SlideShare a Scribd company logo
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1
Instructor Materials
Chapter 5: Ethernet
CCNA Routing and Switching
Introduction to Networks v6.0
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 13
Chapter 5: Ethernet
Introduction to Networks v6.0
Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 5 - Sections & Objectives
5.1 Ethernet Protocol
• Explain how the Ethernet sublayers are related to the frame fields.
• Describe the Ethernet MAC address.
5.2 LAN Switches
• Explain how a switch operates.
• Explain how a switch builds its MAC address table and forwards frames.
• Describe switch forwarding methods.
• Describe the types of port settings available for Layer 2 switches.
5.3 Address Resolution Protocol
• Compare the roles of the MAC address and the IP address.
• Describe the purpose of ARP.
• Explain how ARP requests impact network and host performance.
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 15
5.1 Ethernet Protocol
Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Ethernet Protocol
Ethernet Frame
 Ethernet Encapsulation
• Ethernet operates in the data link layer and the physical layer.
• Ethernet supports data bandwidths from 10Mbps through 100Gbps.
• Ethernet standards define both the Layer 2 protocols and the Layer 1 technologies.
 MAC Sublayer
• MAC constitutes the lower sublayer of the data link layer.
• Responsible for Data encapsulation and Media access control.
 Ethernet Evolution
• Ethernet has been evolving since its creation in 1973.
• The Ethernet frame structure adds headers and trailers around the Layer 3 PDU to
encapsulate the message being sent.
 Ethernet Frame Fields
• The minimum Ethernet frame size is 64 bytes and the maximum is 1518 bytes.
• Frame smaller than the minimum or greater than the maximum are dropped.
• Dropped frames are likely to be the result of collisions or other unwanted signals and are
therefore considered invalid.
Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Ethernet Protocol
Ethernet Frame (Cont.)
Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Ethernet Protocol
Ethernet MAC Addresses
 MAC Addresses and Hexadecimal
• MAC address is 48-bit long and expressed as 12 hexadecimal digits.
 MAC Addresses: Ethernet Identity
• IEEE requires a vendor to follow two simple rules:
1. Must use that vendor's assigned OUI as the first three bytes.
2. All MAC addresses with the same OUI must be assigned a unique value in the last three
bytes.
 Frame Processing
• The NIC compares the destination MAC address in the frame with the device’s physical
MAC address stored in RAM.
• If there is a match, the framed is passed up the OSI layers.
• If there is no match, the device discards the frame.
 MAC Address Representations
• MAC addresses can be represented with colons, dashes or dots and are case-insensitive.
• 00-60-2F-3A-07-BC, 00:60:2F:3A:07:BC, 0060.2F3A.07BC and 00-60-2f-3a-07-bc are all
valid representations of the same MAC address.
Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Ethernet Protocol
Ethernet MAC Addresses (Cont.)
 Unicast MAC Address
• Unique address used when a frame is sent from a single transmitting device to a single
destination device.
• The source MAC address must always be a unicast.
 Broadcast MAC Address
• Used to address all nodes in the segment.
• The destination MAC address is the address of FF-FF-FF-FF-FF-FF in hexadecimal (48
ones in binary).
 Multicast MAC Address
• Used to address a group of nodes in the segment.
• The multicast MAC address is a special value that begins with 01-00-5E in hexadecimal.
• The remaining portion of the multicast MAC address is created by converting the lower 23 bits of the IP multicast group
address into 6 hexadecimal characters.
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 20
5.2 LAN Switches
Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
LAN Switches
The MAC Address Table
 Switch Fundamentals
• An Ethernet Switch is a Layer 2 device.
• It uses MAC addresses to make forwarding decisions.
• The MAC address table is sometimes referred to as a
content addressable memory (CAM) table.
 Learning MAC Addresses
• Switches dynamically build the CAM by monitoring
source MACs.
• Every frame that enters a switch is checked for new
addresses.
• The frame is forwarded based on the CAM.
 Filtering Frames
• Since the switch knows where to find a specific MAC
address, it can filter the frames to that port only.
• Filtering is not done is the destination MAC is not present
in the CAM.
Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
LAN Switches
Switch Forwarding Methods
 Frame Forwarding Methods on Cisco Switches
• Store-And-Forward
• Cut-Through
 Cut-Through Switching
• Fast-forward switching
• Lowest level of latency immediately forwards a packet after reading the destination
address.
• Typical cut-through method of switching.
• Fragment-free switching
• Switch stores the first 64 bytes of the
frame before forwarding.
• Most network errors and collisions
occur during the first 64 bytes.
 Memory Buffering on Switches
• Port-based memory
• Share memory
Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
LAN Switches
Switch Port Settings
 Duplex and Speed Settings
• Full-duplex – Both ends of the connection can send
and receive simultaneously.
• Half-duplex – Only one end of the connection can
send at a time.
• A common cause of performance issues on Ethernet
links is when one port on the link operates at half-
duplex and the other on full-duplex.
 Auto-MDX
• Detects the type of connection required and
configures the interface accordingly.
• Helps reducing configuration errors.
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 24
5.3 Address Resolution
Protocol
Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Address Resolution Protocol
MAC and IP
 The combination of MAC and IP facilitate
the End-to-End communication.
 Layer 2 addresses are used to move the
frame within the local network
 Layer 3 addresses are used to move the
packets through remote networks.
 Destination on Same Network
• Physical address (MAC address) is used for
Ethernet NIC to Ethernet NIC communications on
the same network.
 Destination on Remote Network
• Logical address (IP address) is used to send the
packet from the original source to the final
destination.
Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Address Resolution Protocol
ARP
 Introduction to ARP
• ARP allows the source to request the MAC address of the destination.
• The request is based upon the layer 3 address of the destination (known by
the source).
 ARP Functions
• Resolving IPv4 addresses to MAC addresses
• Maintaining a table of mappings
• ARP uses ARP Request and ARP Reply to perform its functions.
 Removing Entries from an ARP Table
• Entries are removed from the device’s ARP table when its cache timer expires.
• Cache timers are OS dependent.
• ARP entries can be manually removed via commands.
 ARP Tables
• On IOS: show ip arp
• On Windows PCs: arp -a
Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Address Resolution Protocol
ARP Issues
 ARP Broadcasts
• ARP requests can flood the local
segment.
 ARP Spoofing
• Attackers can respond to requests and
pretend to be providers of services.
Example: default gateway
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 28
5.4 Chapter Summary
Presentation_ID 29© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
 Explain the operation of Ethernet.
 Explain how a switch operates.
 Explain how the address resolution protocol enables communication on a network.
Chapter Summary
Summary
Presentation_ID 33© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Presentation_ID 34© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

More Related Content

What's hot

CCNA (R & S) Module 04 - Scaling Networks - Chapter 9
CCNA (R & S) Module 04 - Scaling Networks - Chapter 9CCNA (R & S) Module 04 - Scaling Networks - Chapter 9
CCNA (R & S) Module 04 - Scaling Networks - Chapter 9
Waqas Ahmed Nawaz
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 5
CCNA (R & S) Module 02 - Connecting Networks - Chapter 5CCNA (R & S) Module 02 - Connecting Networks - Chapter 5
CCNA (R & S) Module 02 - Connecting Networks - Chapter 5
Waqas Ahmed Nawaz
 
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4
Nil Menon
 
CCNA2 Verson6 Chapter9
CCNA2 Verson6 Chapter9CCNA2 Verson6 Chapter9
CCNA2 Verson6 Chapter9
Chaing Ravuth
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 3
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 3CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 3
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 3
Waqas Ahmed Nawaz
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 9
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 9CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 9
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 9
Waqas Ahmed Nawaz
 
CCNA4 Verson6 Chapter4
CCNA4 Verson6 Chapter4CCNA4 Verson6 Chapter4
CCNA4 Verson6 Chapter4
Chaing Ravuth
 
CCNA4 Verson6 Chapter3
CCNA4 Verson6 Chapter3CCNA4 Verson6 Chapter3
CCNA4 Verson6 Chapter3
Chaing Ravuth
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 10
CCNA (R & S) Module 04 - Scaling Networks - Chapter 10CCNA (R & S) Module 04 - Scaling Networks - Chapter 10
CCNA (R & S) Module 04 - Scaling Networks - Chapter 10
Waqas Ahmed Nawaz
 
CCNA2 Verson6 Chapter1
CCNA2 Verson6 Chapter1CCNA2 Verson6 Chapter1
CCNA2 Verson6 Chapter1
Chaing Ravuth
 
CCNA2 Verson6 Chapter10
CCNA2 Verson6 Chapter10CCNA2 Verson6 Chapter10
CCNA2 Verson6 Chapter10
Chaing Ravuth
 
CCNA3 Verson6 Chapter6
CCNA3 Verson6 Chapter6CCNA3 Verson6 Chapter6
CCNA3 Verson6 Chapter6
Chaing Ravuth
 
CCNA4 Verson6 Chapter2
CCNA4 Verson6 Chapter2CCNA4 Verson6 Chapter2
CCNA4 Verson6 Chapter2
Chaing Ravuth
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 3
CCNA (R & S) Module 02 - Connecting Networks - Chapter 3CCNA (R & S) Module 02 - Connecting Networks - Chapter 3
CCNA (R & S) Module 02 - Connecting Networks - Chapter 3
Waqas Ahmed Nawaz
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 10
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 10CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 10
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 10
Waqas Ahmed Nawaz
 
CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07
Irsandi Hasan
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 7
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 7CCNA (R & S) Module 01 - Introduction to Networks - Chapter 7
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 7
Waqas Ahmed Nawaz
 
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05
Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02
Irsandi Hasan
 
CCNA2 Verson6 Chapter5
CCNA2 Verson6 Chapter5CCNA2 Verson6 Chapter5
CCNA2 Verson6 Chapter5
Chaing Ravuth
 

What's hot (20)

CCNA (R & S) Module 04 - Scaling Networks - Chapter 9
CCNA (R & S) Module 04 - Scaling Networks - Chapter 9CCNA (R & S) Module 04 - Scaling Networks - Chapter 9
CCNA (R & S) Module 04 - Scaling Networks - Chapter 9
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 5
CCNA (R & S) Module 02 - Connecting Networks - Chapter 5CCNA (R & S) Module 02 - Connecting Networks - Chapter 5
CCNA (R & S) Module 02 - Connecting Networks - Chapter 5
 
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4
 
CCNA2 Verson6 Chapter9
CCNA2 Verson6 Chapter9CCNA2 Verson6 Chapter9
CCNA2 Verson6 Chapter9
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 3
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 3CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 3
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 3
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 9
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 9CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 9
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 9
 
CCNA4 Verson6 Chapter4
CCNA4 Verson6 Chapter4CCNA4 Verson6 Chapter4
CCNA4 Verson6 Chapter4
 
CCNA4 Verson6 Chapter3
CCNA4 Verson6 Chapter3CCNA4 Verson6 Chapter3
CCNA4 Verson6 Chapter3
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 10
CCNA (R & S) Module 04 - Scaling Networks - Chapter 10CCNA (R & S) Module 04 - Scaling Networks - Chapter 10
CCNA (R & S) Module 04 - Scaling Networks - Chapter 10
 
CCNA2 Verson6 Chapter1
CCNA2 Verson6 Chapter1CCNA2 Verson6 Chapter1
CCNA2 Verson6 Chapter1
 
CCNA2 Verson6 Chapter10
CCNA2 Verson6 Chapter10CCNA2 Verson6 Chapter10
CCNA2 Verson6 Chapter10
 
CCNA3 Verson6 Chapter6
CCNA3 Verson6 Chapter6CCNA3 Verson6 Chapter6
CCNA3 Verson6 Chapter6
 
CCNA4 Verson6 Chapter2
CCNA4 Verson6 Chapter2CCNA4 Verson6 Chapter2
CCNA4 Verson6 Chapter2
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 3
CCNA (R & S) Module 02 - Connecting Networks - Chapter 3CCNA (R & S) Module 02 - Connecting Networks - Chapter 3
CCNA (R & S) Module 02 - Connecting Networks - Chapter 3
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 10
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 10CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 10
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 10
 
CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 7
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 7CCNA (R & S) Module 01 - Introduction to Networks - Chapter 7
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 7
 
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05
 
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02
 
CCNA2 Verson6 Chapter5
CCNA2 Verson6 Chapter5CCNA2 Verson6 Chapter5
CCNA2 Verson6 Chapter5
 

Similar to CCNA (R & S) Module 01 - Introduction to Networks - Chapter 5

Itn instructor ppt_chapter5_ethernet
Itn instructor ppt_chapter5_ethernetItn instructor ppt_chapter5_ethernet
Itn instructor ppt_chapter5_ethernet
Universitas Teknokrat Indonesia
 
CCNA_ITN_Chp5.pptx
CCNA_ITN_Chp5.pptxCCNA_ITN_Chp5.pptx
CCNA_ITN_Chp5.pptx
NguyenLe340487
 
It nv51 instructor_ppt_ch5
It nv51 instructor_ppt_ch5It nv51 instructor_ppt_ch5
It nv51 instructor_ppt_ch5
newbie2019
 
CN L7 — копия.ppt
CN L7 — копия.pptCN L7 — копия.ppt
CN L7 — копия.ppt
AssemNazirova2
 
Computer Networks IEEE 802.3 standard-2021.pptx
Computer Networks IEEE 802.3 standard-2021.pptxComputer Networks IEEE 802.3 standard-2021.pptx
Computer Networks IEEE 802.3 standard-2021.pptx
najed76732
 
Lecture 3 network layer
Lecture 3 network layerLecture 3 network layer
Lecture 3 network layer
Ronoh Kennedy
 
ADDRESSING PADA TCP IP
ADDRESSING PADA TCP IPADDRESSING PADA TCP IP
ADDRESSING PADA TCP IP
Jennifer Daniel
 
IP Routing.pptx
IP Routing.pptxIP Routing.pptx
IP Routing.pptx
ssuser957b41
 
Tcp ip
Tcp ipTcp ip
Addressing in networking (IP,MAC,Port addressing)
Addressing in networking (IP,MAC,Port addressing)Addressing in networking (IP,MAC,Port addressing)
Addressing in networking (IP,MAC,Port addressing)
Geethu Jose
 
Chapter 4 internetworking [compatibility mode]
Chapter 4   internetworking [compatibility mode]Chapter 4   internetworking [compatibility mode]
Chapter 4 internetworking [compatibility mode]
Sĩ Anh Nguyễn
 
Routing of netwok protocls and how .pptx
Routing of netwok protocls and how .pptxRouting of netwok protocls and how .pptx
Routing of netwok protocls and how .pptx
sayidkhalif
 
КЛМ_Урок 5
КЛМ_Урок 5КЛМ_Урок 5
КЛМ_Урок 5
RaynaITSTEP
 
Internet Protocol.pdf
Internet Protocol.pdfInternet Protocol.pdf
Internet Protocol.pdf
BIT DURG
 
CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5
Irsandi Hasan
 
Computer network coe351- part3-final
Computer network coe351- part3-finalComputer network coe351- part3-final
Computer network coe351- part3-final
Taymoor Nazmy
 
NDC Chapter 1.pptx for all this is veriy importan pwor point for all students
NDC Chapter 1.pptx for all this is veriy importan pwor point for all studentsNDC Chapter 1.pptx for all this is veriy importan pwor point for all students
NDC Chapter 1.pptx for all this is veriy importan pwor point for all students
adisuadmasu42
 
NDC Chapter 1.pptx for all this is veriy importan pwor point for all students
NDC Chapter 1.pptx for all this is veriy importan pwor point for all studentsNDC Chapter 1.pptx for all this is veriy importan pwor point for all students
NDC Chapter 1.pptx for all this is veriy importan pwor point for all students
adisuadmasu42
 
Ccna v5-S1-Chapter 5
Ccna v5-S1-Chapter 5Ccna v5-S1-Chapter 5
Ccna v5-S1-Chapter 5
Hamza Malik
 
Ccna 4 Final 4 Version 4.0 Answers
Ccna 4 Final 4 Version 4.0 AnswersCcna 4 Final 4 Version 4.0 Answers
Ccna 4 Final 4 Version 4.0 Answers
CCNA4Answers
 

Similar to CCNA (R & S) Module 01 - Introduction to Networks - Chapter 5 (20)

Itn instructor ppt_chapter5_ethernet
Itn instructor ppt_chapter5_ethernetItn instructor ppt_chapter5_ethernet
Itn instructor ppt_chapter5_ethernet
 
CCNA_ITN_Chp5.pptx
CCNA_ITN_Chp5.pptxCCNA_ITN_Chp5.pptx
CCNA_ITN_Chp5.pptx
 
It nv51 instructor_ppt_ch5
It nv51 instructor_ppt_ch5It nv51 instructor_ppt_ch5
It nv51 instructor_ppt_ch5
 
CN L7 — копия.ppt
CN L7 — копия.pptCN L7 — копия.ppt
CN L7 — копия.ppt
 
Computer Networks IEEE 802.3 standard-2021.pptx
Computer Networks IEEE 802.3 standard-2021.pptxComputer Networks IEEE 802.3 standard-2021.pptx
Computer Networks IEEE 802.3 standard-2021.pptx
 
Lecture 3 network layer
Lecture 3 network layerLecture 3 network layer
Lecture 3 network layer
 
ADDRESSING PADA TCP IP
ADDRESSING PADA TCP IPADDRESSING PADA TCP IP
ADDRESSING PADA TCP IP
 
IP Routing.pptx
IP Routing.pptxIP Routing.pptx
IP Routing.pptx
 
Tcp ip
Tcp ipTcp ip
Tcp ip
 
Addressing in networking (IP,MAC,Port addressing)
Addressing in networking (IP,MAC,Port addressing)Addressing in networking (IP,MAC,Port addressing)
Addressing in networking (IP,MAC,Port addressing)
 
Chapter 4 internetworking [compatibility mode]
Chapter 4   internetworking [compatibility mode]Chapter 4   internetworking [compatibility mode]
Chapter 4 internetworking [compatibility mode]
 
Routing of netwok protocls and how .pptx
Routing of netwok protocls and how .pptxRouting of netwok protocls and how .pptx
Routing of netwok protocls and how .pptx
 
КЛМ_Урок 5
КЛМ_Урок 5КЛМ_Урок 5
КЛМ_Урок 5
 
Internet Protocol.pdf
Internet Protocol.pdfInternet Protocol.pdf
Internet Protocol.pdf
 
CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5
 
Computer network coe351- part3-final
Computer network coe351- part3-finalComputer network coe351- part3-final
Computer network coe351- part3-final
 
NDC Chapter 1.pptx for all this is veriy importan pwor point for all students
NDC Chapter 1.pptx for all this is veriy importan pwor point for all studentsNDC Chapter 1.pptx for all this is veriy importan pwor point for all students
NDC Chapter 1.pptx for all this is veriy importan pwor point for all students
 
NDC Chapter 1.pptx for all this is veriy importan pwor point for all students
NDC Chapter 1.pptx for all this is veriy importan pwor point for all studentsNDC Chapter 1.pptx for all this is veriy importan pwor point for all students
NDC Chapter 1.pptx for all this is veriy importan pwor point for all students
 
Ccna v5-S1-Chapter 5
Ccna v5-S1-Chapter 5Ccna v5-S1-Chapter 5
Ccna v5-S1-Chapter 5
 
Ccna 4 Final 4 Version 4.0 Answers
Ccna 4 Final 4 Version 4.0 AnswersCcna 4 Final 4 Version 4.0 Answers
Ccna 4 Final 4 Version 4.0 Answers
 

More from Waqas Ahmed Nawaz

CCNA (R & S) Module 04 - Scaling Networks - Chapter 7
CCNA (R & S) Module 04 - Scaling Networks - Chapter 7CCNA (R & S) Module 04 - Scaling Networks - Chapter 7
CCNA (R & S) Module 04 - Scaling Networks - Chapter 7
Waqas Ahmed Nawaz
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 6
CCNA (R & S) Module 04 - Scaling Networks - Chapter 6CCNA (R & S) Module 04 - Scaling Networks - Chapter 6
CCNA (R & S) Module 04 - Scaling Networks - Chapter 6
Waqas Ahmed Nawaz
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 5
CCNA (R & S) Module 04 - Scaling Networks - Chapter 5CCNA (R & S) Module 04 - Scaling Networks - Chapter 5
CCNA (R & S) Module 04 - Scaling Networks - Chapter 5
Waqas Ahmed Nawaz
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 2
CCNA (R & S) Module 04 - Scaling Networks - Chapter 2CCNA (R & S) Module 04 - Scaling Networks - Chapter 2
CCNA (R & S) Module 04 - Scaling Networks - Chapter 2
Waqas Ahmed Nawaz
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 1
CCNA (R & S) Module 04 - Scaling Networks - Chapter 1CCNA (R & S) Module 04 - Scaling Networks - Chapter 1
CCNA (R & S) Module 04 - Scaling Networks - Chapter 1
Waqas Ahmed Nawaz
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 8
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 8CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 8
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 8
Waqas Ahmed Nawaz
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 7
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 7CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 7
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 7
Waqas Ahmed Nawaz
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 6
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 6CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 6
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 6
Waqas Ahmed Nawaz
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 5
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 5CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 5
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 5
Waqas Ahmed Nawaz
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 4
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 4CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 4
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 4
Waqas Ahmed Nawaz
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 2
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 2CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 2
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 2
Waqas Ahmed Nawaz
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 8
CCNA (R & S) Module 02 - Connecting Networks - Chapter 8CCNA (R & S) Module 02 - Connecting Networks - Chapter 8
CCNA (R & S) Module 02 - Connecting Networks - Chapter 8
Waqas Ahmed Nawaz
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 7
CCNA (R & S) Module 02 - Connecting Networks - Chapter 7CCNA (R & S) Module 02 - Connecting Networks - Chapter 7
CCNA (R & S) Module 02 - Connecting Networks - Chapter 7
Waqas Ahmed Nawaz
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 6
CCNA (R & S) Module 02 - Connecting Networks - Chapter 6CCNA (R & S) Module 02 - Connecting Networks - Chapter 6
CCNA (R & S) Module 02 - Connecting Networks - Chapter 6
Waqas Ahmed Nawaz
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 4
CCNA (R & S) Module 02 - Connecting Networks - Chapter 4CCNA (R & S) Module 02 - Connecting Networks - Chapter 4
CCNA (R & S) Module 02 - Connecting Networks - Chapter 4
Waqas Ahmed Nawaz
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 1
CCNA (R & S) Module 02 - Connecting Networks - Chapter 1CCNA (R & S) Module 02 - Connecting Networks - Chapter 1
CCNA (R & S) Module 02 - Connecting Networks - Chapter 1
Waqas Ahmed Nawaz
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
Waqas Ahmed Nawaz
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
Waqas Ahmed Nawaz
 

More from Waqas Ahmed Nawaz (18)

CCNA (R & S) Module 04 - Scaling Networks - Chapter 7
CCNA (R & S) Module 04 - Scaling Networks - Chapter 7CCNA (R & S) Module 04 - Scaling Networks - Chapter 7
CCNA (R & S) Module 04 - Scaling Networks - Chapter 7
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 6
CCNA (R & S) Module 04 - Scaling Networks - Chapter 6CCNA (R & S) Module 04 - Scaling Networks - Chapter 6
CCNA (R & S) Module 04 - Scaling Networks - Chapter 6
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 5
CCNA (R & S) Module 04 - Scaling Networks - Chapter 5CCNA (R & S) Module 04 - Scaling Networks - Chapter 5
CCNA (R & S) Module 04 - Scaling Networks - Chapter 5
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 2
CCNA (R & S) Module 04 - Scaling Networks - Chapter 2CCNA (R & S) Module 04 - Scaling Networks - Chapter 2
CCNA (R & S) Module 04 - Scaling Networks - Chapter 2
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 1
CCNA (R & S) Module 04 - Scaling Networks - Chapter 1CCNA (R & S) Module 04 - Scaling Networks - Chapter 1
CCNA (R & S) Module 04 - Scaling Networks - Chapter 1
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 8
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 8CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 8
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 8
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 7
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 7CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 7
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 7
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 6
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 6CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 6
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 6
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 5
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 5CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 5
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 5
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 4
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 4CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 4
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 4
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 2
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 2CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 2
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 2
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 8
CCNA (R & S) Module 02 - Connecting Networks - Chapter 8CCNA (R & S) Module 02 - Connecting Networks - Chapter 8
CCNA (R & S) Module 02 - Connecting Networks - Chapter 8
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 7
CCNA (R & S) Module 02 - Connecting Networks - Chapter 7CCNA (R & S) Module 02 - Connecting Networks - Chapter 7
CCNA (R & S) Module 02 - Connecting Networks - Chapter 7
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 6
CCNA (R & S) Module 02 - Connecting Networks - Chapter 6CCNA (R & S) Module 02 - Connecting Networks - Chapter 6
CCNA (R & S) Module 02 - Connecting Networks - Chapter 6
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 4
CCNA (R & S) Module 02 - Connecting Networks - Chapter 4CCNA (R & S) Module 02 - Connecting Networks - Chapter 4
CCNA (R & S) Module 02 - Connecting Networks - Chapter 4
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 1
CCNA (R & S) Module 02 - Connecting Networks - Chapter 1CCNA (R & S) Module 02 - Connecting Networks - Chapter 1
CCNA (R & S) Module 02 - Connecting Networks - Chapter 1
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
 

Recently uploaded

Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
saastr
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 

Recently uploaded (20)

Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
Artificial Intelligence and Electronic Warfare
Artificial Intelligence and Electronic WarfareArtificial Intelligence and Electronic Warfare
Artificial Intelligence and Electronic Warfare
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 

CCNA (R & S) Module 01 - Introduction to Networks - Chapter 5

  • 1. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1 Instructor Materials Chapter 5: Ethernet CCNA Routing and Switching Introduction to Networks v6.0
  • 2. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 13 Chapter 5: Ethernet Introduction to Networks v6.0
  • 3. Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 5 - Sections & Objectives 5.1 Ethernet Protocol • Explain how the Ethernet sublayers are related to the frame fields. • Describe the Ethernet MAC address. 5.2 LAN Switches • Explain how a switch operates. • Explain how a switch builds its MAC address table and forwards frames. • Describe switch forwarding methods. • Describe the types of port settings available for Layer 2 switches. 5.3 Address Resolution Protocol • Compare the roles of the MAC address and the IP address. • Describe the purpose of ARP. • Explain how ARP requests impact network and host performance.
  • 4. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 15 5.1 Ethernet Protocol
  • 5. Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Ethernet Protocol Ethernet Frame  Ethernet Encapsulation • Ethernet operates in the data link layer and the physical layer. • Ethernet supports data bandwidths from 10Mbps through 100Gbps. • Ethernet standards define both the Layer 2 protocols and the Layer 1 technologies.  MAC Sublayer • MAC constitutes the lower sublayer of the data link layer. • Responsible for Data encapsulation and Media access control.  Ethernet Evolution • Ethernet has been evolving since its creation in 1973. • The Ethernet frame structure adds headers and trailers around the Layer 3 PDU to encapsulate the message being sent.  Ethernet Frame Fields • The minimum Ethernet frame size is 64 bytes and the maximum is 1518 bytes. • Frame smaller than the minimum or greater than the maximum are dropped. • Dropped frames are likely to be the result of collisions or other unwanted signals and are therefore considered invalid.
  • 6. Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Ethernet Protocol Ethernet Frame (Cont.)
  • 7. Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Ethernet Protocol Ethernet MAC Addresses  MAC Addresses and Hexadecimal • MAC address is 48-bit long and expressed as 12 hexadecimal digits.  MAC Addresses: Ethernet Identity • IEEE requires a vendor to follow two simple rules: 1. Must use that vendor's assigned OUI as the first three bytes. 2. All MAC addresses with the same OUI must be assigned a unique value in the last three bytes.  Frame Processing • The NIC compares the destination MAC address in the frame with the device’s physical MAC address stored in RAM. • If there is a match, the framed is passed up the OSI layers. • If there is no match, the device discards the frame.  MAC Address Representations • MAC addresses can be represented with colons, dashes or dots and are case-insensitive. • 00-60-2F-3A-07-BC, 00:60:2F:3A:07:BC, 0060.2F3A.07BC and 00-60-2f-3a-07-bc are all valid representations of the same MAC address.
  • 8. Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Ethernet Protocol Ethernet MAC Addresses (Cont.)  Unicast MAC Address • Unique address used when a frame is sent from a single transmitting device to a single destination device. • The source MAC address must always be a unicast.  Broadcast MAC Address • Used to address all nodes in the segment. • The destination MAC address is the address of FF-FF-FF-FF-FF-FF in hexadecimal (48 ones in binary).  Multicast MAC Address • Used to address a group of nodes in the segment. • The multicast MAC address is a special value that begins with 01-00-5E in hexadecimal. • The remaining portion of the multicast MAC address is created by converting the lower 23 bits of the IP multicast group address into 6 hexadecimal characters.
  • 9. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 20 5.2 LAN Switches
  • 10. Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential LAN Switches The MAC Address Table  Switch Fundamentals • An Ethernet Switch is a Layer 2 device. • It uses MAC addresses to make forwarding decisions. • The MAC address table is sometimes referred to as a content addressable memory (CAM) table.  Learning MAC Addresses • Switches dynamically build the CAM by monitoring source MACs. • Every frame that enters a switch is checked for new addresses. • The frame is forwarded based on the CAM.  Filtering Frames • Since the switch knows where to find a specific MAC address, it can filter the frames to that port only. • Filtering is not done is the destination MAC is not present in the CAM.
  • 11. Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential LAN Switches Switch Forwarding Methods  Frame Forwarding Methods on Cisco Switches • Store-And-Forward • Cut-Through  Cut-Through Switching • Fast-forward switching • Lowest level of latency immediately forwards a packet after reading the destination address. • Typical cut-through method of switching. • Fragment-free switching • Switch stores the first 64 bytes of the frame before forwarding. • Most network errors and collisions occur during the first 64 bytes.  Memory Buffering on Switches • Port-based memory • Share memory
  • 12. Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential LAN Switches Switch Port Settings  Duplex and Speed Settings • Full-duplex – Both ends of the connection can send and receive simultaneously. • Half-duplex – Only one end of the connection can send at a time. • A common cause of performance issues on Ethernet links is when one port on the link operates at half- duplex and the other on full-duplex.  Auto-MDX • Detects the type of connection required and configures the interface accordingly. • Helps reducing configuration errors.
  • 13. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 24 5.3 Address Resolution Protocol
  • 14. Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Address Resolution Protocol MAC and IP  The combination of MAC and IP facilitate the End-to-End communication.  Layer 2 addresses are used to move the frame within the local network  Layer 3 addresses are used to move the packets through remote networks.  Destination on Same Network • Physical address (MAC address) is used for Ethernet NIC to Ethernet NIC communications on the same network.  Destination on Remote Network • Logical address (IP address) is used to send the packet from the original source to the final destination.
  • 15. Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Address Resolution Protocol ARP  Introduction to ARP • ARP allows the source to request the MAC address of the destination. • The request is based upon the layer 3 address of the destination (known by the source).  ARP Functions • Resolving IPv4 addresses to MAC addresses • Maintaining a table of mappings • ARP uses ARP Request and ARP Reply to perform its functions.  Removing Entries from an ARP Table • Entries are removed from the device’s ARP table when its cache timer expires. • Cache timers are OS dependent. • ARP entries can be manually removed via commands.  ARP Tables • On IOS: show ip arp • On Windows PCs: arp -a
  • 16. Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Address Resolution Protocol ARP Issues  ARP Broadcasts • ARP requests can flood the local segment.  ARP Spoofing • Attackers can respond to requests and pretend to be providers of services. Example: default gateway
  • 17. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 28 5.4 Chapter Summary
  • 18. Presentation_ID 29© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential  Explain the operation of Ethernet.  Explain how a switch operates.  Explain how the address resolution protocol enables communication on a network. Chapter Summary Summary
  • 19. Presentation_ID 33© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 20. Presentation_ID 34© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential