – Viewing Network Device MAC addressesSee Lab Descriptions. 5.1.4 MAC and IP >5.1.4.1 MAC and IPThis interactive figure shows a map of North America. There are four buttons at the bottom for North America, Canada, Nova Scotia and Halifax. When you click the buttons, the map zooms in to the specific region. This demonstrates how IP addresses are hierarchical. 5.1.4 MAC and IP >5.1.4.2 End-to-End Connectivity, MAC and IPAnimation 1 on this page shows how the Ethernet Frame header and trailer are wrapped around the IP packet. A switch examines destination and source MAC addresses in the header. A router examines source and destination IP addresses in the IP packet. This process is called encapsulation. The following table shows the IP packet encapsulated in an Ethernet frame:
Animation 2 on this page shows that an IP packet can move across different types of media. Since the MAC sublayer of the data link layer is responsible for placing the frame on the wire, IP is media independent. This figure demonstrates how frames are encapsulated based on the technology of the link. A host PC is sending a frame from a PC in Paris to a laptop in Japan. The frame goes from the router at Paris through satellites to reach the destination laptop. At each hop along the path, an intermediary device accepts frames from one medium, de-encapsulates the frame and then forwards the packets in a new frame. The headers of each frame are formatted for the specific medium that it will cross. Data link layer protocols govern how to format a frame for use on different media. Different protocols may be in use for different media. 5.1.4 MAC and IP.>5.1.4.3 Lab – Using Wireshark to examine Ethernet frames.See Lab Descriptions. 5.1.4 MAC and IP >5.1.4.4 Packet Tracer – Identify MAC and IP AddressesObjectives:Part 1: Gather PDU Information Part 2: Reflection Questions 5.2 Address Resolution Protocol5.2.1 ARP >5.2.1.1 Introduction to ARPThe figure on this page shows four computers connected to a switch. Each computer is labelled with its IP address. The following table lists the IP addresses:
Host 1 has a callout saying, "I need to send information to 192.168.1.7, But I only have the IP address. I don't know the MAC address of the device that has that IP". 5.2.1 ARP >5.2.1.2 ARP FunctionsThe animation on this page shows how a host makes a broadcast on the LAN when it needs to find the MAC address for the destination. The destination host will respond to the broadcast but the other hosts will not. The ARP process is:
5.2.1 ARP >5.2.1.3 ARP OperationFigure 1 on this page shows four hosts and a router on a LAN segment. Each is labelled with its IP address and MAC address. The figure also shows the ARP Cache for Host A which has no ARP entry. The following table lists the MAC addresses and IP addresses of the devices:
Host A wants to send data to Host C, but does not know its MAC address. Figure 2 on this page illustrates how Host A sends out a broadcast asking for the MAC address associated with IP 10.10.0.3. This process is called ARP (Address Resolution Protocol). The request reaches all the other hosts and the router. Figure 3 on this page shows that the request from Host A reaches all the other hosts and the router. Host C with IP address 10.10.0.3, responds with anARP reply that includes its MAC address and now host A knows both the IP and MAC address for the destination. Figure 4 on this page shows that Host A now adds the MAC to IP address map to its ARP cache. The following table represents the ARP cache:
Figure 5 on this page shows that Host A can forward data directly to Host C via MAC address because it can now populate the layer 3 and layer 2 source and destination addresses. 5.2.1 ARP >5.2.1.4 ARP role in remote communicationFigure 1 on this page is the same as figure 1 in the previous section, four hosts and a router on a LAN segment. Each is labelled with its IP address and MAC address. The figure also shows the ARP Cache for Host A which has the ARP entry for Host C from the previous section. The following table lists the MAC addresses and IP addresses of the devices:
Host A wants to send data to a host on a different LAN with IP address 176.10.10.50 but has no ARP entry for the default gateway, IP address 10.10.0.254. The host sends an ARP request for its gateway, the router. Figure 2 on this page illustrates how Host A sends an ARP request looking for the MAC address associated with IP 10.10.0.254. All of the other hosts receive the request. [Figure 3 on this page shows that the router, R1, with IP address 10.10.0.254, responds with a unicast ARP reply, to Host A, that includes the MAC address for the G0/0 interface. Figure 4 on this page shows that Host A adds the MAC to IP address map to its ARP cache. The following table represents the ARP cache:
Figure 5 on this page shows that Host A forwards the data destined for 176.10.10.50 to the default gateway for further processing. The router has a callout saying, "I will forward the packet based on the information in my routing table.". 5.2.1 ARP >5.2.1.5 Removing Entries from an ARP TableThe figure on this page is the same as figure 1 in the previous section, four hosts and a router on a LAN segment. Each is labelled with its IP address and MAC address. Host C has a red X over it. This figure demonstrates that Host C is being removed from the network. It is critical that ARP cache entries be purged after some time has passed, otherwise data will be forwarded incorrectly. If host C's IP and MAC address are not removed from Host A's ARP cache,Host A may still try to communicate with Host C. 5.2.1 ARP >5.2.1.6 ARP Tables on networking devicesFigure 1 on this page shows that on a Cisco router the Figure 2 on this page shows that on a Windows 7 PC the 5.2.1 ARP >5.2.1.7 Packet Tracer – Examine the ARP tableObjectivesPart 1: Examine an ARP Request Part 2: Examine a Switch MAC Address Table Part 3: Examine the ARP Process in Remote Communication 5.2.1.8 Lab-Observing ARP with the windows CLI, IOS CLI, and WiresharkSee Lab Descriptions. 5.2.2 ARP Issues >5.2.2.1 How ARP can create problemsThe figure on this page shows seven computers connected to a multi-access media. This figure demonstrates that ARP broadcasts can flood the local media. ARP Issues are:
A false ARP message can provide an incorrect MAC address that will then hijack frames using that address (called a spoof) 5.2.2 ARP Issues >5.2.2.2 Mitigating ARP ProblemsThe figure on this page shows sixteen computers connected to a switch. This figure shows how a switch creates a separate collision domain for each connected device. This prevents the ARP reply from being broadcast, rather it is a unicast back to the origination. Each computer has its own collision domain. 5.3 LAN Switches5.3.1 Switching >5.3.1.1 Switch Port FundamentalsThe interactive activity on this page shows how a switch uses a MAC address table to forward frames. This table maps a MAC address to a port on the switch. The figure shows a central switch to which eight hosts are connected. The following table represents the MAC table:
The user is asked to first click a source PC then a destination PC and then the "'Send'" button. The source and destination MAC address in the table which is associated with a specific port are highlighted. 5.3.1 Switching >5.3.1.2 Switch MAC Address TableFigure 1 on this page shows a switch with PC1 connected to port 1, PC2 connected to port 3, and port 2 going somewhere else. PC1 generates a frame and sends it to the switch. Figure 2 on this page shows that the switch receives the frame and enters the MAC address for PC1 into the MAC address table and maps it to port 1. Figure 3 on this page shows that since the switch does not have an entry for the destination MAC address, it broadcasts the frame through the remaining ports. Figure 4 on this page shows that PC2 responds to the broadcast and forwards a frame back to the switch. Figure 5 on this page shows that the switch receives the frame and enters the MAC address for PC2 into the MAC address table and maps it to port 3. Figure 6 on this page shows that the frame leaves the switch through port 1 and arrives at PC1. The process that a switch uses to build its MAC Address Table is decribed in the page notes. 5.3.1 Switching >5.3.1.3 Duplex SettingsThe figure on this page shows two diagrams. The first diagram shows a server connected to a hub which is connected to a switch. In this diagram, data can only flow in one direction at a time between the server and the switch. This is known as half duplex. Half Duplex (CSMA/CD):
The second diagram replaces the hub with another switch. In this diagram, data can flow in both directions simultaneously. This is known as full duplex. Full Duplex:
5.3.1 Switching >5.3.1.4 Auto-MDIXFigure shows 4 connections:
MDIX auto detects the type of connection required and configures the interface accordingly. 5.3.1 Switching >5.3.1.5 Frame Forwarding Methods on Cisco SwitchesFigure 1 on this page shows 2 switches. One is set to store and forward and the other is set to cut through. The following table compares the two switches:
Figure 2 on this page is an animation that shows a switch that receives an entire frame and checks the CRC value before forwarding the frame. This is known as store and forward switching. The source sends a frame to the switch. The following table represents the frame::
The store and forward switch receives the entire frame and computes the CRC. If the CRC is valid, the switch looks up the destination address, which determines the outgoing interface. The frame is then forwarded out the correct port. 5.3.1 Switching >5.3.1.6 Cut through SwitchingThe figure on this page is an animation that shows a switch that starts forwarding the frame before it receives the entire frame. This is known as cut through switching. A cut through switch forwards the frame before it is entirely received. At a minimum, the destination address of the frame must be read before the frame can be forwarded. 5.3.1 Switching >5.3.1.7 Activity – Frame Forwarding MethodsFigure 1 on this page lists the following six description:
The user is asked to match the descriptions to their correct frame forwarding method, either Store and Forward or Cut Through. Figure 2 on this page shows the following topology:
Read the scenario based on the topology shown. Identify how the frames will be processed by dragging your answers to the appropriate fields provided in the table. All answers will not be used. The scenario is as follows:
The supplied answers are:
5.3.1 Switching >5.3.1.8 Memory Buffering on switchesThe table on this page compares Port Based and Shared memory buffering as follows:
5.3.1 Switching >5.3.1.9 Activity - Switch It!The figure on this page shows the following topology of four computers and one hub connected to a Catalyst 2950 series switch topology: The following table represents the switch:
The hub has two PC's connected to it with MAC addresses 0E and 0F. Determine how the switch forwards a frame based on the source MAC and destination MAC address and information in the switch MAC table. An example of the frame is represented in the following table:
An example of the MAC Table is as follows:
Answer the questions below using the information provided. Question 1: Where will the switch forward the frame? Fa1, Fa2, Fa3, Fa4, Fa5, Fa6, Fa7, Fa8, Fa9, Fa10, Fa11, Fa12 Question 2: When the switch forwards the frame, which statement(s) are true?
The learner can generate new problems as they desire. 5.3.1 Switching >5.3.1.10 Lab – Viewing the Switch MAC Address TableSee Lab Descriptions. 5.3.2 Fixed or Modular >5.3.2.1 Fixed versus Modular ConfigurationFigure 1 on this page shows a switch connected to an IP phone and a wireless access port. Both devices can receive their power from the switch using Power Over Ethernet or POE. PoE ports look the same as any switch port. Check the model of the switch and the wireless access point to determine if the ports support PoE. Figure 2 on this page shows different form factors for switches as follows:
5.3.2 Fixed or Modular >5.3.2.2 Module Options for Cisco Switch Slotsthe Figure on this page shows three SFP modules as follows:
5.3.3 Layer 3 Switching >5.3.3.1 Layer 3 versus layer 3 SwitchingFigure 1 on this page shows 4 computers connected to a standard LAN switch (layer 2 switch) connected to a router. The router is connected to the Internet. Figure 2 on this page shows 4 computers connected to a Multi Layer switch (layer 2 - 3 switch) connected to the Internet. This diagram shows that you can eliminate a device in some cases. 5.3.3 Layer 3 Switching >5.3.3.2 Cisco Express ForwardingThe figure on this page shows a logical representation of how a layer 3 switch works. The interfaces on a layer 3 switch interact with the internal Route Processor utilising Cisco Express Forwarding (CEF). The Route Processor incorporates the Routing Table, the FB Table, and the Adjacency Table. 5.3.3 Layer 3 Switching >5.3.3.3 Types of Layer 3 InterfacesThe figure on this page shows a Lan consisting of a layer 3 switch. There are 2 standard layer 2 switches attached to the layer 3 switch. Each layer 2 switch has 2 PC's attached. There are 2 V Lans, Faculty (v lan 10) and Student (v lan 20). Each layer 2 switch is connected to the layer 3 switch using a Trunk. The layer 3 switch has two switched virtual interfaces (SVI's) used to route between the two V Lans. 5.3.3 Layer 3 Switching >5.3.3.4 Configuring a Routed Port on a Layer 3 SwitchThe figure on this page shows the CLI of a layer 3 switch. The output shows how to configure an interface to act as a routed interface using the
5.3.3 Layer 3 Switching >5.3.3.5 Packet Tracer - Configure Layer 3 SwitchesObjectivesPart1: Document the Current Network Configurations Part 2: Configure, Deploy, and Test the New Multilayer Switch 5.4 Summary5.4.1 Summary >5.4.1.1 Activity – MAC and Choose InstructionsFigure shows an NIC and a stack of fixed configuration switches. Ethernet uses end and intermediary devices to identify and deliver frames through networks. Video link to discuss the activity :http://tv.netevents.org/the-history-of-ethernet-with-bob-metcalfe-inventor-of-ethernet/ 5.4.1 Summary >5.4.1.2 SummaryThe figure on this page shows 4 computers connected to shared media. Each has a MAC address as follows:
The figure also shows a portion of the frame header including the source and destination MAC addresses:
End of Chapter 5: Ethernet. Next - Chapter 6: Network Layer. |