Download SEMESTER 1 Chapter 5

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Internet protocol suite wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Airborne Networking wikipedia , lookup

IEEE 1355 wikipedia , lookup

Computer network wikipedia , lookup

IEEE 802.11 wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

AppleTalk wikipedia , lookup

Network tap wikipedia , lookup

I²C wikipedia , lookup

Power over Ethernet wikipedia , lookup

CAN bus wikipedia , lookup

IEEE 802.1aq wikipedia , lookup

Point-to-Point Protocol over Ethernet wikipedia , lookup

Wake-on-LAN wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Virtual LAN wikipedia , lookup

Zero-configuration networking wikipedia , lookup

UniPro protocol stack wikipedia , lookup

Transcript
SEMESTER 1 Chapter 9
Ethernet
V 4.0
9.1.1
9.1.2
9.1.3
9.1.4
9.1.5
Who originally published the
Ethernet standard and when
was that?
Who and when published
LAN standards?
What is the number for the
Ethernet LAN standard?
What layers of the OSI
model do Ethernet
standards operate at?
What does Ethernet Layer 1
involve?
140 Points
published in 1980 by a consortium of Digital
Equipment Corporation, Intel, and Xerox (DIX).
1985, the Institute of Electrical and Electronics
Engineers (IEEE)
802.3
1 and 2
signals, bit streams that travel on the media,
physical components that put signals on
media, and various topologies
What are the Ethernet Layer Connects to the upper layers via the LLC
2 functions that overcome
Uses addressing schemes to identify devices
the limitations of Ethernet
Uses frames to organize bits into groups
Layer 1?
Uses MAC to identify transmission sources
What are the two sublayers the Logical Link Control (LLC) sublayer and
of the Data Link Layer?
the Media Access Control (MAC) sublayer.
What are the 4 functions of
Makes connection with the upper layers
the LLC?
Frames the network layer packet
Identifies the network layer protocol
Remains relatively independent of the physical
layer
What type of environment is Software
LLC implemented in?
Where is the MAC sublayer NIC
implemented?
What are the 2 primary
Data Encapsulation
functions of the MAC
Media Access Control
sublayer?
What are the 3 primary
Frame delimiting
functions of data
Addressing
encapsulation?
Error detection
What are the two main
Control of frame placement on and off the
functions of the media
media
access control?
Media recovery
What is the underlying
Mulit-access bus
topology of Ethernet?
What is the media access
CSMA/CD Carrier Sense Multiple Access with
control method for
Collision Detection
Ethernet?
What are the four factors
Simplicity and ease of maintenance
that have made Ethernet a
Ability to incorporate new technologies
success?
What part of the Ethernet
standard remains consistent
across all of its physical
implementations?
9.2.1
What was the historic
network that Ethernet was
based on called?
9.2.1.2 Describe the method of
transmission on a hub?
9.2.2
What is legacy Ethernet?
What is the current standard
for Ethernet?
What is full duplex?
What is the difference when
forwarding a frame from a
switch vs. hub?
9.2.3
What two new uses are
requiring the move to
Gigabit Ethernet?
9.2.3.2 Define a MAN?
9.3.1
What is the most significant
difference between the
IEEE 802.3 (original) and
the revised IEEE 802.3?
What were the minimum
and maximum sizes of
Ethernet frames originally?
What is the new maximum
size for a frame?
What happens if the size of
a transmitted frame is less
than the minimum or greater
than the maximum?
9.3.1.2 What are the six portions of
an Ethernet frame
discussed?
9.3.1.3 What is the Frame Check
Sequence (FCS)?
What is the algorithm used
in determining the value of
the FCS?
What happens if the FCS
values do not match?
9.3.2
What was created to assist
in determining the source
and destination address?
Reliability
Low cost of installation and upgrade
Frame structure
Alohanet
A frame received in one port is transmitted out
all other ports
10Base-T network with a hub at its center
100Base-T network with switches
a connection that can carry both transmitted
and received signals at the same time
Hub always send the signal out all ports and
switch sends directly to device if it’s address is
known
Voice over IP (VoIP) and multimedia services
Ethernet connection across an entire city
the addition of a Start Frame Delimiter (SFD)
and a small change to the Type field to include
the Length
the minimum frame size as 64 bytes and the
maximum as 1518 bytes
1522 bytes
It is dropped
Preamble, start frame delimiter, destination
address, source address, length/type, 802.2
header and data, frame check sequence
(4 bytes) used to detect errors in a frame
Cyclical redundancy check
The frame is dropped
Media Access Control (MAC) address
How is an Ethernet MAC
address represented?
9.3.2.2 Define the two parts of an
Ethernet MAC address?
What is another name for
the MAC address?
As an Ethernet frame
passes through a network
what happens if that
devices MAC address
matches the destination
MAC address?
As an Ethernet frame
passes through a network
what happens if that
devices MAC address does
not match the destination
MAC address?
9.3.3.2 Where can you find your
computer’s MAC address?
9.3.4
What is the problem with
physical addressing?
What is the difference
between physical (Network
Layer) and logical (Data
Link Layer) addressing?
9.3.5
When a unicast
transmission used?
9.3.5.2 When is a broadcast
transmission used?
How is a broadcast IP
address represented?
How is a broadcast MAC
address represented?
9.3.5.3 When is a multicast
transmission used?
How can a multicast packet
only be used?
What type of address does
the source have?
What is the multicast MAC
address?
a 48-bit binary value expressed as 12
hexadecimal digits
All MAC addresses assigned to a NIC or other
Ethernet device must use that vendor's
assigned OUI as the first 3 bytes.
All MAC addresses with the same OUI must be
assigned a unique value (vendor code or serial
number) in the last 3 bytes.
Burned-in address
the NIC passes the frame up the OSI layers,
where the decapsulation process take place
The frame is discarded
Ipconfig/all or ipconfig
No meaning outside the local network
The Network layer address enables the packet
to be forwarded toward its destination.
The Data Link layer address enables the
packet to be carried by the local media across
each segment.
when a frame is sent from a single transmitting
device to single destination device
all hosts on that local network (broadcast
domain) will receive and process the packet
All 1’s in the host portion of the IP address
FF-FF-FF-FF-FF-FF
When a frame is sent to a group of computers
as the destination of a packet
Unicast
Begins with 01-00-5E The value ends by
converting the lower 23 bits of the IP multicast
group address into the remaining 6
hexadecimal characters of the Ethernet
9.4.1
9.4.2
How does a shared media
environment operate?
When does a device on a
shared environment
transmit?
Define latency.
Define collision.
How does collision
detection occur?
What happens when all
devices on a shared
medium detect a collision?
What is invoked after a
device receives a jamming
signal?
How does a backoff
algorithm work?
What mode does a device
return to after the backoff
algorithm has expired?
9.4.2.2 What are the three reasons
given that the growth of the
Internet has resulted in
more collisions?
Define a collision domain?
What does the connection
of hubs and repeaters do to
collision domains?
What happens when the
number of collisions
increases significantly?
9.4.3
Which devices extend the
latency in the medium?
Why would an increased
latency cause more
collisions?
9.4.3.2 What is sent before an
entire Ethernet frame is
sent?
address. The remaining bit in the MAC
address is always a "0".
all devices have guaranteed access to the
medium, but they have no prioritized claim on
it. If more than one device transmits
simultaneously, the physical signals collide
and the network must recover in order for
communication to continue.
When it detects that no other computer is
sending a frame, or carrier signal
The time delay between when a process is
started and that same process is detected
When two stations transmit at the same time
When a device is in listening mode it can
detect an increase in amplitude of the signal
above the normal level
they send out a jamming signal
The backoff algorithm
All devices stop transmitting for a random
amount of time
Listening
More devices are being connected to the
network.
Devices access the network media more
frequently.
Distances between devices are increasing.
The media within a network where collsions
can occur
They increase the collision domain size
reduces the network's efficiency and
effectiveness until the collisions become a
nuisance to the user
Hubs and repeaters
The other device may not hear the signal
before it begins to transmit
The preamble
What does asynchronous
communication mean?
What does synchronous
communication mean?
9.4.3.3 What is a bit time?
What is the slot time?
9.4.4
What is interframe spacing?
What happens to interframe
spacing as the network
speed increases?
9.4.4.3 What happens when the
MAC layer is unable to send
a frame after 16 attempts?
9.5.1
What are the four data rates
are currently defined for
operation over optical fiber
and twisted-pair cables?
9.5.2
What are the three principal
10 Mbps implementations of
Ethernet?
9.5.2.2 What are the most popular
implementations of 100
Mbps Ethernet?
9.5.3
What is Gigabit Ethernet
more susceptible to
because of its speed?
What type of transmission
does 1000Base-T allow for?
9.5.4
What is the maximum
number of voltages used on
the media at the same
during transmission?
What are the two main
causes of noise on the line?
What are the ways that
10Gbps can be compared
to other varieties of
Ethernet?
each receiving device will use the 8 bytes of
timing information to synchronize the receive
circuit to the incoming data and then discard
the 8 bytes
the timing information is not required
a period of time is required for a bit to be
placed and sensed on the media
The time it takes for an electronic pulse to
travel the length of the maximum theoretical
distance between two nodes.
time measured from the last bit of the FCS
field of one frame to the first bit of the
Preamble of the next frame
The time reduces
it gives up and generates an error to the
Network layer
10 Mbps - 10Base-T Ethernet
100 Mbps - Fast Ethernet
1000 Mbps - Gigabit Ethernet
10 Gbps - 10 Gigabit Ethernet
10BASE5 using Thicknet coaxial cable
10BASE2 using Thinnet coaxial cable
10BASE-T using Cat3/Cat5 unshielded
twisted-pair cable
100BASE-TX using Cat5 or later UTP
100BASE-FX using fiber-optic cable
Noise
the transmission and reception of data in both
directions - on the same wire and at the same
time
17
cable and termination problems
Frame format is the same, allowing
interoperability between all varieties of legacy,
fast, gigabit, and 10 gigabit Ethernet, with no
reframing or protocol conversions necessary.
Bit time is now 0.1 nS. All other time variables
scale accordingly.
Because only full-duplex fiber connections are
9.6.1
What is the problem
associate with the classic
Ethernet implementation
using hubs?
List the four problems
related to the
implementation of classic
Ethernet?
9.6.2
How do switches segment a
LAN?
What does the separation of
collision domains mean for
the bandwidth to the
device?
9.6.2.2 What are the three reasons
that bandwidth increases
dramatically when each
device is connected to a
switch port?
What are the three reasons
that hubs are still being
used?
9.6.3
Describe selective
forwarding?
What is the process called
when the switch holds the
frame until the receiving
node is available called?
Describe the store-andforward operation mode of a
switch?
How does a switch use a
MAC table?
9.6.3.2 What are the five basic
operations of a switch?
How does a switch learn a
MAC address?
What happens when an
used, there is no media contention and
CSMA/CD is not necessary.
The IEEE 802.3 sublayers within OSI Layers 1
and 2 are mostly preserved, with a few
additions to accommodate 40 km fiber links
and interoperability with other fiber
technologies.
high levels of collisions on the LAN
Scalability, Latency, Network Failure, and
Collisions
Separate collision domains
Full media bandwidth to each device
Dedicated bandwidth to each port
Collision-free environment
Full-duplex operation
Availability, Economics, and Requirements
establishing a momentary point-to-point
connection between the transmitting and
receiving nodes
Store-and-forward
The switch receives the entire frame and
checks the FCS before forwarding the frame
The incoming frame destination MAC address
is compared to the MAC table to decide which
port to forward the frame to
Learning
Aging
Flooding
Selective Forwarding
Filtering
The source address of the incoming frame
The address is removed from the MAC table
addresses countdown
reaches 0?
What happens when a
switch does not know the
destination address?
What type of frames will not
be forwarded?
9.7.1
What are the two basic
functions of ARP?
What are the names of the
tables that store the list of
MAC addresses with the
network address?
What are the two ways a
computer can gather MAC
addresses?
What are the 2 destination
addresses in an ARP
Request?
9.7.2
If the destination is on the
local network segment,
what MAC address is used?
If the destination is on a
remote network, what MAC
address is used?
If the MAC address of the
gateway is unknown, what
process is used?
9.7.2.2 What is the most common
reason for using a proxy
ARP?
9.7.3
How long are addresses
held in the ARP table?
9.7.4
How could ARP requests
impact performance on a
network?
What is another problem
that may be associated with
ARP?
The frame is flooded out all but the incoming
port
A frame with a destination of the same port, a
corrupt frame, and security reasons
Resolving IPv4 addresses to MAC addresses
Maintaining a cache of mappings
ARP table or ARP Cache
From an incoming frame or using an ARP
request
Broadcast MAC address and the destination
MAC address
The device MAC address
The gateway MAC address
ARP Request
When the device can not determine if the host
is on the same network or not
2 minutes unless used again in those 2
minutes and then 10 minutes
Too many broadcasts at once that each host
receives and processes therefore slowing
down the network
Security- ARP spoofing which causes errors
on the network
* 3 Ethernet media types:
– Coaxial cable - bus topology (old technology)
– Copper cable (UTP) - star topology
– Optical fiber cable - star topology
* You need to be able to do Hexadecimal Number conversion.
 For example, the binary value 0000 1010 is shown in hexadecimal as 0A.
* Ethernet operates in the lower two layers of the OSI model: the Data Link layer and
the Physical layer.
•
IEEE 802.2 standard describes the LLC sublayer
•
•
LLC handles the communication to the upper layers
LLC takes the network protocol data, and adds control information to help deliver the
packet to the destination node.
•
IEEE 802.3 standard describes the MAC sublayer and the Physical layer functions.
• Data Encapsulation
• Frame delimiting
• Addressing
• Error detection
• Media Access Control
• The MAC sublayer controls the placement of frames on the media and
the removal of frames from the media
• CSMA/CD.
•
Make sure you also remember the name mapping between OSI and TCP/IP model.
* The Frame – Encapsulating the Packet.
–
The Ethernet frame structure adds headers and trailers around the Layer 3 PDU.
* MAC address:
 The MAC address is often referred to as a burned-in address (BIA) because it is
burned into ROM (Read-Only Memory) on the NIC.
 All MAC addresses assigned to a NIC must use that vendor's assigned OUI as
the first 3 bytes.
 All MAC addresses with the same OUI must be assigned a unique value in the
last 3 bytes.
* Make sure you still remember this:
– IP address global
– Mac address local
* What is the definition of “Interframe Spacing”? How does it work?
 The Ethernet standards require a minimum spacing between two non-colliding
frames.
 This gives the media time to stabilize after the transmission of the previous frame
and time for the devices to process the frame.
* What is the “random backoff” in CSMA/CD? How does it work?
 After a collision occurs and all devices allow the cable to become idle (each waits
the full interframe spacing), the devices whose transmissions collided must wait
an additional - and potentially progressively longer - period of time before
attempting to retransmit the collided frame.
 The waiting period is intentionally designed to be random so that two
stations do not delay for the same amount of time, which would result in
more collisions.
 Among the groups of devices that received the jam signals and starts the
backoff timer, the station that will 1st try to resend the frame is the station
whose timer expired first. (ADD this to the PPT)
* CSMA/CD: Collisions will occur in any shared media topology.
– Collisions are the cost that Ethernet pays to get the low overhead associated with
each transmission.
– Every time a collision happens on a network, all transmission stops for a period
of time.
– Collisions are the cost that Ethernet pays to get the low overhead associated with
each transmission.
– Using hubs to provide network access to more users reduces the performance
because the fixed capacity of the media has to be shared between more devices.
* These are all CSMA/CD LAN access protocols:
* Full Duplex (typically on a switch):
– In a network that uses twisted-pair cabling, one pair is used to carry the
transmitted signal. A separate pair is used for the return or received signal. It is
possible for signals to pass through both pairs simultaneously.
– In full duplex mode, there is no contention for the media (no collision). Thus, a
collision domain no longer exists.
* Legacy Ethernet (Hub and half-duplex)
– In 10BASE-T networks, typically the central point of the network segment was a
hub. This created a shared media.
– Because the media is shared, only one station could successfully transmit at a
time. .
– As more devices were added to an Ethernet network, the amount of frame
collisions increased significantly.
* Using switch instead of hub:
– Dedicated bandwidth to each port
– Collision-free environment
– Full-duplex operation
– Increase throughput
* What is ARP?
 For a frame to be placed on the LAN media, it must have a destination MAC
address. The ARP protocol provides two basic functions:
 Resolving IPv4 Addresses (known) to MAC Addresses (unknown)
 Maintaining the ARP Table
 When the destination device is on the same LAN (subnet)
 ARP sends a Layer 2 broadcast to all devices on the Ethernet LAN. The
frame contains an ARP request packet with the IP address of the
destination host.
 The node receiving the frame that identifies the IP address as its own
responds by sending an ARP reply packet back to the sender as a unicast
frame. This response is then used to make a new entry in the ARP table.
 If the destination IPv4 host is not on the local network,
 The source node will use the MAC address of the gateway as the
destination address for frames containing an IPv4 packet addressed to
hosts on other networks.
 In the event that the gateway entry is not in the table, the normal ARP
process will send an ARP request to retrieve the MAC address associated
with the IP address of the router interface