<?xml version="1.0" encoding="utf-8"?>
<!-- generator="" -->
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Ethernet Protocol</title>
		<description><![CDATA[Leading Network Security & Cyber Security site. Cisco Routing/Switching, VPN, Microsoft, SASE, SSE, F5, PaloAlto Firewalls, Protocol Analysis, Tips & more.]]></description>
		<link>https://www.firewall.cx/networking/ethernet.html</link>
		<lastBuildDate>Sat, 11 Apr 2026 12:38:12 +1000</lastBuildDate>
		<generator></generator>
		<atom:link rel="self" type="application/rss+xml" href="https://www.firewall.cx/networking/ethernet.feed?type=rss"/>
		<language>en-gb</language>
		<item>
			<title>Troubleshooting techniques for Fast Ethernet</title>
			<link>https://www.firewall.cx/networking/ethernet/troubleshotting-fe.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/networking/ethernet/troubleshotting-fe.html</guid>
			<description><![CDATA[<p style="text-align: justify;">This page will primarily discuss problems unique to Fast Ethernet.</p>
<ul>
<li><strong>The Collision Domain</strong></li>
<li><strong>Incompatible Ethernet Jabber</strong></li>
<li><strong>Auto-negotiation Priorities And Alternatives</strong></li>
<li><strong>Incompatible Cabling Specifications</strong></li>
</ul>
<h2>The Collision Domain</h2>
<p style="text-align: justify;">The single biggest change in network design in Fast Ethernet is the smaller collision domain. Technically, the size of a collision domain in all flavors of Ethernet is exactly the same - 256 bits. On the wire, ten times as many 100Mbps bits can occupy the same space as an equal number of 10Mbps bits, so the collision domain in 100Mbps Ethernet can be only physically one tenth the size of a 10Mbps collision domain.</p>
<p style="text-align: justify;">Effectively this means that whereas up to four hubs can legally be cascaded in 10Base-T between any two stations, only one (or two) hubs can be used in a single segment in 100BASE-T without going through an interconnect device that provides link segmentation; such as a store-and-forward bridge, switch or bridge, or a router. A separate section of the Compendium discusses INTERCONNECT DEVICES in detail. If you see signs of corruption on your network that correspond to propagation delay, check to make sure that you're not cascading too many hubs.</p>
<p style="text-align: justify;">You can make some generalizations regarding the structure of corrupted data frames (as discussed in the 10 Mbps Ethernet FRAME CORRUPTION section) but remember that these corruption patterns may be quite misleading, since you have a hub or switch in the network.</p>
<p style="text-align: justify;">Note that many hub vendors sell stackable hubs. Hubs in a single stack connected via a common backplane are usually considered to be a single hub in terms of propagation delay, but multiple stacks cascaded externally via 100BASE-TX, 100BASE-T4, or 100BASE-FX could definitely cause problems. These 100BASE standards are discussed in the INTRODUCTION to this Fast Ethernet section.</p>
<h2>Incompatible Ethernet Jabber</h2>
<p style="text-align: justify;">Another potential problem in 100Mbps Ethernet is the use of RJ-45 jacks for more than one flavor of Ethernet. Since 100BASE-TX and 100BASE-T4 both use RJ-45 jacks, as do 10Base-T and many other network technologies, the IEEE 802.3 specified an auto-negotiation protocol to allow stations to figure out the networking technology to use.</p>
<p style="text-align: justify;">Unfortunately, they made its implementation optional. If you're using equipment that does not implement IEEE-spec auto-negotiation, the incompatible Ethernet signals could prevent one of your stations from connecting to your network, or even simulate "jabber" by constantly transmitting a TX idle stream and bringing down the network.</p>
<p style="text-align: justify;">The possibility for this jabber is uncertain, considering that the flavors of Ethernet use different signal formats in transmission. Even if data is not exchanged, it is still possible that incompatible Ethernet flavors could assume that they have a proper connection. Ethernets using RJ-45 connections to a hub use a Link Test Pulse to verify link integrity. This pulse is the same in all flavors of Ethernet if auto-negotiation is not used. The auto-negotiation protocol itself uses a modified form of these pulses to negotiate a common Ethernet implementation.</p>
<p style="text-align: justify;">If Ethernet incompatibility jabber were to occur between 100BASE-TX and another flavor of Ethernet, the results could be catastrophic, as 100BASE-TX transmits a continuous idle signal between frames. Although transparent to 100BASE-TX, this idle signal would completely busy out a 10Base-T or 100BASE-T4 segment. On the other hand, the 802.3 specifies that a Fast Ethernet repeater should implement jabber control, automatically partitioning off any port that is streaming information for more than 40000 to 75000 bits. If the repeater were to partition off the "jabbering" port, the symptom would be reduced to inability to connect the 100BASE-TX station to the network.</p>
<h2>Auto-Negotiation Priorities And Alternatives</h2>
<p style="text-align: justify;">If the station and repeater both support 100BASE-TX and 100BASE-T4 and 802.3 auto-negotiation, the link will autonegotiate to 100BASE-T4 instead of 100BASE-TX. Since 100BASE-TX requires Category 5 cabling but 100BASE-T4 requires only Category 3, 100BASE-T4 is assumed to be a better default.</p>
<p style="text-align: justify;">If the cabling is known to be UTP-5, then it is probably more efficient to turn off auto-negotiation and use 100BASE-TX wherever possible. 100BASE-T4 requires more overhead than TX because it multiplexes and demultiplexes the data stream over three wire pairs. There is also significantly less overhead in translating between 100BASE-TX and 100BASE-FX than between 100BASE-T4, as TX and FX both use 4B5B encoding instead of T4's 8B6T. 100BASE-TX and 100BASE-FX also leave open the possibility of Full Duplex communication, although full duplex is not yet part of the 802.3 spec.</p>
<p style="text-align: justify;">On the other hand, 100BASE-TX sends an idle signal whenever it is not transmitting data. The 802.3 spec implies that it may very well be preferable to use 100BASE-T4 for battery-powered operation, since the card would only be transmitting when there is actual information to be moved.</p>
<h2>Incompatible Cabling Specifications</h2>
<p style="text-align: justify;">One final problem with the advent of Fast Ethernet is the different cabling specifications. In classic Ethernet it was difficult to mistake 10Base-2 for 10Base-5. With Fast Ethernet, special care must be taken to verify that the entire connection between station and concentrator either supports TX's 31.25MHz signal or maintains T4's four pairs with proper twist. There are a number of good cable testers and pair scanners available to assist you in determining this for your network.</p>]]></description>
			<category>Ethernet Protocol, CSMA/CD, Collisions</category>
			<pubDate>Sun, 29 May 2011 07:57:34 +1000</pubDate>
		</item>
		<item>
			<title>802.3 Fast Ethernet (100 Mbit/Sec) Model</title>
			<link>https://www.firewall.cx/networking/ethernet/fast-ethernet-model.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/networking/ethernet/fast-ethernet-model.html</guid>
			<description><![CDATA[<p style="text-align: justify;">Here we see a logical drawing of the Fast Ethernet Data Link Layer sublayers. Data is passed down from the upper layers (such as TCP/IP or Novell Netware) to the LLC sublayer. From there it is passed to the MAC sublayer and then, depending on whether this is a 100BASE-T4 or 100BASE-TX environment, either down the right or left-hand path to the wire.</p>
<p style="text-align: justify;">We will intentionally avoid a detailed discussion of exactly what goes on at each of these layers here. Some of the layers' functions, such as 8B6T encoding, Fan-out and NRZI signaling are labeled and will be discussed in this essay.</p>
<p style="text-align: justify;">In 10Mbps Ethernet, the data is handed directly from the MAC layer to the PMA (Physical Medium Attachment) sublayer and onto the wire. The Reconciliation, PCS and PMD sublayers do not exist in 10Mbps Ethernet.</p>
<p><img src="https://www.firewall.cx/images/stories/FE-Layer.gif" alt="FE-Layer" width="442" height="441" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<div id="_mcePaste" class="mcePaste" style="overflow: hidden; position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px;">
<table border="0" style="width: 630px;" cellspacing="0" cellpadding="0" align="center">
<tbody>
<tr>
<td style="height: 718px;" valign="top">
<h5>Introduction</h5>
<p>Here we see a logical drawing of the Fast Ethernet Data Link Layer sublayers. Data is passed down from the upper layers (such as TCP/IP or Novell Netware) to the LLC sublayer. From there it is passed to the MAC sublayer and then, depending on whether this is a 100BASE-T4 or 100BASE-TX environment, either down the right or left-hand path to the wire.</p>
<p>We will intentionally avoid a detailed discussion of exactly what goes on at each of these layers here. Some of the layers' functions, such as 8B6T encoding, Fan-out and NRZI signaling are labeled and will be discussed in this essay.</p>
<p>In 10Mbps Ethernet, the data is handed directly from the MAC layer to the PMA (Physical Medium Attachment) sublayer and onto the wire. The Reconciliation, PCS and PMD sublayers do not exist in 10Mbps Ethernet.</p>
<p>&nbsp;</p>
<p align="center"><span style="font-family: Verdana,Arial,Helvetica,sans-serif; font-size: x-small;"><img src="https://www.firewall.cx/pictures/FE-Layer.gif" alt="" width="442" height="441" /></span></p>
</td>
</tr>
<tr>
<td style="width: 630px; height: 133px;">&nbsp;</td>
</tr>
</tbody>
</table>
</div>]]></description>
			<category>Ethernet Protocol, CSMA/CD, Collisions</category>
			<pubDate>Sun, 29 May 2011 07:49:37 +1000</pubDate>
		</item>
		<item>
			<title>Migrating From Ethernet To Fast Ethernet</title>
			<link>https://www.firewall.cx/networking/ethernet/fast-ethernet-migration.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/networking/ethernet/fast-ethernet-migration.html</guid>
			<description><![CDATA[<p style="text-align: justify;">In this article we will analyze the following aspects of upgrading/migrating from 10Mbit Ethernet to 100Mbit Ethernet.</p>
<ul>
<li>Cabling</li>
<li>Incompatible Implementations</li>
<li>Repeaters In Fast Ethernet</li>
<li>Replacement Of Illegal Byte</li>
<li>Codes Data Translation</li>
<li>Error Handling And Partitioning</li>
</ul>
<h2>Cabling</h2>
<p style="text-align: justify;">There are two methods of running Fast Ethernet over UTP and one method of running it over fibre.</p>
<p style="text-align: justify;"><strong>IMPLEMENTATION&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; CABLE TYPE&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; NUMBER OF PAIRS</strong></p>
<p style="text-align: justify;">100BASE-TX&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Category 5&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 2</p>
<p style="text-align: justify;">100BASE-T4&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Category 3 or 5&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 4</p>
<p style="text-align: justify;">100BASE-FX&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Fiber&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; (Not Applicable)</p>
<p style="text-align: justify;">Category 3 cabling is not rated to carry the fast signaling of 100BASE-TX, so 100BASE-T4 must be used. 100BASE-T4 may also be used on Category 5 cabling, but 100BASE-TX is probably a better choice.</p>
<h2>Incompatible Implementations</h2>
<p style="text-align: justify;">Fast Ethernet brings a new urgency to an old problem. Many network technologies use RJ-45 connectors. In the past, it was usually not difficult to figure out whether a jack was Ethernet or token ring: even at a site where both were in use they seldom were found in the same vicinity, so the network administrator could make an "educated guess". Today, with Fast and classic Ethernet interspersed and 10/100 cards common, some mechanism is needed to allow quick identification of the signal that is running across the wire.</p>
<p style="text-align: justify;">Autonegotiation works by having each end of the connection send a series of pulses down the wire to the other end. These pulses are the same signals used in 10Base-T to test link integrity and cause the link indicator light to turn on. If a station receives a single pulse, referred to as a Normal Link Pulse (NLP), it recognizes that the other end is only capable of 10Base-T.</p>
<p style="text-align: justify;">If autonegotiation is being used, a station will transmit a series of these pulses spaced closely together, referred to as a Fast Link Pulse (FLP). An FLP consists of 17 "clocking" pulses interspersed with up to 16 "signal" pulses to form a 16-bit code word. If a signal pulse occurs between two clocking pulses, that bit is a one. Absence of a signal pulse is a zero.</p>
<p style="text-align: justify;">By comparing the 16-bit code words received in the FLP, a station and hub will agree on what implementation of Ethernet to use. The 16-bit code word describes what implementations of Ethernet are supported. Both station and hub will compare what it supports to what the other end supports, then choose which implementation to use for that link according to following priorities, defined by IEEE 802.3 clause 28B.3:</p>
<p style="text-align: justify;">100BASE-TX full duplex</p>
<p style="text-align: justify;">100BASE-T4</p>
<p style="text-align: justify;">100BASE-TX 1</p>
<p style="text-align: justify;">10BASE-T full duplex</p>
<p style="text-align: justify;">10BASE-T</p>
<p style="text-align: justify;">If the station supports 100BASE-T4, 100BASE-TX, and 10BASE-T and the hub supports full duplex 100BASE-TX, single-duplex 100BASE-TX, and 10BASE-T, they will each discover that the Ethernet implementations they have in common are 100BASE-TX and 10BASE-T. Since 100BASE-TX is defined to have a higher priority that 10BASE-T, the station and hub will use 100BASE-TX. This decision takes place independently on each side of the link, but since each side uses the same decision-making process and priorities, the same decision is reached on each end. Because each end of the connection agrees on what implementation of Ethernet is being used, the potential problem of incompatible signaling is averted.</p>
<h2>Repeaters In Fast Ethernet</h2>
<p style="text-align: justify;">In Fast Ethernet the number of repeaters allowed per network segment is only 1 or 2. Whether one or two repeaters may be used is determined by what class of repeater will be used on the segment. Two classes of Fast Ethernet repeater are defined, Class I and Class II. Only one Class I repeater can be used in a single collision domain. Two Class II repeaters are allowed in a single collision domain, with up to a 5 metre inter-repeater link between them. The only technical difference between Class I and Class II repeaters is that Class II repeaters are faster than Class I repeaters. This allows Class I repeaters to provide other services besides simple repeating, such as translating between 100BASE-TX and 100BASE-T4. Class II repeaters are primarily used to link two hubs supporting only a single implementation of Fast Ethernet.</p>
<p style="text-align: justify;">However, with the trade-off in fewer repeaters comes greater intelligence in each repeater. In addition to implementing the functionality of 10Mbps repeaters, 100Mbps repeaters are responsible for the following:</p>
<h2>Replacement Of Illegal Byte</h2>
<p style="text-align: justify;">Unlike classic Ethernet, Fast Ethernet does not send a straightforward representation of the actual bits across the physical layer. A different representation of the information is sent instead. As a result, there are possible patterns on the wire which are not defined for use in Fast Ethernet. If a repeater detects an illegal pattern on the wire, it may replace that pattern (and every remaining pattern in the frame) with a special symbol identifying that the frame is corrupt.</p>
<h2>Codes Data Translation</h2>
<p style="text-align: justify;">For repeaters that implement more than one implementation of Ethernet, the repeater will change the data encoding to be appropriate to the outgoing ports. 100BASE-T4 and 100BASE-TX use very different representations when sending data across a network. A Class I repeater which implements both 100BASE-TX and 100BASE-T4 needs to ensure that the signal going across the wire is the appropriate representation for the Ethernet implementation.</p>
<h2>Error Handling and Partitioning</h2>
<p style="text-align: justify;">A Fast Ethernet repeater will monitor the state of each port in order to protect the network from any faults that might interrupt the flow of information.</p>
<p style="text-align: justify;">If 60 consecutive collisions are detected from any particular port, the repeater will partition that port: it will stop forwarding information from that port to the rest of the network, but will still continue to repeat all frames from the network to the port. If the station on that port has broken so that it no longer is obeying the rules of CSMA/CD, then it needs to be separated from the network to allow traffic to flow.</p>
<p style="text-align: justify;">However, it is possible that there could be 60 consecutive collisions on an extremely busy segment, so the repeater still forwards information to that port. If the repeater detects between 450 and 560 bits of information from that port without a collision occurring, the repeater will re-activate that port. A legal frame is received from the partitioned port, so we know that the hardware is working.</p>
<p style="text-align: justify;">If between 40000 and 75000 consecutive bits are received from a port, the device at the other end of that cable is assumed to be "jabbering", sending an endless stream of bits, so the output from the port is cut off from the rest of the network. Such a "jabbering" device could prevent any traffic from flowing on a network, since there would never be a break for the other stations to transmit. If the station stops "jabbering", then the repeater will once again activate the port.</p>
<p style="text-align: justify;">In 100BASE-TX and 100BASE-FX, a repeater will further monitor traffic to ensure that only frames with a valid preamble are passed. If two consecutive "false carrier events" occur, or a "false carrier event" lasts for 450-500 bits, the repeater will declare that link to be "unstable" and stop sending information to that port. As a result, faulty links are isolated from the rest of the network, resulting in improved overall network reliability. The link will be reactivated if between 24814 and 37586 bit-times have passed without any information having been received, or if a valid carrier is received after between 64 and 86 bit-times of idle have occurred.</p>]]></description>
			<category>Ethernet Protocol, CSMA/CD, Collisions</category>
			<pubDate>Sun, 29 May 2011 07:36:35 +1000</pubDate>
		</item>
		<item>
			<title>Integrating Fast Ethernet into 10MB Ethernet Networks </title>
			<link>https://www.firewall.cx/networking/ethernet/fast-ethernet-integration.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/networking/ethernet/fast-ethernet-integration.html</guid>
			<description><![CDATA[<p style="text-align: justify;">Now that Fast Ethernet is here, the question becomes, "How do I start using it ?" Integrating Fast Ethernet into existing networks need not be done all at once.</p>
<p style="text-align: justify;">Here are some aspects of 100Mbps implementation that should be considered:</p>
<ul>
<li>Implementing Switching</li>
<li>Eliminating Bottlenecks</li>
<li>Expand The Topology Outwards and Downwards<strong> <br /></strong></li>
</ul>
<h2>Implementing Switching</h2>
<p style="text-align: justify;">Implement switching in high-traffic areas to concentrate the bottlenecks on the network. Since Fast Ethernet provides higher throughput of bits, it makes sense to figure out which network connections need the most relief. Which segments consistently attempt to pump the most bytes? Which segments consistently demonstrate the highest average percent bandwidth usage according to your protocol analyzer?</p>
<p style="text-align: justify;">Installing switches will help you figure out which network segments are moving the most information due to the effect switches have on your network. Installing switches is like moving from traffic lights to limited-access highways. The idea works extremely well in isolating cross-town traffic, e.g. peer-to-peer networking, but doesn't necessarily help when all of the traffic slows down at particular locations, e.g. an enterprise-wide server or the network Internet firewall. Because there are other ways of isolating network bottlenecks, implementing switches is primarily useful when installing 10/100 switches in preparation for 100Mbps Ethernet.</p>
<p style="text-align: justify;">Installing switches also gives the added benefit of segmenting collision domains. In classic Ethernet, there can be up to four hubs or repeaters between any two stations, but in Fast Ethernet that number is only one or two. Installing switches in place of repeaters spares you having to segment your network at a later point, allowing the cost of the transition to be spread over a longer period of time.</p>
<h2>Eliminating Bottlenecks</h2>
<p style="text-align: justify;">Once bottlenecks have been identified, upgrade those network connections to 100 Mbps. The primary difficulty in this step is verifying that the existing cabling will be sufficient for Fast Ethernet. On UTP, the cable either needs to meet Category 5 specifications or have four pairs with proper twist maintained on Category 3. If you're planning on using 100BASE-TX, your wiring closet will also need to be certified for a higher speed. There are many devices available such as wire pair scanners, which will make this job much easier.</p>
<p style="text-align: justify;">Installing the initial Fast Ethernet connections is much easier if the switches installed earlier are 10/100, capable of operating at either classic Ethernet speeds or Fast Ethernet speeds. If the switches installed were only 10Mbps switches, they could be used as "hand-me-downs," replacing hubs in segments where users require more bandwidth.</p>
<h2>Expand The Topology Outwards and Downwards</h2>
<p style="text-align: justify;">Gradually work the Fast Ethernet out into the rest of the network, as far out and down as desired. Note that the price of 10/100 cards is not substantially higher than that of 10Mbps cards, so it may be a wise idea to plan ahead by installing 10/100 cards when installing new machines.</p>
<p style="text-align: justify;">If there comes a point in the future when 100Mbps Ethernet needs to be implemented on that machine, all that will need to be changed is the connection on the other end. On the other hand, upgrading a machine from a 10Mbps card to a 100Mbps card will require reconfiguring the user's machine, installing a new driver, etc. A short-term expenditure can greatly offset the cost in man-hours and down-time later on.</p>]]></description>
			<category>Ethernet Protocol, CSMA/CD, Collisions</category>
			<pubDate>Sun, 29 May 2011 07:25:32 +1000</pubDate>
		</item>
		<item>
			<title>Differences Between Classic Ethernet And Fast Ethernet</title>
			<link>https://www.firewall.cx/networking/ethernet/fast-ethernet-difference.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/networking/ethernet/fast-ethernet-difference.html</guid>
			<description><![CDATA[<p style="text-align: justify;">The two primary areas for concern when upgrading the network from 10Mbps to 100Mbps are cabling and hubs. As discussed on the Fast Ethernet Introduction page, in Fast Ethernet twisted pair cabling needs either to be category 5 or to be category 3 with proper twist on all four pairs.</p>
<p style="text-align: justify;">The problem with hubs is the number of hubs allowed in a single collision domain. Classic Ethernet allows hubs to be cascaded up to four deep between any two stations. In Fast Ethernet, the number of hubs allowed in a collision domain is drastically reduced - to a single hub. Sometimes it may be possible to have more than one hub in a collision domain, but it will probably be easier in the long term to design a Fast Ethernet network assuming that only one hub is allowed.</p>
<p style="text-align: justify;">What the IEEE 802.3 spec does not explicitly state is that this limitation only applies to shared 100BASE-T, not to switched 100BASE-T. Since switches act like bridges in defining a separate collision domain, installing Fast Ethernet switches will allow you to work around the single-hub problem. Even if it is not necessary to deliver dedicated switched Fast Ethernet to each desktop, Fast Ethernet hubs can be connected to switches. Connecting a number of repeaters to a switch will provide shared Fast Ethernet and allow you to maintain the size of your network.</p>]]></description>
			<category>Ethernet Protocol, CSMA/CD, Collisions</category>
			<pubDate>Sun, 29 May 2011 07:23:04 +1000</pubDate>
		</item>
		<item>
			<title>The Novell Proprietary Frame Format</title>
			<link>https://www.firewall.cx/networking/ethernet/ethernet-novel-frame.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/networking/ethernet/ethernet-novel-frame.html</guid>
			<description><![CDATA[<p style="text-align: justify;">Novell's Proprietary Frame Format was developed based on a preliminary release of the 802.3 specification. After Novell released its proprietary format, the LLC Header was added, making Novell's format incompatible.</p>
<p style="text-align: justify;">Below is a 3D diagram of the frame, let's have a look at it and try to analyse it:</p>
<h2 style="text-align: justify;">The Data Link Header</h2>
<p style="text-align: justify;" align="center"><img src="https://www.firewall.cx/images/stories/ethernet-frames-802.3-raw-1.gif" alt="Novell Ethernet 802.3 (RAW) Frame Format" width="516" height="170" style="display: block; margin-left: auto; margin-right: auto;" title="Novell Ethernet 802.3 (RAW) Frame Format" /></p>
<p style="text-align: justify;"><strong>Offset 0-5: The Destination Address</strong></p>
<ul style="text-align: justify;">
<li>The <strong>first six bytes</strong> of an Ethernet frame make up the <strong>Destination Address</strong>. The <strong>Destination Address</strong> specifies to which adapter the data frame is being sent. A <strong>Destination Address</strong> of all ones specifies a <strong>Broadcast Message</strong> that is read in by all receiving Ethernet adapters.</li>
<li>The <strong>first three bytes</strong> of the <strong>Destination Address</strong> are assigned by the IEEE to the vendor of the adapter, and are specific to the vendor.</li>
<li>The <strong>Destination Address</strong> format is identical in all implementations of Ethernet.</li>
</ul>
<p style="text-align: justify;"><strong>Offset 6-11: The Source Address</strong></p>
<ul style="text-align: justify;">
<li>The <strong>next six bytes</strong> of an Ethernet frame make up the <strong>Source Address</strong>. The <strong>Source Address</strong> specifies from which adapter the message originated. Like the <strong>Destination Address</strong>, the <strong>first three bytes</strong> specify the vendor of the card.</li>
<li>The <strong>Source Address format</strong> is identical in all implementations of Ethernet.</li>
</ul>
<p style="text-align: justify;"><strong>Offset 12-13: Length</strong></p>
<ul style="text-align: justify;">
<li><strong>Bytes 13 and 14</strong> of an Ethernet frame contain the length of the data in the frame frame, not including the preamble, <strong>32 bit CRC</strong>, <strong>DLC addresses</strong>, or the <strong>Length field</strong> itself. An Ethernet frame can be no shorter than <strong>64 bytes</strong> total length, and no longer than <strong>1518 bytes</strong> total length.</li>
</ul>
<p style="text-align: justify;">&nbsp;User Data And Frame Check Sequence (FCS)</p>
<p style="text-align: justify;" align="center"><img src="https://www.firewall.cx/images/stories/ethernet-frames-802.3-raw-2.gif" alt="Novell Ethernet 802.3 (RAW) Frame Format" width="516" height="170" style="display: block; margin-left: auto; margin-right: auto;" title="Novell Ethernet 802.3 (RAW) Frame Format" /></p>
<p><span style="color: #ff00ff;"></span><strong>Data: 46-1500 Bytes</strong></p>
<ul style="text-align: justify;">
<li>Following the <strong>Data Link header</strong> are <strong>46 to 1500 bytes</strong> of data. In all Novell frames, the user data begins with an <strong>IPX</strong> (Novell's network layer protocol) <strong>header</strong>. The <strong>IPX header</strong> contains as its first two bytes an optional checksum, with the value FFFF signifying that the checksum is not used. By convention, the checksum is always turned off, and the FFFF that occurs <strong>3 bytes</strong> after the end of the source address is how device drivers differentiate <strong>Novell frames</strong> from <strong>802.3 frames</strong>, which look identical until the first byte following the length field.</li>
</ul>
<p><strong>FCS: Last 4 Bytes</strong></p>
<ul style="text-align: justify;">
<li>
<p>The <strong>last 4 bytes</strong> that the adapter reads in are the <strong>Frame Check Sequence</strong> or <strong>CRC</strong>. When the voltage on the wire returns to zero, the adapter checks the <strong>last 4 bytes</strong> it received against a checksum that it generates via a complex polynomial. If the calculated checksum does not match the checksum on the frame, the frame is discarded and never reaches the memory buffers in the station.</p>
</li>
</ul>
<h2 style="text-align: justify;">Final Note on Novell's Ethernet Frame Format<strong><br /></strong></h2>
<p style="text-align: justify;">"A Novell client can only use one frame format for NetWare"</p>
<p style="text-align: justify;">This is a true statement that needs some clarification to be fully understood.</p>
<p style="text-align: justify;">It should be noted that Novell workstations are capable of using any of the four Ethernet frame types mentioned in the Ethernet Frame section, based on the LOAD and BIND settings in the NET.CFG file. A Novell client will use the list of frame formats in NET.CFG to attempt to locate a file server (or a Netware Directory Server for the VLM shell). The client starts at the top of the list of frame types in NET.CFG and broadcasts a 'Find Nearest Server' message. If no file server answers (or Directory Services server in a VLM client) then the client tries the next frame format. When a server finally does answer then the client will use the successful frame format from then on, until the client is rebooted.</p>
<p style="text-align: justify;">As a result, you should remember that a Novell client will ultimately use only one of the four frame formats; it cannot actually use multiple formats for NetWare at the same time. The format it selects will be based on its initial attempt to locate a server. This behavior is restricted to the frame format used by NCP and SPX - if the client is also running a TCP/IP stack then the IP protocol can be configured to use any other frame format (typically Version II Ethernet).</p>
<p style="text-align: justify;">This completes our anaylsis of the <strong>Novell proprietary frame format</strong>.</p>
<p style="text-align: right;"><a href="https://www.firewall.cx/networking/ethernet.html" title="Back to Ethernet Frame Formats Section">Back to Ethernet Frame Formats Section</a></p>]]></description>
			<category>Ethernet Protocol, CSMA/CD, Collisions</category>
			<pubDate>Sat, 28 May 2011 08:36:02 +1000</pubDate>
		</item>
		<item>
			<title>The IEEE 802.3 SNAP Frame Format</title>
			<link>https://www.firewall.cx/networking/ethernet/ieee-8023-snap-frame.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/networking/ethernet/ieee-8023-snap-frame.html</guid>
			<description><![CDATA[<p style="text-align: justify;">While the original 802.3 specification worked well, the IEEE realized that some upper layer protocols required an Ethertype to work properly. For example, TCP/IP uses the Ethertype to differentiate between ARP packets and normal IP data frames. In order to provide this backwards compatibility with the Version II frame type, the 802.3 SNAP (SubNetwork Access Protocol) format was created.</p>
<p style="text-align: justify;">The <strong>SNAP Frame Format</strong> consists of a normal <strong>802.3 Data Link Header</strong> followed by a normal <strong>802.2 LLC Header</strong> and then a <strong>5-byte SNAP field</strong>, followed by the normal <strong>user data</strong> and <strong>FCS</strong>.</p>
<p style="text-align: justify;">You can see the above mentioned headers in the 3D diagram of the frame below:</p>
<h2>The Data Link Header</h2>
<p align="center"><img src="https://www.firewall.cx/images/stories/ethernet-frames-802.3-snap-1.gif" alt="Ethernet 802.3 SNAP Frame Format - Analysis" width="630" height="162" style="display: block; margin-left: auto; margin-right: auto;" title="Ethernet 802.3 SNAP Frame Format - Analysis" /></p>
<p><strong>&nbsp;Offset 0-5: The Destination Address</strong></p>
<ul style="text-align: justify;">
<li>The <strong>first six bytes</strong> of an Ethernet frame make up the <strong>Destination Address</strong>. The <strong>Destination Address</strong> specifies to which adapter the data frame is being sent. A <strong>Destination Address</strong> of all ones specifies a <strong>Broadcast Message</strong> that is read in by all receiving Ethernet adapters.</li>
<li>The <strong>first three bytes</strong> of the <strong>Destination Address</strong> are assigned by the IEEE to the vendor of the adapter and are specific to the vendor.</li>
<li>The <strong>Destination Address format</strong> is identical in all implementations of Ethernet.</li>
</ul>
<p><strong>Offset 6-11: The Source Address</strong></p>
<ul style="text-align: justify;">
<li>The <strong>next six bytes</strong> of an Ethernet frame make up the <strong>Source Address</strong>. The <strong>Source Address</strong> specifies from which adapter the message originated. Like the <strong>Destination Address</strong>, the <strong>first three bytes</strong> specify the vendor of the card.</li>
<li>The <strong>Source Address format</strong> is identical in all implementations of Ethernet.</li>
</ul>
<p><strong>Offset 12-13: Length</strong></p>
<ul style="text-align: justify;">
<li><strong>Bytes 13 and 14</strong> of an Ethernet frame contain the <strong>length of the data in the frame</strong>, not including the <strong>preamble</strong>, <strong>32 bit CRC</strong>, <strong>DLC addresses</strong>, or the <strong>Length field</strong> itself. An Ethernet frame can be no shorter than <strong>64 bytes</strong> total length and no longer than<strong> 1518 bytes</strong> total length.</li>
</ul>
<h2>The 802.2 Logical Link Control (LLC) Header</h2>
<p align="center"><img src="https://www.firewall.cx/images/stories/ethernet-frames-802.3-snap-2.gif" alt="Ethernet 802.3 SNAP Frame Format - Analysis" width="630" height="162" style="display: block; margin-left: auto; margin-right: auto;" title="Ethernet 802.3 SNAP Frame Format - Analysis" /></p>
<p style="text-align: justify;"><span style="color: #ffff00;"></span>Following the <strong>Datalink Header</strong> is the <strong>Logical Link Control (LLC) Header</strong>, which is described in the <strong>IEEE 802.2 Specification</strong>. The purpose of the <strong>LLC header</strong> is to provide a "hole in the ceiling" of the <strong>Datalink Layer</strong>. By specifying into which memory buffer the adapter places the data frame, the&nbsp;<strong>LLC header</strong> allows the upper layers to know where to find the data.</p>
<p><strong>Offset 15: The Destination Service Access Point (DSAP)</strong></p>
<ul style="text-align: justify;">
<li>The <strong>Destination Service Access Point</strong> or <strong>DSAP</strong>, is a <strong>1 byte</strong> field that simply acts as a pointer to a memory buffer in the receiving station. It tells the receiving network interface card in which buffer to put this information. This functionality is crucial in situations where users are running multiple protocol stacks, etc...</li>
</ul>
<p><strong>Offset 16: The Source Service Access Point (SSAP)</strong></p>
<ul style="text-align: justify;">
<li>The <strong>Source Service Access Point</strong> or <strong>SSAP</strong> is analogous to the <strong>DSAP</strong> and specifies the <strong>Source</strong> of the sending process.</li>
<li>
<p>In order to specify that this is a <strong>SNAP frame</strong>, the <strong>SSAP</strong> is set to <strong>AA hex</strong>.</p>
</li>
</ul>
<p><strong>Offset 17: The Control Byte</strong></p>
<ul style="text-align: justify;">
<li>
<p>Following the <strong>SAPs</strong> is a one byte control field that specifies the type of LLC frame that this is.</p>
</li>
</ul>
<h2 style="text-align: left;" align="center">The Sub-Network Access Protocol (SNAP) Header</h2>
<p align="center"><img src="https://www.firewall.cx/images/stories/ethernet-frames-802.3-snap-3.gif" alt="Ethernet 802.3 SNAP Frame Format - Analysis" width="630" height="162" style="display: block; margin-left: auto; margin-right: auto;" title="Ethernet 802.3 SNAP Frame Format - Sub-Network Access Protocol - Analysis" /></p>
<p><strong>Offset 18-20: The Vendor Code</strong></p>
<ul style="text-align: justify;">
<li>The <strong>first 3 bytes</strong> of the <strong>SNAP header</strong> is the vendor code, generally the same as the first three bytes of the source address although it is sometimes set to zero.</li>
</ul>
<p><strong>Offset 21-22: The Local Code</strong></p>
<ul style="text-align: justify;">
<li>
<p>Following the Vendor Code is a <strong>2 byte field</strong> that typically contains an Ethertype for the frame. This is where the backwards compatibility with Version II Ethernet is implemented.</p>
</li>
</ul>
<p align="center">&nbsp;</p>
<h2>User Data And Frame Check Sequence (FCS)</h2>
<p align="center"><img src="https://www.firewall.cx/images/stories/ethernet-frames-802.3-snap-4.gif" alt="Ethernet 802.3 SNAP Frame Format - Analysis" width="630" height="162" style="display: block; margin-left: auto; margin-right: auto;" title="Ethernet 802.3 SNAP Frame Format - Analysis" /></p>
<p><strong>Data: 38-1492 Bytes</strong></p>
<ul style="text-align: justify;">
<li>Following the <strong>802.2 header</strong> are <strong>38 to 1492 bytes</strong> of data, generally consisting of upper layer headers such as TCP/IP or IPX and then the actual user data.</li>
</ul>
<p><strong>FCS: Last 4 Bytes</strong></p>
<ul style="text-align: justify;">
<li>The <strong>last 4 bytes</strong> that the adapter reads in are the <strong>Frame Check Sequence</strong> or <strong>CRC</strong>. When the voltage on the wire returns to zero, the adapter checks the <strong>last 4 bytes</strong> it received against a checksum that it generates via a complex polynomial. If the calculated checksum does not match the checksum on the frame, the frame is discarded and never reaches the memory buffers in the station.</li>
</ul>
<p>This completes our <strong>anaylsis</strong> of the <strong>IEEE 802.3 SNAP frame format</strong>.</p>
<p style="text-align: right;"><a href="https://www.firewall.cx/networking/ethernet.html" title="Back to Ethernet Frame Formats Section">Back to Ethernet Frame Formats Section</a></p>]]></description>
			<category>Ethernet Protocol, CSMA/CD, Collisions</category>
			<pubDate>Sat, 28 May 2011 08:30:20 +1000</pubDate>
		</item>
		<item>
			<title>The Ethernet II Frame Format </title>
			<link>https://www.firewall.cx/networking/ethernet/ethernet-ii.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/networking/ethernet/ethernet-ii.html</guid>
			<description><![CDATA[<p style="text-align: justify;">The following is a description of the frame format described by the original <span style="color: #6666ff;">Ethernet Version II</span> specification as released by DEC, Intel, and Xerox. Like the <strong>802.3 spec</strong>, the <strong>Version II spec</strong> defines a <strong>Datalink Header</strong> consisting of <strong>14 bytes</strong> (<strong>6</strong>+<strong>6</strong>+<strong>2</strong>) of information, but the <strong>Version II</strong> spec does not specify an <strong>LLC Header</strong>.</p>
<p style="text-align: justify;">Let's now have a closer look at the <strong>Ethernet II frame format</strong>:</p>
<h2>The Data Link Header</h2>
<p style="text-align: justify;" align="center"><img src="https://www.firewall.cx/images/stories/ethernet-frames-ethernet-ii-1.gif" alt="Ethernet II Frame Format, Datalink, header, DATA &amp; CRC (FCS) analysis" width="422" height="165" style="display: block; margin-left: auto; margin-right: auto;" title="Ethernet II Frame Format, Datalink, header, DATA &amp; CRC (FCS) analysis" /></p>
<p><strong>Offset 0-5: The Destination Address</strong></p>
<ul style="text-align: justify;">
<li>The <strong>first six bytes</strong> of an Ethernet frame make up the <strong>Destination Address</strong>. The <strong>Destination Address</strong> specifies to which adapter the data frame is being sent. A <strong>Destination Address</strong> of all ones specifies a <strong>Broadcast Message</strong> that is read in by all receiving Ethernet adapters.</li>
</ul>
<ul style="text-align: justify;">
<li>The <strong>first three bytes</strong> of the <strong>Destination Address</strong> are assigned by the IEEE to the vendor of the adapter and are specific to the vendor. See the <a href="https://www.firewall.cx/mac_addresses.php" target="_blank" title="MAC Address Anaylsis">MAC Address</a> page for more information.</li>
</ul>
<ul style="text-align: justify;">
<li>The <strong>Destination Address</strong> format is identical in all implementations of Ethernet.</li>
</ul>
<p><strong>Offset 6-11: The Source Address</strong></p>
<ul style="text-align: justify;">
<li>The next <strong>six bytes</strong> of an Ethernet frame make up the <strong>Source Address</strong>. The <strong>Source Address</strong> specifies from which adapter the message originated. Like the <strong>Destination Address</strong>, the first three bytes specify the vendor of the card.</li>
</ul>
<ul style="text-align: justify;">
<li>The <strong>Source Address</strong> format is identical in all implementations of Ethernet.</li>
</ul>
<p><strong>Offset 12-13: The Ethertype</strong></p>
<ul style="text-align: justify;">
<li>Following the <strong>Source Address</strong> is a <strong>2 byte</strong> field called the <strong>Ethertype</strong>. The <strong>Ethertype</strong> is analogous to the <strong>SAPs</strong> in the <strong>802.3 frame</strong> in that it specifies the memory buffer in which to place this frame.</li>
</ul>
<p style="text-align: justify;">An interesting question arises when one considers the <strong>802.3</strong> and <strong>Version II</strong> frame formats: Both formats specify a <strong>2 byte</strong> field following the source address (an <strong>Ethertype in Version II</strong>, and a <strong>Length field in 802.3</strong>) -- So how does a driver know which format it is seeing, if it is configured to support both Ethernet frames?</p>
<p style="text-align: justify;">The answer is actually quite simple. All Ethertypes have a value greater than <strong>05DC hex</strong>, or <strong>1500</strong> decimal. Since the maximum frame size in <strong>Ethernet</strong> is <strong>1518 bytes</strong>, there is no point in overlapping between <strong>Ethertypes</strong> and <strong>lengths</strong>. If the field that follows the <strong>Source Address</strong> is greater than <strong>O5DC hex</strong>, the frame is a <strong>Version II</strong>, otherwise it is something else (either 802.3, 802.3 SNAP or Novell Proprietary).</p>
<h2>User Data and FCS</h2>
<p style="text-align: justify;" align="center"><img src="https://www.firewall.cx/images/stories/ethernet-frames-ethernet-ii-2.gif" alt="ethernet-frames-ethernet-ii-2" width="422" height="165" style="display: block; margin-left: auto; margin-right: auto;" title="Ethernet II Frame Format, Datalink, header, DATA &amp; CRC (FCS) analysis" /></p>
<p><span style="color: #ff33ff;"></span><strong>Data: 46-1500 Bytes</strong></p>
<ul style="text-align: justify;">
<li>
<p>Following the <strong>Ethertype</strong> are <strong>46 to 1500 bytes</strong> of data, generally consisting of upper layer headers such as TCP/IP or IPX and then the actual user data.</p>
</li>
</ul>
<p><strong>FCS: Last 4 Bytes</strong></p>
<ul style="text-align: justify;">
<li>
<p>The <strong>last 4 bytes</strong> that the adapter reads in are the <strong>Frame Check Sequence</strong> or <strong>CRC</strong>. When the voltage on the wire returns to zero, the adapter checks the <strong>last 4 bytes</strong> it received against a checksum that it generates via a complex polynomial. If the calculated checksum does not match the checksum on the frame, the frame is discarded and never reaches the memory buffers in the station.<a href="https://www.firewall.cx/networking-topics/ethernet/ethernet-frame-formats.html" title="Back to Ethernet Frame Formats Section"><br /></a></p>
</li>
</ul>
<p>This completes our <strong>anaylsis</strong> of the <strong>Ethernet II frame</strong>.</p>
<p style="text-align: right;"><a href="https://www.firewall.cx//networking/ethernet.html" title="Back to Ethernet Frame Formats Section">Back to Ethernet Frame Formats Section</a></p>
<div id="_mcePaste" class="mcePaste" style="overflow: hidden; position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; text-align: justify;">
<table border="0" style="width: 630px;" cellspacing="0" cellpadding="0" align="center">
<tbody>
<tr>
<td valign="top">
<h5>Introduction</h5>
<p>The following is a description of the frame format described by the original <span style="color: #6666ff;">Ethernet Version II</span> specification as released by DEC, Intel, and Xerox. Like the 802.3 spec, the Version II spec defines a Data Link Header consisting of 14 bytes (<span style="color: #ff0000;">6</span>+<span style="color: #ffff00;">6</span>+<span style="color: #00ffff;">2</span>) of information, but the Version II spec does not specify an LLC header.</p>
<p>Let's now have a closer look at the frame format:</p>
<p align="center"><img src="https://www.firewall.cx/pictures/ethernet-frames-ethernet-ii-1.gif" alt="" width="422" height="165" /></p>
<p><span style="color: #6633ff;"><strong>THE DATA LINK HEADER</strong> </span></p>
<p><span style="color: #ff0000;">Offset 0-5: The Destination Address </span></p>
<ul>
<li>The first six bytes of an Ethernet frame make up the Destination Address. The Destination Address specifies to which adapter the data frame is being sent. A Destination Address of all ones specifies a Broadcast Message that is read in by all receiving Ethernet adapters.</li>
</ul>
<ul>
<li>The first three bytes of the Destination Address are assigned by the IEEE to the vendor of the adapter and are specific to the vendor. See the <a href="https://www.firewall.cx/mac_addresses.php">MAC Address</a> page for more information.</li>
</ul>
<ul>
<li>The Destination Address format is identical in all implementations of Ethernet.</li>
</ul>
<p><span style="color: #ffff33;">Offset 6-11: The Source Address</span></p>
<ul>
<li>The next six bytes of an Ethernet frame make up the Source Address. The Source Address specifies from which adapter the message originated. Like the Destination Address, the first three bytes specify the vendor of the card.</li>
</ul>
<ul>
<li>The Source Address format is identical in all implementations of Ethernet.</li>
</ul>
<p><span style="color: #33ffcc;">Offset 12-13: The Ethertype </span></p>
<ul>
<li>Following the Source Address is a 2 byte field called the Ethertype. The Ethertype is analogous to the SAPs in the 802.3 frame in that it specifies the memory buffer in which to place this frame.</li>
</ul>
<p>An interesting question arises when one considers the 802.3 and Version II frame formats: Both formats specify a 2 byte field following the source address (an Ethertype in Version II, and a Length field in 802.3) -- How does a driver know which format it is seeing, if it is configured to support both?</p>
<p>The answer is actually quite simple. All Ethertypes have a value greater than 05DC hex, or 1500 decimal. Since the maximum frame size in Ethernet is 1518 bytes, there is no point in overlapping between Ethertypes and lengths. If the field that follows the Source Address is greater than O5DC hex, the frame is a Version II, otherwise it is something else (either 802.3, 802.3 SNAP or Novell Proprietary).</p>
<p align="center"><img src="https://www.firewall.cx/pictures/ethernet-frames-ethernet-ii-2.gif" alt="" width="422" height="165" /></p>
<p><span style="color: #ff33ff;"><strong>USER DATA AND FCS</strong></span></p>
<p><span style="color: #6666ff;">Data: 46-1500 Bytes</span></p>
<ul>
<li>
<p>Following the Ethertype are 46 to 1,500 bytes of data, generally consisting of upper layer headers such as TCP/IP or IPX and then the actual user data.</p>
</li>
</ul>
<p><span style="color: #00ff00;">FCS: Last 4 Bytes </span></p>
<ul>
<li>
<p>The last 4 bytes that the adapter reads in are the Frame Check Sequence or CRC. When the voltage on the wire returns to zero, the adapter checks the last 4 bytes it received against a checksum that it generates via a complex polynomial. If the calculated checksum does not match the checksum on the frame, the frame is discarded and never reaches the memory buffers in the station.</p>
</li>
</ul>
</td>
</tr>
<tr>
<td style="height: 95px;">&nbsp;</td>
<td style="width: 629px;">&nbsp;</td>
</tr>
</tbody>
</table>
</div>]]></description>
			<category>Ethernet Protocol, CSMA/CD, Collisions</category>
			<pubDate>Sat, 28 May 2011 08:26:44 +1000</pubDate>
		</item>
		<item>
			<title>The IEEE 802.3 Frame Format </title>
			<link>https://www.firewall.cx/networking/ethernet/ieee-8023-frame.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/networking/ethernet/ieee-8023-frame.html</guid>
			<description><![CDATA[<p>The following is a description of the <strong>Ethernet Frame Format</strong> described in the IEEE 802.3 Specification. The <strong>802.3 Specification</strong> defines a <strong>14 byte Data Link Header</strong> followed by a <strong>Logical Link Control Header</strong> that is defined by the 802.2 Specification.</p>
<p style="text-align: justify;">The Diagram below analyses the <strong>Ethernet 802.3 Frame</strong>:</p>
<h2 style="text-align: justify;">The Data Link Header</h2>
<p align="center"><img src="https://www.firewall.cx/images/stories/ethernet-frames-802.3-1.gif" alt="ethernet-frames-802.3-1" width="624" height="172" style="display: block; margin-left: auto; margin-right: auto;" title="802.3 Ethernet Frame. Contains Datalink, Logical Link Control, Data and FCS" /></p>
<p><strong>Offset 0-5: The Destination Address</strong></p>
<ul style="text-align: justify;">
<li>The <strong>first six bytes</strong> of an Ethernet frame make up the <strong>Destination Address</strong>. The <strong>Destination Address</strong> specifies to which adapter the data frame is being sent. A <strong>Destination Address</strong> of all ones specifies a <strong>Broadcast Message</strong> that is read in by all receiving Ethernet adapters.</li>
<li>The <strong>first three bytes</strong> of the <strong>Destination Address</strong> are assigned by the IEEE to the vendor of the adapter and are specific to the vendor.</li>
<li>The <strong>Destination Address</strong> format is identical in all implementations of Ethernet.</li>
</ul>
<p><strong>Offset 6-11: The Source Address</strong></p>
<ul style="text-align: justify;">
<li>The <strong>next six bytes</strong> of an Ethernet frame make up the <strong>Source Address</strong>. The <strong>Source Address</strong> specifies from which adapter the message originated. Like the <strong>Destination Address</strong>, the first three bytes specify the vendor of the card.</li>
<li>The Source Address format is identical in all implementations of Ethernet.</li>
</ul>
<p><strong>Offset 12-13: Length</strong></p>
<ul style="text-align: justify;">
<li>Bytes 13 and 14 of an Ethernet frame contain the length of the data in the frame frame, not including the preamble, 32 bit CRC, DLC addresses, or the Length field itself. An Ethernet frame can be no shorter than 64 bytes total length, and no longer than 1518 bytes total length.</li>
</ul>
<h2>The 802.2 Logical Link Control (LLC) Header</h2>
<p align="center"><img src="https://www.firewall.cx/images/stories/ethernet-frames-802.3-2.gif" alt="ethernet-frames-802.3-2" width="624" height="172" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p style="text-align: justify;">Following the <strong>Datalink Header</strong> is the <strong>Logical Link Control Header (LLC)</strong>, which is described in the IEEE 802.2 Specification. The purpose of the <strong>LLC header</strong> is to provide a "hole in the ceiling" of the <strong>Datalink Layer</strong>. By specifying into which memory buffer the adapter places the data frame, the <strong>LLC header</strong> allows the upper layers to know where to find the data.</p>
<p><strong>Offset 15: The Destination Service Access Point (DSAP)</strong></p>
<ul style="text-align: justify;">
<li>The <strong>Destination Service Access Point (DSAP)</strong>, is a <strong>1 byte</strong> field that simply acts as a pointer to a memory buffer in the receiving station. It tells the receiving network interface card in which buffer to put this information. This functionality is crucial in situations where users are running multiple protocol stacks, etc...</li>
</ul>
<p><strong>Offset 16: The Source Service Access Point (SSAP)</strong></p>
<ul style="text-align: justify;">
<li>The <strong>Source Service Access Point (SSAP)</strong> is analogous to the <strong>DSAP</strong> and specifies the <strong>Source</strong> of the sending process.</li>
</ul>
<p><strong>Offset 17: The Control Byte</strong></p>
<ul style="text-align: justify;">
<li>
<p>Following the <strong>SAPs</strong> is a one byte control field that specifies the type of <strong>LLC</strong> frame that this is.<br /><br /></p>
</li>
</ul>
<h2>User Data And The Frame Check Sequence (FCS)</h2>
<p align="center"><img src="https://www.firewall.cx/images/stories/ethernet-frames-802.3-3.gif" alt="ethernet-frames-802.3-3" width="624" height="172" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p style="text-align: justify;"><strong>Data: 43-1497 Bytes</strong></p>
<ul style="text-align: justify;">
<li>Following the <strong>802.2 header</strong> are <strong>43 to 1497 bytes</strong> of data, generally consisting of upper layer headers such as TCP/IP or IPX and then the actual user data.</li>
</ul>
<p><strong>FCS: Last 4 Bytes</strong></p>
<ul style="text-align: justify;">
<li>The <strong>last 4 bytes</strong> that the adapter reads in are the <strong>Frame Check Sequence</strong> or <strong>CRC</strong>. When the voltage on the wire returns to zero, the adapter checks the <strong>last 4 bytes</strong> it received against a checksum that it generates via a complex polynomial. If the calculated checksum does not match the checksum on the frame, the frame is discarded and never reaches the memory buffers in the station.</li>
</ul>
<p>This completes our <strong>anaylsis</strong> of the <strong>Ethernet 802.3 frame</strong>.</p>
<p style="text-align: right;"><a href="https://www.firewall.cx//networking/ethernet.html" title="Back to Ethernet Frame Formats Section">Back to Ethernet Frame Formats Section</a></p>]]></description>
			<category>Ethernet Protocol, CSMA/CD, Collisions</category>
			<pubDate>Sat, 28 May 2011 07:36:35 +1000</pubDate>
		</item>
		<item>
			<title>Manchester Signal Encoding</title>
			<link>https://www.firewall.cx/networking/ethernet/ethernet-signal-encoding.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/networking/ethernet/ethernet-signal-encoding.html</guid>
			<description><![CDATA[<p style="text-align: justify;" align="left">The device driver software receives a frame of IP, IPX, NetBIOS, or other higher-layer protocol data. From this data, the device driver constructs a frame, with appropriate Ethernet header information and a frame check sequence at the end.</p>
<p style="text-align: justify;">The circuitry on the adapter card then takes the frame and converts it into an electrical signal. The voltage transitions in the transmitted bit stream are in accordance to the format called Manchester Signal Encoding. Manchester encoding describes how a binary ONE and ZERO are to be represented electrically. Manchester encoding is used in all 10 Megabit per second Ethernets; for example, 10BASE2 Thin Ethernet, 10BASE5 Thick Ethernet and 10BASE-T Twisted-Pair Ethernet.</p>
<p style="text-align: justify;">Here we see an example of the signal transitions used to encode the hexadecimal value "0E", which converts to "00001110" in binary:</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/en-sig1.jpg" alt="en-sig1" width="380" height="153" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p style="text-align: justify;">Notice that there is a consistent transition in the middle of each bit-time. Sometimes this transition is from low-to-high and sometimes it's from high-to-low. This is the clock transition. The receiving adapter circuitry 'locks on' to this constant signal transition and, thereby, identifies the timing to determine the beginning and end of each bit.</p>
<p style="text-align: justify;">To represent a binary ONE, the first half of the bit-time is a low voltage; the second half of a bit is always the opposite of the first half, that's how the clock transition is created. To represent a binary ZERO, the first half of the bit-time is a high voltage. You see that sometimes there is an additional transition at the beginning of a bit-time (not drawn in in the diagram above) where the signal is pulled either up or down in preparation for the next bit.</p>
<p style="text-align: justify;">Consider what happens if an external electromagnetic field interferes with the Manchester bit encoding. This external field could be the result of an electric motor, radio transmission or other source of interference. You should be able to see that if the Manchester signal is disrupted the bits will be destroyed - because the clock signal will be disrupted.</p>
<p style="text-align: justify;">It would not be reasonably possible for electrical interference to change a binary ONE into a binary ZERO. Since each bit is symmetrical (second half is always opposite the first half) the result of electrical noise would be the destruction of the bit, not a change in bit value.</p>]]></description>
			<category>Ethernet Protocol, CSMA/CD, Collisions</category>
			<pubDate>Sat, 28 May 2011 07:10:13 +1000</pubDate>
		</item>
		<item>
			<title>IEEE 802.3 Interframe Spacing</title>
			<link>https://www.firewall.cx/networking/ethernet/ethernet-interframe-spacing.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/networking/ethernet/ethernet-interframe-spacing.html</guid>
			<description><![CDATA[<p style="text-align: justify;">The IEEE 802.3 specification states that before a station can attempt to transmit on the wire, it must first wait until it has heard 9.6 microseconds of silence. Many popular myths have arisen surrounding the reasons for the 9.6 microsecond interframe gap. The purpose of this section is to clarify the true reason for the 9.6 microsecond interframe gap.</p>
<h2>Smaller Interframe Spacing</h2>
<p style="text-align: justify;">The sole reason for the 9.6 microsecond interframe gap is to allow the station that last transmitted to cycle its circuitry from transmit mode to receive mode. Without the interframe gap, it is possible that a station would miss a frame that was destined for it because it had not yet cycled back into receive mode.</p>
<p style="text-align: justify;">There is, however, an interesting sidebar to this discussion and that is that most Ethernet cards in today's market are capable of switching from transmit to receive in much less time than 9.6 microseconds. This is an example of what can happen when 1970's specifications are applied to 1990's technology. In fact, some adapter manufacturers are designing their cards with a smaller interframe spacing, thereby achieving higher data transfer rates than their competitors.</p>
<p style="text-align: justify;">The problem arises when cards with a smaller interframe spacing are mixed on a network with cards that meet the specifications. In this case, there is a potential for lost data.</p>
<p style="text-align: justify;">The moral of the story is that a network administrator needs to know what is going on in his or her network and be aware that not all vendors will stick to the specs. Contact your vendors and find out what they're doing differently -- it'll pay off!</p>
<p><br /><br /></p>]]></description>
			<category>Ethernet Protocol, CSMA/CD, Collisions</category>
			<pubDate>Sat, 28 May 2011 07:07:35 +1000</pubDate>
		</item>
		<item>
			<title>Ethernet Troubleshooting - Physical Frame Corruption</title>
			<link>https://www.firewall.cx/networking/ethernet/ethernet-troubleshooting.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/networking/ethernet/ethernet-troubleshooting.html</guid>
			<description><![CDATA[<p style="text-align: justify;">When troubleshooting your Ethernet network, the first thing to look for is physical frame corruption. In this essay, we will discuss the different causes of physical frame corruption and the characteristics of each one. It is important to remember that the frame corruption being discussed is SPECIFIC TO COAXIAL ETHERNET. Twisted-pair Ethernet implementation will NOT manifest these types of corruption patterns!</p>
<h2>Let's find the problem!</h2>
<p style="text-align: justify;">I am going to discusses troubleshooting with reference to the Network General Expert Sniffer Network Analyzer. While the tips here are universal, other Analyzers' behavior might differ in such a way as to make these tips invalid or unusable.</p>
<p style="text-align: justify;">There are four possible causes of physical frame corruption in an Ethernet Network, each one different in the way it corrupts the frame and therefore recognizable.</p>
<p style="text-align: justify;">The four causes are:</p>
<ul style="text-align: justify;">
<li><strong>Collisions</strong>. Caused by out of spec. cabling or faulty hardware.</li>
<li><strong>Signal Reflections</strong>. Caused by un-terminated cables, impedance mismatch and exceeding the maximum allowable bend radius of the cable.</li>
<li><strong>Electrical Noise</strong>. Caused by nearby power grids, fluorescent lighting, X-ray machines, etc...</li>
<li><strong>Malfunctioning Hardware</strong>. Caused by gremlins, helpful users, natural disasters, etc...</li>
</ul>
<p style="text-align: justify;">At the end of the section there is a troubleshooting flowchart to help you identify the cause of frame corruption. It is important to remember that these corruption patterns will only be evident on a coaxial Ethernet (10BASE-2 Thin Ethernet, 10BASE-5 Thick Ethernet). Twisted-Pair Ethernet networks, where each station is connected to a hub or switch, do not manifest these exact corruption patterns.</p>
<h2>Collisions</h2>
<p style="text-align: justify;">Collisions are the most easily recognizable of the four causes of physical frame corruption. Generally, when a collision occurs, several bytes of the preamble of the colliding frame will be read into your Sniffer's buffer before the signal is completely destroyed. You will see these bytes in the hexadecimal decode of the packet as either several bytes of AAs or several bytes of 55s at the very end of the frame (Remember, AAh=1010b, 55h=0101b. Depending on where the collision occurred, the preamble could be perceived as either of these).</p>
<p style="text-align: justify;">Because the preamble is only 8 bytes long, ending in 1011, if you see more than 8 bytes of AA or 55, then the corruption was not caused by a collision and more investigation is necessary.</p>
<h2>Signal Reflections</h2>
<p style="text-align: justify;">Signal reflections are caused by electrons literally "bouncing" back along the wire. One cause of signal reflection is an un-terminated cable. Electrons travel down the wire until they reach the cable's end where, with no resistor to absorb the voltage potential, they reflect back from the open end of the cable.</p>
<p style="text-align: justify;">Another cause of signal reflections is mixing cables with different impedances. Impedance can be thought of as the "rate of flow" of the wire. When electrons from the higher impedance wire attempt to travel through the lower impedance wire, some of them can't make it and are reflected back, destroying the signal.</p>
<p style="text-align: justify;">The final cause of signal reflections is when the maximum allowable bend radius of the cable is exceeded - the copper media is deformed, causing reflections.</p>
<p style="text-align: justify;">The characteristic of signal reflection is very short frames (typically less than 16-32 bytes), with no preamble in the frame and with all frames cut short within one or two bytes of the same place in the frame. Once again, this can be determined by viewing the frames in the Hexadecimal Decode view of your analyzer. The Expert Sniffer will also probably detect a high number of short or runt frames, as well as a high rate of physical frame corruption.</p>
<h2>Electrical Noise</h2>
<p style="text-align: justify;">Physical frame corruption caused by electrical noise is similar in appearance to corruption caused by reflections in that there is no preamble in the frame -- the frame just seems to stop short, but it is different in that the frames are generally cut off at random lengths.</p>
<h2>Hardware Malfunctions</h2>
<p style="text-align: justify;">Frame corruption caused by hardware malfunctions is potentially the hardest to diagnose because of the large number of ways that hardware can malfunction. Generally, hardware malfunctions will occur either randomly or constantly, but not regularly. The type of frame corruption is impossible to predict, generally manifesting as random "garbage" in the frame, but some common signs are:</p>
<ul style="text-align: justify;">
<li>A stream of ones or zeros. A transceiver has malfunctioned and is "jabbering" on the wire. Most transceivers have jabber detection circuitry that prevents the adapter from transmitting for longer than a certain preset time.</li>
<li>Gigantic frames (greater than 1500 bytes). Same as above.</li>
</ul>
<h2>Troubleshooting Flowchart</h2>
<p style="text-align: justify;">REMEMBER: This applies to corruption patterns that would be visible when viewing frames on a COAXIAL Ethernet.</p>
<p style="text-align: justify;"><strong>1. Is a preamble (less than 8 bytes of AA or 55) visible at the very end of the frame?</strong></p>
<p style="text-align: justify;">If yes:</p>
<ol style="text-align: justify;">
<li>
<p>Make sure you haven't exceeded the specifications of your cable (maximum cable length, maximum repeaters in between nodes, etc)</p>
</li>
<li>Use a "divide and conquer" method to isolate the troublemakers. Separate the network into halves using a bridge and see which side of the bridge the problems occur on. Now separate that half into halves, etc....</li>
</ol>
<p style="text-align: justify;">If no, go on.</p>
<p style="text-align: justify;"><strong>2. Are the corrupt frames very short, and consistently the same length?</strong></p>
<p style="text-align: justify;">If yes:</p>
<ol style="text-align: justify;">
<li>
<p>Your problem is probably related to signal reflection. First check for un-terminated cables. If the cable is terminated properly, your job becomes a lot harder. If new cable has been installed recently, impedance mismatch is probably the problem. Avoid this problem by buying all your cabling from the</p>
<p>same lot (if possible) and buying cabling all at once and putting extra in storage rather than ordering as needed. Finally, check for cable deformation due to bending the cable or placing heavy objects on the cable.</p>
</li>
<li>A Time Domain Reflectometer can really save you some work when diagnosing this type of problem. This device can tell you, probably to the foot, how far down the wire the signal reflection is occurring.</li>
</ol>
<p style="text-align: justify;">If no, go on.</p>
<p><strong>3. Are the frames random in length, all cut off cleanly with no signs of bit streaming or other hardware malfunction?</strong></p>
<p style="text-align: justify;">If yes:</p>
<ol style="text-align: justify;">
<li>Your problem is probably electrical noise. Use the "divide and conquer" method outlined in bullet number 1 to determine where the noise is occurring and then use your intuition. I've seen problems as bizarre as a dentist's X-ray machine being on the other side of the wall to the wiring closet and every time the dentist took an X-ray the network would go down!</li>
</ol>
<p style="text-align: justify;">If no, go on.</p>
<p><strong>4. If you've arrived at this point, your problem is probably hardware related. Use the "divide and conquer" method outlined in bullet 1.</strong></p>]]></description>
			<category>Ethernet Protocol, CSMA/CD, Collisions</category>
			<pubDate>Sat, 28 May 2011 06:58:36 +1000</pubDate>
		</item>
		<item>
			<title>Propagation Delay</title>
			<link>https://www.firewall.cx/networking/ethernet/propagation-delay.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/networking/ethernet/propagation-delay.html</guid>
			<description><![CDATA[<p style="text-align: justify;">You may know that the minimum frame size in an Ethernet network is 64 bytes or 512 bits, including the 32 bit CRC. You may also know that the maximum length of an Ethernet cable segment is 500 meters for 10BASE5 thick cabling and 185 meters for 10BASE2 thin cabling. It is, however, a much less well known fact that these two specifications are directly related. In this essay, we will discuss the relationship between minimum frame size and maximum cable length.</p>
<h2>Propagation Delay</h2>
<p style="text-align: justify;">Before we discuss frame size and cable length, an understanding of signal propagation in copper media is necessary. Electrical signals in a copper wire travel at approximately 2/3 the speed of light. This is referred to as the propagation speed of the signal. Since we know that Ethernet operates at 10Mbps or 10,000,000 bits per second, we can determine that the length of wire that one bit occupies is approximately equal to 20 metres or 60 feet via the following maths:</p>
<ul>
<li>speed of light in a vacuum = 300,000,000 metres/second</li>
<li>speed of electricity in a copper cable = 200,000,000 metres/second</li>
<li>(200,000,000 m/s) / (10,000,000 bits / s) = 20 metres per bit</li>
</ul>
<p style="text-align: justify;">We can further determine that a minimum size Ethernet frame consisting of 64 bytes or 512 bits will occupy 10,240 metres of cable.</p>
<h2>The Relationship</h2>
<p style="text-align: justify;">The only time that an Ethernet controller can detect collisions on the wire is when it is in the transmit mode. When an Ethernet NIC has finished transmitting and switches to receive mode, the only thing it listens for is the 64 bit preamble that signals the start of a data frame. The minimum frame size in Ethernet is specified such that, based on the speed of propagation of electrical signals in copper media, an Ethernet card is guaranteed to remain in transmit mode and therefore detecting collisions long enough for a collision to propagate back to it from the farthest point on the wire from it.</p>
<p style="text-align: justify;">Take, for example, a length of 10BASE5 thick Ethernet cabling exactly 500 meters long (the maximum that the spec allows) with two stations, Station A and Station B, attached to the farthest ends of it.</p>
<p style="text-align: justify;">If Station A begins to transmit, it will have transmitted 25 bits by the time the signal reaches Station B, 500 meters away. If Station B begins to transmit at the last possible instant before Station A's signal reaches it, the collision will reach Station A 25 bit-times later (the time it takes for the signal on the wire to travel one bit-length -- 20 metres in copper cable). Station A will have transmitted only 50 bits when the collision reaches it -- nowhere near the 512 bit boundary for an early collision.</p>
<p style="text-align: justify;">Upon closer examination, however, a peculiarity arises. If a normal collision happens before the 512 bit boundary, Station A would have to be over 5000 metres away from Station B before a late collision occurred. Examine the maths for yourself: 512 bits times 20 metres/bit = 10,240 metres. That's 256 bits or approximately 5000 metres for the signal to propagate from Station A to Station B and 5000 metres for the collision event to propagate back to and be detected by Station A. It seems like a late collision would never occur with a maximum cable length of only 500 meters. What is the reason for the overhead?</p>
<p style="text-align: justify;">The reason for the overhead is twofold. First of all, while the maximum possible cable segment length in Ethernet is 500 metres, it is possible to extend that length with up to 4 repeaters before the IEEE 802.3 spec is violated. This means that the signal may have to travel through as much as 2500 metres of cable to reach Station B, or 5000 metres of cable round trip. The second and final reason for the overhead lies solely in the carefulness of Ethernet's inventors. Generally the spec is twice as strict as it needs to be, allowing ample room for errors.</p>
<p style="text-align: justify;">Herein lies one of the greatest strengths and weaknesses of Ethernet. It is a strength in that if you need to, you can probably get away with violating the specs -- an extra length of cable here, an extra repeater there and your network continues to run normally. It is a weakness in that while you can get away with violating the specs, there is a very fine line between a network that is violating the specs and is running and a network that is violating the specs and is crippled by late collisions and you never know which extra bit of wire or extra repeater is going to cross the line.</p>
<p style="text-align: justify;">Despite this dire warning, there are some general rules for violating specs:</p>
<ul style="text-align: justify;">
<li>If your vendor tells you you can violate the spec and you're not mixing vendors, it's probably ok. If you mix vendors, obey the strictest vendor.</li>
<li>If something is wrong with your network and you know that it violates the spec in places, those places should be the first ones you check. Try segmenting the network with a bridge and see which side of the bridge the problems are on.</li>
</ul>]]></description>
			<category>Ethernet Protocol, CSMA/CD, Collisions</category>
			<pubDate>Sat, 28 May 2011 06:47:47 +1000</pubDate>
		</item>
		<item>
			<title>Late Ethernet Collisions</title>
			<link>https://www.firewall.cx/networking/ethernet/late-ethernet-collisions.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/networking/ethernet/late-ethernet-collisions.html</guid>
			<description><![CDATA[<p style="text-align: justify;">Late collisions, on the other hand, are not normal and are usually the result of out of spec. cabling or a malfunctioning adapter. A late collision is defined as any collision that occurs after 512 bits of the frame have been transmitted.</p>
<p style="text-align: justify;">In this discussion we will refer to the same network described in the discussion of early collisions, but with one modification: In this network, the network administrator has violated the maximum cable length (500 meters for 10BASE5 thick ethernet, 185 meters for 10BASE2 thin ethernet) by either adding too many repeaters in between Stations A and B or by laying too much wire between them.</p>
<p style="text-align: justify;">The following is an outline of a late collision event caused by out of spec. cabling:</p>
<p style="text-align: justify;">Station A, detecting that the wire has been idle for 9.6 microseconds, begins to transmit its data frame, beginning with the 64 bit preamble. Station A transmits 256 bits of its frame. If the cabling were in spec and Station B began to transmit, causing a collision, even if Stations A and B were on the farthest ends of the wire from each other the collision would be detected by station A before it could transmit its 512th bit. (Stage 1)</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/late-collision-1.gif" alt="late-collision-1" width="425" height="198" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p style="text-align: justify;" align="left">&nbsp;</p>
<p style="text-align: justify;" align="left">Station A continues to transmit bits, and meanwhile, down at the other end of the wire, just before the electrical signal reaches Station B, Station B detects idle wire for 9.6 microseconds and begins to transmit. (Stage 2)</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/late-collision-2.gif" alt="late-collision-2" width="425" height="198" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p style="text-align: justify;" align="left">&nbsp;</p>
<p style="text-align: justify;" align="left">A minute amount of time later, a collision occurs. (Stage 3) Station B, being extremely close to the collision, detects it first and begins transmitting a 32 bit jam signal.</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/late-collision-3.gif" alt="late-collision-3" width="425" height="198" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p style="text-align: justify;" align="left">&nbsp;</p>
<p style="text-align: justify;" align="left">The collision begins to propagate down the wire towards Station A (Stage 4), followed by the 32 Bit Jam signal generated from Station B.</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/late-collision-4.gif" alt="late-collision-4" width="425" height="198" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p style="text-align: justify;" align="left">&nbsp;</p>
<p style="text-align: justify;" align="left">But because the cabling was out of spec. by the time it gets to Station A, Station A has already finished transmitting and is no longer listening for collisions! (Stage 5) Station A is completely unaware that a collision has occurred!</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/late-collision-5.gif" alt="late-collision-5" width="425" height="198" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p style="text-align: justify;">The reason that late collisions are a problem is that once the NIC misses the fact that a collision has occurred, recovery and retransmission are left to the upper layers and recovery time goes up drastically. While a NIC will typically recover and retransmit a frame in 2-3 milliseconds, it typically takes anywhere from 10 to 100 times that long for upper layers.</p>
<p style="text-align: justify;">The other major cause of late collisions is a malfunctioning NIC. If a NIC malfunctions in such a manner that it is unable to detect that another station is talking, late (and early) collisions will occur.</p>]]></description>
			<category>Ethernet Protocol, CSMA/CD, Collisions</category>
			<pubDate>Sat, 28 May 2011 06:27:32 +1000</pubDate>
		</item>
		<item>
			<title>Early Ethernet Collisions</title>
			<link>https://www.firewall.cx/networking/ethernet/early-ethernet-collisions.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/networking/ethernet/early-ethernet-collisions.html</guid>
			<description><![CDATA[<p style="text-align: justify;" align="left">In this example, we will refer to an imaginary Ethernet network consisting of Stations A and B and any number of other stations. The status of the network is such that the wire is idle (nobody is talking) and 9.6 microseconds have passed since anybody last talked on the wire.</p>
<p style="text-align: justify;" align="left">An early collision is any collision that occurs before 512 bits of the frame have been put onto the wire.</p>
<p style="text-align: justify;" align="left">The following is an outline of a normal or "early" collision event:</p>
<p style="text-align: justify;" align="left">Station A, detecting that the wire has been idle for 9.6 microseconds, begins to transmit its data frame, beginning with the 64 bit preamble. While Station A is transmitting, it is also listening for abnormal voltage on the wire -- a signal that a collision has occurred. (Stage 1)</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/early-collision-1.gif" alt="early-collision-1" width="425" height="198" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p style="text-align: justify;" align="left">&nbsp;</p>
<p style="text-align: justify;" align="left">Some period of time later, but before the signal from Station A has had time to propagate down the wire to Station B, Station B also detects that the wire has been idle for 9.6 microseconds and begins to transmit its data frame beginning with the 64 bit preamble. Station B is also listening for a collision on the wire. (Stage 2)</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/early-collision-2.gif" alt="early-collision-2" width="425" height="170" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p style="text-align: justify;" align="left">&nbsp;</p>
<p style="text-align: justify;" align="left">At some point on the wire in between Station A and Station B the electrical signals overlap, creating a point of abnormal voltage. As the signals continue to propagate, this abnormal voltage travels down the wire towards both Station A and Station B. (Stage 3)</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/early-collision-3.gif" alt="early-collision-3" width="425" height="170" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p style="text-align: justify;" align="left">&nbsp;</p>
<p style="text-align: justify;" align="left">Whichever station is closest to the physical point on the wire where the two signals overlapped will detect the collision first. For the sake of this discussion, we will say that Station A detects the collision first. (Stage 4)</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/early-collision-4.gif" alt="early-collision-4" width="425" height="170" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p style="text-align: justify;" align="left">&nbsp;</p>
<p style="text-align: justify;" align="left">Station A, detecting the abnormal voltage on the wire and realizing that a collision has occurred, immediately stops transmitting data and transmits a 32 bit "jam" onto the wire. (Stage 5)</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/early-collision-5.gif" alt="early-collision-5" width="425" height="198" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p style="text-align: justify;">The 32bit jam consists of any combination of values that is not a valid CRC for the frame that was just interrupted by the collision. Most Ethernet cards today just send 32 ones and know that there is only a 1/(2^32) chance that that will be the checksum -- pretty good odds. The purpose of the 32 bit jam is to fully propagate the wire with voltage, preventing anybody else from talking.</p>
<p style="text-align: justify;">Station A will then implement an algorithm known as the Truncated Binary Exponential Backoff Algorithm, which determines how long it will wait before it attempts to retransmit the frame that was just interrupted. The interrupted frame is referred to as a Runt.</p>
<p style="text-align: justify;">Next, Station B will detect the collision. Station B will also send a 32 bit jam and implement the Truncated Binary Exponential Backoff Algorithm. (Stage 6)</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/early-collision-6.gif" alt="early-collision-6" width="425" height="198" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p style="text-align: justify;" align="left">Early collisions occur regularly in a normally operating Ethernet network. There is no hardware malfunction or misbehaving station -- it just so happens that two NICs start to talk at the same time. Generally, after the talkers implement the backoff algorithm which is specially designed to not have both NICs attempt to talk at the same time again, both talkers will successfully put their frame onto the wire. It typically takes no longer than 2-3 milliseconds for a station to recover from a collision and successfully retransmit its frame.</p>]]></description>
			<category>Ethernet Protocol, CSMA/CD, Collisions</category>
			<pubDate>Sat, 28 May 2011 06:11:04 +1000</pubDate>
		</item>
		<item>
			<title>Introduction to Ethernet Collisions </title>
			<link>https://www.firewall.cx/networking/ethernet/ethernet-collisions.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/networking/ethernet/ethernet-collisions.html</guid>
			<description><![CDATA[<p style="text-align: justify;" align="left">The word "Collision" shouldn't be any new news to people who work with networks everyday. If it is thought, don't worrie, that's why you are here.</p>
<p style="text-align: justify;" align="left">A collision is an event that happens on an Ethernet network when two stations simultaneously "talk" on the wire. Collisions are a normal part of life in an Ethernet network and under most circumstances should not be considered a problem.</p>
<p style="text-align: justify;" align="left">Even thought alot of people know that collisions do happen on a network, what they don't know is that there are two different type of collisions ! Yes, thats right, two different type of collissions, one is the <a href="https://www.firewall.cx/networking/ethernet/early-ethernet-collisions.html" target="_blank" title="Early Collisions">Early Collisions</a> and the other, <a href="https://www.firewall.cx/networking/ethernet/late-ethernet-collisions.html" target="_blank" title="Late Collisions">Late Collisions </a>.</p>
<p style="text-align: justify;" align="left">We will have a look at two collision examples (one of each) in the next couple of pages, and these examples have been carefully selected to help you understand the difference between the two types of collisions. Also, we are going to have a look at the events leading up to and immediately following a collision.</p>
<p style="text-align: justify;" align="left">You can use the menu to get to the next pages or simply click on the links below :</p>
<ul>
<li style="text-align: justify;"><a href="https://www.firewall.cx/networking/ethernet/early-ethernet-collisions.html">Early Ethernet Collisions</a></li>
<li style="text-align: justify;"><a href="https://www.firewall.cx/networking/ethernet/late-ethernet-collisions.html">Late Ethernet Collisions</a></li>
</ul>]]></description>
			<category>Ethernet Protocol, CSMA/CD, Collisions</category>
			<pubDate>Sat, 28 May 2011 06:08:15 +1000</pubDate>
		</item>
		<item>
			<title>What is CSMA/CD ?</title>
			<link>https://www.firewall.cx/networking/ethernet/ethernet-csma-cd.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/networking/ethernet/ethernet-csma-cd.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><strong>CSMA/CD</strong> stands for <strong>Carrier Sense Multiple Access</strong> with <strong>Collision Detection</strong>. It refers to the means of media access, or deciding "who gets to talk" in an Ethernet network.</p>
<p style="text-align: justify;">A more elegant term for "who gets to talk" is to refer to the "media access method", which, in this case, would be "CSMA/CD".</p>
<p style="text-align: justify;"><strong>Carrier Sense</strong> means that before a station will "talk" onto an Ethernet wire, it will listen for the "carrier" that is present when another station is talking. If another station is talking, this station will wait until there is no carrier present.</p>
<p style="text-align: justify;"><strong>Multiple Access</strong> refers to the fact that when a station is done transmitting it is allowed to immediately make another access to the medium (a 'multiple' access). This is as opposed to a Token-Ring network where a station is required to perform other tasks inbetween accessing the medium (like releasing a token or sometimes releasing a management frame).</p>
<p style="text-align: justify;"><strong>Collision Detection</strong> refers to the ability of an Ethernet adapter to detect the resulting "collision" of electrical signals and react appropriately. In a normally operating Ethernet network, it will sometimes occur that two stations simultaneously detect no carrier and begin to talk. In this case the two electrical signals will interfere with each other and result in a collision; an event which is detected by the Collision Detection circuitry in the transmitting network interface cards.</p>
<p style="text-align: justify;">The process of CSMA/CD is implemented slightly differently in a twisted pair (as opposed to a coaxial) Ethernet network.</p>
<p style="text-align: right;">Back to <a href="https://www.firewall.cx/networking/ethernet.html" title="Ethernet Protocol">Ethernet Protocol</a> section</p>]]></description>
			<category>Ethernet Protocol, CSMA/CD, Collisions</category>
			<pubDate>Sat, 28 May 2011 06:02:34 +1000</pubDate>
		</item>
	</channel>
</rss>
