0% found this document useful (0 votes)
73 views12 pages

Ccna R&S 1: Ethernet

The document discusses Ethernet encapsulation and MAC addressing. It describes how Ethernet operates at the data link layer using the LLC and MAC sublayers to encapsulate data. The MAC sublayer adds headers and trailers for frame delimiting, addressing, and error detection. MAC addresses provide unique 48-bit identifiers for network interfaces to enable communication at the data link layer.

Uploaded by

Faisal Budiman
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
73 views12 pages

Ccna R&S 1: Ethernet

The document discusses Ethernet encapsulation and MAC addressing. It describes how Ethernet operates at the data link layer using the LLC and MAC sublayers to encapsulate data. The MAC sublayer adds headers and trailers for frame delimiting, addressing, and error detection. MAC addresses provide unique 48-bit identifiers for network interfaces to enable communication at the data link layer.

Uploaded by

Faisal Budiman
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 12

MODUL PERKULIAHAN

CCNA R&S 1

Ethernet

Fakultas Program Studi Tatap Muka Kode MK Disusun Oleh

07
Ilmu Komputer Teknik Informatika Desi Ramayanti, S.Kom, MT

Abstract Kompetensi
Mengetahui Dapat memahami konsep Mengetahui konsep routing dan dan
encapsulation yang terdapat dalam paket yang berjalan dalam protocol
layer network serta memahami protocol Data Unit (PDU)
apa saja yang ada pada layer tersebut,
serta mahasiswa mengetahui tentang
konsep routing
Ethernet Encapsulation
Ethernet is the most widely used LAN technology today.
Ethernet operates in the data link layer and the physical layer. It is a family of
networking technologies that are defined in the IEEE 802.2 and 802.3 standards. Ethernet
supports data bandwidths of:
 10 Mb/s
 100 Mb/s
 1000 Mb/s (1 Gb/s)
 10,000 Mb/s (10 Gb/s)
 40,000 Mb/s (40 Gb/s)
 100,000 Mb/s (100 Gb/s)
As shown in Figure 7-1, Ethernet standards define both the Layer 2 protocols and the
Layer 1 technologies. For the Layer 2 protocols, as with all 802 IEEE standards, Ethernet
relies on the two separate sublayers of the data link layer to operate, the Logical Link Control
(LLC) and the MAC sublayers.

Figure 7-1 Ethernet


LLC sublayer

The Ethernet LLC sublayer handles the communication between the upper layers
and the lower layers. This is typically between the networking software and the device
hardware. The LLC sublayer takes the network protocol data, which is typically an IPv4
packet, and adds control information to help deliver the packet to the destination node. The
LLC is used to communicate with the upper layers of the application, and transition the
packet to the lower layers for delivery.
LLC is implemented in software, and its implementation is independent of the hardware. In a
computer, the LLC can be considered the driver software for the NIC. The NIC driver is a
2018 CCNA R&S 1 Pusat Bahan Ajar dan eLearning
2 Desi Ramayanti, S.Kom, MT http://www.mercubuana.ac.id
program that interacts directly with the hardware on the NIC to pass the data between the
MAC sublayer and the physical media.

MAC sublayer

Figure 7-2 List Comon IEEE

MAC constitutes the lower sublayer of the data link layer. MAC is implemented by
hardware, typically in the computer NIC. The specifics are listed in the IEEE 802.3
standards. Figure 7-2 lists common IEEE Ethernet standards.

MAC Sublayer
As shown in the figure, the Ethernet MAC sublayer has two primary responsibilities:
 Data encapsulation
 Media access control

Data encapsulation
The data encapsulation process includes frame assembly before transmission, and
frame disassembly upon reception of a frame. In forming the frame, the MAC layer adds a
header and trailer to the network layer PDU.
Data encapsulation provides three primary functions:
 Frame delimiting - The framing process provides important delimiters that are used to
identify a group of bits that make up a frame. These delimiting bits provide
synchronization between the transmitting and receiving nodes.

2018 CCNA R&S 1 Pusat Bahan Ajar dan eLearning


3 Desi Ramayanti, S.Kom, MT http://www.mercubuana.ac.id
 Addressing - The encapsulation process contains the Layer 3 PDU and also provides
for data link layer addressing.
 Error detection - Each frame contains a trailer used to detect any errors in
transmissions.
The use of frames aids in the transmission of bits as they are placed on the media and in the
grouping of bits at the receiving node.

Media Access Control

The second responsibility of the MAC sublayer is media access control. Media
access control is responsible for the placement of frames on the media and the removal of
frames from the media. As its name implies, it controls access to the media. This sublayer
communicates directly with the physical layer.
The underlying logical topology of Ethernet is a multi-access bus; therefore, all nodes
(devices) on a single network segment share the medium. Ethernet is a contention-based
method of networking. A contention-based method means that any device can try to transmit
data across the shared medium whenever it has data to send. The Carrier Sense Multiple
Access/Collision Detection (CSMA/CD) process is used in half-duplex Ethernet LANs to
detect and resolve collisions. Today’s Ethernet LANs use full-duplex switches, which allow
multiple devices to send and receive simultaneously with no collisions.

Ethernet Evolution

Since the creation of Ethernet in 1973, standards have evolved for specifying faster
and more flexible versions of the technology. This ability for Ethernet to improve over time is
one of the main reasons it has become so popular. Early versions of Ethernet were relatively
slow at 10 Mbps. The latest versions of Ethernet operate at 10 Gigabits per second and
faster. Scroll through the timeline in Figure 7-3 to view the various versions of Ethernet.

2018 CCNA R&S 1 Pusat Bahan Ajar dan eLearning


4 Desi Ramayanti, S.Kom, MT http://www.mercubuana.ac.id
Figure 7-3 Ethernet Evolution Timeline

At the data link layer, the frame structure is nearly identical for all speeds of Ethernet.
The Ethernet frame structure adds headers and trailers around the Layer 3 PDU to
encapsulate the message being sent, as shown in Figure 7-4.

Figure 7-4 Ethernet II Frame Structure and Field Size

Ethernet II is the Ethernet frame format used in TCP/IP networks. The minimum
Ethernet frame size is 64 bytes and the maximum is 1518 bytes. This includes all bytes from
the Destination MAC Address field through the Frame Check Sequence (FCS) field. The
Preamble field is not included when describing the size of a frame. Any frame less than 64
bytes in length is considered a “collision fragment” or “runt frame” and is automatically
discarded by receiving stations. Frames with more than 1500 bytes of data are considered
“jumbo” or “baby giant frames”.

If the size of a transmitted frame is less than the minimum or greater than the
maximum, the receiving device drops the frame. Dropped frames are likely to be the result of
collisions or other unwanted signals and are therefore considered invalid.

2018 CCNA R&S 1 Pusat Bahan Ajar dan eLearning


5 Desi Ramayanti, S.Kom, MT http://www.mercubuana.ac.id
MAC Address and Hexadecimal
An Ethernet MAC address is a 48-bit binary value expressed as 12 hexadecimal
digits (4 bits per hexadecimal digit). Just as decimal is a base ten number system,
hexadecimal is a base sixteen system. The base sixteen number system uses the numbers
0 to 9 and the letters A to F. Figure 7-5 shows the equivalent decimal and hexadecimal
values for binary 0000 to 1111. It is easier to express a value as a single hexadecimal digit
than as four binary bits.

Figure 7-5 Hexadecimal Numbering

Given that 8 bits (one byte) is a common binary grouping, binary 00000000 to
11111111 can be represented in hexadecimal as the range 00 to FF, as shown in Figure 7-
6. Leading zeroes are always displayed to complete the 8-bit representation. For example,
the binary value 0000 1010 is shown in hexadecimal as 0A.

Figure 7-6 Hexadecimal Numbering

2018 CCNA R&S 1 Pusat Bahan Ajar dan eLearning


6 Desi Ramayanti, S.Kom, MT http://www.mercubuana.ac.id
Note: It is important to distinguish hexadecimal values from decimal values regarding the
characters 0 to 9, as shown in the figure.

Representing Hexadecimal Values

Hexadecimal is usually represented in text by the value preceded by 0x (for example 0x73)
or a subscript 16. Less commonly, it may be followed by an H(for example 73H). However,
because subscript text is not recognized in command line or programming environments, the
technical representation of hexadecimal is preceded with "0x" (zero X). Therefore, the
examples above would be shown as 0x0A and 0x73 respectively.

Hexadecimal is used to represent Ethernet MAC addresses and IP Version 6 addresses.

Hexadecimal Conversions

Number conversions between decimal and hexadecimal values are straightforward, but
quickly dividing or multiplying by 16 is not always convenient. If such conversions are
required, it is usually easier to convert the decimal or hexadecimal value to binary, and then
to convert the binary value to either decimal or hexadecimal as appropriate.

MAC Address: Ethernet Identity


In Ethernet, every network device is connected to the same, shared media. Ethernet
was once predominantly a half-duplex topology using a multi-access bus or later Ethernet
hubs. This meant that all nodes would receive every frame transmitted. To prevent the
excessive overhead involved in the processing of every frame, MAC addresses were created
to identify the actual source and destination. MAC addressing provides a method for device
identification at the lower level of the OSI model. Although Ethernet has now transitioned to
full-duplex NICs and switches, it is still possible that a device that is not the intended
destination will receive an Ethernet frame.

MAC Address Structure

The MAC address value is a direct result of IEEE-enforced rules for vendors to
ensure globally unique addresses for each Ethernet device. The rules established by IEEE
require any vendor that sells Ethernet devices to register with IEEE. The IEEE assigns the
vendor a 3-byte (24-bit) code, called the Organizationally Unique Identifier (OUI).

2018 CCNA R&S 1 Pusat Bahan Ajar dan eLearning


7 Desi Ramayanti, S.Kom, MT http://www.mercubuana.ac.id
IEEE requires a vendor to follow two simple rules, as shown in the figure:

 All MAC addresses assigned to a NIC or other Ethernet device must use that vendor's
assigned OUI as the first 3 bytes.
 All MAC addresses with the same OUI must be assigned a unique value in the last 3
bytes.

Note: It is possible for duplicate MAC addresses to exist due to mistakes during
manufacturing or in some virtual machine implementation methods. In either case, it will be
necessary to modify the MAC address with a new NIC or in software.

Figure 7-7 The Ethernet Mac Address Structure

Frame Processing
The MAC address is often referred to as a burned-in address (BIA) because,
historically, this address is burned into ROM (Read-Only Memory) on the NIC. This means
that the address is encoded into the ROM chip permanently.

Note: On modern PC operating systems and NICs, it is possible to change the MAC address
in software. This is useful when attempting to gain access to a network that filters based on
BIA. Consequently, filtering or controlling traffic based on the MAC address is no longer as
secure. We can see in the figure 7-8 below

2018 CCNA R&S 1 Pusat Bahan Ajar dan eLearning


8 Desi Ramayanti, S.Kom, MT http://www.mercubuana.ac.id
Figure 7-8 Frame Forwarding

When the computer starts up, the first thing the NIC does is copy the MAC address
from ROM into RAM. When a device is forwarding a message to an Ethernet network, it
attaches header information to the frame. The header information contains the source and
destination MAC address.

Click Play in the animation to view the frame forwarding process. When a NIC
receives an Ethernet frame, it examines the destination MAC address to see if it matches the
device’s physical MAC address stored in RAM. If there is no match, the device discards the
frame. If there is a match, it passes the frame up the OSI layers, where the de-encapsulation
process takes place.

Note: Ethernet NICs will also accept frames if the destination MAC address is a
broadcast or a multicast group of which the host is a member.

Any device that can be the source or destination of an Ethernet frame must be
assigned a MAC address. This includes workstations, servers, printers, mobile devices, and
routers.

MAC Address Representations

On a Windows host, the ipconfig /all command can be used to identify the MAC
address of an Ethernet adapter. In Figure 7-9, notice the display indicates the Physical
Address (MAC) of the computer to be 00-18-DE-DD-A7-B2. If you have access, you may
wish to try this on your own computer. On a MAC or Linux host, the ifconfig command is
used.
2018 CCNA R&S 1 Pusat Bahan Ajar dan eLearning
9 Desi Ramayanti, S.Kom, MT http://www.mercubuana.ac.id
Figure 7-9 Physical Address Of a Host

Depending on the device and the operating system, you will see various
representations of MAC addresses, as displayed in Figure 7-10. Cisco routers and switches
use the form XXXX.XXXX.XXXX where X is a hexadecimal character.

Figure 7-10 Fifferent Representations of MAC Address

Switch Fundamentals
A Layer 2 Ethernet switch uses MAC addresses to make forwarding decisions. It is
completely unaware of the protocol being carried in the data portion of the frame, such as an
IPv4 packet. The switch makes its forwarding decisions based only on the Layer 2 Ethernet
MAC addresses.

Unlike legacy Ethernet hubs that repeat bits out all ports except the incoming port, an
Ethernet switch consults a MAC address table to make a forwarding decision for each frame.

2018 CCNA R&S 1 Pusat Bahan Ajar dan eLearning


10 Desi Ramayanti, S.Kom, MT http://www.mercubuana.ac.id
In the figure, the four-port switch was just powered on. It has not yet learned the MAC
addresses for the four attached PCs.

Note: The MAC address table is sometimes referred to as a content addressable


memory (CAM) table. While the term CAM table is fairly common, for the purposes of this
course, we will refer to it as a MAC address table.

Figure 7-11 Examine Source MAC Address

2018 CCNA R&S 1 Pusat Bahan Ajar dan eLearning


11 Desi Ramayanti, S.Kom, MT http://www.mercubuana.ac.id
Daftar Pustaka
[1] Wendell Odom,.CCIE, CCNA Routing & Switching 200-125 Official Cert Guide
Library, Ciscopress.com
[2] CCNA R&S: Routing and Switching Essentials 6.0, Cisco Academy, 2018
[3] Todd Lamle, CCNA Study Guide, PT. Elex Media Komputindo, 2005
[4] Allan Johnsons, Routing Protocols and Concepts, Cisco Press, 2012

2018 CCNA R&S 1 Pusat Bahan Ajar dan eLearning


12 Desi Ramayanti, S.Kom, MT http://www.mercubuana.ac.id

You might also like