Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 37

CCNA Routing and Switching

Chapter 2: Ethernet Networking and Data Encapsulation

Instructor & Todd Lammle

Ethernet Networking

Ethernet Networking
A connection media access method that
allows all hosts on a network to share the
same bandwidth
(Uses Data Link & Physical Layer
specifications)
CSMA/CD
Half Duplex
Full Duplex

Ethernet Networking

This figure shows an old, legacy network thats a single


collision domain where only one host can transmit at a time.
4

A typical network youd see


today

This figure shows a typical network design


still used today and see if its any better.
5

A router creates broadcast domain


boundaries.

This figure shows how a router


would create a broadcast domain
boundary.

Ethernet Networking
Ethernet is a contention media access method that
allows all hosts on a network to share the same
bandwidth of a link.
Ethernet is popular because its readily scalable,
meaning that its comparatively easy to integrate
new technologies, such as Fast Ethernet and
Gigabit Ethernet, into an existing network
infrastructure.
Its also relatively simple to implement in the first
place, and with it, troubleshooting is reasonably
straightforward.

Ethernet Collision Detection


CSMA/CD

Ethernet Collision Detection


CSMA/CD
- CSMA/CD (Carrier Sense Multiple Access with Collision
Detection)
- Listens to the networks shared media to see if any other users
on on the line by trying to sense a neutral electrical signal or
carrier.
- If no transmission is sensed, then multiple access allows anyone
onto the media without any further permission required.
- If two PCs detect a neutral signal and access the shared media
at the exact same time, a collision occurs and is detected.
- The PCs sense the collision by being unable to deliver the entire
frame (coming soon) onto the network.
- When a collision occurs, a jamming signal is sent out by the first
PC to detect the collision.
- Using either a priority or random backoff scheme, the PCs wait
certain amount of time before retransmitting.
- If collisions continue to occur, the PCs random interval is
doubled, lessening the chances of a collision.
9

Ethernet Collision Detection


Jam Signal and Random Backoff
CSMA/CD
Collision Detection
When a device is in listening mode, it can
detect when a collision occurs on the media,
because devices can detect an increase in
amplitude of the signal above the normal
level.
When collision is detected, the transmitting
devices send out a jamming signal.
The jamming signal notifies the other
devices of a collision, so that they invoke a
backoff algorithm.
This backoff algorithm causes all
devices to stop transmitting for a random
amount of time, which allows the collision
signals to subside.
A random backoff period ensures that
the devices in the collision do not try to
send traffic again at the same time, which
would cause the whole process to
repeat.
During the backoff period, a third device
may transmit before either of the two
involved in the collision have a chance to
re-transmit.
10

Half and Full Duplex


802.3 Half duplex (CSMA/CD)
Unidirectional data flow
Higher potential for collision
Hubs connectivity
One wire pair
Shared collision domain
Lower Effective Throughput

Full duplex
Point-to-point only
Attached to dedicated switched
port
Requires full-duplex support on
both ends
Collision free
Collision detect circuit disabled
Two wire pair

11

Communications in a switched LAN network


occur in three ways
Unicast:
In unicast transmission, there is just one sender and one receiver.
Unicast transmission is the predominant form of transmission on LANs and within
the Internet.
Examples of unicast transmissions include HTTP, SMTP, FTP, and Telnet.
Broadcast:
In this case, there is just one sender, but the information is sent to all connected
receivers.
Broadcast transmission is essential when sending the same message to all devices
on the LAN.
An example of a broadcast transmission is the ARP sends to all computers on a
LAN.
Multicast:
Communication in which a frame is sent to a specific group of devices or clients.
Multicast transmission clients must be members of a logical multicast group to
receive the information.
An example of multicast transmission is the video and voice transmissions
associated with a network-based, collaborative business meeting.

12

Ethernet Addressing
The MAC, or hardware, address is a 48-bit (6-byte) address
written in a hexadecimal format.

13

Ethernet Addressing
The first 2 bits of a MAC address are used as I/G bit and U/L
bit.
I/G bit and U/L bit
The first two bits of a destination address convey certain
information:
I/G = 0
Individual address: the destination is a singe node.
I/G = 1
Group address: the destination is a group of LAN
nodes (multicast or broadcast address).
U/L = 0
Universally administered address: the adapter uses
its burned-in MAC address.
U/L = 1
Locally administered address: the adapter uses a
logical address (assigned by network administrator).
U/L=1 may result in a hex code of 0x02 in the first
byte. The U/L bit is always set when a logical address
is assigned (even if the assigned address doesn't
follow this convention). Therefore, it is impossible to
imitate a burned-in address; but other logical address
may be imitated at any time.

14

Ethernet at the Physical Layer

15

Ethernet Cabling
Ethernet cabling is an important discussion, especially if you
are planning on taking the Cisco exams.
Three types of Ethernet cables are available:
Straight-through cable
Crossover cable
Rolled cable
We will look at each in the following sections.

16

Straight Through
The straight-through cable is used to connect
Host to switch or hub
Router to switch or hub

17

UTP Gigabit crossover Ethernet cable

For a straight-through cable its still 1 to 1, 2 to 2, and so


on up to pin 8. And in creating the gigabit crossover
cable, youd still cross 1 to 3 and 2 to 6, but you would
add 4 to 7 and 5 to 8pretty straightforward!

18

Crossover Cable
The crossover cable can be used to connect
Switch to switch
Hub to hub
Host to host
Hub to switch
Router direct to host

19

Fiber Optic
The cable allows for very fast transmission of data, is made of glass (or even plastic!), is
very thin, and works as a waveguide to transmit light between two ends of the fiber.
Fiber optics has been used to go very long distances, as in intercontinental
connections, but it is becoming more and more popular in Ethernet LAN networks
due to the fast speeds available and because, unlike UTP, its immune to interference
like cross-talk.

20

What type of cable is used?

21

What type of cable is used for


each connection?

22

Data Encapsulation
When a host transmits data across a network to another device, the
data goes through encapsulation:
It is wrapped with protocol information at each layer of the OSI
model.
Each layer communicates only with its peer layer on the
receiving device.

23

PDU

24

Port Numbers
The Transport layer uses port numbers to define both the virtual
circuit and the upper-layer process.

25

Ciscos Three-Layer Model


The following are the three layers and their typical functions:
The core layer: backbone
The distribution layer: routing
The access layer: switching

26

Ciscos Three-Layer Model


Hierarchical design model is used.
1=Hierarchical network design involves dividing the network into
discrete layers.
2-Each layer provides specific functions that define its role within
the overall network.
3-By separating the various functions that exist on a network, the
network design becomes modular, which facilitates scalability and
performance.

27

Ciscos Three-Layer Model


The Core Layer

28

Ciscos Three-Layer Model


The Distribution Layer

29

Ciscos Three-Layer Model


The Access Layer

30

Switch Features Hierarchical Network


Access Layer Switch Features:
Port Security

Link Aggregation

VLANs
PoE

FastEthernet/Gigabit

Quality of Service (QoS)


31

Switch Features Hierarchical Network


Distribution Layer Switch Features:
Layer 3 Support

Link Aggregation

High Forwarding Rate

Redundant Components

Gigabit/10 Gigabit

Quality of Service (QoS)


Security Policies
32

Switch Features Hierarchical Network


Core Layer Switch Features:
Layer 3 Support
Link Aggregation

Very High Forwarding Rate


Gigabit/10 Gigabit
Redundant Components

Quality of Service (QoS)


33

Switches Small and Medium Business


Summary

Access

Bandwidth (Link) Aggregation

FastEthernet/Gigabit Ethernet

Distribution

Core

Gigabit Ethernet/10 Gigabit Ethernet

High Forwarding Rate

u
u

u
u

Layer 3 Support
Port Security

Power Over Ethernet (PoE)


Quality of Service (QoS)

u
u
u

Redundant Components
Security Policies/Access Control Lists

Very High Forwarding Rate


VLANs

34

Review Question
Switch

Hub

Hub

Switch

Hub

Hub

Hub

Hub

How many collision domains


35
are shown?

Which of the hosts can transmit


simultaneously without causing
collisions?
Switch
Hub

How many collision and broadcast


domains are show?
36

Written Labs and Review


Questions
Open your books and go through all the
written labs and the review questions.
Review the answers in class.

37

You might also like