SlideShare a Scribd company logo
The Ethernet Packet 802.3 Destination  Address Source Address Type Data Field CRC - 32 Breaking Down the Packet
The Ethernet Packet 802.3 Destination  Address Source Address Type Data Field CRC - 32 Breaking Down the Packet 02 60 8C   01 02 04 Card Vendor Node ID 3COM 02 60 8C 01 02 04 The Node that  will receive  the  packet
The Ethernet Packet 802.3 Destination  Address Source Address Type Data Field CRC - 32 Breaking Down the Packet 02 60 8C   04 05 06 Card Vendor Node ID 3COM 02 60 8C 01 02 04 The Node that  is transmitting  the  packet 02 60 8C 04 05 06
The Ethernet Packet 802.3 Destination  Address Source Address Type Data Field CRC - 32 Breaking Down the Packet 08 00 02 60 8C 01 02 04 ID of Protocol (TCP/IP) 02 60 8C 04 05 06 08 00
The Ethernet Packet 802.3 Destination  Address Source Address Type Data Field CRC - 32 Breaking Down the Packet The Data Field is an area that contains both the header  and the user data 02 60 8C 01 02 04 The first 30 bytes of the IPX Structure is referred to as the header 02 60 8C 04 05 06 08 00
The IPX Data Field User Data 546 Bytes Header = 30 Bytes Checksum (2 BYTES) Length (2 BYTES) Transport Control  (1 BYTE) Packet Type = 1  (1 BYTE) Destination Network  (4 BYTES) Destination Node  (6 BYTES) Destination Socket = 0453  (2 BYTES) Source Network  (4 BYTES) Source Node   (6 BYTES) Source Socket  (2 BYTES)
The Ethernet Packet 802.3 Breaking Down the Packet Checksum (2 BYTES) The  checksum  contains 16 bits which check the integrity of the packet  If the feature is disabled, the contents will read FFFF Destination  Address Source Address Type Data Field CRC - 32 02 60 8C 01 02 04 02 60 8C 04 05 06 08 00
The Ethernet Packet 802.3 Breaking Down the Packet Checksum (2 BYTES) Length (2 BYTES) The  length Min 30 Bytes Max 576 - 30 bytes Note:  With LAN communication the number may be as high as the transmission medium allows. 1500 - Ethernet 1496 - 802.3 4472 - 4 Mbs Token Ring Destination  Address Source Address Type Data Field CRC - 32 02 60 8C 01 02 04 02 60 8C 04 05 06 08 00
The Ethernet Packet 802.3 Breaking Down the Packet Checksum (2 BYTES) Length (2 BYTES) Transport Control  (1 BYTE) The  Transport Control  Initially set to 0 Provides the maximum number of hops Note: As the data traverses through the network the number of hops from router to router is counted. If the number goes higher than 15 the packet is discarded  Destination  Address Source Address Type Data Field CRC - 32 02 60 8C 01 02 04 02 60 8C 04 05 06 08 00
The Ethernet Packet 802.3 Breaking Down the Packet Checksum (2 BYTES) Length (2 BYTES) Transport Control  (1 BYTE) Packet Type = 1  (1 BYTE) The  Packet Type Provides a description about the data within the data field Destination  Address Source Address Type Data Field CRC - 32 02 60 8C 01 02 04 02 60 8C 04 05 06 08 00
The Ethernet Packet 802.3 Breaking Down the Packet Checksum (2 BYTES) Length (2 BYTES) Transport Control  (1 BYTE) Packet Type = 1  (1 BYTE) Destination Network  (4 BYTES) The  length Min 30 Bytes Max 576 - 30 bytes Destination  Address Source Address Type Data Field CRC - 32 02 60 8C 01 02 04 02 60 8C 04 05 06 08 00
The Ethernet Packet 802.3 Breaking Down the Packet Checksum (2 BYTES) Length (2 BYTES) Transport Control  (1 BYTE) Packet Type = 1  (1 BYTE) Destination Network  (4 BYTES) Destination Node  (6 BYTES) The  length Min 30 Bytes Max 576 - 30 bytes Destination  Address Source Address Type Data Field CRC - 32 02 60 8C 01 02 04 02 60 8C 04 05 06 08 00
The Ethernet Packet 802.3 Breaking Down the Packet Checksum (2 BYTES) Length (2 BYTES) Transport Control  (1 BYTE) Packet Type = 1  (1 BYTE) Destination Network  (4 BYTES) Destination Node  (6 BYTES) Destination Socket = 0453  (2 BYTES) The  length Min 30 Bytes Max 576 - 30 bytes Destination  Address Source Address Type Data Field CRC - 32 02 60 8C 01 02 04 02 60 8C 04 05 06 08 00
The Ethernet Packet 802.3 Breaking Down the Packet Checksum (2 BYTES) Length (2 BYTES) Transport Control  (1 BYTE) Packet Type = 1  (1 BYTE) Destination Network  (4 BYTES) Destination Node  (6 BYTES) Destination Socket = 0453  (2 BYTES) Source Network  (4 BYTES) The  length Min 30 Bytes Max 576 - 30 bytes Destination  Address Source Address Type Data Field CRC - 32 02 60 8C 01 02 04 02 60 8C 04 05 06 08 00
The Ethernet Packet 802.3 Breaking Down the Packet Checksum (2 BYTES) Length (2 BYTES) Transport Control  (1 BYTE) Packet Type = 1  (1 BYTE) Destination Network  (4 BYTES) Destination Node  (6 BYTES) Destination Socket = 0453  (2 BYTES) Source Network  (4 BYTES) Source Node   (6 BYTES) The  length Min 30 Bytes Max 576 - 30 bytes Destination  Address Source Address Type Data Field CRC - 32 02 60 8C 01 02 04 02 60 8C 04 05 06 08 00
The Ethernet Packet 802.3 Breaking Down the Packet The  length Min 30 Bytes Max 576 - 30 bytes Destination  Address Source Address Type Data Field CRC - 32 02 60 8C 01 02 04 02 60 8C 04 05 06 08 00 Checksum (2 BYTES) Length (2 BYTES) Transport Control  (1 BYTE) Packet Type = 1  (1 BYTE) Destination Network  (4 BYTES) Destination Node  (6 BYTES) Destination Socket = 0453  (2 BYTES) Source Network  (4 BYTES) Source Node   (6 BYTES) Source Socket  (2 BYTES)
The Ethernet Packet 802.3 Destination  Address Source Address Type Data Field CRC - 32
The Ethernet Packet 802.3 Destination  Address Source Address Type Data Field CRC - 32 The address of the immediate recipient of the message
The Ethernet Packet 802.3 Destination  Address Source Address Type Data Field CRC - 32 The address of the sender of the packet
The Ethernet Packet 802.3 Destination  Address Source Address Type Data Field CRC - 32 The type of data within the packet TCP/IP, Apple Talk, XNS etc.
The Ethernet Packet 802.3 Destination  Address Source Address Type Data Field CRC - 32 Contains the upper layer of software headers and the user data
The Ethernet Packet 802.3 Destination  Address Source Address Type Data Field CRC - 32 Contains the CRC so packet integrity can be analyzed by the algorithm
Ethernet CSMA/CD Carrier Sense Multiple Access With Collision Detection
Ethernet Mediums Thick Net = 10BASE5 Thin Net = 10Base2 UTP = 10 BASE T
Ethernet Mediums Wiring Categories for UTP = Unshielded Twisted Pair Category 3 up to 10 Mbps Category 4 up to 20 Mbps Category 5 up to 100 Mbps UTP = 10 BASE T
Ethernet WS-B WS-A Both stations listen for the carrier. After detecting that the line is clear:
Ethernet Collision Both Packets A&B try to contend for the line  at the same time resulting in: WS-B WS-A A B
The Seven Layer OSI Application Presentation Session Transport Network Data Physical
The Seven Layer OSI Application Presentation Session Transport Network Data Physical Protocol describing the transmission method over the physical media Ethernet over 10BaseT
The Seven Layer OSI Application Presentation Session Transport Network Data Physical Construction and Reconstruction of the Packet
The Seven Layer OSI Application Presentation Session Transport Network Data Physical Finds the most efficient route SPX/IPX & TCP/IP
The Seven Layer OSI Application Presentation Session Transport Network Data Physical Performs Error Checking
The Seven Layer OSI Application Presentation Session Transport Network Data Physical Establishes the logical communication between two nodes on the network
The Seven Layer OSI Application Presentation Session Transport Network Data Physical Reformats, Decodes or Compresses the information for presentation to the Session or Application Layer
The Seven Layer OSI Application Presentation Session Transport Network Data Physical Communication and interface to the network segment of the Application Program Excel, Word, Etc.
Workstation 1 Workstation 2 T S P A N D T S P A N D Cable Physical T S P A N D Datalink T S P A N Network T S P A Transport S P A Session P A Presentation A Application T S P A N D Cable Physical T S P A N D Datalink T S P A N Network T S P A Transport S P A Session P A Presentation A Application T S P A N D
Bridges The function of a bridge is to join two networks and pass only packets that belong on a specific network. In other words the bridge acts a packet Filtering device. A B
[object Object],[object Object],[object Object],The Bridge  blocks  the  Packet from going on the opposite Network The  Blue Network The Yellow Network
[object Object],[object Object],[object Object],The Bridge  passes  the  Packet to the destination PC on the opposite Network The Yellow Network The  Blue Network
Facts About Bridges ,[object Object],[object Object],[object Object],[object Object]
Token Ring
Token Ring   The packet circulates around the ring until it finds its destination station The Information is placed in the packet and sent from the originating to the destination station  Station 1 Station 2 Station 3 Station 4

More Related Content

What's hot

Ethernet frame format
Ethernet frame formatEthernet frame format
Ethernet frame formatmyrajendra
 
Ethernet
EthernetEthernet
Ethernet
Mihika Shah
 
Ethernet protocol
Ethernet protocolEthernet protocol
Ethernet protocol
Tom Chou
 
IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11
Keshav Maheshwari
 
Local Area Network – Wired LAN
Local Area Network – Wired LANLocal Area Network – Wired LAN
Local Area Network – Wired LAN
Raj vardhan
 
Ethernet and token ring
Ethernet and token ringEthernet and token ring
Ethernet and token ringAbhijeet Shah
 
5 IEEE standards
5  IEEE standards5  IEEE standards
5 IEEE standards
Rodgers Moonde
 
Ethernet Computer network
Ethernet Computer networkEthernet Computer network
Ethernet Computer network
miteshppt
 
Ethernet - LAN
Ethernet - LANEthernet - LAN
Ethernet - LAN
Adeel Rasheed
 
Communication standards ieee 802 3
Communication standards ieee 802 3Communication standards ieee 802 3
Communication standards ieee 802 3
thanhtrung_ys
 
Network Topologies
Network TopologiesNetwork Topologies
Network TopologiesJason Hando
 
Physical Layer of ISO-OSI model and Devices
Physical Layer of ISO-OSI model and DevicesPhysical Layer of ISO-OSI model and Devices
Physical Layer of ISO-OSI model and Devices
Shahid Khan
 
Ethernet,token ring
Ethernet,token ring Ethernet,token ring
Ethernet,token ring
Hareem Naz
 
Gigabit Ethernet
Gigabit EthernetGigabit Ethernet
Gigabit EthernetManasa K
 
Ad hoc and wsn
Ad hoc and wsnAd hoc and wsn
Ad hoc and wsn
GOWTHAMMS6
 
Topologies
TopologiesTopologies
Topologies
Ahmed Elnaggar
 

What's hot (20)

Ethernet frame format
Ethernet frame formatEthernet frame format
Ethernet frame format
 
Ethernet
EthernetEthernet
Ethernet
 
Ethernet protocol
Ethernet protocolEthernet protocol
Ethernet protocol
 
IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11
 
Chapter9
Chapter9Chapter9
Chapter9
 
Ethernet
EthernetEthernet
Ethernet
 
Local Area Network – Wired LAN
Local Area Network – Wired LANLocal Area Network – Wired LAN
Local Area Network – Wired LAN
 
Ethernet and token ring
Ethernet and token ringEthernet and token ring
Ethernet and token ring
 
5 IEEE standards
5  IEEE standards5  IEEE standards
5 IEEE standards
 
IEEE Standards
IEEE StandardsIEEE Standards
IEEE Standards
 
Ethernet Computer network
Ethernet Computer networkEthernet Computer network
Ethernet Computer network
 
Ethernet - LAN
Ethernet - LANEthernet - LAN
Ethernet - LAN
 
Communication standards ieee 802 3
Communication standards ieee 802 3Communication standards ieee 802 3
Communication standards ieee 802 3
 
Ethernet Frames Explained
Ethernet Frames ExplainedEthernet Frames Explained
Ethernet Frames Explained
 
Network Topologies
Network TopologiesNetwork Topologies
Network Topologies
 
Physical Layer of ISO-OSI model and Devices
Physical Layer of ISO-OSI model and DevicesPhysical Layer of ISO-OSI model and Devices
Physical Layer of ISO-OSI model and Devices
 
Ethernet,token ring
Ethernet,token ring Ethernet,token ring
Ethernet,token ring
 
Gigabit Ethernet
Gigabit EthernetGigabit Ethernet
Gigabit Ethernet
 
Ad hoc and wsn
Ad hoc and wsnAd hoc and wsn
Ad hoc and wsn
 
Topologies
TopologiesTopologies
Topologies
 

Viewers also liked

Sonet And Fddi 03 Format
Sonet And Fddi 03 FormatSonet And Fddi 03 Format
Sonet And Fddi 03 Formatanishgoel
 
Network switching
Network switchingNetwork switching
Network switching
PREMAL GAJJAR
 
Sonet (synchronous optical networking )
Sonet (synchronous optical networking )Sonet (synchronous optical networking )
Sonet (synchronous optical networking )
Hamza Sajjad
 
17 SONET/SDH
17 SONET/SDH17 SONET/SDH
17 SONET/SDH
Ahmar Hashmi
 
Sonet
Sonet Sonet
Sonet
kongara
 
Sonet
SonetSonet
Sonet
rohit25786
 
Token bus
Token busToken bus
Token bus
Denver Rockfreak
 
He thong truyen dan PDH va SDH
He thong truyen dan PDH va SDHHe thong truyen dan PDH va SDH
He thong truyen dan PDH va SDH
Đinh Công Thiện Taydo University
 
10 Slides to Sonet
10 Slides to Sonet10 Slides to Sonet
10 Slides to Sonet
seanraz
 
Chapter 4 - Digital Transmission
Chapter 4 - Digital TransmissionChapter 4 - Digital Transmission
Chapter 4 - Digital Transmission
Wayne Jones Jnr
 
Sonet Sdh Dwdm
Sonet Sdh DwdmSonet Sdh Dwdm
Sonet Sdh Dwdmdeven l
 
SDH/SONET alarms & performance monitoring
SDH/SONET alarms & performance monitoringSDH/SONET alarms & performance monitoring
SDH/SONET alarms & performance monitoring
MapYourTech
 

Viewers also liked (13)

Sonet And Fddi 03 Format
Sonet And Fddi 03 FormatSonet And Fddi 03 Format
Sonet And Fddi 03 Format
 
Network switching
Network switchingNetwork switching
Network switching
 
Sonet (synchronous optical networking )
Sonet (synchronous optical networking )Sonet (synchronous optical networking )
Sonet (synchronous optical networking )
 
17 SONET/SDH
17 SONET/SDH17 SONET/SDH
17 SONET/SDH
 
Sonet
Sonet Sonet
Sonet
 
Sonet
SonetSonet
Sonet
 
Token bus
Token busToken bus
Token bus
 
He thong truyen dan PDH va SDH
He thong truyen dan PDH va SDHHe thong truyen dan PDH va SDH
He thong truyen dan PDH va SDH
 
10 Slides to Sonet
10 Slides to Sonet10 Slides to Sonet
10 Slides to Sonet
 
Ipv4
Ipv4Ipv4
Ipv4
 
Chapter 4 - Digital Transmission
Chapter 4 - Digital TransmissionChapter 4 - Digital Transmission
Chapter 4 - Digital Transmission
 
Sonet Sdh Dwdm
Sonet Sdh DwdmSonet Sdh Dwdm
Sonet Sdh Dwdm
 
SDH/SONET alarms & performance monitoring
SDH/SONET alarms & performance monitoringSDH/SONET alarms & performance monitoring
SDH/SONET alarms & performance monitoring
 

Similar to Networking Ethernet

TCP vs UDP in OSI model Computer Network
TCP vs UDP in OSI model  Computer NetworkTCP vs UDP in OSI model  Computer Network
TCP vs UDP in OSI model Computer Network
SwarajSonavane
 
Bridging.ppt
Bridging.pptBridging.ppt
group11_DNAA:protocol stack and addressing
group11_DNAA:protocol stack and addressinggroup11_DNAA:protocol stack and addressing
group11_DNAA:protocol stack and addressingAnitha Selvan
 
Chapter 01 - Overview
Chapter 01 - OverviewChapter 01 - Overview
Chapter 01 - Overviewphanleson
 
Networks A2
Networks  A2Networks  A2
Networks A2
aeneas
 
Networking basics
Networking basicsNetworking basics
Networking basics
Sridhar Baithi
 
Exploration network chapter_5_modified
Exploration network chapter_5_modifiedExploration network chapter_5_modified
Exploration network chapter_5_modifiedrajesh531
 
Ethernet and switches
Ethernet and switchesEthernet and switches
Ethernet and switches
Bhavik Vashi
 
Networking Basics
Networking BasicsNetworking Basics
Networking Basics
SMC Networks Europe
 
How Computer network Works?
How Computer network Works?How Computer network Works?
How Computer network Works?
priyavanimurugarajan
 
Data communication part2
Data communication part2Data communication part2
Data communication part2
Melvin Cabatuan
 
Unit 4 - Network Layer
Unit 4 - Network LayerUnit 4 - Network Layer
Unit 4 - Network Layer
Chandan Gupta Bhagat
 
Bluetooth mobileip
Bluetooth mobileipBluetooth mobileip
Bluetooth mobileip
VIKAS SINGH BHADOURIA
 
Networking interview questions and answers
Networking interview questions and answersNetworking interview questions and answers
Networking interview questions and answers
Amit Tiwari
 
lec 3 4 Core Delays Thruput Net Arch.ppt
lec 3 4 Core Delays Thruput Net Arch.pptlec 3 4 Core Delays Thruput Net Arch.ppt
lec 3 4 Core Delays Thruput Net Arch.ppt
MahamKhurram4
 
12 ethernet-wifi
12 ethernet-wifi12 ethernet-wifi
12 ethernet-wifi
Olivier Bonaventure
 
Internetworking Overview
Internetworking OverviewInternetworking Overview
Internetworking Overview
scooby_doo
 
Transport Layer in Computer Networks (TCP / UDP / SCTP)
Transport Layer in Computer Networks (TCP / UDP / SCTP)Transport Layer in Computer Networks (TCP / UDP / SCTP)
Transport Layer in Computer Networks (TCP / UDP / SCTP)
Hamidreza Bolhasani
 

Similar to Networking Ethernet (20)

TCP vs UDP in OSI model Computer Network
TCP vs UDP in OSI model  Computer NetworkTCP vs UDP in OSI model  Computer Network
TCP vs UDP in OSI model Computer Network
 
Bridging.ppt
Bridging.pptBridging.ppt
Bridging.ppt
 
group11_DNAA:protocol stack and addressing
group11_DNAA:protocol stack and addressinggroup11_DNAA:protocol stack and addressing
group11_DNAA:protocol stack and addressing
 
Chapter 01 - Overview
Chapter 01 - OverviewChapter 01 - Overview
Chapter 01 - Overview
 
Networks A2
Networks  A2Networks  A2
Networks A2
 
Networking basics
Networking basicsNetworking basics
Networking basics
 
Exploration network chapter_5_modified
Exploration network chapter_5_modifiedExploration network chapter_5_modified
Exploration network chapter_5_modified
 
Ethernet and switches
Ethernet and switchesEthernet and switches
Ethernet and switches
 
Lec9
Lec9Lec9
Lec9
 
Networking Basics
Networking BasicsNetworking Basics
Networking Basics
 
How Computer network Works?
How Computer network Works?How Computer network Works?
How Computer network Works?
 
Data communication part2
Data communication part2Data communication part2
Data communication part2
 
Unit 4 - Network Layer
Unit 4 - Network LayerUnit 4 - Network Layer
Unit 4 - Network Layer
 
Bluetooth mobileip
Bluetooth mobileipBluetooth mobileip
Bluetooth mobileip
 
Networking interview questions and answers
Networking interview questions and answersNetworking interview questions and answers
Networking interview questions and answers
 
lec 3 4 Core Delays Thruput Net Arch.ppt
lec 3 4 Core Delays Thruput Net Arch.pptlec 3 4 Core Delays Thruput Net Arch.ppt
lec 3 4 Core Delays Thruput Net Arch.ppt
 
Intro to Ethernet
Intro to EthernetIntro to Ethernet
Intro to Ethernet
 
12 ethernet-wifi
12 ethernet-wifi12 ethernet-wifi
12 ethernet-wifi
 
Internetworking Overview
Internetworking OverviewInternetworking Overview
Internetworking Overview
 
Transport Layer in Computer Networks (TCP / UDP / SCTP)
Transport Layer in Computer Networks (TCP / UDP / SCTP)Transport Layer in Computer Networks (TCP / UDP / SCTP)
Transport Layer in Computer Networks (TCP / UDP / SCTP)
 

Recently uploaded

Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
Krisztián Száraz
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 

Recently uploaded (20)

Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 

Networking Ethernet

  • 1. The Ethernet Packet 802.3 Destination Address Source Address Type Data Field CRC - 32 Breaking Down the Packet
  • 2. The Ethernet Packet 802.3 Destination Address Source Address Type Data Field CRC - 32 Breaking Down the Packet 02 60 8C 01 02 04 Card Vendor Node ID 3COM 02 60 8C 01 02 04 The Node that will receive the packet
  • 3. The Ethernet Packet 802.3 Destination Address Source Address Type Data Field CRC - 32 Breaking Down the Packet 02 60 8C 04 05 06 Card Vendor Node ID 3COM 02 60 8C 01 02 04 The Node that is transmitting the packet 02 60 8C 04 05 06
  • 4. The Ethernet Packet 802.3 Destination Address Source Address Type Data Field CRC - 32 Breaking Down the Packet 08 00 02 60 8C 01 02 04 ID of Protocol (TCP/IP) 02 60 8C 04 05 06 08 00
  • 5. The Ethernet Packet 802.3 Destination Address Source Address Type Data Field CRC - 32 Breaking Down the Packet The Data Field is an area that contains both the header and the user data 02 60 8C 01 02 04 The first 30 bytes of the IPX Structure is referred to as the header 02 60 8C 04 05 06 08 00
  • 6. The IPX Data Field User Data 546 Bytes Header = 30 Bytes Checksum (2 BYTES) Length (2 BYTES) Transport Control (1 BYTE) Packet Type = 1 (1 BYTE) Destination Network (4 BYTES) Destination Node (6 BYTES) Destination Socket = 0453 (2 BYTES) Source Network (4 BYTES) Source Node (6 BYTES) Source Socket (2 BYTES)
  • 7. The Ethernet Packet 802.3 Breaking Down the Packet Checksum (2 BYTES) The checksum contains 16 bits which check the integrity of the packet If the feature is disabled, the contents will read FFFF Destination Address Source Address Type Data Field CRC - 32 02 60 8C 01 02 04 02 60 8C 04 05 06 08 00
  • 8. The Ethernet Packet 802.3 Breaking Down the Packet Checksum (2 BYTES) Length (2 BYTES) The length Min 30 Bytes Max 576 - 30 bytes Note: With LAN communication the number may be as high as the transmission medium allows. 1500 - Ethernet 1496 - 802.3 4472 - 4 Mbs Token Ring Destination Address Source Address Type Data Field CRC - 32 02 60 8C 01 02 04 02 60 8C 04 05 06 08 00
  • 9. The Ethernet Packet 802.3 Breaking Down the Packet Checksum (2 BYTES) Length (2 BYTES) Transport Control (1 BYTE) The Transport Control Initially set to 0 Provides the maximum number of hops Note: As the data traverses through the network the number of hops from router to router is counted. If the number goes higher than 15 the packet is discarded Destination Address Source Address Type Data Field CRC - 32 02 60 8C 01 02 04 02 60 8C 04 05 06 08 00
  • 10. The Ethernet Packet 802.3 Breaking Down the Packet Checksum (2 BYTES) Length (2 BYTES) Transport Control (1 BYTE) Packet Type = 1 (1 BYTE) The Packet Type Provides a description about the data within the data field Destination Address Source Address Type Data Field CRC - 32 02 60 8C 01 02 04 02 60 8C 04 05 06 08 00
  • 11. The Ethernet Packet 802.3 Breaking Down the Packet Checksum (2 BYTES) Length (2 BYTES) Transport Control (1 BYTE) Packet Type = 1 (1 BYTE) Destination Network (4 BYTES) The length Min 30 Bytes Max 576 - 30 bytes Destination Address Source Address Type Data Field CRC - 32 02 60 8C 01 02 04 02 60 8C 04 05 06 08 00
  • 12. The Ethernet Packet 802.3 Breaking Down the Packet Checksum (2 BYTES) Length (2 BYTES) Transport Control (1 BYTE) Packet Type = 1 (1 BYTE) Destination Network (4 BYTES) Destination Node (6 BYTES) The length Min 30 Bytes Max 576 - 30 bytes Destination Address Source Address Type Data Field CRC - 32 02 60 8C 01 02 04 02 60 8C 04 05 06 08 00
  • 13. The Ethernet Packet 802.3 Breaking Down the Packet Checksum (2 BYTES) Length (2 BYTES) Transport Control (1 BYTE) Packet Type = 1 (1 BYTE) Destination Network (4 BYTES) Destination Node (6 BYTES) Destination Socket = 0453 (2 BYTES) The length Min 30 Bytes Max 576 - 30 bytes Destination Address Source Address Type Data Field CRC - 32 02 60 8C 01 02 04 02 60 8C 04 05 06 08 00
  • 14. The Ethernet Packet 802.3 Breaking Down the Packet Checksum (2 BYTES) Length (2 BYTES) Transport Control (1 BYTE) Packet Type = 1 (1 BYTE) Destination Network (4 BYTES) Destination Node (6 BYTES) Destination Socket = 0453 (2 BYTES) Source Network (4 BYTES) The length Min 30 Bytes Max 576 - 30 bytes Destination Address Source Address Type Data Field CRC - 32 02 60 8C 01 02 04 02 60 8C 04 05 06 08 00
  • 15. The Ethernet Packet 802.3 Breaking Down the Packet Checksum (2 BYTES) Length (2 BYTES) Transport Control (1 BYTE) Packet Type = 1 (1 BYTE) Destination Network (4 BYTES) Destination Node (6 BYTES) Destination Socket = 0453 (2 BYTES) Source Network (4 BYTES) Source Node (6 BYTES) The length Min 30 Bytes Max 576 - 30 bytes Destination Address Source Address Type Data Field CRC - 32 02 60 8C 01 02 04 02 60 8C 04 05 06 08 00
  • 16. The Ethernet Packet 802.3 Breaking Down the Packet The length Min 30 Bytes Max 576 - 30 bytes Destination Address Source Address Type Data Field CRC - 32 02 60 8C 01 02 04 02 60 8C 04 05 06 08 00 Checksum (2 BYTES) Length (2 BYTES) Transport Control (1 BYTE) Packet Type = 1 (1 BYTE) Destination Network (4 BYTES) Destination Node (6 BYTES) Destination Socket = 0453 (2 BYTES) Source Network (4 BYTES) Source Node (6 BYTES) Source Socket (2 BYTES)
  • 17. The Ethernet Packet 802.3 Destination Address Source Address Type Data Field CRC - 32
  • 18. The Ethernet Packet 802.3 Destination Address Source Address Type Data Field CRC - 32 The address of the immediate recipient of the message
  • 19. The Ethernet Packet 802.3 Destination Address Source Address Type Data Field CRC - 32 The address of the sender of the packet
  • 20. The Ethernet Packet 802.3 Destination Address Source Address Type Data Field CRC - 32 The type of data within the packet TCP/IP, Apple Talk, XNS etc.
  • 21. The Ethernet Packet 802.3 Destination Address Source Address Type Data Field CRC - 32 Contains the upper layer of software headers and the user data
  • 22. The Ethernet Packet 802.3 Destination Address Source Address Type Data Field CRC - 32 Contains the CRC so packet integrity can be analyzed by the algorithm
  • 23. Ethernet CSMA/CD Carrier Sense Multiple Access With Collision Detection
  • 24. Ethernet Mediums Thick Net = 10BASE5 Thin Net = 10Base2 UTP = 10 BASE T
  • 25. Ethernet Mediums Wiring Categories for UTP = Unshielded Twisted Pair Category 3 up to 10 Mbps Category 4 up to 20 Mbps Category 5 up to 100 Mbps UTP = 10 BASE T
  • 26. Ethernet WS-B WS-A Both stations listen for the carrier. After detecting that the line is clear:
  • 27. Ethernet Collision Both Packets A&B try to contend for the line at the same time resulting in: WS-B WS-A A B
  • 28. The Seven Layer OSI Application Presentation Session Transport Network Data Physical
  • 29. The Seven Layer OSI Application Presentation Session Transport Network Data Physical Protocol describing the transmission method over the physical media Ethernet over 10BaseT
  • 30. The Seven Layer OSI Application Presentation Session Transport Network Data Physical Construction and Reconstruction of the Packet
  • 31. The Seven Layer OSI Application Presentation Session Transport Network Data Physical Finds the most efficient route SPX/IPX & TCP/IP
  • 32. The Seven Layer OSI Application Presentation Session Transport Network Data Physical Performs Error Checking
  • 33. The Seven Layer OSI Application Presentation Session Transport Network Data Physical Establishes the logical communication between two nodes on the network
  • 34. The Seven Layer OSI Application Presentation Session Transport Network Data Physical Reformats, Decodes or Compresses the information for presentation to the Session or Application Layer
  • 35. The Seven Layer OSI Application Presentation Session Transport Network Data Physical Communication and interface to the network segment of the Application Program Excel, Word, Etc.
  • 36. Workstation 1 Workstation 2 T S P A N D T S P A N D Cable Physical T S P A N D Datalink T S P A N Network T S P A Transport S P A Session P A Presentation A Application T S P A N D Cable Physical T S P A N D Datalink T S P A N Network T S P A Transport S P A Session P A Presentation A Application T S P A N D
  • 37. Bridges The function of a bridge is to join two networks and pass only packets that belong on a specific network. In other words the bridge acts a packet Filtering device. A B
  • 38.
  • 39.
  • 40.
  • 42. Token Ring The packet circulates around the ring until it finds its destination station The Information is placed in the packet and sent from the originating to the destination station Station 1 Station 2 Station 3 Station 4