Lecure#4 - Local Area Network
Lecure#4 - Local Area Network
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
Ethernet Frames
Ethernet Encapsulation
• It is a family of
networking technologies
defined in the IEEE
802.2 and 802.3
standards.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
Ethernet Frames
Data Link Sublayers
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
Ethernet Frames
MAC Sublayer
The MAC sublayer is responsible for data encapsulation and accessing the media.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
Ethernet Frames
MAC Sublayer
Media Access
• The IEEE 802.3 MAC sublayer includes the
specifications for different Ethernet
communications standards over various types
of media including copper and fiber.
• Legacy Ethernet using a bus topology or hubs,
is a shared, half-duplex medium. Ethernet over
a half-duplex medium uses a contention-based
access method, carrier sense multiple
access/collision detection (CSMA/CD).
• Ethernet LANs of today use switches that
operate in full-duplex. Full-duplex
communications with Ethernet switches do not
require access control through CSMA/CD.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
Ethernet Frames
Ethernet Frame Fields
• The minimum Ethernet frame size is 64 bytes and the maximum is 1518 bytes.
• The preamble field is not included when describing the size of the frame.
• Any frame less than 64 bytes in length is considered a “collision fragment” or “runt frame”
and is automatically discarded. Frames with more than 1500 bytes of data are considered
“jumbo” or “baby giant frames”.
• If the size of a transmitted frame is < minimum, or > maximum, the receiving device drops
the frame. Dropped frames are likely to be the result of collisions or other unwanted
signals. They are considered invalid. Jumbo frames are usually supported by most Fast
Ethernet and Gigabit Ethernet switches and NICs.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
Lab Activity
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
Ethernet MAC Addresses
MAC Address and Hexadecimal
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
Ethernet MAC Addresses
Ethernet MAC Address
• In an Ethernet LAN, every network device is connected to the same, shared media. MAC
addressing provides a method for device identification at the data link layer of the OSI model.
• An Ethernet MAC address is a 48-bit address expressed using 12 hexadecimal digits.
Because a byte equals 8 bits, we can also say that a MAC address is 6 bytes in length.
• All MAC addresses must be unique to the Ethernet device or Ethernet interface. To ensure
this, all vendors that sell Ethernet devices must register with the IEEE to obtain a unique 6
hexadecimal (i.e., 24-bit or 3-byte) code called the organizationally unique identifier (OUI).
• An Ethernet MAC address consists of a 6 hexadecimal vendor OUI code followed by a 6
hexadecimal vendor-assigned value.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
Ethernet MAC Addresses
Frame Processing
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
Ethernet MAC Addresses
Unicast MAC Address
In Ethernet, different MAC addresses are
used for Layer 2 unicast, broadcast, and
multicast communications.
• A unicast MAC address is the unique
address that is used when a frame is sent
from a single transmitting device to a
single destination device.
• The process that a source host uses to
determine the destination MAC address
associated with an IPv4 address is known
as Address Resolution Protocol (ARP).
The process that a source host uses to
determine the destination MAC address
associated with an IPv6 address is known
as Neighbor Discovery (ND).
Note: The source MAC address must always be a unicast.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
Ethernet MAC Addresses
Broadcast MAC Address
An Ethernet broadcast frame is received and
processed by every device on the Ethernet LAN.
The features of an Ethernet broadcast are as
follows:
• It has a destination MAC address of FF-FF-FF-
FF-FF-FF in hexadecimal (48 ones in binary).
• It is flooded out all Ethernet switch ports except
the incoming port. It is not forwarded by a
router.
• If the encapsulated data is an IPv4 broadcast
packet, this means the packet contains a
destination IPv4 address that has all ones (1s)
in the host portion. This numbering in the
address means that all hosts on that local
network (broadcast domain) will receive and
process the packet.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
Ethernet MAC Addresses
Multicast MAC Address
An Ethernet multicast frame is received and processed by a group of
devices that belong to the same multicast group.
• There is a destination MAC address of 01-00-5E when the
encapsulated data is an IPv4 multicast packet and a destination
MAC address of 33-33 when the encapsulated data is an IPv6
multicast packet.
• There are other reserved multicast destination MAC addresses
for when the encapsulated data is not IP, such as Spanning
Tree Protocol (STP).
• It is flooded out all Ethernet switch ports except the incoming
port, unless the switch is configured for multicast snooping. It is
not forwarded by a router, unless the router is configured to
route multicast packets.
• Because multicast addresses represent a group of addresses
(sometimes called a host group), they can only be used as the
destination of a packet. The source will always be a unicast
address.
• As with the unicast and broadcast addresses, the multicast IP
address requires a corresponding multicast MAC address.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
Lab Activity
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
Frame Forwarding
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
Frame Forwarding
Switching in Networking
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
Frame Forwarding
The Switch MAC Address Table
A switch will use the destination MAC address to determine the egress
interface.
Before a switch can make this decision it must learn what interface the
destination is located.
A switch builds a MAC address table, also known as a Content
Addressable Memory (CAM) table, by recording the source MAC address
into the table along with the port it was received.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
Frame Forwarding
The Switch Learn and Forward Method
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
Frame Forwarding
Switch Forwarding Methods
Switches use software on application-specific-integrated circuits (ASICs) to make
very quick decisions.
A switch will use one of two methods to make forwarding decisions after it receives a
frame:
• Store-and-forward switching - Receives the entire frame and ensures the frame
is valid. Store-and-forward switching is Cisco’s preferred switching method.
• Cut-through switching – Forwards the frame immediately after determining the
destination MAC address of an incoming frame and the egress port.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
Frame Forwarding
Store-and-Forward Switching
Store-and-forward has two primary characteristics:
• Error Checking – The switch will check the Frame Check Sequence (FCS) for CRC errors.
Bad frames will be discarded.
• Buffering – The ingress interface will buffer the frame while it checks the FCS. This also
allows the switch to adjust to a potential difference in speeds between the ingress and
egress ports.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
Frame Forwarding
Cut-Through Switching
• Cut-through forwards the frame immediately after determining the destination MAC.
• Fragment Free method will check the destination and ensure that the frame is at least
64 Bytes. This will eliminate runts.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
Switching Domains
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
Switching Domains
Collision Domains
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
Switching Domains
Broadcast Domains
• A broadcast domain extends across all Layer 1 or Layer 2 devices on a LAN.
§ Only a layer 3 device (router) will break the broadcast domain, also called a MAC
broadcast domain.
§ The broadcast domain consists of all devices on the LAN that receive the broadcast traffic.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
Switching Domains
Alleviated Network Congestion
Switches use the MAC address table and full-duplex to eliminate collisions and avoid
congestion.
Protocol Function
Fast Port Speeds Depending on the model, switches may have up to 100Gbps port speeds.
Fast Internal This uses fast internal bus or shared memory to improve performance.
Switching
Large Frame Buffers This allows for temporary storage while processing large quantities of
frames.
High Port Density This provides many ports for devices to be connected to LAN with less cost.
This also provides for more local traffic with less congestion.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
Lecture#4: Local Area Network
Wired LAN : VLAN
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
Overview of VLANs
VLAN Definitions
Benefits Description
Smaller Broadcast Domains Dividing the LAN reduces the number of broadcast domains
Improved Security Only users in the same VLAN can communicate together
VLANs can group devices with similar requirements, e.g. faculty vs.
Improved IT Efficiency
students
Reduced Cost One switch can support multiple groups or VLANs
Better Performance Small broadcast domains reduce traffic, improving bandwidth
Similar groups will need similar applications and other network
Simpler Management
resources
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
Overview of VLANs
Types of VLANs
Note: While we cannot delete VLAN1 Cisco will recommend that we assign these
default features to other VLANs
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
Overview of VLANs
Types of VLANs (Cont.)
Data VLAN
• Dedicated to user-generated traffic (email and web traffic).
• VLAN 1 is the default data VLAN because all interfaces are assigned to this VLAN.
Native VLAN
• This is used for trunk links only.
• All frames are tagged on an 802.1Q trunk link except for those on the native VLAN.
Management VLAN
• This is used for SSH/Telnet VTY traffic and should not be carried with end user traffic.
• Typically, the VLAN that is the SVI for the Layer 2 switch.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
Overview of VLANs
Types of VLANs (Cont.)
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
Lab Activity