Содержание
- 2. Ethernet Standards and Implementation
- 3. Standards and Implementation The most common LAN technology. Different media (copper cable, optical fibre) Different bandwidths
- 4. Standards and Implementation History: First LAN was Ethernet, designed at Xerox. 1980: First Ethernet standard published
- 5. Standards and Implementation 802.3 OSI Model Compatibility: Needs of Layer 1. The lower portion of Layer
- 6. Standards and Implementation Layer 2 divided into two distinct areas of functionality or sub-layers. Logical Link
- 7. Standards and Implementation Layer 1 limitations were addressed at Layer 2.
- 8. Standards and Implementation Logical Link Control (LLC) – 802.2: Communicates with the upper layers independent of
- 9. Standards and Implementation Ethernet 802.3
- 10. Standards and Implementation Logical Link Control (LLC) – 802.2: Prepares the data for the upper layers.
- 11. Physical Implementations Most of the traffic on the Internet originates and ends with Ethernet connections. When
- 12. Ethernet Communication Through the LAN
- 13. Historical Ethernet CSMA/CD
- 14. Early Media
- 15. Legacy Ethernet Hub Switch
- 16. Legacy Ethernet Hub Half Duplex: One way traffic. Necessary on a shared media. Only one device
- 17. Switch Legacy Ethernet Full Duplex: Two way traffic. Not a shared media. Dedicated switch connection. A
- 18. Legacy Ethernet Ethernet with hubs is designed to work with collisions. Collisions occur when devices transmit
- 19. Moving to 1 Gbps and Beyond Gigabit Ethernet is used to describe implementations that provide bandwidth
- 20. Moving to 1 Gbps and Beyond Increased cabling distances enabled by the use of fiber-optic cable
- 21. Ethernet Ethernet Frame
- 22. Encapsulating the Packet The Ethernet protocol defines the frame format. Adds headers and trailers around the
- 23. Encapsulating the Packet The IEEE 802.3 Ethernet Frame format: Minimum Size: 64 Bytes Maximum Size: 1518
- 24. Encapsulating the Packet Preamble and Start of Frame Delimiter (SFD) – 8 bytes: Used to synchronize
- 25. Encapsulating the Packet Destination MAC Address – 6 bytes: Identifies the node that is to receive
- 26. Encapsulating the Packet Source MAC Address – 6 bytes: Identifies the node that originated the frame.
- 27. Encapsulating the Packet Length / Type – 2 bytes: DIX used this for type, the original
- 28. Encapsulating the Packet Data and Pad – 46 to 1500 bytes: The encapsulated data from Layer
- 29. Encapsulating the Packet Frame Check Sequence (FCS)– 4 bytes: Used to detect errors in a frame
- 30. Ethernet MAC Address In order for a transmission to be received properly at the destination computer,
- 31. Ethernet MAC Address 48 bits in length. Expressed as 12 hexadecimal digits. The first 6 hexadecimal
- 32. Ethernet MAC Address The OUI and the sequential number ensure that the assigned MAC addresses remain
- 33. Ethernet MAC Address When a network device matches the destination address to the address in the
- 34. Hexadecimal Numbering and Addressing A big problem with the binary system was verbosity. In order to
- 35. Hexadecimal Numbering and Addressing The hexadecimal numbering system addresses both of these issues: It is compact.
- 36. Hexadecimal Numbering and Addressing You can expect to see hex numbers represented in documents and the
- 37. Hexadecimal Numbering and Addressing BIT: 0 and 1 NIBBLE: BYTE: WORD: Binary Data Organization
- 38. Hexadecimal Numbering and Addressing Hexadecimal and Binary: Hexadecimal numbering is base 16 and requires a way
- 39. Hexadecimal Numbering and Addressing Hexadecimal and Binary: A byte is 8 bits (2 nibbles). Each byte
- 40. Hexadecimal Numbering and Addressing Converting Hexadecimal to Binary: Convert 0xCA to Binary……. Convert each hexadecimal digit
- 41. Hexadecimal Numbering and Addressing Converting Binary to Hexadecimal: Convert 11001010 to Hexadecimal….. Beginning at the left,
- 42. Hexadecimal Numbering and Addressing
- 43. Viewing the MAC Address
- 44. Another Layer of Addressing
- 45. Ethernet Unicast, Multicast and Broadcast Different MAC addresses are used to provide different types of communication.
- 46. Ethernet Unicast, Multicast and Broadcast
- 47. Ethernet Unicast, Multicast and Broadcast
- 48. Ethernet Unicast, Multicast and Broadcast
- 49. Ethernet Ethernet MAC CSMA/CD
- 50. Ethernet MAC method In a shared media environment, all devices have guaranteed access to the medium
- 51. CSMA/CD: The Process To transmit, each host will listen on the media. If a signal from
- 52. CSMA/CD: The Process It can happen that two devices will determine that it is safe to
- 53. CSMA/CD: The Process Both devices detect the collision and send out a jamming signal. The jamming
- 54. CSMA/CD: The Process The jamming signal causes each device to invoke a backoff algorithm. Devices wait
- 55. CSMA/CD: The Process
- 56. Ethernet Timing Latency: Each transmission encounters a certain amount of delay before reaching the destination. Every
- 57. Ethernet Timing Timing and Synchronization: The 8 byte (64 bit) preamble is transmitted at the start
- 58. Ethernet Timing Jam Signal: As soon as a collision is detected, the sending devices transmit a
- 60. Скачать презентацию