chapter 9- ethernet modified by profs. chen and cappellino

61
Chapter 9- Ethernet Modified by Profs. Chen and Cappellino

Post on 19-Dec-2015

223 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: Chapter 9- Ethernet Modified by Profs. Chen and Cappellino

Chapter 9- Ethernet

Modified by Profs. Chen and Cappellino

Page 2: Chapter 9- Ethernet Modified by Profs. Chen and Cappellino

Objectives Learning Objectives

Upon completion of this chapter, you will be able to:

Describe the evolution of Ethernet Explain the fields of the Ethernet Frame Describe the function and characteristics of the

media access control method used by Ethernet protocol

Describe the Physical and Data Link layer features of Ethernet

Compare and contrast Ethernet hubs and switches

Explain the Address Resolution Protocol (ARP)

Page 3: Chapter 9- Ethernet Modified by Profs. Chen and Cappellino

Historic Ethernet - FYI The foundation for Ethernet technology was first

established in 1970 with a program called Alohanet. Alohanet was a digital radio network designed to transmit

information over a shared radio frequency between the Hawaiian Islands.

Alohanet required all stations to follow a protocol in which an unacknowledged transmission required re-transmitting after a short period of waiting.

The techniques for using a shared medium in this way were later applied to wired technology in the form of Ethernet.

Ethernet was designed to accommodate multiple computers that were Interconnected on a ________________________

The first version of Ethernet incorporated a media access method known as Carrier Sense Multiple Access with Collision Detection (_______________).

Page 4: Chapter 9- Ethernet Modified by Profs. Chen and Cappellino

Ethernet – Standard and Implementation Ethernet operates in the __________

_____________ of the OSI model: the __________________________ (L2) and the _________________ (L1).

The first Ethernet standard was published in 1980 by a consortium of Digital Equipment Corporation, Intel, and Xerox (DIX).

In 1985, the Institute of Electrical and Electronics Engineers (IEEE) standards committee published standards for LANs.

These standards start with the number 802. The ______________________________

Page 5: Chapter 9- Ethernet Modified by Profs. Chen and Cappellino

Ethernet – Layer 1 and Layer 2 The Physical layer

Review: Ethernet at Layer 1 involves signals, bit streams, physical components that put signals on media, and various topologies.

Ethernet is actually implemented in the _______________ of the Data Link layer, which is known as the _________ _____________________________

Ethernet at Layer 2 addresses the limitations that exist in layer 1– see chart…

The MAC sublayer is concerned with the ______ ______________________________________________________________________ and __________________________ over the media.

The ____________________ sublayer of the Data Link layer remains relatively ___________ of the physical equipment

Acts as an ______________________________ ____________________________________

Page 6: Chapter 9- Ethernet Modified by Profs. Chen and Cappellino

Logical Link Control Sublayer of the Data Link Layer

IEEE 802.2 standard describes the LLC sublayer

LLC handles the _____________ between the ______________ and the hardware of the MAC sublayer and _____________

LLC is implemented ___________ and takes the network protocol data (L3), and ______________________ to help deliver the packet to the destination node.

_________________________________

Page 7: Chapter 9- Ethernet Modified by Profs. Chen and Cappellino

MAC Sublayer of the Data Link Layer IEEE _______ standard describes the MAC sublayer and

the Physical layer functions. MAC is implemented in hardware, typically in __________ MAC sublayer has _________ responsibilities:

1. ______________ including frame assembly prior to transmission and frame parsing when frame is received

Frame __________________________________ that make up a frame The MAC layer _____________________ to the Layer 3 PDU. It __________________________ between the transmitting and

receiving nodes. Each __________________________________________ that

enables a frame to be delivered to a destination node. More to come on MAC addresses…

________________________ Each trailer contains a ________________. If the CRC of the

_________________________________, the frame can be ______________ to have been received without error.

Page 8: Chapter 9- Ethernet Modified by Profs. Chen and Cappellino

MAC Sublayer responsibilities cont…

2. Media Access Control The ____ sublayer controls the _________

_____________________________________________________________

Includes recovery from transmission failure due to collisions.

The media access control method for Ethernet is _________________

All the nodes in that network segment ________ _________________________________

___________________________________________ transmitted by any node on that segment.

They examine the MAC address to determine if frame is meant for themselves

Page 9: Chapter 9- Ethernet Modified by Profs. Chen and Cappellino

Physical Implementations of Ethernet

Ethernet has evolved to meet the increased demand for high-speed LANs due to the introduction of fiber optics.

Ethernet is simple, easy to maintain and upgrade, reliable and cost effective

With the introduction of Gigabit speeds, Ethernet has become a Metropolitan Area Network (MAN) and WAN standard.

Ethernet can _____________________________ ______________________________

Ethernet supports a variety of media types but the ____________________________________________________________________

Uses different media to interconnect network devices via intermediary devices such as hubs and switches.

Page 10: Chapter 9- Ethernet Modified by Profs. Chen and Cappellino

Early Ethernet Media- Bus topology The first versions of Ethernet used

________ to connect computers in a physical bus topology.

Each _____________________ ______________________

This versions of Ethernet were known as _____________, (10BASE5) and _______________ (10BASE2).

__________, used a _____________________ _____________________ before the signal required a repeater.

_______________, used a ______________ ______________________________________________________________________

Coaxial cables where eventually replaced with UTP cables

UTP was easier to work with, lightweight, and less expensive

Page 11: Chapter 9- Ethernet Modified by Profs. Chen and Cappellino

Early Ethernet Media- Star topology

Physical topology eventually changed to a _____________________________________ concentrate connections

When a frame arrives at one port, it is __________ _____________________________________

Hubs _______________________ by allowing any single cable to fail without disrupting the entire network.

Page 12: Chapter 9- Ethernet Modified by Profs. Chen and Cappellino

Ethernet Collision Management Legacy Ethernet (Hub and half-duplex)

10BASE-T networks used hubs as the central point of the network segment

______________enabled only ________________________ ______________________________________

As ___________ were added to an Ethernet network, the amount of frame ________________ significantly.

Current Ethernet (switch and full-duplex)____________ – around development of 100BASE-TX- were

introduced to __________________________________ isolate each port and _______________________________ (if the

destination is known), rather than send frame to every device. Later ______________________________ was introduced

connections that ________________________________________ at the ___________________________

In full duplex mode, there is no contention for the media. Thus, a _____________________________________

Page 13: Chapter 9- Ethernet Modified by Profs. Chen and Cappellino

The Frame – Encapsulating the Packet Review of Frame from Chapter 7-- The Ethernet frame structure adds headers and

trailers around the Layer 3 PDU. There are 2 Ethernet framing- what are they? Ethernet Frame Size

Both Ethernet standards define the minimum frame size as 64 bytes and the maximum as 1522 bytes (extended from 1518 bytes)

This includes all bytes from the Destination MAC Address field through the Frame Check Sequence (FCS) field.

The Preamble and Start Frame Delimiter fields are not included The frame size was increased to accommodate a technology

called Virtual Local Area Network (VLAN). _______________________________________________ _______________________________________

Page 14: Chapter 9- Ethernet Modified by Profs. Chen and Cappellino

Review- what field is it?

Page 15: Chapter 9- Ethernet Modified by Profs. Chen and Cappellino

The Ethernet MAC Address- in more detail… A unique identifier called a Media Access Control (______)

__________ was created to _________________ _____________________________________

It provided a method for device identification at a lower level of the OSI model.

REVIEW… What layer does the MAC address belong to? What is the size of the MAC address?

What is another name for a MAC address?

Page 16: Chapter 9- Ethernet Modified by Profs. Chen and Cappellino

MAC Address Structure Any vendor that sells Ethernet devices must

register with IEEE who will assign a 3-byte Organizational Unique Identifier (____) to that vendor

A ________________________________ Requirements:

All MAC addresses assigned to a NIC must use that ______________________________ _____________________________

All MAC addresses with the same OUI must be assigned a unique value in the last 3 bytes.

The MAC address is often referred to as a burned-in address (____) because it is ___________________________________

When the computer starts up, the NIC copies the address into RAM.

The address is used to compare with the destination address of a received frame.

Ensures unique MAC address gets assigned to all devices

Page 17: Chapter 9- Ethernet Modified by Profs. Chen and Cappellino

How a MAC is used on a LAN

When a device forwards a message in an Ethernet network, each NIC in the (local) network sees if the destination MAC address matches its address. If there is ___________________________________ If there is a _________, that device’s ___________

______________, where the _______________ process take place.

All devices connected to an Ethernet LAN have MAC addressed interfaces including workstations, servers, switches, printers etc.

Page 18: Chapter 9- Ethernet Modified by Profs. Chen and Cappellino

Hexadecimal (“Hex”) Numbering and Addressing _____________ is used to ______________________

addresses and IP Version 6 addresses. Hexadecimal is a base ______________ system.

It uses the ________________________________Hex is a way to represent binary values

Each Hex digit is up to ____________________ Review: what base is decimal? And binary? Given that 8 bits (a byte) is a common binary grouping,

Binary 00000000 to 11111111 can be represented in hexadecimal as the range _________________

Leading zeroes are always displayed to complete the 8-bit representation

Given the chart at the right- what is the Hex equivalent of the following: 0010 1011

Hexadecimal is usually ________________________ _______________________________ (for example 0x73) to distinguish it from a decimal value.

NOTE: you should be able to convert Hex to binary to decimal or vice-versa

Review: How would be calculate the DECIMAL VALUE OF 1011?

Page 19: Chapter 9- Ethernet Modified by Profs. Chen and Cappellino

Addressing Review… Data Link layer (Layer 2) physical

addressing, implemented as an Ethernet MAC address, is used to transport the ________________ _________________________

These addresses have _______________ ___________________________

Source and Destination MAC addresses _________________________________

Network layer (Layer 3) addresses, such as ______________, provide ________________ that is understood at both source and destination and _________________________

Source and Destination ____________ ______________ at all from start to finish

The Network layer address enables the packet to be forwarded toward its destination.

Page 20: Chapter 9- Ethernet Modified by Profs. Chen and Cappellino

Ethernet Unicast, Broadcast & Multicast

A _______ MAC address is the ___________ used when a frame is sent from a ______________ ________________________________________ device.

In the example shown, a host with IP address 192.168.1.5 (source) requests a web page from the server at IP address 192.168.1.200.

The destination IP address and MAC address combine to deliver data to one specific destination host.

Notice- both source and destination are on the same network

HOW DO WE KNOW THAT?

Page 21: Chapter 9- Ethernet Modified by Profs. Chen and Cappellino

Ethernet Unicast, Broadcast & Multicast With a _______________________

___________________________________________________________

Direct broadcast This numbering in the address means that ____

____________________________________________________________________________

Network protocols, such as Dynamic Host Configuration Protocol (______) and Address Resolution Protocol (_____), __________________

On Ethernet networks, the broadcast MAC address on the frame is 48 binary ones displayed as Hexadecimal ___________________________

Page 22: Chapter 9- Ethernet Modified by Profs. Chen and Cappellino

Ethernet Unicast, Broadcast & Multicast ___________ addresses allow a ________

__________________________________. Devices that belong to a multicast group are

assigned a _____________________ ranging from ______________________________

___________ used as the ___________ of a packet while the ___________ will always have a _______________________

Multicast IP address requires a corresponding multicast MAC address to actually deliver frames on a local network.

The _____________________________ ________________________ in hexadecimal.

The value ___________________________ _______________________________________________________ of the multicast MAC address.

The leading bit in the last half of the MAC address is always a binary "0".

Page 23: Chapter 9- Ethernet Modified by Profs. Chen and Cappellino

Media Access Control in Ethernet- Review In a shared media environment, all devices

have guaranteed access to the medium If more than one device transmits simultaneously, what happens?

Ethernet uses Carrier Sense Multiple Access with Collision Detection (CSMA/CD) to detect and handle collisions and manage the restart of communications.

Page 24: Chapter 9- Ethernet Modified by Profs. Chen and Cappellino

CSMA/CD – The Process Carrier Sense

____________________________________________ for electrical activity on the cable before transmitting.

If a device _________________ from another device, it will _________ for a specified amount of time before attempting to transmit.

When there is ____________, a device ________________ its message. While this transmission is occurring, the __________________________

for traffic or collisions on the LAN. After the message is sent, the ______________________________

Multi-accessIf the distance between devices is such that the one device's signals are

not detected by a second device, ____________________________ __________________________________--

Their messages will propagate across the media until they _____________________________________

At that point, the _________________________________________Although the messages are corrupted, the jumble of remaining signals

_______________________ across the media.

Page 25: Chapter 9- Ethernet Modified by Profs. Chen and Cappellino

CSMA/CD – The Process cont… Collision Detection

Once a collision occurs, the ______________________ - as well as all the transmitting devices - _______________________ __________________________ above the normal level

Once detected, every device transmitting will continue to transmit to _________________________________________________

Jam Signal and Random BackoffOnce the collision is detected by the transmitting devices, they

_____________________ used to notify the other devices of a collision, so that they will __________________________

This backoff algorithm causes all devices to __________________ _________________, which allows the collision signals to subside.

A __________________ ensures that the devices that were involved in the collision do not try to send their traffic again at the same time, which would cause the whole process to repeat.

Page 26: Chapter 9- Ethernet Modified by Profs. Chen and Cappellino

Hubs and Collision Domains Collisions will occur in many shared media topologies ______ were created as intermediary network devices that

enable ______________________________________Because hubs operate at the ___________________, _________

____________________ between the devices they connect.Hubs retransmit ____________________________________,

except the one from which it received the signal _______________________________________________

____________________________ or series of directly connected hubs (see next slide for graphic of a collision domain)

A collision domain can also be considered a _________________. Hubs _________________ of the collision domain.

Seen on the next slide, the interconnection of hubs form a physical topology called an extended star and _________ _______________________

Page 27: Chapter 9- Ethernet Modified by Profs. Chen and Cappellino

Hubs and Collision Domains Graphic

Need something more than CSMA/CD to control collisions in a large networked environment

Stay tuned…

Page 28: Chapter 9- Ethernet Modified by Profs. Chen and Cappellino

Collision domains The types of devices that interconnect the media

segments define collision domains. ___________________________________________

Examples of Layer 1 devices: repeaters and hubs _________________ the collision domains

__________________________________________________________________________

Breaking up, or ___________________________ ______________ with Layer 2 and 3 devices is also known as segmentation

Layer 2 device- _____________ Layer 3 device- _____________

Page 29: Chapter 9- Ethernet Modified by Profs. Chen and Cappellino

Segmentation with switch

How many collision domains do we have?

Page 30: Chapter 9- Ethernet Modified by Profs. Chen and Cappellino

Segmentation with router

How many collision

domains do we have

here?

Page 31: Chapter 9- Ethernet Modified by Profs. Chen and Cappellino

Ethernet Timing: Latency

When a device wants to send a message, the electrical ______________________ ______________________ called _______ to travel down the cable.

Each hub adds latency as it forwards the bits from one port to the next.

The ___________________________ increases the likelihood that ___________ will occur

Listening node may begin transmitting signals while the hub is processing the message.

Page 32: Chapter 9- Ethernet Modified by Profs. Chen and Cappellino

Ethernet Timing: Timing and Synchronization _________ 64 bits of __________________

informationTransmitted by the sending device in half-duplex mode

The sending device ______________________ __________________________________

Ethernet with throughput speeds of __________ ________ are ____________________.

Meaning each ____________________________ ___________________________________

Ethernet implementations with throughput of ____________________ are _______________.

Synchronous communication in this context means that the _________________________________

Page 33: Chapter 9- Ethernet Modified by Profs. Chen and Cappellino

Ethernet Timing: Bit Time ___________ For each

different media speed this is the __________________ _____________________________________________

For 100 meters of UTP cable, it takes just under 5 bit times for a 10BASE-T signal to travel the length the cable.

Page 34: Chapter 9- Ethernet Modified by Profs. Chen and Cappellino

Ethernet Timing: Slot Time __________ time it takes for an __________

_________________________________________________________________________

Slot time is calculated assuming maximum cable lengths on the largest legal network architecture

In half-duplex Ethernet, slot time becomes an important parameter in determining how many devices can share a network.

The _________________________________ ____________________________________________________________ (4096 for Gigabit Ethernet) of the frame transmission.

Page 35: Chapter 9- Ethernet Modified by Profs. Chen and Cappellino

Interframe Spacing Ethernet standards require a

minimum spacing between two non-colliding frames.

Gives the media time to stabilize after the transmission of the previous frame and time for the devices to process the frame.

_________________ is the ____ measured from the _________ _________________________________________________________________________

Page 36: Chapter 9- Ethernet Modified by Profs. Chen and Cappellino

Jam Signal As soon as a collision is detected, the

sending devices transmit a 32-bit "jam" signal that will enforce the collision and ensure all devices in the LAN to detect the collision.

It is important that the ________________ ___________________________________; otherwise the collision would not be identified.

The corrupted, __________________ ______________ are often referred to as collision fragments or ____________.

Page 37: Chapter 9- Ethernet Modified by Profs. Chen and Cappellino

Backoff Timing After a collision occurs and all devices allow the

cable to become idle (each waits the full interframe spacing), the devices must ________ __________________________________ before attempting to retransmit

Randomization is important so that two stations do not transmit at the same time, which would result in more collisions.

The methods described in this section allowed Ethernet to provide greater service in a shared media topology based on the use of hubs.

With the use of switches, the need for CSMA/CD starts to diminish or, in some cases, is removed altogether– stay tuned…

Page 38: Chapter 9- Ethernet Modified by Profs. Chen and Cappellino

Overview of Ethernet Physical Layer The ____________ between standard

Ethernet, Fast Ethernet, Gigabit Ethernet, and 10 Gigabit Ethernet __________________________

Ethernet is covered by the IEEE 802.3 standards. Four data rates are currently defined for operation over optical fiber and twisted-pair cables:

______ Mbps - ___________ Ethernet ____ Mbps - _________ Ethernet ______ Mbps - _________ Ethernet 10 Gbps - 10 Gigabit Ethernet

There are many different implementations of Ethernet at these various data rates

Page 39: Chapter 9- Ethernet Modified by Profs. Chen and Cappellino

10 Mbps Ethernet The principal 10 Mbps implementations of Ethernet

include:10BASE5 using Thicknet coaxial cable (bus topology)10BASE2 using Thinnet coaxial cable (bus topology)10BASE-T using Cat3-Cat5 unshielded twisted-pair cable (star

topology) 10 Mbps Ethernet - ________________

______________________ is typically used today10BASE-T uses ___________________ and is ___________ at

each end with an 8-pin _____________________ It uses Manchester-encoding over two unshielded twisted-pair cables.

It uses a _______________________It could be up to __________________________________ (or

repeater)The 10BASE-T links connected to a switch can support either half-

duplex or full-duplex operation.

Page 40: Chapter 9- Ethernet Modified by Profs. Chen and Cappellino

100 Mbps Fast Ethernet 100 Mbps AKA Fast Ethernet

Can be _____________________________________________. Higher frequency signals make Fast Ethernet _______________

__________________Two main types…

100BASE-TX (Cat5 or later UTP)Designed to support _____________________________________ copper

wire or ________________________Uses 4B/5B encoding Is ______________________________________________ at the center

100BASE-FX (fiber-optic cable)100BASE-FX standard uses the same signaling procedure as 100BASE-

TX, but ___________________________ rather than UTP copper. Encoding, decoding, and clock recovery procedures are the same for both

media, Signal transmission is different - ___________________________100BASE-FX uses the duplex SC connector

Page 41: Chapter 9- Ethernet Modified by Profs. Chen and Cappellino

1000 Mbps Ethernet

1000 Mbps AKA Gigabit Ethernet Can be _____________________________

________________________________With signals occurring in less time, bits

become even _________________________ than Fast Ethernet

______________________Two main types

1000Base-T Ethernet 1000Base-SX and 1000Base-LX using Fiber

More to come…

Page 42: Chapter 9- Ethernet Modified by Profs. Chen and Cappellino

1000BASE-T Ethernet Provides ______________________________

____________________________________Gigabit Ethernet over copper wire enables 125 Mbps per wire pair, or ____________________________

Each wire pair signals in full duplex, doubling the 500 Mbps to _____________________

Can ______________________________________________ ____________________________

Uses 4D-PAM5 line encoding to obtain 1 Gbps data throughput.

Unlike most digital signals where there are usually a couple of discrete voltage levels,

1000BASE-T uses many voltage levels. Looks similar to an analog signal rather than digital

Page 43: Chapter 9- Ethernet Modified by Profs. Chen and Cappellino

1000BASE-SX and 1000BASE-LX These ________________ of _______________

offer the following advantages over UTP: small physical size

Support full-duplex binary transmission at 1250 Mbps over two strands of optical fiber.

The transmission coding is based on the 8B/10B encoding scheme.

The principal ________________- among the 1000BASE-SX and 1000BASE-LX fiber versions are the ________________ and wavelength of the optical signal

Page 44: Chapter 9- Ethernet Modified by Profs. Chen and Cappellino

Ethernet - Future Options The IEEE 802.3ae standard was adapted to include 10

Gbps, full-duplex transmission over fiber-optic cable. 10-Gigabit Ethernet (10GbE) is evolving for use not only in LANs,

but also for use in WANs and MANs. 10Gbps can be compared to other varieties of Ethernet in

these ways:______________________, allowing _______________ between

all varieties of legacy, fast, gigabit, and 10 gigabit Ethernet. Because only full-duplex fiber connections are used, CSMA/CD is

not necessary. The IEEE 802.3 sublayers within OSI Layers 1 and 2 are

mostly preserved, with a few additions to accommodate 40 km fiber links and interoperability with other fiber technologies.

Future Ethernet SpeedsThe IEEE and the 10-Gigabit Ethernet Alliance are working on

40-, 100-, or even 160-Gbps standards.

Page 45: Chapter 9- Ethernet Modified by Profs. Chen and Cappellino

Legacy Ethernet – Using Hubs Classic Ethernet uses hubs to interconnect nodes

on the LAN segment. Hubs ___________________________________Forwards all the bits to every device connected to

the hub. ____________________________________May result in high levels of collisions on the LAN.

Sharing media creates issues as the network grows.

Scalability -with each device added to the shared media, the _________________________________ ____________________

Latency __________________________________________

connected to a segment results in increased latency. The greater the latency the _________________

_______________________Network Failure- if any device connected to the hub

____________________, the _________________ on the media ___________________________.

_________ a network with a larger number of nodes contains more traffic and has a larger collision domain

Page 46: Chapter 9- Ethernet Modified by Profs. Chen and Cappellino

Ethernet – Using Switches

A _____________________ network device which _________________________________ ____________________________

Looks like a hub Essential distinction between hubs and switches is

that a ___________________________________ between hosts on a network.

Page 47: Chapter 9- Ethernet Modified by Profs. Chen and Cappellino

Ethernet – Using Switches Switches allow the ___________

______________________________________________________

___________ of the switch represents a ____________________________ __________________ to the node or nodes connected on that port.

With fewer nodes in each collision domain, there is an ____________ ______________________ to each node, and ____________________.

In a LAN where a hub is connected to a switch port, there is still shared bandwidth, which may result in collisions within the shared environment of the hub.

Switch will isolate the segment and help reduce collisions

Page 48: Chapter 9- Ethernet Modified by Profs. Chen and Cappellino

Using Switches-with _____________________

_____________ of the network ___________ dramatically due to…

__________________________ Each device has a dedicated point-to-point

connection between the device and the switch, without media contention.

____________________________ Each node is it’s own collision domain If running NIC with _____________________

____________________________

Full-duplex operation With full-duplex enabled in a switched Ethernet

network, the devices connected directly to the switch ports can transmit and receive simultaneously, at the full media bandwidth.

Doubles transmission rates when compared to half-duplex. How?

Page 49: Chapter 9- Ethernet Modified by Profs. Chen and Cappellino

Ethernet – Why are hubs still being used?

______________ Early Ethernet networks used hubs and many of them remain in operation to this day.

____________________ As the price of switches has dropped, the use of hubs has decreased and cost is becoming less of a factor in deployment decisions.

_____________________ In certain (very few) LANs, shared media hubs still suffice so are still used

Page 50: Chapter 9- Ethernet Modified by Profs. Chen and Cappellino

Switches – Selective Forwarding _________________________

_______________________________________ between __________________________________

At this time, __________________ between them Switches forward individual frames directly from the receiving

port to the destination port (if known) using selective forwardingSwitch ______________________________________The _____________________________________. that matches a

destination MAC address with the port used to connect to a node. For each incoming frame, the ______________________ in the frame

header is _______________________________ in the MAC table. If a match is found, the ____________________ that is paired with the MAC

address is used as the ___________________________

The MAC table AKA the _______________ or the bridge table or the __________________

Page 51: Chapter 9- Ethernet Modified by Profs. Chen and Cappellino

Bridging- FYI Bridges were devices used in early LANs

to connect two physical network segments.Today- ______________________________

________________________ Today, bridges are used in wireless

networks to connect two wireless network segments

Stay tuned to the next course…

Page 52: Chapter 9- Ethernet Modified by Profs. Chen and Cappellino

Switches – Store and Forward In __________________________, the switch

_______________________, checks the FSC for errors, and ______________________________ ______________ for the destination node.

Any node operating in full-duplex mode can transmit anytime it has a frame, without regard to the availability of the receiving node.

This is because a LAN _________________________ ___________________ and _____________________ __________ when that port is idle.

As a result of the ability to ___________ and _______________________, _______________ ________________________________

They can send and receive at full media speed without losses due to collisions or the overhead associated with managing collisions.

Page 53: Chapter 9- Ethernet Modified by Profs. Chen and Cappellino

Switch Operation Ethernet LAN switches use ____basic operations: 1. __________________

This process ________________________________ with MAC addresses and their corresponding ports ______________ during normal operation

As each frame enters the switch, the switch examines the ______________ MAC address.

If ___________________________________________________ using the _____________ MAC address and pairs the address with the _________________________________________

The switch now can use this mapping to forward frames to this node.

2. _____________________The entries in the MAC table are ________________

After entry made in MAC table, a __________________ begins. When the value reaches 0, the entry in the table will be

removed.

Page 54: Chapter 9- Ethernet Modified by Profs. Chen and Cappellino

Switch Operation3. ____________________

If the ______________________ to which port to send a frame because the destination MAC address is not in the MAC table, the switch ______________________________________________________

Flooding is also used for frames sent to the ______________________.

4. __________________________Selective forwarding is the process of ______________ a frame's

_____________ MAC address and _____________________________ The destination MAC address has already been learned and the

corresponding port added to the MAC tableCore function of a switch

5. _______________ when a frame is __________ forwardedA switch does _________________________________________A switch will _____________________________.

If a frame fails a CRC check An additional reason for filtering a frame is ____________________.

A switch has security settings for _______________________ to and/or from selective MAC addresses.

Page 55: Chapter 9- Ethernet Modified by Profs. Chen and Cappellino

The ARP Process – Mapping IP to MAC Address The ARP protocol provides two basic functions:1. ________________________________________________

For a frame to be placed on the LAN media, it must have a __________ destination MAC address.

When a _____________ to the Data Link layer _________________ into a frame, the node refers to a table in its memory to find the Data Link layer MAC address that is mapped to the destination IPv4 address.

This table is called the ___________ or the ________________- The ARP table is stored in the _____________ of the device.

2. Maintaining the ARP TableThe ARP table is _______________________There are _____________ that a device can ____________________

______ way is to _________________________________________ Another way is to __________________________ as follows…

ARP sends a Layer 2 broadcast to all devices on the Ethernet LAN. The frame contains an ARP request packet with the IP address of the destination host.

The _____________ receiving the frame that __________________________ _______________________ packet back to the sender as a ________________. This response is then used to make a ___________________________

These dynamic entries in the ARP table are timestamped.

Page 56: Chapter 9- Ethernet Modified by Profs. Chen and Cappellino

ARP Process- obtaining a MAC address from a node on the LOCAL network

1.

3.

2. Broadcast sent..

4. ARP table is populated

Now, what if the destination is outside the local area network?...

Page 57: Chapter 9- Ethernet Modified by Profs. Chen and Cappellino

ARP Process – Destination outside the local Network

If the ________________ IPv4 host is ________ _______________ (determined by the source node’s comparison of it’s IP to the destination IP)

the source node __________________________ _________ which is the gateway or next hop used to reach the ultimate destination.

The ____________________________________ ___________________ for frames containing an IPv4 packet addressed to hosts on other networks.

In the event that the gateway entry is not in the table, the __________________ will send an __________ to _______________ associated with the IP address of the ______________________-

Page 58: Chapter 9- Ethernet Modified by Profs. Chen and Cappellino

ARP Process – Destinations outside the local Network

1.

2. Broadcast sent

3.

5. Ultimate destination IP and local router’s MAC used

4. ARP cache populated

NOTE: In this scenario, host A expressly requests the MAC address of the gateway (router’s interface)

Page 59: Chapter 9- Ethernet Modified by Profs. Chen and Cappellino

Proxy ARP– Destinations outside the local Network There are circumstances under which a __________________________

______________________________________________ (ie- the host does not expressly request the MAC address of the router’s interface)

The device sends ARP requests for IPv4 addresses not on the local network instead of requesting the MAC address with the IPv4 address of the gateway.

To provide a MAC address for these hosts, a ___________________ to respond on behalf of remote hosts.

This means that the ARP cache of the requesting device will contain the ____ ___________________________________________________________

If proxy ARP is disabled on the router interface, these hosts cannot communicate out of the local network.

When might proxy ARP be needed?IPv4 ________________ whether the ________________________________

as the source. When a host believes that it is directly connected to the same network as the

destination host. This generally occurs when a host is configured with an improper mask.

When a ___________________________________________. Proxy ARP can help devices on a network reach remote subnets.

Page 60: Chapter 9- Ethernet Modified by Profs. Chen and Cappellino

ARP Process – Removing Address Mapping

For each device, an ARP _______________ _________________ that have not been used for a specified period of time.

The times differ depending on the device and its operating system.

Commands may also be used to __________ ____________ all or some of the entries in the ARP table.

>______________ Deletes all entriesAfter an entry has been removed, the process for sending an ARP request and receiving an ARP reply must occur again to enter the map in the ARP table.

Page 61: Chapter 9- Ethernet Modified by Profs. Chen and Cappellino

ARP Broadcasts Issues Overhead on the Media

As a broadcast frame, an ARP request is received and processed by every device on the local network.

These broadcasts, generally, would probably have minimal impact on network performance.

Security Risk________________________________________________ AKA ___________, is a technique used by an attacker to ______________________ ______________________________________

An attacker forges the MAC address of a device and then frames can be sent to the wrong destination.

Prevent ARP spoofing by: ____________________ static ARP associations ____________________________________________

__________________________________