Você está na página 1de 19

CCNA 5.

0
Planning Guide
Chapter 5: Ethernet

Introduction to Networks

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Chapter 5: Objectives
Upon completion of this chapter you will be able to:
Describe the operation of the Ethernet sublayers.
Identify the major fields of the Ethernet frame.
Describe the purpose and characteristics of the Ethernet MAC
address.
Describe the purpose of ARP.
Explain how ARP requests impact network and host performance.
Explain basic switching concepts.
Compare fixed configuration and modular switches.
Configure a Layer 3 switch.

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Chapter 5: Overview
This chapter examines the characteristics and operation of Ethernet
as it has evolved from a shared media, contention-based data
communications technology to today's high bandwidth, full-duplex
technology.

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Chapter 5: Activities
What activities are associated with this chapter?
5.0.1.2 Class Activity Join My Social Circle
5.1.1.6 Activity MAC and LLC Sublayers
5.1.2.4 Activity Ethernet Frame Fields
5.1.3.6 Activity Viewing Network Device MAC Addresses
5.1.4.3 Lab Using Wireshark to Examine Ethernet Frames
5.1.4.4 Packet Tracer Identify MAC and IP Addresses
5.2.1.7 Packet Tracer Examine the ARP Table
5.2.1.8 Lab Observing ARP with Windows CLI, IOS CLI and
Wireshark
5.3.1.7 Activity Frame Forwarding Methods

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Chapter 5: Activities (cont.)

5.3.1.9 Activity Switch It!


5.3.1.10 Lab Viewing the Switch MAC Address Table
5.3.3.5 Packet Tracer Configure Layer 3 Switches
5.4.1.1 Activity MAC and Choose

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Chapter 5: Packet Tracer Activity Password


The password for all the Packet Tracer activities in this chapter is:
PT_ccna5

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Chapter 5: Assessment
Students should complete the Chapter 5 Assessment after they
have completed Chapter 5.
Worksheets, labs, and quizzes can be used to informally assess
student progress.

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Chapter 5: New Terms


What terms are introduced in this chapter?
5.1.1.1

5.1.1.2

IEEE 802.2
IEEE 802.3
LLC Sublayer
MAC Sublayer
Data Encapsulation
Frame Delimiting
Cyclic Redundancy Check
Carrier Sense Multiple Access (CSMA)

5.1.1.3

CSMA/Collision Avoidance

5.1.1.4

Organizationally Unique Identifier (OUI)


Ethernet II
Start Frame Delimiter
Frame Check Sequence (FCS)
Runt Frame
Virtual Local Area Network (VLAN)
802.1Q VLAN Tag

5.1.2.1
5.1.2.2

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Chapter 5: New Terms (cont.)


What terms are introduced in this chapter?
5.1.2.3

Preamble

5.1.3.1

Hexadecimal

5.1.3.3

Unicast MAC Address

5.1.3.4

Broadcast MAC Address

5.1.3.5

Multicast MAC Address


Physical Address
Logical Address

5.1.4.1

5.2.1.2

Address Resolution Protocol (ARP)


ARP Table Or ARP Cache
ARP Request
Static ARP Table Entries

5.2.1.3

ARP Reply

5.2.1.6

Arp A
ARP Spoofing
ARP Poisoning

5.1.4.2

5.2.2.1

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

Chapter 5: New Terms (cont.)


What terms are introduced in this chapter?
5.2.2.2
5.3.1.2
5.3.1.3
5.3.1.4
5.3.1.5
5.3.1.6
5.3.1.8
5.3.2.1

Presentation_ID

Layer 2 LAN Switch


MAC Address Table
Content Addressable Memory (CAM)
Half Duplex
Full Duplex
Auto-MDIX
Store-and-forward Switching
Cut-through Switching
Fast-forward Switching
Fragment-free Switching
Port-based Memory Buffering
Shared Memory Buffering
Power Over Ethernet (POE)
Forwarding Rate
Fixed Configuration Switch
Modular Switch

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

10

Chapter 5: New Terms (cont.)


What terms are introduced in this chapter?
5.3.2.2
5.3.3.1

Switch Form-factor Pluggable (SFP)


Layer 3 Switch

5.3.3.2

Cisco Express Forwarding (CEF)


Forwarding Information Base (FIB)
Adjacency Table
Switch Virtual Interface (SVI)
Routed Port
Layer 3 Etherchannel

5.3.3.3

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

11

Chapter 5: Best Practices


Prior to teaching Chapter 5, the instructor should:
Complete Chapter 5 Assessment.
Explain that this chapter focuses on the Ethernet protocol, the most
commonly used LAN technology in the world. Ethernet is a
combination of Data Link layer software and Physical layer hardware,
because the Physical and Data Link layers are tightly coupled.
Remind students that the Data Link layer controls the Physical layer.
Ethernet is a standardized protocol, and therefore, has well-defined
rules for how it operates and well-defined rules for the structure of the
Data Link layer frames and Physical layer signals it uses.
Explain that the Ethernet Data Link layer today has two main parts.
The LLC sublayer links Ethernet to the upper layers, while the MAC
sublayer controls the hardware. Ethernet can be used with a wide
variety of physical media.
Explain that Ethernet performs the Data Link layer functions of
framing, addressing, media access control, and error detection.
Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

12

Chapter 5: Best Practices (cont.)


Explain that Ethernet uses a multi-access shared media topology,
so there are several nodes (i.e., devices or computers) on the
same physical circuit. Therefore, each node must have a unique
address. When a device on a multi-access physical circuit
transmits, every node on the circuit receives the message and
looks at the destination address to see if the frame is addressed to
it. If the frame is addressed to the node, the node processes it; if
not, the node discards it. A good analogy is having a discussion
using a radio, as in aircraft, taxis, police, fire, etc. Every user on
the same radio frequency can hear each other, so each message
starts with the name of the device that should listen to it. All
devices receive all messages, but ignore those not addressed to
them.
Describe how ARP entries age out of the ARP table

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

13

Chapter 5: Best Practices (cont.)


This would be a good place to do a Wireshark demonstration. Use
Wireshark to capture some packets on your network. Show the
contents of a few packets by working down the OSI protocol stack
in the same order as the chapters in the course. Start by showing
the Layer 7 PDU (ideally an HTTP get), the Layer 4 PDU (TCP
segment), the Layer 3 PDU (IP packet) and finally the Layer 2
PDU (probably Ethernet). This will remind students of the role of
the packets created at other layers. Then spend a few minutes
pointing out the different fields in the Layer 2 PDU.
Remind students about the security problems of Ethernet.
Describe the OUI and vendor assigned components of a MAC
address. Give some examples with unicast and multicast MAC
addresses.
Note: MAC addresses are unique to Ethernet networks (serial
interfaces have no MAC address).
Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

14

Chapter 5: Additional Help


For additional help with teaching strategies, including lesson plans,
analogies for difficult concepts, and discussion topics, visit the
CCNA Community at http://community.netacad.net/web/ccna/files.
If you have lesson plans or resources that you would like to share,
upload them to the CCNA Community in order to help other
instructors.

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

15

Chapter 5: Topics Not in ICND1 100-101


This section lists topics covered by this chapter that are NOT listed
in ICND 100-101 Blueprint posted at http://
www.cisco.com/web/learning/exams/list/icnd1b.html.
Instructors could skip these sections, however they either provide
additional information to assist the learner with the topic and/or
provide fundamental concepts for the learner.

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

16

Chapter 5: Topics Not in ICND1 100-101


(cont.)
What sections of this chapter are NOT in ICND1 100-101
certification blueprint?
5.0
5.2
5.3.3.3
5.3.3.4
5.4

Presentation_ID

Section
Section
Page
Page
Section

Introduction
Address Resolution Protocol
Types of Layer 3 Interfaces
Configuring a Router Port on a Layer 3 Switch
Summary

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

17

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

18

Presentation_ID

2008 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

19

Você também pode gostar