🎧 New: AI-Generated Podcasts Turn your study notes into engaging audio conversations. Learn more

Module 4 Ethernet Switching and Network Layer.pdf

Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Full Transcript

Module 7: Ethernet Switching Introduction to Networks v7.0 (ITN) Module Objectives Module Title: Ethernet Switching Module Objective: Explain how Ethernet works in a switched network. Topic Title Topic Objective Explain how the...

Module 7: Ethernet Switching Introduction to Networks v7.0 (ITN) Module Objectives Module Title: Ethernet Switching Module Objective: Explain how Ethernet works in a switched network. Topic Title Topic Objective Explain how the Ethernet sublayers are related to the frame Ethernet Frame fields. Ethernet MAC Address Describe the Ethernet MAC address. Explain how a switch builds its MAC address table and The MAC Address Table forwards frames. Describe switch forwarding methods and port settings Switch Speeds and Forwarding Methods available on Layer 2 switch ports. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 7.1 Ethernet Frames © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3 Ethernet Frames Ethernet Encapsulation Ethernet operates in the data link layer and the physical layer. It is a family of networking technologies defined in the IEEE 802.2 and 802.3 standards. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4 Ethernet Frames Data Link Sublayers The 802 LAN/MAN standards, including Ethernet, use two separate sublayers of the data link layer to operate: LLC Sublayer: (IEEE 802.2) Places information in the frame to identify which network layer protocol is used for the frame. MAC Sublayer: (IEEE 802.3, 802.11, or 802.15) Responsible for data encapsulation and media access control, and provides data link layer addressing. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5 Ethernet Frames MAC Sublayer The MAC sublayer is responsible for data encapsulation and accessing the media. Data Encapsulation IEEE 802.3 data encapsulation includes the following: 1. Ethernet frame - This is the internal structure of the Ethernet frame. 2. Ethernet Addressing - The Ethernet frame includes both a source and destination MAC address to deliver the Ethernet frame from Ethernet NIC to Ethernet NIC on the same LAN. 3. Ethernet Error detection - The Ethernet frame includes a frame check sequence (FCS) trailer used for error detection. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6 Ethernet Frames MAC Sublayer Media Access The IEEE 802.3 MAC sublayer includes the specifications for different Ethernet communications standards over various types of media including copper and fiber. Legacy Ethernet using a bus topology or hubs, is a shared, half-duplex medium. Ethernet over a half-duplex medium uses a contention-based access method, carrier sense multiple access/collision detection (CSMA/CD). Ethernet LANs of today use switches that operate in full-duplex. Full-duplex communications with Ethernet switches do not require access control through CSMA/CD. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7 Ethernet Frames Ethernet Frame Fields The minimum Ethernet frame size is 64 bytes and the maximum is 1518 bytes. The preamble field is not included when describing the size of the frame. Any frame less than 64 bytes in length is considered a “collision fragment” or “runt frame” and is automatically discarded. Frames with more than 1500 bytes of data are considered “jumbo” or “baby giant frames”. If the size of a transmitted frame is less than the minimum, or greater than the maximum, the receiving device drops the frame. Dropped frames are likely to be the result of collisions or other unwanted signals. They are considered invalid. Jumbo frames are usually supported by most Fast Ethernet and Gigabit Ethernet switches and NICs. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8 Ethernet Frames Lab – Use Wireshark to Examine Ethernet Frames In this lab, you will complete the following objectives: Part 1: Examine the Header Fields in an Ethernet II Frame Part 2: Use Wireshark to Capture and Analyze Ethernet Frames © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9 7.2 Ethernet MAC Address © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10 Ethernet MAC Addresses MAC Address and Hexadecimal An Ethernet MAC address consists of a 48-bit binary value, expressed using 12 hexadecimal values. Given that 8 bits (one byte) is a common binary grouping, binary 00000000 to 11111111 can be represented in hexadecimal as the range 00 to FF, When using hexadecimal, leading zeroes are always displayed to complete the 8-bit representation. For example the binary value 0000 1010 is represented in hexadecimal as 0A. Hexadecimal numbers are often represented by the value preceded by 0x (e.g., 0x73) to distinguish between decimal and hexadecimal values in documentation. Hexadecimal may also be represented by a subscript 16, or the hex number followed by an H (e.g., 73H). © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11 Ethernet MAC Addresses Ethernet MAC Address In an Ethernet LAN, every network device is connected to the same, shared media. MAC addressing provides a method for device identification at the data link layer of the OSI model. An Ethernet MAC address is a 48-bit address expressed using 12 hexadecimal digits. Because a byte equals 8 bits, we can also say that a MAC address is 6 bytes in length. All MAC addresses must be unique to the Ethernet device or Ethernet interface. To ensure this, all vendors that sell Ethernet devices must register with the IEEE to obtain a unique 6 hexadecimal (i.e., 24-bit or 3-byte) code called the organizationally unique identifier (OUI). An Ethernet MAC address consists of a 6 hexadecimal vendor OUI code followed by a 6 hexadecimal vendor-assigned value. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12 Ethernet MAC Addresses Frame Processing When a device is forwarding a message to an Ethernet network, the Ethernet header include a Source MAC address and a Destination MAC address. When a NIC receives an Ethernet frame, it examines the destination MAC address to see if it matches the physical MAC address that is stored in RAM. If there is no match, the device discards the frame. If there is a match, it passes the frame up the OSI layers, where the de-encapsulation process takes place. Note: Ethernet NICs will also accept frames if the destination MAC address is a broadcast or a multicast group of which the host is a member. Any device that is the source or destination of an Ethernet frame, will have an Ethernet NIC and therefore, a MAC address. This includes workstations, servers, printers, mobile devices, and routers. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13 Ethernet MAC Addresses Unicast MAC Address In Ethernet, different MAC addresses are used for Layer 2 unicast, broadcast, and multicast communications. A unicast MAC address is the unique address that is used when a frame is sent from a single transmitting device to a single destination device. The process that a source host uses to determine the destination MAC address associated with an IPv4 address is known as Address Resolution Protocol (ARP). The process that a source host uses to determine the destination MAC address associated with an IPv6 address is known as Neighbor Discovery (ND). Note: The source MAC address must always be a unicast. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14 Ethernet MAC Addresses Broadcast MAC Address An Ethernet broadcast frame is received and processed by every device on the Ethernet LAN. The features of an Ethernet broadcast are as follows: It has a destination MAC address of FF-FF-FF- FF-FF-FF in hexadecimal (48 ones in binary). It is flooded out all Ethernet switch ports except the incoming port. It is not forwarded by a router. If the encapsulated data is an IPv4 broadcast packet, this means the packet contains a destination IPv4 address that has all ones (1s) in the host portion. This numbering in the address means that all hosts on that local network (broadcast domain) will receive and process the packet. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15 Ethernet MAC Addresses Multicast MAC Address An Ethernet multicast frame is received and processed by a group of devices that belong to the same multicast group. There is a destination MAC address of 01-00-5E when the encapsulated data is an IPv4 multicast packet and a destination MAC address of 33-33 when the encapsulated data is an IPv6 multicast packet. There are other reserved multicast destination MAC addresses for when the encapsulated data is not IP, such as Spanning Tree Protocol (STP). It is flooded out all Ethernet switch ports except the incoming port, unless the switch is configured for multicast snooping. It is not forwarded by a router, unless the router is configured to route multicast packets. Because multicast addresses represent a group of addresses (sometimes called a host group), they can only be used as the destination of a packet. The source will always be a unicast address. As with the unicast and broadcast addresses, the multicast IP address requires a corresponding multicast MAC address. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16 Ethernet MAC Addresses Lab – View Network Device MAC Addresses In this lab, you will complete the following objectives: Part 1: Set Up the Topology and Initialize Devices Part 2: Configure Devices and Verify Connectivity Part 3: Display, Describe, and Analyze Ethernet MAC Addresses © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17 7.3 The MAC Address Table © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18 The MAC Address Table Switch Fundamentals A Layer 2 Ethernet switch uses Layer 2 MAC addresses to make forwarding decisions. It is completely unaware of the data (protocol) being carried in the data portion of the frame, such as an IPv4 packet, an ARP message, or an IPv6 ND packet. The switch makes its forwarding decisions based solely on the Layer 2 Ethernet MAC addresses. An Ethernet switch examines its MAC address table to make a forwarding decision for each frame, unlike legacy Ethernet hubs that repeat bits out all ports except the incoming port. When a switch is turned on, the MAC address table is empty Note: The MAC address table is sometimes referred to as a content addressable memory (CAM) table. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19 The MAC Address Table Switch Learning and Forwarding Examine the Source MAC Address (Learn) Every frame that enters a switch is checked for new information to learn. It does this by examining the source MAC address of the frame and the port number where the frame entered the switch. If the source MAC address does not exist, it is added to the table along with the incoming port number. If the source MAC address does exist, the switch updates the refresh timer for that entry. By default, most Ethernet switches keep an entry in the table for 5 minutes. Note: If the source MAC address does exist in the table but on a different port, the switch treats this as a new entry. The entry is replaced using the same MAC address but with the more current port number. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20 The MAC Address Table Switch Learning and Forwarding (Contd.) Find the Destination MAC Address (Forward) If the destination MAC address is a unicast address, the switch will look for a match between the destination MAC address of the frame and an entry in its MAC address table. If the destination MAC address is in the table, it will forward the frame out the specified port. If the destination MAC address is not in the table, the switch will forward the frame out all ports except the incoming port. This is called an unknown unicast. Note: If the destination MAC address is a broadcast or a multicast, the frame is also flooded out all ports except the incoming port. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21 The MAC Address Table Filtering Frames As a switch receives frames from different devices, it is able to populate its MAC address table by examining the source MAC address of every frame. When the MAC address table of the switch contains the destination MAC address, it is able to filter the frame and forward out a single port. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22 The MAC Address Table Video – MAC Address Tables on Connected Switches This video will cover the following: How switches build MAC address tables How switches forward frames base on the content of their MAC address tables © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23 The MAC Address Table Video – Sending the Frame to the Default Gateway This video will cover the following: What a switch does when the destination AMC address is not listed in the switch’s MAC address table. What a switch does when the source AMC address is not listed in the switch’s MAC address table © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24 The MAC Address Table Lab – View the Switch MAC Address Table In this lab, you will complete the following objectives: Part 1: Build and Configure the Network Part 2: Examine the Switch MAC Address Table © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25 7.4 Switch Speeds and Forwarding Methods © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26 Switch Speeds and Forwarding Methods Frame Forwarding Methods on Cisco Switches Switches use one of the following forwarding methods for switching data between network ports: Store-and-forward switching - This frame forwarding method receives the entire frame and computes the CRC. If the CRC is valid, the switch looks up the destination address, which determines the outgoing interface. Then the frame is forwarded out of the correct port. Cut-through switching - This frame forwarding method forwards the frame before it is entirely received. At a minimum, the destination address of the frame must be read before the frame can be forwarded. A big advantage of store-and-forward switching is that it determines if a frame has errors before propagating the frame. When an error is detected in a frame, the switch discards the frame. Discarding frames with errors reduces the amount of bandwidth consumed by corrupt data. Store-and-forward switching is required for quality of service (QoS) analysis on converged networks where frame classification for traffic prioritization is necessary. For example, voice over IP (VoIP) data streams need to have priority over web-browsing traffic. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27 Switch Speeds and Forwarding Methods Cut-Through Switching In cut-through switching, the switch acts upon the data as soon as it is received, even if the transmission is not complete. The switch buffers just enough of the frame to read the destination MAC address so that it can determine to which port it should forward out the data. The switch does not perform any error checking on the frame. There are two variants of cut-through switching: Fast-forward switching - Offers the lowest level of latency by immediately forwarding a packet after reading the destination address. Because fast-forward switching starts forwarding before the entire packet has been received, there may be times when packets are relayed with errors. The destination NIC discards the faulty packet upon receipt. Fast- forward switching is the typical cut-through method of switching. Fragment-free switching - A compromise between the high latency and high integrity of store-and-forward switching and the low latency and reduced integrity of fast-forward switching, the switch stores and performs an error check on the first 64 bytes of the frame before forwarding. Because most network errors and collisions occur during the first 64 bytes, this ensures that a collision has not occurred before forwarding the frame. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28 Switch Speeds and Forwarding Methods Memory Buffering on Switches An Ethernet switch may use a buffering technique to store frames before forwarding them or when the destination port is busy because of congestion. Method Description Frames are stored in queues that are linked to specific incoming and outgoing ports. A frame is transmitted to the outgoing port only when all the frames ahead in the queue have been successfully transmitted. Port-based memory It is possible for a single frame to delay the transmission of all the frames in memory because of a busy destination port. This delay occurs even if the other frames could be transmitted to open destination ports. Deposits all frames into a common memory buffer shared by all switch ports and the amount of buffer memory required by a port is dynamically allocated. Shared memory The frames in the buffer are dynamically linked to the destination port enabling a packet to be received on one port and then transmitted on another port, without moving it to a different queue. Shared memory buffering also results in larger frames that can be transmitted with fewer dropped frames. This is important with asymmetric switching which allows for different data rates on different ports. Therefore, more bandwidth can be dedicated to certain ports (e.g., server port). © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29 Switch Speeds and Forwarding Methods Duplex and Speed Settings Two of the most basic settings on a switch are the bandwidth (“speed”) and duplex settings for each individual switch port. It is critical that the duplex and bandwidth settings match between the switch port and the connected devices. There are two types of duplex settings used for communications on an Ethernet network: Full-duplex - Both ends of the connection can send and receive simultaneously. Half-duplex - Only one end of the connection can send at a time. Autonegotiation is an optional function found on most Ethernet switches and NICs. It enables two devices to automatically negotiate the best speed and duplex capabilities. Note: Gigabit Ethernet ports only operate in full-duplex. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30 Switch Speeds and Forwarding Methods Duplex and Speed Settings Duplex mismatch is one of the most common causes of performance issues on 10/100 Mbps Ethernet links. It occurs when one port on the link operates at half- duplex while the other port operates at full-duplex. This can occur when one or both ports on a link are reset, and the autonegotiation process does not result in both link partners having the same configuration. It also can occur when users reconfigure one side of a link and forget to reconfigure the other. Both sides of a link should have autonegotiation on, or both sides should have it off. Best practice is to configure both Ethernet switch ports as full-duplex. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31 Switch Speeds and Forwarding Methods Auto-MDIX Connections between devices once required the use of either a crossover or straight- through cable. The type of cable required depended on the type of interconnecting devices. Note: A direct connection between a router and a host requires a cross-over connection. Most switch devices now support the automatic medium-dependent interface crossover (auto-MDIX) feature. When enabled, the switch automatically detects the type of cable attached to the port and configures the interfaces accordingly. The auto-MDIX feature is enabled by default on switches running Cisco IOS Release 12.2(18)SE or later. However, the feature could be disabled. For this reason, you should always use the correct cable type and not rely on the auto-MDIX feature. Auto-MDIX can be re-enabled using the mdix auto interface configuration command. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32 Module Practice and Quiz What did I learn in this module? Ethernet operates in the data link layer and the physical layer. Ethernet standards define both the Layer 2 protocols and the Layer 1 technologies. Ethernet uses the LLC and MAC sublayers of the data link layer to operate. The Ethernet frame fields are: preamble and start frame delimiter, destination MAC address, source MAC address, EtherType, data, and FCS. MAC addressing provides a method for device identification at the data link layer of the OSI model. An Ethernet MAC address is a 48-bit address expressed using 12 hexadecimal digits, or 6 bytes. When a device is forwarding a message to an Ethernet network, the Ethernet header includes the source and destination MAC addresses. In Ethernet, different MAC addresses are used for Layer 2 unicast, broadcast, and multicast communications. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33 Module Practice and Quiz What did I learn in this module? (Contd.) A Layer 2 Ethernet switch makes its forwarding decisions based solely on the Layer 2 Ethernet MAC addresses. The switch dynamically builds the MAC address table by examining the source MAC address of the frames received on a port. The switch forwards frames by searching for a match between the destination MAC address in the frame and an entry in the MAC address table. Switches use one of the following forwarding methods for switching data between network ports: store-and-forward switching or cut-through switching. Two variants of cut-through switching are fast-forward and fragment-free. Two methods of memory buffering are port-based memory and shared memory. There are two types of duplex settings used for communications on an Ethernet network: full- duplex and half-duplex. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34 Module 8: Network Layer Introduction to Networks v7.0 (ITN) Module 8: Topics What will I learn to do in this module? Topic Title Topic Objective Network Layer Explain how the network layer uses IP protocols for reliable Characteristics communications. IPv4 Packet Explain the role of the major header fields in the IPv4 packet. IPv6 Packet Explain the role of the major header fields in the IPv6 packet. Explain how network devices use routing tables to direct packets to a How a Host Routes destination network. Router Routing Tables Explain the function of fields in the routing table of a router. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37 8.1 Network Layer Characteristics © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38 Network Layer Characteristics The Network Layer Provides services to allow end devices to exchange data IP version 4 (IPv4) and IP version 6 (IPv6) are the principle network layer communication protocols. The network layer performs four basic operations: Addressing end devices Encapsulation Routing De-encapsulation © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39 Network Layer Characteristics IP Encapsulation IP encapsulates the transport layer segment. IP can use either an IPv4 or IPv6 packet and not impact the layer 4 segment. IP packet will be examined by all layer 3 devices as it traverses the network. The IP addressing does not change from source to destination. Note: NAT will change addressing, but will be discussed in a later module. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40 Network Layer Characteristics Characteristics of IP IP is meant to have low overhead and may be described as: Connectionless Best Effort Media Independent © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41 Network Layer Characteristics Connectionless IP is Connectionless IP does not establish a connection with the destination before sending the packet. There is no control information needed (synchronizations, acknowledgments, etc.). The destination will receive the packet when it arrives, but no pre-notifications are sent by IP. If there is a need for connection-oriented traffic, then another protocol will handle this (typically TCP at the transport layer). © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42 Network Layer Characteristics Best Effort IP is Best Effort IP will not guarantee delivery of the packet. IP has reduced overhead since there is no mechanism to resend data that is not received. IP does not expect acknowledgments. IP does not know if the other device is operational or if it received the packet. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43 Network Layer Characteristics Media Independent IP is unreliable: It cannot manage or fix undelivered or corrupt packets. IP cannot retransmit after an error. IP cannot realign out of sequence packets. IP must rely on other protocols for these functions. IP is media Independent: IP does not concern itself with the type of frame required at the data link layer or the media type at the physical layer. IP can be sent over any media type: copper, fiber, or wireless. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44 Network Layer Characteristics Media Independent (Contd.) The network layer will establish the Maximum Transmission Unit (MTU). Network layer receives this from control information sent by the data link layer. The network then establishes the MTU size. Fragmentation is when Layer 3 splits the IPv4 packet into smaller units. Fragmenting causes latency. IPv6 does not fragment packets. Example: Router goes from Ethernet to a slow WAN with a smaller MTU © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 45 8.2 IPv4 Packet © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 46 IPv4 Packet IPv4 Packet Header IPv4 is the primary communication protocol for the network layer. The network header has many purposes: It ensures the packet is sent in the correct direction (to the destination). It contains information for network layer processing in various fields. The information in the header is used by all layer 3 devices that handle the packet © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47 IPv4 Packet IPv4 Packet Header Fields The IPv4 network header characteristics: It is in binary. Contains several fields of information Diagram is read from left to right, 4 bytes per line The two most important fields are the source and destination. Protocols may have may have one or more functions. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 48 IPv4 Packet IPv4 Packet Header Fields Significant fields in the IPv4 header: Function Description Version This will be for v4, as opposed to v6, a 4 bit field= 0100 Differentiated Services Used for QoS: DiffServ – DS field or the older IntServ – ToS or Type of Service Header Checksum Detect corruption in the IPv4 header Time to Live (TTL) Layer 3 hop count. When it becomes zero the router will discard the packet. Protocol I.D.s next level protocol: ICMP, TCP, UDP, etc. Source IPv4 Address 32 bit source address Destination IPV4 Address 32 bit destination address © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 49 IPv4 Packet Video – Sample IPv4 Headers in Wireshark This video will cover the following: IPv4 Ethernet packets in Wireshark The control information The difference between packets © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 50 8.3 IPv6 Packets © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 51 IPv6 Packets Limitations of IPv4 IPv4 has three major limitations: IPv4 address depletion – We have basically run out of IPv4 addressing. Lack of end-to-end connectivity – To make IPv4 survive this long, private addressing and NAT were created. This ended direct communications with public addressing. Increased network complexity – NAT was meant as temporary solution and creates issues on the network as a side effect of manipulating the network headers addressing. NAT causes latency and troubleshooting issues. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 52 IPv6 Packets IPv6 Overview IPv6 was developed by Internet Engineering Task Force (IETF). IPv6 overcomes the limitations of IPv4. Improvements that IPv6 provides: Increased address space – based on 128 bit address, not 32 bits Improved packet handling – simplified header with fewer fields Eliminates the need for NAT – since there is a huge amount of addressing, there is no need to use private addressing internally and be mapped to a shared public address © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 53 IPv6 Packets IPv4 Packet Header Fields in the IPv6 Packet Header The IPv6 header is simplified, but not smaller. The header is fixed at 40 Bytes or octets long. Several IPv4 fields were removed to improve performance. Some IPv4 fields were removed to improve performance: Flag Fragment Offset Header Checksum © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 54 IPv6 Packets IPv6 Packet Header Significant fields in the IPv4 header: Function Description Version This will be for v6, as opposed to v4, a 4 bit field= 0110 Traffic Class Used for QoS: Equivalent to DiffServ – DS field Flow Label Informs device to handle identical flow labels the same way, 20 bit field Payload Length This 16-bit field indicates the length of the data portion or payload of the IPv6 packet Next Header I.D.s next level protocol: ICMP, TCP, UDP, etc. Hop Limit Replaces TTL field Layer 3 hop count Source IPv4 Address 128 bit source address Destination IPV4 Address 128 bit destination address © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 55 IPv6 Packets IPv6 Packet Header (Cont.) IPv6 packet may also contain extension headers (EH). EH headers characteristics: provide optional network layer information are optional are placed between IPv6 header and the payload may be used for fragmentation, security, mobility support, etc. Note: Unlike IPv4, routers do not fragment IPv6 packets. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 56 IPv6 Packets Video – Sample IPv6 Headers in Wireshark This video will cover the following: IPv6 Ethernet packets in Wireshark The control information The difference between packets © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 57 8.4 How a Host Routes © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 58 How a Host Routes Host Forwarding Decision Packets are always created at the source. Each host devices creates their own routing table. A host can send packets to the following: Itself – 127.0.0.1 (IPv4), ::1 (IPv6) Local Hosts – destination is on the same LAN Remote Hosts – devices are not on the same LAN © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 59 How a Host Routes Host Forwarding Decision (Cont.) The Source device determines whether the destination is local or remote Method of determination: IPv4 – Source uses its own IP address and Subnet mask, along with the destination IP address IPv6 – Source uses the network address and prefix advertised by the local router Local traffic is dumped out the host interface to be handled by an intermediary device. Remote traffic is forwarded directly to the default gateway on the LAN. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 60 How a Host Routes Default Gateway A router or layer 3 switch can be a default-gateway. Features of a default gateway (DGW): It must have an IP address in the same range as the rest of the LAN. It can accept data from the LAN and is capable of forwarding traffic off of the LAN. It can route to other networks. If a device has no default gateway or a bad default gateway, its traffic will not be able to leave the LAN. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 61 How a Host Routes A Host Routes to the Default Gateway The host will know the default gateway (DGW) either statically or through DHCP in IPv4. IPv6 sends the DGW through a router solicitation (RS) or can be configured manually. A DGW is static route which will be a last resort route in the routing table. All device on the LAN will need the DGW of the router if they intend to send traffic remotely. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 62 How a Host Routes Host Routing Tables On Windows, route print or netstat -r to display the PC routing table Three sections displayed by these two commands: Interface List – all potential interfaces and MAC addressing IPv4 Routing Table IPv6 Routing Table © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 63 8.5 Introduction to Routing © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 64 Introduction to Routing Router Packet Forwarding Decision What happens when the router receives the frame from the host device? © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 65 Introduction to Routing IP Router Routing Table There three types of routes in a router’s routing table: Directly Connected – These routes are automatically added by the router, provided the interface is active and has addressing. Remote – These are the routes the router does not have a direct connection and may be learned: Manually – with a static route Dynamically – by using a routing protocol to have the routers share their information with each other Default Route – this forwards all traffic to a specific direction when there is not a match in the routing table © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 66 Introduction to Routing Static Routing Static Route Characteristics: Must be configured manually Must be adjusted manually by the administrator when there is a change in the topology Good for small non-redundant networks Often used in conjunction with a dynamic routing protocol for configuring a default route © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 67 Introduction to Routing Dynamic Routing Dynamic Routes Automatically: Discover remote networks Maintain up-to-date information Choose the best path to the destination Find new best paths when there is a topology change Dynamic routing can also share static default routes with the other routers. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 68 Introduction to Routing Video – IPv4 Router Routing Tables This video will explain the information in the IPv4 router routing table. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 69 Introduction to Routing Introduction to an IPv4 Routing Table The show ip route command shows the following route sources: L - Directly connected local interface IP address C – Directly connected network S – Static route was manually configured by an administrator O – OSPF D – EIGRP This command shows types of routes: Directly Connected – C and L Remote Routes – O, D, etc. Default Routes – S* © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 70 Module Practice and Quiz What did I learn in this module? IP is connectionless, best effort, and media independent. IP does not guarantee packet delivery. IPv4 packet header consists of fields containing information about the packet. IPv6 overcomes IPv4 lack of end-to-end connectivity and increased network complexity. A device will determine if a destination is itself, another local host, and a remote host. A default gateway is router that is part of the LAN and will be used as a door to other networks. The routing table contains a list of all known network addresses (prefixes) and where to forward the packet. The router uses longest subnet mask or prefix match. The routing table has three types of route entries: directly connected networks, remote networks, and a default route. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 71

Use Quizgecko on...
Browser
Browser