Ethernet Network Analysis and Troubleshooting
Ethernet Network Analysis and Troubleshooting
Ethernet Network Analysis and Troubleshooting
Ethernet
Network Analysis
and Troubleshooting
Sniffer University
Note:
Be sure to practice before you teach this new version! You will
need to tighten up on all the sections so you will have time to
cover the new materials. It will be a challenge! Pace it
carefully.
Page 1 - 1
1-2
Sniffer University
Important
Points to
Cover: Logo page. Skip past this quickly.
Original Traces for the Course: (all were saved as .CAP files – none were
recaptured)
Page 1 - 2
1-3
Housekeeping
BREAKS
LUNCH
TELEPHONES
Call the
office
REST ROOMS
EMERGENCY INFORMATION
QUESTIONS
?
All phone calls must be made outside the classroom during breaks.
Page 1 - 3
1-4
Sniffer University
Thank You!
Students are not permitted to audio or video tape the course presentation.
Duplication of Course Materials or the Trace File CD is strictly prohibited by
copyright.
Important
Points to
Cover: Keep going
Briefly review the policy.
The trace files for this class are placed in the 202GUI directory on
the trace file CD in the student manual.
Mention that there are additional trace files that are copied to
Sniffer Pro’s program directory if they would like to practice with
those samples.
Page 1 - 4
1-5
Interfaces
• Token Ring Network Analysis & Troubleshooting
• Ethernet Network Analysis & Troubleshooting
Tools & • Implementing Distributed Sniffer System / RMON Pro
Systems • Troubleshooting with the Sniffer Pro Network Analyzer
• Sniffer Pro for DOS Sniffer Experts
Visit our website for more information on our classes and a current schedule:
Important
Points to
Cover: These are the 11 active courses in the curriculum as of Oct 2, 2000
for Version 4.0.
Keep going.
Page 1 - 5
Table of Contents
• Course Overview Page 1-7 Day 1
1-6
Important
Points to
Cover: Run down the list of topics. Mainly here for student reference.
Use this to let them know what we will cover in class. The
redundant list after this was removed.
Page 1 - 6
1-7
Course
Overview
Sniffer University
Important
Points to
Cover: Standard title slide only.
Page 1 - 7
1-8
Course Objectives
Important
Points to
Cover: We are here to learn something about Ethernet technology, how to
use the Sniffer Pro analyzer in an Ethernet environment, and how
to interpret the data captured.
Page 1 - 8
1-9
Prerequisites
or
• TNV-112-GUI: Sniffer Pro for DOS Sniffer Experts
Important
Points to
Cover: Cover quickly.
Determine if all of the students meet the prereqs and discuss any
problems if you have some that have not taken TNV-101-GUI or
TNV-112-GUI.
Page 1 - 9
1-10
OSI Functional Protocol Layers
Important
Points to
Cover: This is now a build slide that builds on mouse clicks. The Ethernet
layers are set off to emphasize this is where the Ethernet
specifications reside. Everything else is “upper layer” to Ethernet.
Review the functions of each layer, so the students may apply the
binary search method against the OSI stack.
Page 1 - 10
1-11
IEEE 802 Standards
802.2 – Logical Link Control (LLC) describes peer-to-peer procedures
for the transfer of information and control between any pair
802.10 LAN/MAN
The lower part of the Data Link Layer is called the MAC layer, an abbreviation
for Media Access Control.
In addition, 802.14 Standard Protocol for Cable-TV-based Broadband
Communication Network is another protocol in development in 1998.
802.7 standard is a recommended practice for common Physical Layer
technologies, IEEE Recommended Practice for Broadband Local Area Networks.
The ANSI number for the 802.3 1996 edition of the specs is 8802-3:1996
IEEE Specifications can be purchased through http://www.ieee.com
Important
Points to
Cover: History of where the Standards came from. The relationship among
the standards committees.
This is the official IEEE diagram based on the drawing in the IEEE
Std 802.3ab -1999. The 802.1 layer has the bridging standards
listed individually and 802.14 for Cable-TV based broadband is not
on this drawing due to space constraints.
Page 1 - 11
1-12
Major IEEE Ethernet Standards
802.3 1985 Carrier Sense Multiple Access with Collision
Detection (Original Ethernet Specification)
802.3u 1995 Media Access Control (MAC) Parameters, Physical
Layer, Medium Attachment Units and Repeater for
100 Mb/s Operation, Type 100BASE-T
802.3x 1997 Specification for Full Duplex Operation
802.3z 1998 Media Access Control Parameters, Physical
Layers, Repeater and Management Parameters for
1000 Mb/s (Gigabit) Operation
802.3ab 1999 Physical Layer parameters for 1000 Mb/s Operation
over 4-Pair Cat 5 Balanced Copper Cabling, Type
Sniffer University
1000BASE-T
802.3ac 1998 Carrier Sense Multiple Access with Collision
Detection (CSMA/CD) frame extensions for Virtual
Bridged Local Area Networks (VLAN) tagging on
802.3 networks
802.3ad 2000 Carrier Sense Multiple access with Collision
Detection (CSMA/CD) access method and physical
layer specification- Aggregation of Multiple Link
Segments (Parallel Point-to-Point link segments)
Important
Points to
Cover: This is a quick list of the Ethernet standards we will cover in this
class.
You might want to note the large gap between the original 802.3
standard approved in 1985 and the u standard approved in 1995.
This does not mean to indicate there was no change in 10 years.
Quite the contrary: as the original spec was improved for thin coax,
then twisted pair with all the other changes to devices were defined
in the “a” through “t” addenda.
Page 1 - 12
1-13
Ethernet Evolution
1972 1982 1983 1985 1990 1993 1995 1996 1997 1998 2000
completed exceed
by DEC, shared hubs
Intel and
Xerox Design Goals:
1. Definition simplicity
2. Efficient use of shared resources
3. Ease of reconfiguration and maintenance
4. Compatibility
5. Low cost
Important
Points to
Cover: Discuss the milestones and the Design Goals.
All frame types that use CSMA/CD are now valid 802.3.
Page 1 - 13
1-14
Media Evolution
Thick Thin Twisted Optical
Coax Coax Pair Fiber
Sniffer University
DB15 Connectors
attaches to BNC Connectors RJ45 RJ45
External transceiver with T connectors Connectors Connectors
with AUI cable
& Twinax..
Important
Points to
Cover: New Slide.
Do just a quick review of how Ethernet media has changed over the
years.
Cables attach to connectors in the wall or cube, the wire then goes
to a punch-down block and finally to a hub or switch.
Dedicated wires for receive and transmit meant that cards could no
longer listen on the same wire, so new ways of learning of
collisions had to be developed.
Page 1 - 14
1-15
Media Access Evolution
Hub or Concentrator
Switch Switch
Coax cables are broadcast in nature. Every station sees every signal on the wire.
Each must wait its turn to use the wire and only one signal can be on the wire
at a time.
Twisted pair cabling provides dedicated receive and transmit wires in the cable,
but only one wire can be active at a time. Concentrators or hubs repeat the
signals out to all stations attached, so each station must sense whether the wire
is busy, wait the interframe gap and sense collisions and retransmit if a collision
occurs.
The introduction of full duplex connections allowed bandwidth to double, since
each direction can be busy simultaneously.
The advent of the switch allowed dedicated connections between two devices in
a switched temporary point-to-point connection. Even though collisions are
avoided in this configuration, the same adapter cards are used, so the devices
still sense for carrier, wait the interframe gap and sense collisions.
When faster technologies were introduced, full duplex switched point-to-point
connections allowed signals on each wire simultaneously. Since the links are
point-to-point, there is no need to sense carrier or detect collisions.
Important
Points to
Cover: New Slide.
This attempts to show how access to the wire has changed over
the years.
All of the newer technologies still have this as the basis for their
specifications.
When full duplex was developed, each device had two lines in a
point-to-point connection to the other end. There was no need to
wait for the line- you always had access to the receive port on the
other side. But the listen-and-wait and retry was maintained for
backward compatibility.
Page 1 - 15
1-16
Summary of Ethernet Features
The minimum frame size is 64 bytes. This includes 4 bytes of frame check
sequence but does not include the 8 bytes of preamble sequence. The
maximum frame size is 1518 bytes including CRC.
Important
Points to
Cover: Original specifications are based on bus technology and
CSMA/CD. CSMA/CD has always been the defining feature of
Ethernet. With the introduction of switches and Full Duplex
Ethernet, this can no longer be the feature common to all varieties,
since some don’t use carrier sense (CS), are not multiple access
(MA), and do not have collisions to detect (CD).
Page 1 - 16
1-17
Digital Signal Encoding
0 1 0 0 1 1
TTL
Manchester
(10 Mbps
Ethernet)
Sniffer University
Differential
Manchester
(Token Ring)
Bit Cell Bit Cell Bit Cell Bit Cell Bit Cell Bit Cell
Important
Points to
Cover: Don’t dwell on this slide. It is only really important for the students
to understand that the timing is imbedded in the data stream so
that adapters can tell a 1 from a 0.
Page 1 - 17
1-18
Important
Points to
Cover: Topic Title slide only. Keep going.
Page 1 - 18
1-19
Section Objectives
frame formats
• Identify frame format incompatibilities
Important
Points to
Cover: State the objectives for this section. This prepares the students and
set expectations about the desired outcome of learning this
information.
Page 1 - 19
1-20
Ethernet Frame Formats
LLC: Logical Link Control. A protocol that provides connection control and
multiplexing to subsequent embedded protocols; standardized as IEEE 802.2
and ISO/DIS 8802/2.
SAP: Service Access Point.
(1) A small number used by convention or established by a standards group,
that defines the format of subsequent LLC data; a means of demultiplexing
alternative protocols supported by LLC.
(2) Service Advertising Protocol. Used by NetWare servers to broadcast the
names and locations of servers and to send a specific response to any station
that queries it.
SNAP: Sub-Network Access Protocol (also sometimes called Sub-Network
Access Convergence Protocol). An extension to IEEE 802.2 LLC that permits a
station to have multiple network-layer protocols. The protocol specifies that
DSAP and SSAP addresses must be AA hex. A field subsequent to SSAP identifies
one specific protocol. Interpreted in the TCP/IP PI suite and the AppleTalk PI
suite. (See RFC 1042 for further information on SNAP.)
MAC frames are used in Full Duplex Ethernet
The Expert Detail Panel shows the frame type associated with each device at the
DLC layer.
Important
Points to
Cover: This is a list of what we will cover in the next set of slides.
Page 1 - 20
1-21
Ethernet Version 2 Frame
Important
Points to
Cover: Emphasize the preamble and its function.
Hit the bit pattern and reference the AAAAs and 55555s.
Page 1 - 21
1-22
Ethernet Version 2 Data Link Layer
Network Layer
Physical Layer
Non-IEEE Networks
(e.g., Ethernet, ARCNET, Local Talk)
Sniffer University
Important
Points to
Cover: Information on slide should suffice.
Page 1 - 22
1-23
Novell NetWare 802.3 “Raw” Frame
8 6 6 2 FFFF 4
1010...10101011
Sniffer Pro Capture Range
Sniffer University
Novell developed their frame type before the IEEE committee was finished. As a
result, they identified the length but did not use LLC.
This is not a problem provided all stations use the same frame type.
It does have a negative impact on IEEE compliant implementations when Novell
issues broadcast frames. Service Access Point of FF is the broadcast SAP. All
stations have to copy.
Important
Points to
Cover: Use a third match as you take the students through this process. If
performed correctly, you will certainly speed up the exercises at the
end of this section, if not eliminate them.
Point out that Novell’s frame type was defined while the IEEE
committees were still meeting. It really did not matter, since one
only installed a single operating system. We were not designing
enterprise networks with LANs and we certainly were not
interfacing a lot of dissimilar systems.
In today’s environment however, it is definitely an issue.
Page 1 - 23
1-24
802.3 “Raw” Data Link Layer
Network Layer
IEEE Networks
(e.g., 1BASE5, 802.3, 802.5)
Sniffer University
Important
Points to
Cover: NetWare IEEE 802.3. Information on slide should suffice.
Page 1 - 24
1-25
IEEE 802.3 Frame
Logical Link Control
(LLC) 802.2
Preamble SFD DA SA Length DSAP SSAP Control Data +Pad CRC
7 1 6 6 2 1 1 1 or 2 42 - 1497 4
1010...10101011
Sniffer Pro Capture Range
Important
Points to
Cover: Repeat of previous page. Be sure to select a different match and to
disable the first match.
Stations know if a frame is Version 2 or 802.3 by evaluating the 2
bytes following the source address. If they are greater than 05DC
hex (1500 decimal), then the frame is Version 2; if they are less,
they are assumed to be a length field. Note: the exception is PUP,
which uses Ethertype 2ØØ. (PUP stands for PARC Universal
Packet.)
Page 1 - 25
1-26
IEEE 802.3 Data Link Layer
Network Layer
Physical Layer
IEEE Networks
(e.g., 1BASE5, 802.3, 802.5)
Sniffer University
Important
Points to
Cover: Information on slide should suffice.
Page 1 - 26
1-27
IEEE 802.3 SNAP Frame
Logical Link
Control (LLC) SNAP Header
802.2
Preamble SFD DA SA Length Control Type CRC
7 1 6 6 2 AA AA 1 3 2 38 - 1492 4
• Length: (2 bytes) specifies the number of bytes (3-1500) in the LLC and data fields
• DSAP: (1 byte) Destination Service Access Point; receiving process at destination
• SSAP: (1 byte) Source Service Access Point; sending process in source
• Control: (1 byte) Various control information
• SNAP: (5 bytes) First three bytes identify the vendor. Last two bytes identify the
protocol
• Data: The data link layer views all information handed to it by higher layers as
data, whether it is protocol information or user data
• Pad: Pads frame to minimum of 46 bytes total for the data and LLC (so collisions
can be detected)
• CRC: Cyclic Redundancy Check Frame Check Sequence (FCS), or
checksum value
SNAP allows vendors who do not have an assigned Service Access Point to
become IEEE compliant.
Service Access Point of AA identifies a SNAP header immediately following the
LLC header.
A Snap header is five bytes. The first three bytes identify the vendor and the
last two bytes identify the protocol used. The first three bytes (the vendor ID)
are usually padded with zeroes. The version 2 Ethertype is generally used as the
identifier.
Important
Points to
Cover: Finish with the pattern match and save “setups.”
Page 1 - 27
1-28
IEEE 802.3 SNAP Data Link Layer
Network Layer
SNAP
Data LLC
Link
Layer Media Access Control
Sublayer
Physical Layer
IEEE Networks
Sniffer University
Important
Points to
Cover: Is a subset of LLC.
Page 1 - 28
1-29
IEEE Ethernet Frame Evolution
7 1 6 6 2 1 1 1 or 2 42 - 1497 4
Length/Type
0-1500 = Length
1536 - 65,535 = Type
1501-1535 reserved
+
Important
Points to
Cover: This is an automated build slide that will display on a timer. Don’t
click until you’re ready for the next slide!
A “+” in the lower left corner of the build slides tells you how many
clicks you need before it goes to the next slide. When there is no
number after the “+”, the slide is totally automated. The next click
shows the next slide.
Point out the field values at the bottom that devices use to tell what
type of frame is arriving. Of course, they’ve always done it this way,
but now the specification matches the process.
Page 1 - 29
1-30
Ethertypes and SAPs
Important
Points to
Cover: There is a more complete list from the Sniffer Pro analyzer’s main
menu.
Demo: Go to Define Filters and demonstrate for the students the protocol
filters.
Page 1 - 30
1-31 Determining Ethernet Frame Types
Start here
Important
Points to
Cover: Student reference.
There are 3 clicks; one at each stop sign after each determination
has been made.
Page 1 - 31
Expert Shows Frame Types
• The DLC Layer Objects show the frame types
1-32
received and transmitted
– Shows only as Ethertype or 802.3
Sniffer University
Important
Points to
Cover: Student reference.
Page 1 - 32
1-33
Examine the DLC Details
Version 2 Frame
Sniffer University
802.3 Frame
Important
Points to
Cover: This is a quick visual shot of how version 2 and 802.3 frames
appear in the Detail window.
Page 1 - 33
1-34
Examine the DLC Details
SNAP Frame
Page 1 - 34
1-35
Sniffer Pro Filter Elimination Patterns
Important
Points to
Cover: This replaces the several data pattern match slides in the previous
version of the course.
Those screen shots are placed in the student notes on this page
for their reference.
The exercise that used pattern matching has been replaced by one
using the Expert.
Page 1 - 35
1-36
So How Does This Matter?
• Devices using different frame formats will not
be able to communicate directly
– They must send their frames to a translating bridge
or router which converts and forwards the frames
– This creates a local router situation which doubles
the traffic
• Devices configured with multiple unnecessary
frame formats load the network
Sniffer University
Important
Points to
Cover: New Slide.
Page 1 - 36
1-37
Exercise: Which Frames Are on the Network?
Important
Points to
Cover: This exercise has been modified. It no longer uses data pattern
matching.
Be sure to practice this before class so you are ready for it!
Page 1 - 37
1-38
If
you have no questions about
the previous exercise
then
continue with the next exercise
or
Sniffer University
Slide Title:Yield
Important
Points to
Cover: This slide is here so you can control the exercise process.
Page 1 - 38
1-39
Exercise: A Surprise at 23:00
Important
Points to
Cover: This exercise is unchanged.
Page 1 - 39
1-40 Summary
Slide Title:Summary
Important
Points to
Cover: Wrap up the section by reviewing the labs and the objectives. Ask
the students if they have any questions.
Page 1 - 40
2-1
Section 2
Important
Points to
Cover: Section 2 title slide only.
Page 2 - 1
2-2
Section Objectives
Important
Points to
Cover: State the objectives.
Page 2 - 2
2-3
10/100 Ethernet
Sniffer University
Important
Points to
Cover: Title Slide Only.
Page 2 - 3
2-4
10/100 Portable System Requirements
• PAC 64 or 65 or CardBus compatible notebook PC
– Can also be loaded on a desktop PC
– Pentium 200 MHz CPU or higher
• Windows 95c*/98 or NT SP3 server or workstation
• Sniffer 10/100 Ethernet adapter
• 85 MB Disk space for software
– Much more for traces
Sniffer University
• 64 MB RAM
– Some topologies require more
• Keyboard and Pointing Device
PAC 64
Windows 95c requires Winsock 2. Windows NT has been tested through SP 6a.
Consult the Sniffer documentation for a list of the adapters supported with this release.
On heavily loaded Ethernet networks, increase the receive buffer size and capture rate on the
Ethernet adapter.
In Windows 95/98:
1.In the Windows control panel, select the Network icon.
2.In the list box at the top of the Configuration tab, select the adapter, then click Properties.
3.Click the Advanced tab.
4.In the Property list box, select Receive Buffers and increase the value to a larger number. We
recommend you increase the buffer size in increments of 10 to the highest possible setting,
which still enables the card to load.
5.Change the Capture Rate to High - No CPU Throttling.
In Windows NT:
1.In the Windows control panel, select the Network icon.
2.Click the Adapter tab.
3.Select the adapter, then click Properties.
4.Increase the Receive Buffers value to a larger number. We recommend you increase the
buffer size in increments of 10 to the highest possible setting, which still enables the card to
load.
5.Change the Capture Rate to High - No CPU Throttling.
© Network Associates Ethernet Network Analysis and Troubleshooting
Ethernet Sniffer Pro Hardware
Section 2 TNV-202-GUI Ethernet Network Analysis and Troubleshooting
Important
Points to
Cover: New Slide.
Page 2 - 4
2-5
Attaching Sniffer Pro to the Network
PAC 64
Important
Points to
Cover: Discuss the various ways they can attach the Sniffer. It doesn’t
matter if it is notebook, Dolch or desktop. All attach the same way.
Page 2 - 5
DSPro Agents
• DS Pro consists of two computers:
2-6
Ethernet
Network DSPro Agent DSPro Console
Sniffer University has a two day TNV-012-DSP class that teaches the unique
configuration processes required for the DS Pro system.
Important
Points to
Cover: Don’t get sidetracked into explaining the DS Pro system.
Page 2 - 6
2-7
Full Duplex
Sniffer Pro
Sniffer University
Important
Points to
Cover: Title Slide Only.
Page 2 - 7
2-8
System Requirements
A Fast Ethernet Full Duplex Pod installation consists of the following major
components:
A PC with Sniffer Pro or Sniffer agent (Distributed Sniffer) software installed on
the hard disk (the Sniffer PC).
A supported Fast Ethernet network adapter installed in the Sniffer PC. Consult
the Sniffer documentation for a list of the adapters supported with this release
of the Full Duplex Pod.
A Fast Ethernet Full Duplex Pod is connected to the Sniffer PC via the Fast
Ethernet adapter and the Ethernet port on the Fast Ethernet Full Duplex Pod
labeled, "Host Channel 10/100 UTP.”
Important
Points to
Cover: Slide moved here from section five of the previous version.
Page 2 - 8
2-9
Full Duplex Pod
The Fast Ethernet Full Duplex Pod is a separate network interface pod provided
by Network Associates for use with Sniffer Pro and the Distributed Sniffer. The
Fast Ethernet Full Duplex Pod provides two separate receive channels (one for
each side of a full duplex Fast Ethernet network) and can capture at full Fast
Ethernet line rate speeds in either a passthrough mode or a terminated mode.
The Fast Ethernet Full Duplex Pod lets you use the Sniffer with a Fast Ethernet
card installed to monitor or capture data from Ethernet, Fast Ethernet, Full
Duplex Fast Ethernet, and Half Duplex Fast Ethernet.
This is called the “Pod-FEDC-NA-100” for Fast Ethernet Dual Channel in the NAI
order book.
Important
Points to
Cover: Slide moved here from section five of the previous version.
Page 2 - 9
2-10
Full Duplex Pod Connectors
Host
Probe Channel B Probe Channel A
Channel
Power Synch Synch Serial 10/100 10/100 10/100
Connector MII MII
Sniffer University
Connection
The Fast Ethernet Full Duplex Pod captures network data off the connected
circuit and stores it in its own internal buffer. The captured data is then
encapsulated in Ethernet frames and sent to the Sniffer PC over a Fast Ethernet
connection. There, the analyzer strips the encapsulated capture data out of the
Ethernet frame, making it available to the full set of Sniffer features.
The pod can capture frames up to 4082 bytes in length (including CRC). Frames
larger than 4082 bytes will be treated as illegal frames. Normal Ethernet frames
are 1518 bytes maximum.
Important
Points to
Cover: Slide moved here from section five of the previous version.
Page 2 - 10
2-11
Full Duplex Pod LEDs
Pass- HW
Host Channel A Channel B Terminate Clock Activity Power
through Chk
LINK
ACT
LED Description
Passthrough Lit when pod is in passthrough mode. Switch with the
button on the back of the pod
Terminate Lit when pod is in terminate mode
Clock Lit periodically to indicate the pod’s software is alive and
active
Activity Lit when there is potential loss of data.The data may be
lost when there is more data than the pod can handle
Power Lit when the pod is receiving power
HW Chk Lit when there is pod hardware or software failure
Flashes in test mode
Page 2 - 11
2-12
Connecting the Pod to the Sniffer
When the pod is powered on before the host, pod initialization may fail. Turn
the pod off, then on if this occurs.
The pod provides a pass-through mode. When you remove power from the pod
in pass-through mode, the link will go down! You may wish to install a splitter in
the line that will enable you to attach the pod when needed without bringing
down the link. Be sure it meets the dB loss specifications so the link is not
degraded.
Important
Points to
Cover: New Slide.
Emphasize that this pod has a different power adapter from the
rest.
It is huge and heavy and nicknamed “the brick” for good reason –
it’s as big and heavy as a brick.
It’s important they follow this order. They may damage the pod
and/or PC if they don’t or the Sniffer may not be able to see the
pod.
Page 2 - 12
2-13
Attaching FDX Pod to the Network
Channel A
• Insert directly in the link Channel B
– Copper pass-through Ethernet
prevents losing link, even Hubs or
Switches
when powered off
Important
Points to
Cover: Slide moved here from section five of the previous version.
Three ways:
Break open the link and insert the pod. Push the button to place it
in pass-through mode.
Keep splitters in the line at all times so you won’t need to break the
connection to attach the Sniffer. Set the button to terminate mode
so the signals are not repeated back onto the wire!
Attach to a monitor port on the switch. This is vendor-specific, but
will probably allow you to select which channels you want to
monitor.
Page 2 - 13
2-14
Attaching FDX Pod to DSPro Agents
DSSPro
• When using the Distributed Agent
Sniffer System, attach the Full
Duplex pod to the Agent and use
the remote console to configure Transport
Monitor
Cable
the options. Cable
Channel
• Attach using the diagrams on B
Ethernet Channel
A
Network
DSPro Console
Important
Points to
Cover: New Slide.
There is also a 4 port Ethernet card that can be used in the DS Pro
to monitor several different full-duplex connections, including 400
MB pipes that combine full-duplex channels.
Page 2 - 14
2-15
Gigabit Sniffer
Sniffer University
Important
Points to
Cover: Title slide.
Page 2 - 15
2-16
Gigabit Sniffer Pro Minimum Host CPU
Windows 95 is not supported for the Gigabit Sniffer. Use a compatible portable
(Dolch) or desktop that has a Peripheral Component Interconnect (PCI ) slot.
AMI and Award are popular BIOS chips. The BIOS version should be AI5TV-
D2-0617 You can contact DOLCH to get the BIOS Flash upgrade. There should
be two files:
awdflash.exe, size=7,847 Bytes, Dated 3/8/96
Dolch-2.bin, size=131,072 Bytes, Dated 6/19/97
Upgrade the Flash BIOS for PAC-64
To Upgrade the Flash BIOS for PAC-64, follow these instructions:
1. Insert the Flash BIOS upgrade diskette into driver A:
2. Run the awdflash.exe file.
3. You will be prompted to enter bios file name, enter Dolch-2.bin and save the
BIOS.
4. You then will be prompted to save a file. Give this file the name
Dolch-1.bin.
5. Save and program the BIOS.
6. Reboot after update.
© Network Associates Ethernet Network Analysis and Troubleshooting
Ethernet Sniffer Pro Hardware
Section 2 TNV-202-GUI Ethernet Network Analysis and Troubleshooting
Important
Points to
Cover: Slide moved here from section five of the previous version
Slide is adequate.
Page 2 - 16
2-17
Hardware Included
Important
Points to
Cover: Slide moved here from section five of the previous version
Slide is adequate.
Page 2 - 17
2-18
Interfaces
Important
Points to
Cover: New slide.
Page 2 - 18
2-19
3.3v Power
• Two sources:
• Mother boards in newer CPUs have 3.3v power supply
connector
– Dolch PAC 65 and newer has 3.3 v power, PAC 64 needs the
card (PAC 63 and older are not supported for Gigabit)
– Attach to the Protocol Analyzer card
• 3.3v Voltage Regulator half-slot ISA card for CPUs
Sniffer University
Important
Points to
Cover: Slide moved here from section five of the previous version
Needs 3volts power. If the motherboard doesn’t have it, you need
another card that supplies it.
Jumper from this card to the PacketMaster card.
Page 2 - 19
2-20
Xyratex 1250 Connectors
Rx 2
• Two
1000Base-SX Connector 1 to Device 1 Tx 1
Channel 2
or LX Gigabit
Ethernet SC Rx 1
Channel 1
Connections
Connector 2 to Device 2 Tx 2
• External
Sniffer University
trigger in and
trigger out PacketMaster
Sync In (Trigger In) 1250 Card
connections Sync Out (Trigger Out)
Important
Points to
Cover: Slide moved here from section five of the previous version
Slide is adequate.
Page 2 - 20
2-21
Connecting the Analyzer
Tx
Full Duplex Rx1
connection between PA C 62
Rx2 Tx
2 hubs, switches
Tx
Rx1
Full Duplex Tx2
Rx
Rx2
connection between PA C 62
Tx1 Tx
end nodes Rx
Tx
Rx1
Full Duplex
Sniffer University
connection between PA C 62
Rx2
Tx
switch and end node
Attached to hub or
switched port (can Rx1 Tx
be a SPAN port) PA C 62
Loopback between
Use this for traffic Tx1 & Rx2
generation also
Important
Points to
Cover: Slide moved here from section five of the previous version
This will help those students who have the Sniffer now. (They are
very lucky- they are in high demand and short supply.)
Slide is self-explanatory.
Page 2 - 21
2-22
Gigabit DSPro
portable Sniffer
Sniffer University
Important
Points to
Cover: New Slide.
Mainly FYI
Screens still look the same when you connect to the Agent.
Page 2 - 22
2-23
Exercise: Comparing Ethernet Data
Important
Points to
Cover: New Exercise.
This exercise is here to let them see right up front how the data
looks in almost all speeds of the Sniffer. I was unable to get a 100
MB full-duplex trace file, so it has been mentioned briefly.
Do not mention the 10 bit hex decode in the Gigabit screens now!
Wait until they have been explained in the Gigabit section.
Page 2 - 23
2-24
Summary
Important
Points to
Cover: Review the section objectives and answer any remaining
questions.
Page 2 - 24
3-1
Important
Points to
Cover: Section 3 title slide only.
Traces: HUB6ARC.caz
Page 3 - 1
3-2 Section Objectives
Important
Points to
Cover: State the objectives.
The focus of the prior revision was on the new components most
customers have in their environments.
The specifications for 10BASE2 and 10BASE5 are still the basis for
the newer environments and need to be covered.
Page 3 - 2
Ethernet Components Today
Switched Segment
3-3
Dedicated Connections:
Only Broadcasts are propagated to all
• There is a wide variety of
Switches Switches configurations and options available
• All still adhere to core concepts that
define Ethernet
• Segments are extended logically by
chaining hubs or switches, or by
using bridges
• Networks are segmented using
Sniffer University
OFF
ON
Router
Hubs
Network Interface
OFF
ON
Important
Points to
Cover: Today networks are undergoing change. We are installing switches
and hubs now. No one is really installing 10BASE5 or 10BASE2
today.
Fast Ethernet
Full duplex
Fast transmit adapters
Gigabit Ethernet
Yesterday, hubs were the new devices in networks, pushing out the
older 10BASE5 and 10BASE2 networks.
Today, switches may start to push out hubs. The only constant we
really have is change.
Page 3 - 3
3-4 Ethernet Contention Access Control
• Broadcast environment
• All network stations contend for available network bandwidth
• Simultaneous transmissions cause collisions, which produce
runt frames
• Contention Access Control works well with bursty traffic
Sniffer University
Concentrator or Hub
Important
Points to
Cover: No inherent line control is used. The only requirement to transmit
data is that the wire is quiet for 9.6 bit times.
Page 3 - 4
CSMA/CD
The Basis for Ethernet Specifications
3-5
• Carrier Sense
– Listen until no carrier is sensed, then transmit after a delay
• Multiple Access
– Designed for a broadcast environment
– Every station hears every frame
• with Collision Detection
Sniffer University
Important
Points to
Cover: The basics. Preparing the students for what is to come later.
Page 3 - 5
3-6 MAC Frame Transmission
All adapters are manufactured to the Ethernet specifications. The card has no
knowledge of whether it is plugged into a switch or hub port.
These specifications apply to all speeds of Ethernet. The interframe spacing is
always 96 bit times. The actual time between frames is dependant on the
speed of the network and shrinks in proportion to the increase in speed.
Specifications dictate that there be a minimum 9.6 micro-second delay
between frames in 10 Mbps Ethernet. An adapter must sense that the wire has
been quiet at least 9.6 micro-seconds before it can transmit.
In Fast Ethernet, the interframe gap is .96 microseconds.
The gap in Gigabit Ethernet is 96 nanoseconds.
Important
Points to
Cover: With IEEE MAC layer, it is the MAC’s job to ensure the minimum
frame length.
This is a departure from the V2 specifications, which forced the
network layer protocol to guarantee the minimum frame size. Now
the version two frames have been brought under the IEEE, so all
versions must pad.
The MAC layer is responsible for accessing the channel and
ensuring correct transmission of the data.
MAC functions reside on the adapter on the chipset.
Page 3 - 6
Frame Transmission
• After sensing that there is no carrier on the wire during the
3-7
101..101
10
Sniffer University
10
..
10
0101
10
Concentrator or Hub
1
1010101..0101
0101
1001000110101101..0101 10101
Dest Address Preamble
0 1..
Source
Station
Even in switched environments, stations must wait the interframe time after
the line goes silent before they start transmitting.
Important
Points to
Cover: This is a timed build slide and covers only the transmission part of
the process. It builds automatically.
This is a good time to discuss the adapters that jump the gun
and start transmitting before the interframe gap time. This is
mentioned in the student notes and should be discussed in
class.
Page 3 - 7
3-8 Collisions
• When two stations with data to transmit sense that the media is
available at the same time, they both transmit and a collision occurs
Jam Jam
Concentrator or Hub
Sniffer University
Important
Points to
Cover: This is a timed build slide. Some is automated on a timer, and
some requires a mouse click to activate.
--------------------------------------------------------------------------------
The signal from the transmitting station will not be heard by the
second station some distance from it, so it begins to send its frame.
If a collision occurs, the participating stations output a minimum of
32 bits as a jam.
Its purpose is simply to busy out the wire on a 500 meter segment.
Import change: The wording was changed slightly to indicate
it does not stop transmitting, but just continues to transmit the
jam signal instead of the frame.
IEEE states a minimum jam of 32 bits but does not specify a
maximum jam period past 150 ms.
There is no specified jam pattern for the adapters.
Manufacturers can do what they want as long as it is not the CRC
of the bits that were just transmitted.
The transmitting adapters back off a random amount of time. The
first station to timeout tries again. In the meantime, a totally
different station may have gotten a frame out onto the network.
Each time the adapter is involved in a collision trying to transmit the
same frame, it waits a longer period of time before listening for
carrier.
It gives up after 16 unsuccessful attempts and purges the frame
from its transmit buffer. The upper layer protocol must queue it
again. This of course involves more delay than the collisions and
backoff induced.
Page 3 - 8
3-9 Truncated Binary Exponential Backoff
Retry Random Time Range Retry Random Time Range
1 21 = 0....2 x 51.2µsec 9 29 = 0...512 x 51.2 µsec
2 22 = 0....4 x 51.2 µsec 10 210 = 0....1024 x 51.2 µsec
3 23 = 0....8 x 51.2 µsec 11 210 = 0....1024 x 51.2 µsec
4 24 = 0....16 x 51.2 µsec 12 210 = 0....1024 x 51.2 µsec
5 25 = 0....32 x 51.2 µsec 13 210 = 0....1024 x 51.2 µsec
6 26 = 0....64 x 51.2 µsec 14 210 = 0....1024 x 51.2 µsec
Sniffer University
The backoff time is measured using the propagation delay of the media (slot
time). The figures above are for 10 Mbps Ethernet. 100 Mbps times are one
1/10th these times, gigabit are 1/100th of these times.
The previous two slides are now combined on this single slide.
Page 3 - 9
3-10 Half Duplex MAC Transmit
Data
to
send
No Pad to 60
< 60 bytes? bytes
Yes
Calculate
and add CRC Compute backoff.
Sniffer University
Too many
Carrier No Transmit Detect Yes Send attempts?
Sense? Wait Data Collision? Jam
96 bit Listen for Yes
Yes No
times collision Done.
Defer Transmit No End of Yes Done. Excessive
Until End data? Transmit errors
OK!
All speeds of Ethernet follow this flowchart. Only the timing changes.
Important
Points to
Cover: Spend time taking the students through the process. Make sure
they understand.
Page 3 - 10
3-11
Frame Reception
Destination
080069020FD3
Sniffer University
..AAAAA ..AAAAA
C788CD8097823DF020960080BAAAAAA..AAAAAAAAA
..AAAAA Concentrator ..AAAAA
Source Address Dest Address Preamble
or Hub
C788CD809782
Source *Timing slowed to show process
+1
Important
Points to
Cover: This is an automated build slide. Click the mouse when you are
ready to show the action after you have covered the bullets.
Stations hear the preamble and synchronize their clocks to it. The
Start if Frame delimiter indicates the destination field is coming
next.
If the frame is not intended for them, they discard the bits from their
receive buffer and passively wait for a new signal or the quiet time
so that they may send their own data.
Page 3 - 11
3-12 Assessment of Received Frames
No No
Sniffer University
Alignment Error
Discard Frame
Important
Points to
Cover: Cover well.
Page 3 - 12
3-13 Repeaters
Repeater
10BASE5 10BASE5
OFF
AUI AUI
ON
Multiport Repeater
OFF
ON
10BASE2 10BASE5
10BASE-T
Hub or Concentrator 1 2 3 4 5 6 AUI
Sniffer University
A repeater can cause more collisions, since a collision signal is propagated out
all ports.Hubs managed through SNMP have an IP address assigned to the
interface that communicates with the management application. This address is
NOT used in frame regeneration.
Important
Points to
Cover: Repeaters are required to quickly forward data from one port onto
all others.
A repeater doesn’t isolate collisions, it propagates them.
Page 3 - 13
3-14 Repeaters are Responsible For:
• Preamble Regeneration
– Remove preamble from received frame and regenerate it on
sending frame
• Data Repeat
– Repeat all signals received on one segment to all other
segments attached to the repeater
• Signal Amplification
Sniffer University
Important
Points to
Cover: Repeaters do not repeat preamble. They create a new preamble.
When they see the “11” indicating the end of preamble, they go into
repeat mode.
Repeaters jam out all ports on detection of a collision.
They are the only devices for which IEEE has defined a jam pattern
(documented in the student notes).
Page 3 - 14
3-15 10BASE-T Ethernet Cabling
Concentrator or Hub
RJ-45 jacks
Important
Points to
Cover: Hubs are repeaters.
Page 3 - 15
3-16 10/100Base-T Frame Transmission
Workstation
Workstation
File Server File Server
Concentrators (hubs) are the equivalent of a bus in a box and function like
multiport repeaters. A signal received from a transmitting station is repeated
onto the backplane and then repeated (flooded) out all other ports. Hubs and
repeaters do not repeat preamble. They regenerate a new one. When the end
of preamble is reached, repeaters then go into repeat mode. Fragments are
extended to the minimum of 96 bits. Concentrators (hubs) do not segment
collision domains. Upon detection of a collision, hubs jam out all ports.
Repeaters are the only devices that have an IEEE-specified jam pattern. The
first 62 bits (of 96) must be 10101010...etc.
The concentrator may partition any port with 32 consecutive collisions.
Unmanaged hubs will re-enable the port upon receipt of any good data frame.
Managed hubs tend to require that the administrator re-enable the port
through the elemental manager.
Important
Points to
Cover: Note the edition of 100Base info here.
Page 3 - 16
3-17 The Hierarchy of Ethernet Hubs
Simple, low-cost Desktop Hubs
• Standalone hubs typically support 8-16 ports
• Some larger multi-slot hubs support from 4-12
“line cards,” each containing 12-24 ports, for a
total of about 288 physical ports
• All users are connected to same backplane,
hence the same LAN
• 10/100 Autosensing
Sniffer University
Workgroup Hubs
• The need for autonomous work groups requires
backplane segmentation of larger hubs
• Hub backplanes are physically separated into 2
or 3 or 4 different Ethernet segments
• 10/100 Autosensing
Important
Points to
Cover: Student notes and slide are adequate.
The names of the hubs have changed to reflect how they are
marketed today.
Page 3 - 17
3-18 Backbone Hubs
OFF
ON
OFF
ON
Important
Points to
Cover: Student notes and slide are adequate.
Page 3 - 18
Link Test Pulse
TX
3-19
RX TX
COL RX
LINK COL
RX
LINK
TX
TX
RX NIC
• Many transceivers and hub ports feature a Link LED (usually green
in color) that provides a confidence check of wire pair integrity
• A pulse is transmitted on one end’s transmit pair to the other end’s
receive pair every 201 µs. The pulse is unique and will not be
Sniffer University
10Mbps link test pulses are 100 nanoseconds (100 nanoseconds = 0.1
microseconds = 1 bit time) in size, and are transmitted every 201
microseconds. Unless there is a regular link test pulse, data is not transferred
from the wire to the receiver, or from the transmitter to the wire.
Polarization or phase is the correct match of TX+ to RX+ instead of TX+ to
RX-. Some early 10BASE-T products did not incorporate auto-polarity and auto-
phase matching capabilities. The wires connecting these devices must be
oriented correctly. Subsequent products do incorporate these features.
100BASE-T Link Integrity pulses are sent continuously on the T4 primary
transmit pair about 1 ms apart. Failure to detect these pulses generates an
error.
Important
Points to
Cover: The link pulse test does check for correct phasing of the signal.
It is simply a continuity test.
One pulse
Page 3 - 19
3-20 10 Base T Ethernet Pinouts
Jack RJ-45
at NIC Plug 8
1
Contact Signal X-over
1 white/orange Transmit + 3 white/orange
4 Not used
Sniffer University
5 Not used
7 Not used
8 Not used
The 8-pin connector is used as the mechanical interface to the twisted pair
cable. The connector is used on the hub as well as the NIC. Typically the NIC
connects to a wall outlet using a twisted pair patch cord. Wall outlets connect
through building wiring and a cross-connect function to the repeater hub. The
cross connect (or crossover) function connects the transmitter at one end of
the twisted pair link to the receiver at the other end of the twisted pair link.
The cross connect can be built into the receiving end.
There are two pairs used for each station attachment. Two wires (one pair)
are used to receive data from the hub to which it is attached. The second pair
is used to transmit data to the hub. Normally a light on the hub indicates the
pair from the station to the hub are attached correctly (this is the TX+ and TX-
from the station to the RX+ and RX- on the hub). A light (Link LED) on the
card indicates the pair from the hub to the station are correct (this is the TX+
and TX- from the hub to the RX+ and RX- on the station).
Most 10 and 100 MBPS twisted-pair Ethernet is still half duplex: a station is
either transmitting or receiving, not both.
Important
Points to
Cover: Ethernet hubs used to require correct phasing. You could not get
away with reversing the leads.
Pins 4 and 5 are not used. They were reserved for tip and ring.
Pins 7 and 8 were used in the old days for a second line or to
power a phone with auxiliary features.
Page 3 - 20
3-21 Which Wires are Paired at the Jack/Plug?
Wire #
1 white/green white/orange
pair 3 pair 2 T+
2 green orange
T- Ethernet
3 white/orange white/green (802.3)
R+
4 blue blue
white/blue 1 2 white/blue 1 3
5
6 orange green
R-
white/brown white/brown
7
4 4
Sniffer University
How will you know if noise is affecting data to a station? For one thing, you will
see lots of CRC errors on the Sniffer with that station as the destination
address. There will also be various other errors (especially retransmissions)
associated with the station.
The EIA/TIA 568 wiring standards shown above is somewhat different from
the widely used “USOC” wiring scheme (not shown) for telephone signals.
Because of the wire-pair layouts, a 568 link can be used for voice signals;
however, USOC wiring is not properly paired for Ethernet signals.
EIA/TIA 568 standards specify an 8-pin connector (RJ-45), pinned out in one
of the two options--568A or 568B--shown above. Today’s connecting hardware
is color-coded to match the wires, and modern cable testers can quickly
determine if the link is capable of carrying a 10 or 100 Megabit Ethernet signal.
Important
Points to
Cover: 10BASE-T requires the transmit leads and the receive leads to be
discreet pairs.
It does not matter how your plant is cabled, but you need to know
so that the pairing can be maintained.
Page 3 - 21
3-22 Common Mode Rejection (CMR)
Important
Points to
Cover: This is what allows 10BASE-T to work.
The important concept is that you want the same amount of noise
on the receive minus wire as the noise on the receive plus wire.
When wires are not twisted together and noise hits, the
relationship is not constant and common mode rejection doesn’t
work.
Page 3 - 22
3-23 Cabling Installations
7 6
0 1 2 3 4 5 6 7 8 9 10 11
0 1 2 3 4 5 6 7 8 9 10 11
OFF
Sniffer University
8
ON
9
0 1 2 3 4 5 6 7 8 9 10 11
OFF 0 1 2 3 4 5 6 7 8 9 10 11
ON
The diagram above can apply to Ethernet or Token Ring. The connections in
the diagram are:
1) PC NIC and UTP patch cord
2) UTP patch cord and wall plate
3) Wall plate and UTP cable
4) UTP cable and punchdown block
Punch down blocks include BIX 1A, Telco 66, and/or AT&T MT 110
(for level 5)
5) Punchdown block and 25-pair cable
6) 25-pair cable and first patch panel
7) First patch panel and UTP patch cord
8) UTP patch cord and second patch panel
9) Second patch panel and 25-pair cable
10) 25-pair cable and interface module
This cabling diagram may be simplified in most locations. The shaded area
from points 4-9 are the equivalent of a harmonica, a device in common usage
in many installations.
Important
Points to
Cover: This cabling diagram does not represent the ideal, but rather is an
example of how things should NOT be done. Unfortunately, this is
the cabling found in some environments.
Each mechanical connection induces loss and an opportunity for a
failure point.
This cabling diagram represents the way things were done in the
past -- to meet category 3 standards. Most new installations DO
NOT install wiring this way. Each mechanical connection induces
loss and an opportunity for a failure point.
New installations wire the network to category 5 specifications. An
example would be to connect the wallplate (3) to the back of the
patch panel (8). Cross connects are made directly to the hub.
Page 3 - 23
3-24 Hub-to-Hub Connections
• Hubs typically cross internally over the transmit and receive pairs
from the nodes
• Hub-to-hub connections must be “crossed over” so that the
transmit pair of one hub’s port goes to the receive pair of the
other hub’s port and vice-versa
• This can be done with a “crossover cable,” or at the punchdown
block, or via an “MDI-X” port that internally crosses the pairs
Sniffer University
OFF OFF
ON ON
TX+ RX+
1 3
OFF
ON
TX- 2 6 RX-
OFF
ON
RX+ 3 1 TX+
RX- 6 2 TX-
Some manufacturers do not support hubs being connected via node ports.
Some of these manufacturers are circumventing the IEEE rules by using
special connections for hub-to-hub connections, and advertise themselves as
half-hop hubs, that may be cascaded further (to more hops) than the IEEE
rules allow, using the special connections, and no crossovers.
Some hub manufacturers are now offering proprietary higher speed
synchronous links between THEIR hubs. Other manufacturers have developed
Full Duplex Ethernet hubs.
MDI-X should only be enabled on one end.
Important
Points to
Cover: Student notes and slide are adequate.
Page 3 - 24
3-25
Timing Specifications
Sniffer University
Important
Points to
Cover: Title slide only.
Page 3 - 25
3-26 Collision Domain
A transmission
on this segment...
...and news of a
problem, if any,
Sniffer University
Repeaters
Important
Points to
Cover: This is an automated build slide.
Page 3 - 26
3-27 Ethernet Signal Propagation Speed
Important
Points to
Cover: This is a lead-in to the next slide.
Page 3 - 27
3-28 So, How Long is a Bit?
For thick Ethernet, the basis of the specification:
• 231,000 km/sec divided by 10 million bits per second = 23.1
meters
• A bit occupies 23.1 meters on thick Ethernet, slightly fewer
meters for thin and twisted pair Ethernet
• An extension of 32 bits would cause an additional 32 x 23.1
meters or 739 meters to be busy, which makes it possible to busy
out a maximum size Ethernet segment
• This explains why a repeater extends a fragment frame by at
Sniffer University
Important
Points to
Cover: Our favorite slide. (Lightbulb goes on.)
The pictures you see of a tiny frame on a big network are all wrong.
The frame quickly envelopes the entire cable segment, thus
collisions are much more rare than you have been led to believe.
Page 3 - 28
3-29 Historical IEEE 802.3 Maximum Topology (5-4-3 Rule)
This information is taken from the 1992 edition of the 802.3 specification.
Maximum end-to-end propagation delay is derived by dividing the maximum
length by the speed. See previous page for speed.
For thick coax, this is 500 m divided by 231,000 km/sec = 2165 nanoseconds.
For thin coax, this is 185 meters divided by 195,000 km/sec = 950
nanoseconds.
Each tap and each device adds additional delay, so the total network must not
introduce more than 51.2 micro seconds of delay.
Even though these rules are specified for coax cable, the 5-4-3 rule still applies
to the newer fast technologies. Cable lengths are modified and delay
characteristics are calculated to obtain the maximum topology rules.
Important
Points to
Cover: These rules are derived from the collision domain concept.
They are taken directly from the IEEE specs that have been in
place for many, many years.
Page 3 - 29
3-30 Minimum Frame Length Determination
Segment Segment Segment Segment Segment
1 2 3 4 5
• Station 3 just misses hearing Station 1’s transmission and also transmits.
Station 3’s transmission collides with Station 1’s transmission
• The damaged frame travels back down the network to inform Station 1 that a
collision has occurred. This takes approximately 50 microseconds or 500 bit
times
• The minimum frame length is defined such that the:
–Message from Station 1 is long enough so that Station 1 is still sending when the
collision is detected
–The resulting runt message from Station 1 is short enough such that Station 2 (the
receiver) can throw out the message on the basis of it being too short (less than 64
bytes)
The node needs to know it had a collision, so the damaged frame can be re-
sent at the MAC level. Retransmitting at the MAC level is very fast: within
microseconds. A retransmission at the LLC level takes a few milliseconds. A
retransmission at upper-layers can take a few seconds per frame.
Important
Points to
Cover: These rules are derived from the collision domain concept.
Page 3 - 30
3-31
So How Does this Apply to TP?
1 5
R4
R1
Populating one of
2 these repeaters 4
R2 would break the
rule
3
R3
Sniffer University
Important
Points to
Cover: New Slide.
Perhaps they should label the devices so unused ports are not
used incorrectly.
Page 3 - 31
3-32 Is this a Valid Application of 5-4-3?
Important
Points to
Cover: Yes. This is a 10BASE-T network with a 3-level cascade. The
topmost concentrator serves as the “backbone” to the other hubs.
The middle-end hubs are populated, whereas the middle-center
hub is not: it is a link segment to the two lower populated hubs.
Note that no frame needs to traverse more than 5 segments or 4
repeaters (hubs) to its destination.
Page 3 - 32
3-33 Exercise: Cable Specifications
Important
Points to
Cover: Use the instructor notes in the back of the instructor manual to
review the exercise.
Page 3 - 33
3-34 Exercise: Cable Specifications
Network Diagram
Thin Ethernet
Node 1 UTP ?? coax RG58 coax
WstDig178C4
Important
Points to
Cover: Review the network configuration.
Note that the picture is not complete. For example, there probably
were other stations on the thin Ethernet. The Sniffer analyzer was
connected somewhere near the end of the thin Ethernet.
(Otherwise the Sniffer technician probably would have noticed the
ARCNET cable!?!) We don’t know exactly what was on the other
side of the bridge shown on the left.
Originally the Sniffer analyzer was placed at the end of the topology
and saw no errors. In the actual trace, the Sniffer analyzer was
placed at the junction and saw errors. The node was moved to the
end of the topology and worked without incident.
Client addresses in the trace all exist off of the Concentrator with
the Server Coffee.1
Since the transmission model slides were moved to the back, you
will probably not cover this with the class. The calculations are left
here just in case you need them.
To calculate the p v v, we calculate from right to left:
50 meters
N
N
H H H H H H
FS
N S
B
8+8+8+8+8+16 = 56
This does not exceed the delay, but it is higher than the 49 p v v
allowed in Model 2.
Page 3 - 34
3-35 Degree of Degradation
Important
Points to
Cover: Important concept.
Page 3 - 35
Retransmissions
MAC Layer vs. Application Layer
3-36
Sniffer University
943: NFS request. 950: Frame 949 is collided and is retransmitted 24.2mS later.
944: Unanswered request (943) is retransmitted 0.7s later. 951: Frame 950 is collided and is retransmitted 11.4mS later.
945: Unanswered request (944) is retransmitted 3s later. 952: Frame 951 is collided and is retransmitted 50mS later.
946: Frame 945 is collided and is retransmitted 0.2mS later. 953: Unanswered request (952) is retransmitted 12.3s later.
947: Frame 946 is collided and is retransmitted 0.3mS later. 954: Frame 953 is collided and is retransmitted 0.3mS later.
948: Frame 947 is collided and is retransmitted 0.2mS later. 955: pc150 times out after request is unanswered and ARPs
949: Frame 948 is collided and is retransmitted 2.6mS later. for natco-4 26.9s later.
Important
Points to
Cover: Retransmission timer as revealed in the Sniffer Pro analyzer
screens.
Demo: FRAGS.CAP
Page 3 - 36
3-37 Summary
Important
Points to
Cover: Wrap up the section by reviewing the objectives and answering any
questions the students may have.
Page 3 - 37
© Network Associates Ethernet Network Analysis and Troubleshooting
Ethernet Physical and Data Link Layers
Section 3 TNV-202-GUI Ethernet Network Analysis and Troubleshooting
Page 3 - 38
4-1
Troubleshooting Methodologies
Sniffer University
Important
Points to
Cover: Section 4 title slide only.
Traces:
HUBPORT1.CAP HUBPORT2. CAP BADCABLE. CAP
BAD03. CAP FRAGS. CAP 01.CAP
05.CAP 06.CAP 16.CAP
17.CAP 19.CAP 20.CAP
Badcrc.cap Badcrc-1.cap 21.CAP (was
GIANT.ENC)
Exercises: Hubports
More Problems
Test Your Skill
Errors
Optional- Evaluating Hub Jams
Ethernet Physical Errors
There are too many to do all and have time to cover the newer
technologies. Choose those you feel will meet your student’s
needs.
Page 4 - 1
4-2
Section Objectives
Important
Points to
Cover: State the objectives.
Page 4 - 2
4-3 Capturing Error Frames
Important
Points to
Cover: New Slide.
Use this slide to emphasize they need to use NAI supported cards
and drivers in order to capture the error frames.
Page 4 - 3
4-4
Analyzing the Ethernet Physical Layer
• Frame Corruption
– Collisions
– Propagation delay
– Reflected signals
– Electrical noise
Sniffer University
– Hardware failure
• With any of these problems, users will see
decreased performance due to multiple
frame retransmissions
Important
Points to
Cover: Look for evidence of these in the Sniffer Pro analyzer.
Page 4 - 4
4-5 Some Guidelines
The IEEE specifications stipulate that the Bit Error Rate (BER) should not
exceed 10-8 in worst case. A typical LAN 10Mbps segment should have a BER
of 10-11 or better. This translates to a frame loss rate of 10-7.
Important
Points to
Cover: These are important guidelines for determining when they need to
act.
Page 4 - 5
4-6 Fast Transmit Adapters
• Some adapters start transmitting before the entire
frame has arrived in their transmit buffer
– If the remainder of the frame has not arrived when the
first part is on the wire, it just quits transmitting, leaving
the short incomplete frame on the wire
– Since it has no CRC, the Sniffer calculates the CRC based
on the last 4 bytes and shows a CRC error
– The adapter waits for carrier to drop and 96 bit times to
Sniffer University
The name depends on the vendor. The adapter may also be called a parallel
tasking adapter.
Important
Points to
Cover: This is a new slide that discusses the effect of “fast transmit” or
“parallel tasking” adapters. (They may be known by other vendor-
specific names)
Page 4 - 6
4-7 Troubleshooting Tip
Important
Points to
Cover: Student notes and slide are adequate.
Page 4 - 7
4-8
Divide and Conquer
• All speeds of half-duplex Ethernet are contention-
based
• Because of its nature, we are still troubleshooting
Ethernet with the “Binary Search” method
• Divide the domain in half. Which half does the
problem follow?
– This is still valid for star networks
• We could always use a network map!
Sniffer University
Problem?
Problem?
+1
Some hubs will autopartition devices out of the network that have too many
bad CRCs or if they are jabbering.
You can also look at the hub with a solid activity light. That usually indicates
problems.
Important
Points to
Cover: This is an automated build slide.
Page 4 - 8
4-9 Exercise: Hubports
Page 4 - 9
4-10 Exercise: Hubports Continued
Network Diagram
10BASE-T Hub • The user’s PC was
replaced by a Sniffer.
The same cable
Hubport1: known good port
connecting the PC
Hubport2: suspect port was used
NetWare client: Novell~FAA
Sniffer University
• Another Sniffer is
NetWare file server: 3Com~704 plugged into a known
good port. Both
Sniffers were
capturing
NetWare client: 3Com~F91 simultaneously
NetWare client:
Sniffer analyzer: suspect port
NetWare client:
NetWare file server:
NetWare client:
Page 4 - 10
4-11 Legal Collisions
• Collision occurs within the first 512 bits (64 bytes) of
data
• Preamble collisions have no recoverable frame data
• Typical collisions occur within the first 48 bytes of
data
• Sniffer Pro Analyzer needs to see 96 bits to capture
the frame, otherwise it just increments the collision
counter
Sniffer University
Important
Points to
Cover: These collisions are a normal part of Ethernet.
Sniffer adapters:
The Sniffer Network Analyzer uses two basic types of adapters:
Page 4 - 11
4-12 Normal Collisions
• Preamble collisions are not captured
• Local coax collisions do not have AAs or 55s in the data
• Remote collisions show AAs and 55s in the data field
inserted by the repeater
• They may be labeled collision fragments or runts
Sniffer University
Runts
Preamble D Addr S Addr Tp/Ln Headers Data CRC
8 6 6 2 varies varies 4
Important
Points to
Cover: New slide
Page 4 - 12
4-13 Late Collisions
• On coax, the signal becomes much more negative
when the collision occurs. The squelch filter drops this
signal, so you see good data then nothing.
• On UTP repeated sections, look for evidence of jam
from the repeater after 6010 bytes
– Either aa aa aa aa... or 55 55 55 55 …
– 101010101010 is aa aa aa, 010101010101 is 55 55 55
– 64 byte minimum minus the 4 byte CRC
– 6010 = 3D16
Sniffer University
Late Collisions
Preamble D Addr S Addr Tp/Ln Headers Data CRC
8 6 6 2 varies varies 4
Important
Points to
Cover: This is a screen capture that “draws the line” in the hex window to
show where the dividing line is between a normal and late collision.
This should help you in teaching them how to determine when the
collision was too late.
Page 4 - 13
4-14 Rogue Nodes or Bad Hubs
• Rogue nodes with “hearing problems” may think the
wire is quiet when they send their frame in the middle
of someone else’s frame
• Bad hubs can also cause late collisions
• Calculate the math pertaining to network size
– If collisions are occurring well beyond where they should be,
suspect a rogue node or bad hub
Sniffer University
Important
Points to
Cover: New Slide.
Page 4 - 14
4-15 Propagation Delay Problems
Important
Points to
Cover: Important skill which allows you to know what may have caused the
corruption the Sniffer analyzer is showing.
Page 4 - 15
4-16 Excessive Propagation Delay
Important
Points to
Cover: Important skill which allows you to know what may have caused the
corruption the Sniffer analyzer is showing.
Page 4 - 16
4-17 Signal Reflection Problems
• These problems occur on all media, but are not seen
in UTP frames because the adapter does not see
them. They are easy to detect on coax.
• Corruption is non-random
– Frames are corrupted by their own reflected preamble
• A victim node’s frame will typically be corrupted at
the same offset
– Corruption often occurs prior to the 32nd byte (3210 = 1F16)
– Collision data may be visible
Sniffer University
+1
Important
Points to
Cover: Important skill which allows you to know what may have caused the
corruption the Sniffer analyzer is showing.
You may want to discuss some of the things that may show up in
the Sniffer’s hex window. Of course, where the Sniffer was
attached in relation to the open cable and where the transmitting
station is located directly affect it.
Page 4 - 17
4-18 Electrical Noise Problems
• Users see intermittent disconnections and problems
connecting to network services
• Sniffer Pro Analyzer sees:
– “Physical errors” symptoms or diagnoses
– Damaged frames resulting in CRC errors
– The frames are the “right” size but have incorrect data,
maybe only one or a few bits got changed
– Not many more runts or collisions than baseline
• Cause:
Sniffer University
Important
Points to
Cover: Review quickly.
Page 4 - 18
4-19 Troubleshooting Electrical Noise
• Corruption is random
• No collision data is visible
– This is an absolute!
• Noise typically has no effect on frame length
• Worst case scenario:
– If the damaged frame is greater than 64 bytes, it will
Sniffer University
Important
Points to
Cover: Student notes and slide are adequate.
Page 4 - 19
4-20 Hardware Problems / Issues
• Corruption can look like all the other types of physical
errors
• Typical evidence is too many bytes
– Much more than 8 bytes of corrupted data
• Corrupted data may resemble preamble sequence of AAs and
55s
• Could be a jabbering transceiver or NIC
– The 802.3 specification states that a transceiver should
contain a self-interrupt capability to inhibit a station from
Sniffer University
A hardware card that is jabbering can jabber with preamble sequence or all
ones.
Important
Points to
Cover: Student notes and slide are adequate.
Page 4 - 20
4-21
Jabbering NIC
• Lots of
ones or
zeros
that
seem to
go on
forever
Sniffer University
Important
Points to
Cover: New slide.
Screen shot showing jabber in a frame. This shot was taken from
jabtest.enc from HQ engineering. It may have been created, but it
meets the Expert’s criteria for jabber as you see on the screens.
Warning- the Jabber.cap file we previously used for jabber may not
actually show jabber. The Expert doesn’t label it that way and you
will see the same pattern of bits in the frame that was retransmitted
and others around it.
Page 4 - 21
4-22 Sniffer Pro Ethernet Error Analysis
Sniffer Label Frame Size Error patterns Probable Causes
#Collision 64 bytes or greater N/A (Truncated) Representative of late collisions on coaxial media.
Frames will be truncated. Causes include
propagation delay or faulty hardware.
Alignment <64 bytes Look for 8 to 12 bytes Alignment errors with the AA/55 pattern are most
# Alignment >64 bytes of AAAAs or 5555s. often caused by normal collisions on UTP cable.
If not there, or greater The data pattern is caused by the repeater jam
amount, see signal. If data length is greater than 64 bytes on
comments. any damaged frame, include propagation delay and
hardware as causes. If the AA/55 pattern exceeds
12 bytes, a jabbering NIC or repeater is most likely.
CRC >64 bytes No specific pattern. Most commonly caused by noise or hardware,
especially damaged or improperly installed wiring.
Runt <64 bytes May contain the Runts have the same causes as Alignments.
AA/55 pattern, usually
Sniffer University
from 8 – 12 bytes.
Fragment <64 bytes May contain the Fragments are defined as Runts with an invalid
AA/55 pattern, usually CRC. Handle the same as Alignments.
from 8 – 12 bytes.
Jabber May be any size. Greater than 12 bytes The cause is hardware, usually a NIC or repeater.
The pattern is of AAs or 55s.
important
Oversize >1514 bytes Pattern will include Hardware has failed and is streaming data.
lots of AAs and 55s. Managed hubs may permanently partition node
streaming for more than 150ms; unmanaged hubs
may not.
Important
Points to
Cover: Review quickly. Do not attempt to read this fine print from the
screen.
Page 4 - 22
4-23 Exercise: More Problems
Page 4 - 23
4-24 Most Hubs Bit Jam on a Collision
• Per 802.3: If a collision is detected on any of the ports
to which the repeater (hub) is transmitting, the
repeater transmits a 96 bit Jam, such that the first 62
bits transmitted are a pattern of alternate 1s and 0s.
– The 96 bits is 12 bytes if 55 or AA, 4 from source
collider, 4 from destination collider, and 4 bytes
from the hub
Sniffer University
+
Sniffer Pro Analyzer
Important
Points to
Cover: When the hub senses a collision, it sends a 96 bit jam out all of the
ports.
Page 4 - 24
4-25
Sniffer University
Hub Jam Signatures
Important
Points to
Cover: New slide.
Two screen captures showing both 5s and As. Both the Summary
and Hex windows are shown so you can point out how the Sniffer
shows in each panel.
Page 4 - 25
4-26 Analyzing Collisions and Hub Jam
Sniffer Pro 2 sees
a partial frame
with jam bits
Sniffer Pro 1
sees a partial
frame with
jam bits
Sniffer Pro 3
Sniffer University
sees a partial
frame with jam
bits
1-A collision
occurs here
2-The hub
Collision
propagates jam
signals out to Jam
all devices Repeaters
+
Important
Points to
Cover: New slide.
Page 4 - 26
4-27 Frame Type Interoperability Problems
• User sees:
– Inability to connect to specific network services
• Sniffer Pro Analyzer sees:
– No more error frames than usual
• Examine frames to see:
– If the user’s system is using Ethernet frame format and the
network service IEEE 802.3 frame format (or vice versa)
Sniffer University
If the network is not experiencing physical layer problems, verify the frame
types being used by both communicating parties.
Important
Points to
Cover: Review quickly.
Page 4 - 27
4-28
Check Dashboard Statistics
Important
Points to
Cover: The following screen shots enable you to discuss the areas of
Sniffer Pro that help them to troubleshoot Ethernet specifically.
This should be familiar if they have been to the 101 G class, but it
never hurts to re-emphasize these.
Either use the traffic generator screen from the tools menu or right
click over the Summary panel and choose “Generate current
buffer” and send it out continuously so you’ll have plenty of time to
show these next screens.
Page 4 - 28
4-29 Monitor Dashboard Details
• Use the Dashboard Detail counters to find physical
errors
Sniffer University
Reminder: You must have the enhanced drivers loaded to detect and capture
error frames. Supported Ethernet adapters are:
Adaptec Fast Ethernet Adapter
Network Associates Card Bus Ethernet 10/100 Adapter (Xircom)
Important
Points to
Cover: Click the Detail tab to show this view.
Page 4 - 29
4-30 Dashboard Error Timeline
• Click on the Network and Detail Error sections to see
a graphic representation of Ethernet physical errors
Sniffer University
6
0
5
0
10
0
9
Important
Points to
Cover: New Slide.
Show all of the lower timelines and relate them to Ethernet counts.
Page 4 - 30
4-31 Track Errors with History Samples
• Run these
and save
the data as
a .CSV file
• Open in
Excel or a
Sniffer University
reporting
application
Important
Points to
Cover: There are more. Demonstrate on your Sniffer.
Page 4 - 31
4-32 Create a Multiple History Report
• Include the errors you need to see
Sniffer University
To create a multiple history report, open the History Samples window from
either the Monitor menu > History Samples or by clicking the History
Samples icon.
Click the Add Multiple History icon, assign a name to your sample and
modify the sample interval and Graph Type on the General dialog box.
Click the Selection tab, then the New (Insert) icon and scroll and click to
choose a sample from the Statistics List window. Repeat this process until you
have chosen all the statistics you want included in your report. Use the up and
down arrow icons to place the statistics that will have the highest values at
the bottom. Adjust any colors as you wish. Click OK when done.
Double click the icon with the sample name to start collecting the statistics.
Minimize the window to get it out of your way if you wish. It will continue to
gather statistics in the background.
When you want to save the statistics to a file, click the Export icon and
name the file and choose the file type (comma, tab or space delimited) and
path. The application will continue to gather statistics until you close the
window.
You will also be able to save the information in graphic format when you close
the sample window. This can be viewed later within the History samples
application. If you want to import a snapshot of this screen, just press the alt
and print screen keys to copy it to the clipboard. Then paste it into your
document or a paint program for further editing.
© Network Associates Ethernet Network Analysis and Troubleshooting
Troubleshooting Methodologies
Section 4 – TNV-202-GUI Ethernet Network Analysis and Troubleshooting
Important
Points to
Cover: Demonstrate how to create a Multiple History report of the Ethernet
errors.
Suggest they may want to run this as a baseline and for trend
analysis or scheduled reports for the boss.
Run for a specific time and save the file as comma, space or tab
delimited file for import into a spreadsheet or database.
They can also save a snapshot of this graph as a .HST file when
they close the window.
Page 4 - 32
4-33 Check Utilization In Global Stats
Important
Points to
Cover: Demonstrate this screen under Global Statistics.
The 37% given here will re-emphasize this statistic they need for
CNX.
If they are seeing a high level of physical errors, they should check
first if the network is overloaded. If the traffic is within normal
ranges, they need to look at a possible physical reason for the
errors.
Page 4 - 33
4-34 Look at the Expert’s DLC Layer
Who’s the
source?
Sniffer University
Check the
Symptoms and
Diagnoses
Important
Points to
Cover: This emphasizes “troubleshoot from the bottom up”.
The DLC layer is the only place they will see Ethernet-related
specific information.
Demonstrate with your favorite trace file that shows several DLC
layer symptoms and diagnoses.
This is not the place to teach the Expert. They learned this in TNV-
101-GUI (we hope they went).
Page 4 - 34
4-35 Troubleshooting Exercises
Page 4 - 35
4-36
Summary
Important
Points to
Cover: Wrap up the section by reviewing the bullets and answering any
questions the students may have.
Page 4 - 36
5-1
Important
Points to
Cover: Section 5 title slide only.
Page 5 - 1
5-2
Section Objectives
Important
Points to
Cover: State the objectives for the section.
Page 5 - 2
5-3
Bridges
Sniffer University
Important
Points to
Cover: Title slide only.
Page 5 - 3
5-4
Ethernet Bridges
LOCAL REMOTE
Bridges work at the Data Link layer of the OSI Reference Model, specifically at the
MAC sub-layer. Bridges are only concerned with physical layer addresses. They learn the
address of each device on each segment to which the bridge is connected, typically two
segments. When a frame is received on one port of the bridge, it examines the physical
layer address to determine whether or not the frame should be forwarded to the other
segment. The bridge stores this information in a "Forwarding Table."
Bridges are also what is termed "Protocol Transparent." Since they work at the MAC
layer and are only concerned with physical layer address (like Ethernet), they have no
reason to be concerned with higher layer protocols like DECnet, XNS, TCP/IP. One bridge
can forward (or filter) all of these higher layer protocols.
Some bridges allow complex filters to be used to determine which frames get forwarded
and which frames don't. This might be used in the case where a router was previously
installed to route IP frames. Due to company growth, a new protocol is added and
eventually a bridge to allow access to a second segment. Since an IP router is already
being used to forward IP frames, the bridge must not forward these same frames. The
bridge is programmed (using a filter) not to forward IP frames, but allow remaining
frames to be forwarded if the destination address deems it necessary.
With any luck at all your bridge is sophisticated enough to have some sort of bridge
manager. The bridge manager will allow you to configure the bridge, maintain its address
table, as well as allow you to examine how effective the bridge is to forward and filter
frames. Additionally, consider this: is your vendor's manager going to manage another
vendor's bridge? When determining a vendor for your bridge purchase, you may want to
consider its management capability.
Important
Points to
Cover: Work at the Data Link Layer.
Page 5 - 4
5-5
Multiport Ethernet Bridges
Multi-Port Bridge
Port A Port B Port C Port D
Address 1 Address 4 Address 5 Address 7
Address 2 Address 6 Address 8
Address 3
Hub
OFF
ON
OFF
ON Mini-Hubs
Sniffer University
A list must be kept of what node addresses lie beyond a bridge port. The list can
be lengthy.
The number of addresses are vendor dependent, but usually start with 1024.
Important
Points to
Cover: As noted on the slide.
Page 5 - 5
5-6
Ethernet Bridges are Responsible For:
Flooding:
If the destination address is unknown, or if it’s a multicast/broadcast
destination address, the bridge sends the frame out each port except
the port on which the frame was received
Learning:
A bridge is promiscuous and sees every frame on the segments to
which it is attached. By examining the source address in frames, a
bridge learns which stations are on which side of it
Forwarding:
Sniffer University
Once a bridge learns where stations are, it only sends a frame out the
correct port to reach the destination station
Filtering:
If the destination and source addresses are on the same port, the
bridge just drops the frame
User Filtering:
Allows a network manager to filter, based on protocols, addresses,
packet type, etc., to increase the network's efficiency or add security
measures
The filtering function might seem so obvious it's not worth mentioning, but
actually it is worth mentioning in order to compare a bridge to a repeater: a
repeater repeats everything, even if the two stations communicating are on the
same side of the repeater. Since a bridge looks at the data link header, it learns
the locations, it does not need to forward unnecessarily.
The filtering rate advertised for a bridge is the number of frames per second on
which the bridge can make forwarding/nonforwarding decisions. User filtering
may employ a technique similar to the Sniffer analyzer’s pattern match function,
allowing some manufacturers to claim to filter on layer three protocol addresses,
even though a bridge is a layer two device.
Important
Points to
Cover: Cover the slide points well.
Page 5 - 6
5-7
Store and Forward
A B
DA = B
HUB HUB
This technique requires the bridge to look at the entire frame before making a
forwarding decision. A benefit of this feature is that the bridge can determine
whether there is an error in the frame before making a forwarding decision.
Error frames are removed from the network. A drawback is that the bridge will
introduce latency (delay).
Important
Points to
Cover: This is now an animated build slide.
Review them.
Page 5 - 7
Bridge Data Flow
Receive frame on
5-8
Port x
Read source
address
MAC DA
in Table? No
Yes
No Yes
Forward frame DA on
on correct port Port x?
Discard
frame
+4
All speeds of Ethernet follow this flowchart. Only the timing changes.
Important
Points to
Cover: New partially automated build slide.
Click to reveal each step in the decision process as you discuss it.
Page 5 - 8
5-9
Bridging Loop
Forward Forward
Broadcast
Frames
circle Forward
Forward
endlessly
Forward Forward
The Spanning Tree specification is defined in IEEE 802.1d. Topology loops can
occur in a switched network just like a bridged network.
Bridges are assigned an ID by the administrator (two byte field).
The MAC address of the adapter is appended to the two byte ID, and the result
becomes the Bridge Identifier.
The lowest value Bridge Identifier becomes the Root bridge.
The network manager configures a cost for each port on the bridge. For example,
the cost for a T1 link could default to 100, while the cost for a 56 kbps line could
default to 500.
Costing information is exchanged with BPDU frames.
Important
Points to
Cover: Broadcast frames will be forwarded continuously when
Spanning Tree is not enabled.
Page 5 - 9
5-10
Spanning Tree
Cost = 2
Co s 5
2 t= =
= 1 st
st C o
Co
Co
Co
4 st
st
= =
st
=
Co s 2
t= Co
1
4
Best Cost = 5
Backup
Important
Points to
Cover: New Slide.
Page 5 - 10
5-11
BPDU Frames
Multicast
Dest. Address
• Sent by the
bridge to
neighbors to
share
configuration
information Type of frame
Sniffer University
Root Bridge
Link Cost
Source
information
Timers
Important
Points to
Cover: New Slide.
Page 5 - 11
5-12
Capturing in a Bridged Environment
Node D Node A
Node B
Node E
HUB HUB
Sniffer University
Node F Node C
SnifferPro
Important
Points to
Cover: “New” Slide. (Actually a resurrection of the slides we always
included in this class – updated to star wiring.
Page 5 - 12
5-13
Exercise: Short Circuited Bridges (Optional)
Page 5 - 13
Exercise: Short Circuited Bridges
5-14
192 Kb Link
Sniffer University
192 Kb Link
Sniffer
Pro
analyzer
Time to transmit a minimum length Ethernet frame across the 192 Kb link
TIME LINE
Station on left sends ARP. Assume within 576 microseconds Bridge 1
and Bridge 4 receive the frame.
.03 seconds later Bridge 1 has transmitted the frame to Bridge 2. During
the same time period Bridge 4 to Bridge 3.
Either Bridge 2 or Bridge 3 will be able to access the Ethernet media on
the right.
Assume Bridge 2 puts the frame out. (For argument’s sake, let's say this
is the ARP Frame 1 we see on the Sniffer.) Within 576 microseconds,
Bridge 3 is receiving the frame Bridge 2 transmitted.
Bridge 3 begins transmitting Frame 1 back towards Bridge 4.
Bridge 3 begins transmitting its frame out on to the Ethernet (Frame 2 on
the Sniffer).
Bridge 2 receives Frame 2 after 576 microseconds.
During which time, Bridge 4 begins putting Frame 1 onto the left Ethernet
segment.
Bridge 2 will transmit the frame back toward Bridge 1 and then the
process continues...
Page 5 - 14
5-15
Switches
Sniffer University
Important
Points to
Cover: Title slide only.
Page 5 - 15
5-16
Switches
A switch connects LAN segments like a hub does, but unlike a hub, which divides the
bandwidth among all attached segments, a switch provides full bandwidth at each port.
A port can be dedicated to a single file server, for example. Like a bridge, a switch
learns which addresses are available at each port. Unlike a bridge, when forwarding a
packet a switch may look at just the destination address, instead of the whole packet,
and forward immediately if possible. If the destination segment is busy, the frame is
queued in a buffer, just like a bridge, until the destination segment is free. Usually the
destination segment is not busy.
Packets are processed in parallel by very fast hardware. One vendor claims a switching
delay of only 40 microseconds, which they measure as the time between the first bit of
a packet received and the first bit of the packet sent.
Some switches support software configuration to specify which ports can talk to which
ports, sort of an “electronically controlled patch panel.” It really is hard to compare
switches, especially because they have very different architectures and because vendors
are getting very creative in combining the functions of layer 1, layer 2 and layer 3
relays. The late 1990s started major innovations in this area.
Issues with using switches instead of bridges or routers include:
1. A switch may forward a bad CRC and a runt that has a destination address.
2. Switches will not isolate broadcast storms. They often cannot be set up for protocol
filtering. They generally won’t do fragmentation and re-assembly.
3. Using the switch’s “electronically controlled patch panel” feature sounds great, but
could wreak havoc with IP addressing and subnet mask schemes.
Important
Points to
Cover: Vendors are doing many things to improve the performance of their
products.
Page 5 - 16
5-17
Switched Networking
Sniffer Pro
• Switches are not governed by standards, so a
combination of vendor switches is difficult
– There are many proprietary implementations
Microsegmentation means that there is only one device at each switch port,
rather than a shared LAN on a port as in segmented network.
The overall benefit of switching is that multiple conversations can occur
simultaneously on a single switched hub, providing the user or segment with
almost dedicated bandwidth.
Switching extends the life of existing legacy LAN networks, provide increased
performance without replacing existing wiring plant, and increase network
throughput, reducing response times. Switches are a small cost, when compared
to other alternatives.
Switches are plug and play, easy to implement, but much pre-planning is
required. As an example, if your bandwidth is being eaten up by DLC layer
broadcasts, a switch will not improve the condition. Traffic is aggregated on the
backplane of the switch. This backplane should be between 1.5 - 10 Gbps with
recent announcements for 85 Gbps backplanes.
Important
Points to
Cover: Slide and notes points.
Page 5 - 17
5-18
Basic LAN Switching Defined
Server Server
Workstation Workstation
Important
Points to
Cover: Collisions are in switched environments.
The path is active for the duration of the frame only. It is torn down
after each frame has been transmitted.
A bullet and student note was added that addresses the issues of
the speed of the switching fabric.
A switch should have a very low PLR or Packet Loss Rate. It can
have congestion control, where a switch will slow things down if
ports become overloaded. Switching times may degrade
noticeably, but at least you won’t lose any packets which will cause
retransmissions.
Switches that can buffer more than 100 1518 byte packets are
considered very robust.
Page 5 - 18
5-19
Capturing in a Switched Environment
Node D Node A
Sniffer University
Node E Node B
Node F Node C
Vendor
Dependent
The Sniffer Pro Network Analyzer sees different things based on the switch
technology and how the switch has been set up. At the data link layer, the
source and destination addresses will be the end node’s addresses. You will
not see the switch’s addresses. Switch vendors have provided various
mechanisms for network analysis tools to evaluate network traffic and
conversations.
Important
Points to
Cover: What you see is what the vendor allows you to see.
Page 5 - 19
5-20
Seeing the Frames
SnifferPro
Sniffer University
SnifferPro
+2
Tapping the backplane of the switch does not limit the traffic sent to the
monitor port. You will get all traffic that occurs on any port in the hub. This may
present problems due to high utilization on the monitor port. It will work well
when overall use of the switch is low, but if several users of the switch are
demanding high amounts of bandwidth individually, their combined traffic may
be greater than the switch can process through a single monitor port. You will
most likely lose packets.
A port tap limits traffic seen to just what happens on that one port.
Important
Points to
Cover: Several separate slides are now combined so you can cover them
quickly and compare them more easily.
You’ll need to set a capture filter to focus on the traffic that will help
you solve the problem.
Station address filter
Address class filter
Protocol filter
But if the port can’t deliver it, you still can’t capture it.
Page 5 - 20
5-21
Seeing the Frames Continued
Shared
Media
Sniffer University
Hubs
Shared
Media
Hub
(mini-hub)
Server Server Server
Work-
Server Transport
stations
Card
Matrix Switch
SnifferPro
Monitor Card
DSS/RMON Agent
+
The hub should be attached when the server is inactive, and left in place to
enable real-time monitoring. There are several inexpensive mini-hubs on the
market. This is a very easy solution to implement and, in some environments, a
very effective solution. For example, when there are only a couple of servers in
a server-client environment, everyone will be talking to those servers, therefore
you’re actually getting all traffic on the switch by just monitoring the servers’
ports. This also works well with unsophisticated switches that have do not have
a built-in monitor port.
Several companies make matrix switches.
Portable Sniffer Pro Network Analyzers can also be used in place of the
DSS/RMON. If you are using a DSS/RMON Agent, you should use a Network
Associates supported switch like the DataComm switch. There are several
advantages to using a Network Associates supported switch.
Remember, though, you can only monitor one port at a time. Adding the hub
may change the timing characteristics of the segment and may introduce its
own set of errors if you exceed the collision domain. Be sure you are not
introducing a repeater into a full-duplex link by mistake.
Important
Points to
Cover: Permanently install minihubs in the line to your servers.
Allows you to see all the traffic to and from the server.
There are several vendors that supply switches from DS Pro. Some
of them can be controlled directly with SniffView.
Page 5 - 21
5-22
Switch Control and Expert
• Switch control allows you to access supported
switches and span one port or VLAN to a monitor port
• Two adapters are required to span a port
– The configuration adapter sends SNMP signals to the switch’s
IP address to control the switch and retrieve MIB data
• Attach to the switch control port
– The monitor adapter does the assigned Sniffer tasks
• Attach to the mirrored port
• One adapter is enough if you just want MIB data
Sniffer University
Monitor
Switch
adapter
SPAN
Port
Frames Port or
VLAN
Configuration SNMP
Commands
adapter
+
Important
Points to
Cover: New Slide.
Unfortunately we just don’t have time to delve into this in this class.
You also need a switch to demonstrate all the functions of this
feature.
The basics:
You can get all the MIB data from the switch and see it in the
Sniffer windows.
You can use these MIB screens to mirror a port or VLAN to the port
where the Sniffer is attached. (VLAN mirroring is not supported for
all switch models.)
You can do all the Sniffer functions on the mirror port i.e. start
Monitor screens, capture, set triggers, etc.
You need the second card only if you want to do the Sniffer
functions. You can get the MIB data with a single adapter. You
cannot use a single card to send the SNMP commands to the
switch to control it AND then turn around and sniff using the same
card. Port mirroring (or SPAN) puts a big load on the switch. DO
NOT leave it enabled constantly. Turn the mirroring off when you
are done!
Page 5 - 22
5-23
Switch Frames
Important
Points to
Cover: New Slide.
You can filter from the Expert’s VLAN symptoms and diagnoses.
You can get the switch MIB statistics on adapter and VLAN MIB
counts that can be very helpful.
Page 5 - 23
5-24
Switch Performance
mode
– Only frames at least 64 bytes in size are forwarded
• Switch latency increases the further into a frame the
switch checks for data integrity
• Switches forward damaged frames if damage occurs past
their check point
Important
Points to
Cover: Slide is adequate.
Page 5 - 24
5-25
Exercise: Busy Jam
Page 5 - 25
5-26
Exercise: Busy Jam Diagram
Switch
Hub
Sniffer
Pro 10 Mbps Server
analyzer
Sniffer University
Client
Stations
Network Diagram
Page 5 - 26
5-27
Important
Points to
Cover: New Section - New title Slide.
Page 5 - 27
5-28
VLANs
• Many switches allow you to set up virtual LANs
– A VLAN is roughly a broadcast domain
– Stations in different physical locations can communicate as if
they were on a common LAN
– Some manufacturers allow you to place ports on more than
one switch in a VLAN
– There are many vendor-specific implementations
Sniffer University
HR
VLAN 2nd Floor
Finance
1st Floor VLAN
Exec 3rd Floor
VLAN
Port configurations aggregate stations based on the port where they are
attached. This was the first implementation of VLAN groups. It is a good way to
isolate groups using non-routable protocols.
Protocol-based VLANs group stations based on their protocol type or layer 3
address. The switches use standard routing protocols to communicate with
routers, but all traffic in the VLAN is switched.
MAC address-based VLANs group stations based on their MAC address. This is
useful when you have laptop users who carry them around and attach their
PCMCIA cards in different locations. Problems arise when they dock these
laptops and use the docking station’s NIC card or software overwrites the MAC
address.
IP Multicast address groups segregate the multicast traffic and send only to
those devices that are in the VLAN. This extends beyond the normal network-
maintenance address types for routing and bridging support to specialized
applications like broadcast audio or video data.
802.1Q VLAN tagged frames is a new IEEE standard that uses an additional
header in the frames between the switches that identifies the VLAN.
Since many of the mechanisms are vendor-specific, you should try to buy all
your switches from one vendor or only use switches that support the 802.1Q
standard.
Important
Points to
Cover: New Slide.
VLANs have been around for a long time and most students will
have basic knowledge about them. What they may not know is how
their traffic looks on the wire.
Page 5 - 28
5-29
VLAN Grouping Techniques
• Port
– Assign each port to a particular VLAN
– Quick and simple, moves require reconfiguration
• Protocol (Layer 3 grouping)
– Groups all devices with the same protocol - isolates protocol-
specific broadcasts
– Stations with multiple protocols belong to multiple VLANs
– Router required between different protocols and IP subnet
Sniffer University
VLANs
• MAC address
– Assign each NIC to a particular VLAN IP multicast address
– Good for laptops that move around
• Multicast Address
– Proxy address for a group of devices
Important
Points to
Cover: New Slide.
Page 5 - 29
5-30
VLAN Tagging
This is just a page to introduce the reason for tags and the VLAN
tagging methods
Page 5 - 30
5-31
Interswitch Link (ISL) Protocol
Important
Points to
Cover: New Slide.
Page 5 - 31
5-32
Cisco ISL Frame Tags
• Ethernet frame
is attached
after the 26
byte ISL Header
• VLAN identifier
Sniffer University
Inter Switch Link (ISL) protocol was developed by Cisco and has been
incorporated into the 802.1Q standard.
ISL adds a 10 bit address to every frame as it enters the switch fabric. The
frame is forwarded only to switches and interconnected links with the same 10
bit address.
This tag is removed before the frame is forwarded to the end station or switch
outside the VLAN.
Important
Points to
Cover: New Slide.
Don’t go into details of this protocol. Let Cisco teach that in their
classes!
Page 5 - 32
5-33
Cisco ISL Expert Information
• VLAN information shown at the Global Layer
• VLAN list in the Detail Tree
• Statistics and details in the Expert Detail panel
Sniffer University
Page 5 - 33
5-34
802.1Q VLAN Standard
• The 802.1Q standard is based on the 802.10 standard
– 802.10 is the Interoperable LAN/MAN Security (SLIS) standard
which defines a single Protocol Data Unit (PDU) with an 802.10
header inserted between the MAC header and the frame data
for secure transmission of data
• 802.1Q uses frame tagging to carry VLAN membership
information across multiple multivendor devices
– The security header from 802.10 is modified to support VLAN
tagging
Sniffer University
Important
Points to
Cover: New Slide.
This is the IEEE standard for VLAN tagging. The headers are
different.
All the switches in the VLAN must support the same tagging
method or frames will not get where they need to go!
Page 5 - 34
5-35
802.1Q VLAN Headers
Fits between the Source MAC address and Type/Length
field of the MAC header of the Ethernet frame
MAC D & S Type Tag Control MAC Type/Length Data
802.1Q standard works hand in hand with the 802.1P standard for assigning
priority levels to frames. You may see it called 802.1 Q/p in some publications.
The user priority field allows applications that require guaranteed bandwidth to
be delivered before applications that are not time-sensitive.
3 bits allow for 8 different priority levels. The switches must maintain internal
queues for each priority. Incoming frames are placed in the queue for the
priority in the field and the highest priority frames are transmitted out before
the lower priority frames.
This enables lower cost Ethernet installations to compete with the high-
maintenance and cost ATM networks that provide robust Quality of Service
guarantees.
Keep in mind that this is priority done at layer 2. RSVP at the network layer in
the stack needs to inform layer 2 to set the priority bits to match the level of the
data being sent. To have end-to-end priority, all devices in the intervening path
must recognize the priority levels at both layers.
The 802.3ac standard has extended the maximum frame size to 1522 bytes to
allow for these 4 additional bytes.
Important
Points to
Cover: New Slide.
This shows a breakout of the fields in the tag to prepare them for
what the Sniffer shows.
Point out that the tag comes in the MAC header! This was very
confusing when I first viewed these frames. I wanted to put the
Type/Length field in with the tag, because the Sniffer puts it there
without identifying that it is part of the DLC header. The number of
bytes in the spec didn’t match what I saw in the frames that way.
The destination and source addresses come first, then the tag,
then the MAC type or length field.
Page 5 - 35
5-36
802.1Q Header
• Ethernet
frame is
encapsulated
inside the
802.1Q
Header
• VLAN
Sniffer University
identifier
The tag Protocol Type is used for FDDI, Token Ring and SNAP encoded fields.
Ethernet sets this to 8100.
Important
Points to
Cover: New Slide.
It does indicate only the first 1514 bytes were captured in the Detail
window. That shouldn’t create problems for us, since it still has
almost the entire frame, certainly enough to get through all the ULP
layers to see if there are problems there.
BTW – a question has been raised about how the Sniffer handles
the max size Ethernet frames captured by a pod. Remember it
encapsulates them in Ethernet frames to send them to the PC. The
pod transparently fragments these oversize frames and the PC
reassembles them in the driver software before they are sent up
the stack for analysis.
Page 5 - 36
5-37
Expert 802.1Q Information
• VLAN information is shown at the Global layer
• Symptoms and diagnoses break out stations in
the VLAN
Sniffer University
VLAN
8021Q Protocol in use numbers and
switch MAC
addresses
VLAN Info
Important
Points to
Cover: New Slide.
If time is running short, give them the details and skip the exercise.
If you’re doing OK, cover it very briefly here and let them discover
the details on their own in the exercise.
Page 5 - 37
5-38
VLAN Frames
• Sniffer sees VLAN headers only between switches that
support them
– Tap into the trunk link or mirror the trunk port to the Sniffer
port with Switch control
Sniffer University
HR
VLAN 2nd Floor
Finance
1st Floor VLAN
Exec 3rd Floor
VLAN
More details on the switch Expert are available in these Sniffer University
classes:
TNV-101-GUI, Troubleshooting with the Sniffer Pro Analyzer
TNV-201-DSP, Implementing Distributed Sniffer System/RMON Pro
TNV-315-GUI, Interconnection Concepts and Troubleshooting
Important
Points to
Cover: New Slide.
This is just a visual reminder you will see these only if you tap into
the trunk link either physically or by spanning the trunk port to the
Sniffer. This is risky!
Page 5 - 38
5-39
Optional Exercise: Switch Traffic
Important
Points to
Cover: New Exercise.
They won’t see the MIB data or be able to do a SPAN, but this will
help.
Page 5 - 39
Summary
5-40
Important
Points to
Cover: Wrap up the section by reviewing the objectives and answering any
questions the students may have.
Page 5 - 40
6-1
100 Mbps
Fast Ethernet
Sniffer University
Important
Points to
Cover: Section 6 title slide only.
The former three-part section covering all the fast technologies has
been split into sections for each.
Please allow enough time to present it if the class is interested. By
now, they have seen Fast Ethernet several times, so this section
can be taught very quickly.
Have the students do the exercises if possible. The first shows
various different vendor implementations of back pressure.
The second is a filtered trace and shows lots of hub jams and
collisions.
References:
Fast Ethernet: dawn of a New Network by Howard W. Johnson,
1996, Prentice Hall Publishing, ISBN 0-13-352643-7
Page 6 - 1
6-2
Section Objectives
Important
Points to
Cover:
Troubleshooting Fast Ethernet is basically the same as 10mb
Ethernet.
Page 6 - 2
6-3
Overview of Fast Ethernet
Important
Points to
Cover: The specification calls for a few changes from the previous spec,
but mostly outlines the new features.
Page 6 - 3
Where to Deploy Fast Ethernet
Remote LAN
6-4
Campus
Workgroup 10/100 Mbps Hubs
LANs and Switches
Network Center
10/100 Mbps
Workgroup WAN
Switches
Hubs/Switches
T1, X.25,
Frame Relay
Router
Sniffer University
Faster Hub
Server
Firewall Links
Router
Router
Token Ring
Server Cluster
Due to the small collision domain and repeater limitations, most Fast Ethernet
hub installations will be in workgroup areas. It is not useful in the backbones of
large enterprise networks. Fast Ethernet switches or other technologies are
needed to go the distances.
Important
Points to
Cover: Key words: “In place of” does not mean pull out all of your FDDI
and use Fast Ethernet instead. FDDI has been around a long time
and is a proven technology. This is to say, “If you need to install a
new highspeed backbone, consider Fast Ethernet.”
Pulling out FDDI would be a real waste of money, and Fast
Ethernet is probably inferior.
Fast Ethernet is, however, cheaper to implement, and easier, since
troubleshooting skills students already have transfer over to this
technology.
Page 6 - 4
6-5
Similarities between 10BASE-T and 100BASE-T
Fortunately, 100BASE-T makes use of CSMA/CD and the same frame formats as
10Mbps Ethernet. Therefore, most of what has been covered in this course is
applicable to 100BASE-T also.
Wiring specification
Page 131 of IEEE 802.3U - 1995 spec details the pinout for internal and external
crossover cables.
pin
1 ----------| Dedicated Transmit pair +
2 ----------| Dedicated Transmit pair -
3 ----------| Dedicated Receive pair +
4 ----------| Bi-directional pair 1 +
5 ----------| Bi-directional pair 1 -
6 ----------| Dedicated Receive pair -
7 ----------| Bi-directional pair 2 +
8 ----------| Bi-directional pair 2 -
Important
Points to
Cover: Point out just how similar the two are. The differences do not affect
us as the protocol analyst. Of course, as a network manager
concerned with the installation and overall network design, the
similarities and differences are critical.
Page 6 - 5
6-6
100BASE-T Features
Important
Points to
Cover: This slide shows key differences
Point out the interframe gap is still 96 bit times, the bit times are
just 10 times shorter!
Page 6 - 6
6-7
Physical Layer Specifications
Important
Points to
Cover: Use this page as a preview of what we will cover in more detail.
Page 6 - 7
6-8
100BASE-TX for Category 5 UTP
Category 5 certified
• Traditional DB-9 connector used for STP wiring
• 4B5B coding
Important
Points to
Cover: Slide information is adequate.
Page 6 - 8
6-9
100BASE-T4 for Category 3 UTP
Important
Points to
Cover: Slide information is adequate.
Page 6 - 9
6-10
100 Base T Ethernet Pinouts
RJ45 8
1 AT&T 258A and
EIA/TIA-T568A EIA/TIA-568B
4 Receive 1 4 Receive 1
Sniffer University
blue/white blue/white
It doesn’t matter which wiring spec you choose, you just need to ensure you
follow through with the same pinouts for all the cables.
Both T4 and 1000BASE-T require four pairs. Gigabit requires a higher quality
connector.
Wiring specification
Page 131 of IEEE 802.3U - 1995 spec details the pinouts for internal and
external crossover cables
Important
Points to
Cover: New Slide.
If they are upgrading NICs to 100 or 1000 Mbps, they will need to
connect all eight of the pins to make the old cable work for the new
speed!
Page 6 - 10
6-11
100BASE-FX for Fiber Optic Cabling
Important
Points to
Cover: Slide information is adequate.
Page 6 - 11
4B5B Encoding Technique
(100BASE-FX and 100BASE-TX )
6-12
The conversion from 4 bits to 5 bits does not involve any mathematical
calculations - it is merely a table lookup.
Q: How does 4B5B contribute to making Fats Ethernet fast?
A: By processing bits in parallel blocks as they pass through the MAC layer
rather than serially as in Manchester encoding.
Fast Ethernet operates at 100 Mbps as data passes through the NIC. After the
addition of the extra bit, it theoretically transmits at 125 MHz.
Important
Points to
Cover: New diagram requested by Linda Richman. Thank you!
The codes do not directly map to the hex value of the byte, so don’t
get hung up on the fact that a 1 maps to 01001 and F to 11101.
The codes were defined to keep the number of sequential zeros
less than 3 to maintain clock.
In 4B5B, every four bits will be sent out over five bit times.
Look at the beginning of the bit cell to see if there’s a transition. If
there is, you’ve got a one, otherwise it’s a zero.
What makes 4B5B different from other encoding schemes is that
the kind of transition is not always the same.
The transition order (+1,0,-1,0,+1,0…) tells us that if there is going
to be a transition, this is where the signal goes.
Page 6 - 12
6-13
4B5B Ternary Example
• 100BASE-TX uses MLT-3 ternary signaling
– Any signal change in TX is represented by
circulating among three progressive levels: (+1, 0,-
1, 0, +1, 0,-1, 0 ...)
No Transition
transition +1 present,
present, 0 so this is a
so this is a -1 binary 1
binary 0
Sniffer University
0 1 0 0 1 1 1 1 0 1
1 F
Each 4 bit nibble is translated into a 5 bit symbol. The five bit symbol for 1 is
01001, the 5 bit symbol for F is 11101.
What happens if you connect a 10 Mbps hub to a 100 Mbps port?
Autonegotiation signals will not be sent by the 10Mbps hub, so the 100 Mbps
hub will adjust the port to 10 Mbps.
The slow hub will send frames using Manchester encoding, the fast hub
converts it to 4B5T encoding and uses MLT-3 ternary signaling to forward it out
a fast port. It does the opposite conversion before forwarding any frames from
the fast port to the slow port.
Important
Points to
Cover: This is electrical signaling – how we get the bits we just converted
form 4 bit patterns into 5 bit symbols.
Notice that after each group of four bits, there’s a transition. This
transition does not provide data but is used for clocking.
Page 6 - 13
8B6T Encoding Technique
(100BASE-T4)
6-14
Important
Points to
Cover: This is “nice to know” information but not needed to troubleshoot
Fast Ethernet. Cover it quickly so you have time to present the stuff
that will help them.
The 802.3u spec defines a six part code for each byte.
Page 6 - 14
6-15
8B6T Example
Important
Points to
Cover: Cover quickly.
Page 6 - 15
6-16
Data Frame Transmission in 8B6T
BYTES
3 ( of t
he 4 pairs
)
Important
Points to
Cover: As we showed earlier, 100BASE-T4 operates over four pairs of
UTP wiring. Three are used for transmission, the fourth does
collision detection.
Each byte goes to a different wire in a round robin fashion.
Page 6 - 16
6-17
Maximum Collision Domain
– 100 meters (328 feet) is the maximum for each UTP link
– A maximum of two repeaters is allowed
– Two “classes” of repeaters are used (depending on their
latency characteristics): Class I and Class II
Sniffer University
The 512 bit-time propagation limitation still applies. However, 512-bit times
equals only 5.12 micro-seconds. Therefore, the performance of the repeater
determines the number of repeaters allowed. To make things easier, certain
classifications regarding the repeater’s characteristics have been defined.
Important
Points to
Cover: Slide information is adequate.
Page 6 - 17
6-18
Class I Repeaters
100m
Class I 100m
UTP UTP
100Base-TX 100Base-T4
200m
Class one repeaters convert each incoming analog signal to digital before the
data is placed on the backbone and repeated out. The digital data then must be
converted back to analog at each port before it is sent out. This allows
translation between different encoding, but adds latency to the repeater. For
this reason, only one level one repeater is allowed in the collision domain.
Analog Digital
Analog Digital
Analog Digital
Analog Digital Backplane
Analog Digital
Analog Digital
Analog Digital
Important
Points to
Cover: A little more clarification has been added to help differentiate
between Class 1 and 2 repeaters.
This limits you to just one repeater due to the longer propagation
delay.
Page 6 - 18
6-19
Class II Repeaters
• Provide ports for only one physical signaling system
type
– Timing constraints do not allow translation between 100BASE-
TX and 100BASE-T4
• Have smaller internal delays so that two class II
repeaters may reside within a given collision domain
when maximum cable lengths are used
• Standard Class II repeater has 92 bits as its maximum
Sniffer University
Class II 5m Class II
100m UTP UTP 100m UTP
205m
Class II repeaters repeat the analog signal BEFORE it is converted to digital. The
latency of these repeaters is less, but no conversion between encoding can be
done.
Analog
Analog
Analog
Analog Backplane Digital
Analog
Analog
Analog
Important
Points to
Cover: Because Class II repeaters cannot translate, they can forward the
information much more rapidly. That allows for two in a collision
domain.
Page 6 - 19
6-20
Stackable Hubs Provide More Ports
Important
Points to
Cover: New Slide.
Page 6 - 20
6-21
Fiber Repeaters
• Fiber cabling allows much larger collision
domains Class II 18m Class II
105m Fiber Fiber 105m Fiber
228m
Class II Class II
• Fiber and UTP can be mixed
Sniffer University
Important
Points to
Cover: New Slide.
Page 6 - 21
6-22 Auto-Negotiation
• “The algorithm that allows two devices at either end of a link segment
to negotiate common data service functions”
• RJ-45 connector may have any one of five different Ethernet signals:
10BASE-T, 10BASE-T full-duplex, 100BASE-TX, 100BASE-TX full-duplex
or 100BASE-T4
• Both 100BASE-T NICs and hubs send a modified 10BASE-T link
integrity test pulse sequence (called Fast Link Pulses -FLP)
– 10BaseT devices don’t understand the pulses and ignore them
– 100BaseT devices adjust to 10 Mbps when they receive 10BASE-T link
pulses
• Hub and NIC automatically adjust their speed to the highest common
Sniffer University
10 or 100? OFF
ON
Useful if you’re
unsure what
Full or half? ??
OFF
ON
you’re plugging
AUTO- Hub or into AND when
NEGOTIATE! switch upgrading to
100BASE-T hubs
or cards
Important
Points to
Cover: Good coverage of this on pages 133 through 135 of the Seifert
book.
Autonegotiation created a lot of problems in the early NICs. Not
vendors used the same algorithm and things worked OK until you
introduced a new brand of NIC into the network. These early
implementation problems are now corrected and most cards are
compatible.
Most hubs allow you to turn autonegotiation off to force the network
to specific parameters.
Autonegotiation is done on power up. Generally there are devices
on the network that are never powered down, so they control the
parameters of a broadcast segment.
The negotiation is done for a specific link. Most hubs and switches
can negotiate on each port, so you may have a combination of 10
and 100 MB stations on the ports.
The pulses sent to negotiate are ignored by any cards that do not
support it. 16 bit “pages” are sent that carry information that
identifies the parameters. There is a larger discussion of these in
the gigabit section.
Cards are able to differentiate between the link pulses,
autonegotiation and data signals on the wire. The Sniffer will not
capture any of these signals, so we will not see them in traces.
Autonegotiation is used only on 100 Mbps twisted pair networks.
The IEEE has not been able to overcome the negotiation problems
in fiber optic networks, so the ends of the links must be manually
configured.
Page 6 - 22
6-23
10/100 Hubs and Switches
Important
Points to
Cover: New Slide.
This slide also answers the question of “what if I plug in the wrong
Sniffer?” (We address it later, too.)
The best advice is to leave the 10/100 Ethernet card in your Sniffer
set to autonegotiate the speed. Attach it to the network, then power
it up. It will learn automatically the correct speed and begin to
watch the frames even before you start any monitor or capture
processes.
If you plug any 10/100 card into the wrong port, the worst that
happens is the card (including the Sniffer) won’t see anything!
Page 6 - 23
6-24
10/100 Flow Control
Important
Points to
Cover: New Slide.
Page 6 - 24
6-25
Back Pressure
• Switches send “back pressure” frames as a “busy
signal” to end stations to prevent them from sending
frames when the switches internal buffers have
reached their capacity
– Switches that do not use back pressure or some other “flow
control” mechanism will simply DROP FRAMES when their
internal buffers cannot handle the traffic flow
• Frames are vendor-specific
– IEEE specifies this as preamble bits not followed by a start of
Sniffer University
Switches discard frames when their buffers are full. This causes retransmissions
at the higher layers, which degrades performance.
If the switch causes collisions when the buffer is full to keep from discarding
frames, the backoff algorithm in the end station will keep incrementing the time
the card waits to retransmit and will finally give up.
Back pressure eliminates this problem. By keeping the line busy with bits, the
cards can transmit as soon as they sense the line is free and the backoff
algorithm will not be started.
Important
Points to
Cover: This slide discusses the features of back pressure and how to deal
with and identify it in the network.
Demo: If you don’t have time for the exercise in class, show the
BACKPRES.CAP and BACKPRES1.CAP trace files. If they will do
the exercise, let them discover it.
Here is the text of an email from a former instructor while she was
working at 3 Com about the BACKPRES.CAP trace. It is copied
verbatim from the IFAQ.
The same patterns can be used as jams, too. I differentiate by
looking at the fragments in the trace. (The suggestion in the last
bullets are hers.) 3 Com calls it Intelligent Flow Management (IMF)
in its documentation.
Here’s how it works: There’s an input buffer (size varies by device);
let’s use 256k for our example. When the switch detects there’s
254k in the input buffer, it sends those signals to the network. The
filling of the input buffer could mean the outbound segment is busy
and the switch is having difficulty sending frames out, etc.
A few things to remember:
Since these are not valid frames, their only function is to trigger
carrier detect on the cards on that segment. There is no meaning to
their content.
Backpressure is a good thing! It looks like collisions, but keep this
in mind. Ethernet cards are designed to backoff and retransmit if
they detect a collision while transmitting. This takes microseconds.
Backpressure will prevent them from transmitting in the first place
or may cause a few collisions here and there (the switches don’t
carrier sense before they output backpressure). Anyway, it’s the
physical layer that handles this. If you disable backpressure,
frames may be dropped at the switch. This means no collision
occurs and the upper layer has to time out to detect the lost packet.
With LLC this could be a matter of milliseconds. With TCP, this
could be a matter of hundreds of milliseconds. That’s an eternity,
especially on Fast Ethernet. Bottom line, leave backpressure on.
Thanks, Michelle!!!
Page 6 - 25
6-26
Troubleshooting Fast Ethernet
Important
Points to
Cover: The slide is self-explanatory.
Page 6 - 26
6-27
Troubleshooting Fast Ethernet
Important
Points to
Cover: The slide is adequate.
Page 6 - 27
6-28
Troubleshooting Fast Ethernet
• Cabling problems
– All RJ-45 jacks look alike. Cables coming into the wiring closet
may come from a lower speed NIC and cause problems
without autonegotiation
– Updated NIC may connect to old wires and cause degradation
in the signals
– Look for evidence of physical corruption, CRC errors, jabber,
etc., in the Dashboard Detail panel
Sniffer University
Important
Points to
Cover: The slide is adequate.
Page 6 - 28
6-29
Fast Ethernet Exercises
Back Pressure
• Fast Ethernet
Problems
Important
Points to
Cover: Please do these two exercises. They teach valuable skills and give
them another chance to work with Fast Ethernet and how it impacts
the network.
The first shows Fast Ethernet traffic. At the end are 2 trace files
showing different types of backpressure.
If you run out of time, you could use these trace files to
demonstrate the patterns.
The second exercise discusses some of the issues in the 10/100
autosensing hubs.
Look back to page 25 for the backpres.cap story. This is the story
that came with the backpres2.cap file:
This trace came from a company that was having problems from a
line running in the proximity of a generator in a warehouse using
cat 5 cabling. The errors coming from the EMI was overflowing the
buffer on the 10/100 switch so the switch was sending out the
backpressure. To solve the situation the customer installed a fiber
zip cord and it worked. This proves the point that the back pressure
was not the problem but the EMI was. I hope this fills in the gaps
for everyone. Michael "Mickey" Giovingo
Page 6 - 29
6-30
Summary
Important
Points to
Cover: Review the section objectives and answer any remaining
questions.
Page 6 - 30
7-1
Important
Points to
Cover: Section 7 title slide only.
Page 7 - 1
7-2
Section Objectives
Important
Points to
Cover: You will not have access to the FDX pod for this class.
Since many students may have questions regarding how the Sniffer
will handle Full Duplex and Gigabit, you have these sections as an
overview.
References:
Fast Ethernet: dawn of a New Network by Howard W. Johnson,
1996, Prentice Hall Publishing, ISBN 0-13-352643-7
Gigabit Ethernet, Technology and Applications for High Speed
LANs by Rich Seifert, 1998, Addison Wesley Publishing, ISBN
0-201-18553-9
Switched, Fast and Gigabit Ethernet 3rd Edition by Robert Breyer
and Sean Riley, 1999, Macmillan Technical Publishing, ISBN
1-57870-073-6
Page 7 - 2
7-3
Full Duplex Communication
Full-duplex
Power Users
Switch • Simultaneous Transmit and
Receive on separate cables
Full-duplex
Uplinks • Eliminates collisions
• Must be supported by both
hub and end-node
Full Duplex • Can allow full distance
Switch
limitation of media
Sniffer University
Full duplex cards are usually practical only for servers with high levels of traffic
on both the receive and transmit lines.
Adding a full duplex card to a workstation is only practical for one with a multi-
tasking operating system running applications that require and can handle
simultaneous read and write operations.
Important
Points to
Cover: Each station has two cables: one to transmit to the port, the other
to receive. They can send and receive simultaneously.
Because there are no collisions, the cables can be much longer.
Full duplex doubles the aggregate channel capacity, but does not
double the maximum data transfer rate due to the nature of the
traffic. Most connections send a lot of data in one direction and
acknowledgements in the other direction. This imbalance will be
most apparent in a client-server link between a single user and
server. With a server or router connected to a backbone and many
stations accessing them, the receive and transmit channels are
more likely to have an equal amount of traffic.
Each link must be a dedicated connection. If they were shared,
you’d need the CSMA/CD and all the advantages go out the
window.
Page 7 - 3
7-4 Where to Deploy Full Duplex Ethernet
Remote LAN
Campus Workgroup Remote Router
LANs 10/100 Mbps
Hubs and Switches
Network Center
Full Duplex
Workgroup Connections
Hubs WAN
SONET, ATM or
Sniffer University
ISDN with H
Firewall
Router channels
Router Faster
Server Links
Server Cluster
attached full duplex
Important
Points to
Cover: In the backbone so edge devices can have full bandwidth in each
direction.
In powerful servers that service many clients.
Anywhere there is a need for a huge fast pipe.
Note that is can be used in 10, 100 or 1000 Mbps networks.
This is a very simplified diagram. Most companies will have much
larger configurations!
Page 7 - 4
7-5
Switched Full Duplex
Important
Points to
Cover: Emphasize the first bullet.
Idea from Seifert: Ethernet has always been defined as CSMA/CD.
If it didn’t do it, it was Token Ring, FDDI, Token Passing- you get
the idea.
Now we have an environment that doesn’t do CS, isn’t MA and
doesn’t need to do CD, but we still call it Ethernet!
Page 7 - 5
7-6
Full Duplex Transmit
• Receive frame from the upper layer
• Transmit out the transmit port
• Wait interframe gap
• Transmit the next frame
Frame
Sniffer University
Frame
Frame
Frame Frame IFG Frame
Important
Points to
Cover: This slide is animated.
If you have a frame to send, by golly, just put it on the wire!
If you have a bunch of frames to send, just keep pumping them
out, but be sure to put the interframe gap for the technology
between them so the receiver can catch it’s breath, send the frame
up the stack and get ready to synch up for the next one.
Page 7 - 6
Full Duplex Receive
10101010...
7-7
Yes My No
SFD? Assemble Frame Address?
No Yes
Wait CRC No
Discard Frame
Valid?
Sniffer University
Yes
Good Frame!
Yes >512 No
Pass to higher
Bits?
layer protocol
Important
Points to
Cover: This is a modified version of the 10 Mb flow chart. A couple of
things have been added here that were assumed in the 10 Mb
chart: SFD recognition, frame assembly, address recognition.
The other one had so many things going on, that we just didn’t
have room for them there!
Question: Does the receiver need the gap to tell when the frame
has ended?
Nope. It has the length filed to tell it how long the frame is.
Page 7 - 7
7-8
Full Duplex Flow Control
• Switches discard frames when their buffers overflow
• Full duplex transmission bursts can fill buffers,
especially if different speed devices are conversing
• MAC Control Frames were developed to allow the
switch to tell the nodes to throttle back
– PAUSE is the only MAC Control frame defined today
• MAC Control frames are part of the Data Link Layer
Sniffer University
Important
Points to
Cover: MAC frames in Ethernet????? And they still call it Ethernet???
The PAUSE is the only MAC frame defined yet. It is anticipated
more will be added as needed.
These frames replace backpressure.
Page 7 - 8
7-9
MAC Control Frame
Bytes
8 Preamble and SFD
6 Destination Address 0180C2000001
6 Source Address Sending Station’s Address
2 Type = 8808 MAC Control Frame Type
2 MAC Control Opcode PAUSE = 0001
Sniffer University
Important
Points to
Cover: The 8808 type filed identifies this as a MAC Control frame.
The opcode indicates which type of MAC frame. Right now the only
one is 0001 for the PAUSE.
The time is always listed in 512 bit-time intervals. Conceivably they
can be used for all speeds- the spec was written with that in mind.
Later on there may be control frames that need more fields. Space
is reserved for more parameters.
Question: Does the full duplex Sniffer capture these control
frames?
Page 7 - 9
7-10
400+ Mbps Full Duplex
NAI sells a four port Ethernet adapter and tap card for DSPro Agents which
allows you to designate all four ports as an EtherChannel.
The TNV-201-DSP course has more information on this card.
Important
Points to
Cover: New Slide.
DO NOT try to give them details here. It is only for the DS Pro and
we cover this card and all the other non-portable solutions in the
TNV-201-DSP class.
Page 7 - 10
7-11
Full Duplex
Sniffer Pro
Sniffer University
Important
Points to
Cover: Title page to lead into covering the Sniffer.
Page 7 - 11
7-12
Create an Agent for the Pod
• File >
Select
Settings
1 Choose the
Ethernet card
2 Choose the
FDX pod
Sniffer University
3 IP address
should fill in
one higher
than your
card’s Pod initializes
address when you click
OK
When configuring the new agent, you must select the Ethernet network card
before you check the Full Duplex pod radio button. This will enable the IP
address box.
The Host adapter must be configured with a fixed IP address. DHCP for the
host is not supported. Set the pod’s IP address one higher than the address
of the Ethernet card in your computer if the address is not automatically sensed.
Important
Points to
Cover: Remind them the system requirement and pod information was
covered in section two so we haven’t repeated it here.
Use the familiar File > Select Settings to create the new agent.
When you select the Full Duplex pod in the Netpod type field, the
IP address becomes active.
Important: the IP address for the pod must be one host number
higher than the address of the Ethernet card. They can use
Ipconfig.exe or open the Windows network window to get the
address if they don’t know it.
When you click OK on this screen and select it from the Select
Settings window, you’ll see some progress report messages as the
code is downloaded to the pod.
If all goes well, you should see the Sniffer window open and the
agent name and pod speed shows up in the title bar.
Page 7 - 12
7-13
Set Line Speed
• Before you start a capture, check the line
speed settings in Tools > Options > Full
Duplex Pod
Sniffer University
Important
Points to
Cover: The first thing you need to do is set the line speed of the link.
Use Tools > Options > Full Duplex pod tab window to do that. All
of the choices are shown in the drop-down list.
Page 7 - 13
7-14 Two Memory Pools
• Pod Memory
– The physical memory installed
in the box
– Up to 512 MB
– Frames from the network are
copied here
Sniffer University
• Sniffer PC Memory
– Set through the Buffer tab on
Capture Filters
– Frames from the pod are copied
here
Important
Points to
Cover: This is preparation for the next slide that shows the options you
have in capturing this traffic.
Page 7 - 14
7-15
Two Transfer Modes
• Set by clicking the icons on the toolbar or the
Capture Menu
• Stream Mode
– The pod streams the data to the analyzer
application as it is captured off the network
– Counts appear in the Sniffer window
• High Speed Capture Mode
Sniffer University
Important
Points to
Cover: Stream Mode – the pod sends the frames to the Sniffer PC as they
arrive on the network. The pod may miss capturing some frames as
the frames are transferred to the PC on very busy networks.
The software decodes the frames and shows statistics, but does
not so real-time Expert analysis.
You must stop the capture and upload the frames to the PC before
you get Expert analysis.
You’ll want to watch the buffer dial to make sure you stop the
capture before the pod buffer recycles and writes over the first
frames. You can also configure the Sniffer to stop when the pod
buffer is full and upload the frames to the PC.
Page 7 - 15
7-16
Pod Buffer Action Configuration
Capture > Define Filter > Full Duplex
Pod
Sniffer University
Important
Points to
Cover: This configuration sets the actions on the pod buffer
Page 7 - 16
7-17
Sniffer Buffer Action Configuration
• Capture <
Define
Filter >
Buffer
• Set the
Sniffer University
Sniffer Buffer
actions here
– Same
options as
other
Sniffers
Important
Points to
Cover: This panel controls the PC buffer actions. There are no unique Full
Duplex settings here.
Page 7 - 17
7-18
Capture Panel Display Window
View
Sniffer Both
Statistics Shown
when you
start a
capture
from the
capture
menu or
Sniffer University
icon
Pod
Statistics
Important
Points to
Cover: This is the display when you have enabled the View Both option.
The graphs on the lower panel are color-coded for each channel.
The pod counts show numbers for each channel and total counts.
Page 7 - 18
7-19
Special Icons on the Toolbar
session on the PC
• View Both
– Split screen to show statistics for both
Important
Points to
Cover: These icons control which panels are open on the Sniffer capture
screen.
You can select just the Sniffer PC counts, just the pod counts or
both.
Page 7 - 19
7-20
Pod Gauges
• Percentage of free
memory on each
channel
Sniffer University
Important
Points to
Cover: Slide is self-explanatory.
Page 7 - 20
7-21 Setting Pod Properties
– Pod IP Address
– Pod Ethernet Mac
Address
– Connection mode
– Line Speeds
– Total Memory
Pod Version number specifies the version of the software on the pod
IP Address shows the IP address assigned to the pod
MAC Address shows the hardware address of the Ethernet adapter in the
pod
Connection shows whether the pod is set to passthrough or terminate
mode
Channel A Line Speed shows the line speed of the network segments
attached to Channel A
Channel B Line Speed shows the line speed of the network segments
attached to Channel B
Total Memory shows the amount of memory installed on the pod (in
DIMMs)
Important
Points to
Cover: Slide is self-explanatory.
Page 7 - 21
7-22
Address Filters
• If Mode is set to Include and you set address filters
with less than or equal to 16 sources and 16
destinations, the filter is applied as a hardware filter
• If Mode is set to Exclude or if you have more than
16 sources or 16 destination, the filter is applied as a
software filter
Type of address filter # Sources # Destinations
Sniffer University
2 2
1 0
0 1
1 1
“Any” does not count as a source or destination
Hardware filters are applied at the pod as the frames are captured from the
network. The frames excluded by hardware filters are not saved in the pod
buffer.
Software filters are applied by the Sniffer application to the frames uploaded
from the pod buffer to the Sniffer buffer.
Hardware filters
Software filters
Important
Points to
Cover: Slide is self-explanatory.
Page 7 - 22
7-23
Filters in High Speed Captures
Important
Points to
Cover: Slide is self-explanatory.
Set capture filters to save room for what you need to see!
Page 7 - 23
7-24
Error Frames with the Full Duplex Pod
For more details, see Appendix A in the Full Duplex Product Manual on your
student CD.
Important
Points to
Cover: Slide is self-explanatory.
If you want more details, look at Appendix 2 in the Full Duplex pod
use documentation on the student CD.
Page 7 - 24
7-25
2 LAN Sniffer Pros in Full Duplex
• Interim solution when you don’t have an FDX
pod
FAST ETHERNET 100 Mbps SPLITTER
Transmit Receive
1
Receive Transmit
Fast Ethernet 2
Switch Server
3
PA C 62
Important
Points to
Cover: This is the same diagram we had before. It is possible to use two
regular Fast Ethernet Sniffers attached to a splitter to capture each
channel separately.
Remind them to time synchronize them as close as they can before
they start to capture and start the capture as simultaneously as
they can.
They will need to match request and reply sequences in the frames
to line up the frames for comparison.
Once they have the trace files saved, both can be opened in Sniffer
Pro and their windows set side by side to compare them directly as
we did in the hubports exercise.
Page 7 - 25
7-26
Summary
Slide Title:Summary
Important
Points to
Cover: Review the section objectives and answer any remaining
questions.
Page 7 - 26
8-1
Gigabit Ethernet
Sniffer University
Important
Points to
Cover: Section 8 title slide only.
This will enable you to create a new agent and show the features of
the Sniffer.
Page 8 - 1
8-2
Section Objectives
Important
Points to
Cover: Cover the objectives quickly.
References:
Gigabit Ethernet, Technology and Applications for High Speed
LANs by Rich Seifert, 1998, Addison Wesley Publishing, ISBN
0-201-18553-9
Page 8 - 2
8-3
Gigabit Overview
• 1000 Mbps Ethernet is able to transmit a frame at ten times
the data rate of 100 Mbps Ethernet
• It allows you to use familiar Ethernet technology while
providing much higher bandwidth
• The standard using optical cabling is defined in 802.3z
addendum
• 802.3ab addendum defines the Physical Layer parameters
for 4-pair over Cat 5 balanced copper cabling
• Switches with 10/100 and Gigabit port link legacy networks
Sniffer University
The aggregate data rate of 100 Mbps is achieved by transmission at a data rate
of 250 Mbps over each UTP wire pair. Full duplex transmission allows symbols to
be transmitted and received on the same wire pairs at the same time. Baseband
signaling with a modulation rate of 125 Mbaud is used on each of the wire pairs.
The period for each symbol is 8 ns.
T T
R R
T T
R R
T T
R R
T T
R R
Important
Points to
Cover: You may want to poll the class to see what their plans are for
gigabit vs. ATM.
Review the bullets quickly.
Page 8 - 3
8-4
Deploying Gigabit Ethernet
Remote LAN
Campus
10/100 Mbps Hubs Remote Router
and Switches with
Workgroup Gigabit Uplinks
Network Center
LANs Gigabit Backbone WAN
Workgroup Connections SONET, ATM or
Hubs ISDN with H
channels
Sniffer University
Firewall
Router
Router
Due to the cost of Gigabit switches, only high throughput links will initially use
or need Gigabit Ethernet.
Important
Points to
Cover: One last slide like this.
Early implementations will concentrate these very expensive high
speed connections where the highest levels of traffic exist.
Fast Ethernet switches for the LANs will have gigabit uplinks to
multiplex the traffic onto the high speed backbone.
Later slides address the move to gigabit to the desktop.
Page 8 - 4
8-5 IEEE Gigabit Data Link Layer
The Gigabit Ethernet standard draws from two separate specifications. The
Physical layers are derived from the ANSI X3T11 Fibre Channel specification.
The Data link layers are derived from the IEEE 802.3 Ethernet specification that
specifies CSMA/CD for half duplex or full duplex rules for media access control.
The LLC layer is moved intact from the IEEE specification.
Important
Points to
Cover: Don’t spend much time on it here, since it is mainly FYI stuff.
Page 8 - 5
8-6
Physical Limitations of Shared Gigabit
• Using the standard Ethernet specifications for copper
wire, the half-duplex network diameter would be
reduced to 20 meters - not very practical!
• Carrier extension is used to extend the frame so the
diameter can be extended to 200 meters using fiber
or copper media
– Different cables yield higher diameters
– This compares to the 200 meter limit for 100Mbps Ethernet
over copper
Sniffer University
– Only one repeater (hub) can exist between any two devices
on the network
The large number of cable choices allows for a maximum network diagram to range from 200
meters with category 5 UTP to 550 meters using 1300 nm single mode 500Mhx/km fiber at
attenuation 2.32 all the way to 5000 meters using 1300 nm single mode 10/125 µm cables fiber
at attenuation 4.5.
Important
Points to
Cover: A VERY small collision domain IF you use it in a half-duplex
configuration.
Page 8 - 6
8-7
Gigabit Carrier Extend
Most Gigabit implementations will use Full Duplex mode to enable long cable lengths.
P Preamble
DA Destination Address
SA Source Address
L/T Length/Type
DS Destination SAP
SS Source SAP
Ctr LLC Control
A SNAP header not shown here may follow this field
Data Frame data
F Frame Check Sequence (CRC)
Carrier Extend allows the network diameter to remain at the 200 meter limit used by
Fast Ethernet over twisted pair media.
This is also inefficient. If a device only has 64 bytes of data to send (a minimum-length
Ethernet frame), it still must send 512 bytes, most of which is only a carrier signal.
It imposes a great deal of overhead for a network where smaller frames predominate.
Important
Points to
Cover: This is a multi-faceted tool.
Extend small frames to the 512 byte minimum in half-duplex so all
stations will hear the transmission and wait to transmit.
Fill the interframe gap in burst mode (covered on the next slide).
One or more inserted between each frame in full-duplex mode.
The Carrier Extend length is purposely written as 448 – 1 bytes,
since it is dependent on how long the frame is.
Page 8 - 7
8-8
Carrier Extend in the Sniffer
• Turn on 10 Bit decodes from the Hex right-
click menu
– This frame was captured from a full duplex network
• Note the [A] channel indicators
• Even the 1472 byte frame 23 has one Carrier_Extend field
Sniffer University
Important
Points to
Cover: This shows how to enable the Sniffer to display the 10 bit codes.
Page 8 - 8
8-9
Frame Bursting Part One
Important
Points to
Cover: If the station has multiple frames queued in its transmit buffer,
packet bursting allows it to send them until the 64Kbit timer runs
out.
The station waits until there is no carrier sensed, then it begins to
transmit the first frame. It extends it to the slot time if it is short.
If a collision occurs, it backs off and waits its turn to transmit.
When the first frame is out, it keeps the line busy by transmitting
nondata symbols (carrier extension symbols) to fill the interframe
gap, then it transmits the second frame.
It can continue to transmit frames separated by carrier extend until
the 64 Kbit timer runs out (8192 bytes). If it has a frame in process,
it finishes sending it, then yields the line.
Collisions should not occur during the burst, since all stations
should hear carrier and wait. If the collision domain limit is
exceeded or a device has failed, it may cause a late collision. If this
occurs, the adapter stops transmitting data and starts jamming,
then it backs off and retries, starting the process over again.
Packet bursting is not used in full-duplex, since the stations owns
the wire in each direction and has full bandwidth to transmit at all
times.
Page 8 - 9
8-10
Frame Bursting Part Two
Important
Points to
Cover: Notes on previous page cover this page.
Page 8 - 10
8-11
Problems of Shared Media
Important
Points to
Cover: Review the bullets quickly.
This is a quick recap of the problems of shared media 9and why full
duplex is the choice for everyone.
Page 8 - 11
8-12
Full-Duplex, Switches & Jumbo Frames
• Gigabit switches will be the solution of choice
– Since switches act like bridges - each port is a separate
collision domain
– Switches can be connected in a hierarchical fashion to extend
the network without the concern of collision detection
• Most switches offer full-duplex ports which will
effectively double the potential throughput to 2 Gbps
and extend the cable length.
• Many 100 Mbps hubs and switches will be equipped
Sniffer University
Single mode fiber increases the length of the cable substantially. One vendor
supports single mode cable lengths up to 9 miles.
Since sending frames requires CPU processing, sending a lot of small frames is
inefficient. By allowing servers to send large frames, the CPU can queue a large
frame, then work on other tasks while it is being sent.
Important
Points to
Cover: Can you imagine Gigabit without using switches?
Each connection is its own collision domain. There still can be
collisions between the switch and the end station, but these will be
very rare.
Half duplex still does contention, full duplex doesn’t need it.
The best solution is full duplex gigabit. You get full bandwidth in
both directions, reduce the overhead doing contention and increase
the cable lengths.
Page 8 - 12
8-13
Physical Media - Optical Fiber
µm = micron
nm = nanometers
Important
Points to
Cover: This is the first of 3 slides that discuss the various types of media.
Cover them quickly.
Page 8 - 13
8-14
Copper Cable
• 1000BASE-CX
– Can only be used as patch cables or “jumpers” due to a
distance limit of 25 meters
– Created to help reduce cost of the many short connections
required in a wiring closet
– Consists of 2 pairs of shielded 150-ohm Twinax cable
– Much like Type 1 STP used in traditional token ring
environments, but with higher electrical quality standards
• 1000BASE-T
Sniffer University
Important
Points to
Cover: Slide is adequate.
Page 8 - 14
8-15
Gigabit to the Desktop
amount of traffic
The gigabit transceiver chip on the board contains more than 200,000
transistors, about the processing capability of an Intel 486 chip. Many different
manufacturers use this chip on the r boards.
Important
Points to
Cover: Big challenges:
Coax cable limitations for such high speeds
Page 8 - 15
8-16
Encoding Technique: 8B10B
• Used for fiber optic and 1000BASE-CX media
• Derived from 4B5B encoding used in 100BaseTX,
100BaseFX, and FDDI
• Each 8-bit byte is represented by a 10-bit code
– There are two code groups or categories:
• “D” Group - Used for data transmission
• “K” Group - Used to send control signals
• Uses a look-up table for the conversion values
Sniffer University
IBM developed and patented the 8B10B encoding standard and it licensed it for
Fibre Channel and Gigabit Ethernet.
It ensures there are enough clock transitions for receiver clock recovery and
allows control signals to be embedded in the data stream.
Single and multiple bit errors can be corrected.
The data code words never include more than 4 consecutive ones or zeros or
the ten bit codes do have an imbalance of more than one, i.e., 5 ones and 5
zeros, 6 ones and 4 zeros or 4 ones and 5 zeros.
The IEEE std 802.3ab -1999 spec lists the entire bit-to-symbol mapping table of
codes. It is also referred to as 8B1Q4 coding technique. The conversion process
is called 4D-PAM5 and refers to the 4 Dimensional 5-level Pulse Code Amplitude
Modulation process.
Important
Points to
Cover: Nice to know information.
Won’t help troubleshoot.
Cover quickly.
A table of symbols is included in the spec and table A-1 page 387
of Seifert’s book and the IEEE spec (of course).
The Gigabit Sniffer interface in current use gives statistics of the D
and K group bits.
Page 8 - 16
8-17
Autonegotiation
If only one side supports full duplex, the connection will use half-duplex if each side allows
negotiation.
The PAUSE and Asymmetry direction bits are used together to determine if the device supports
flow control and if it does, whether is is capable of asymmetric flow control.
(Asymmetric refers to a large discrepancy between the amount of data on each line at the same
time. If the device is a server, it can process requests from multiple clients on the transmit and
receive lines, so the traffic will be somewhat even on the two sides. If the device is a node, data
transfer will occur on only one line with acknowledgments on the other, so the traffic tends to be
heavy on one line and light on the other line.)
There are four possibilities with the two bits:
1) No flow control 2) Asymmetric flow control toward the node 3) Asymmetric flow control from
the node and 4) Symmetric flow control.
The Remote Fault bits indicate error conditions that prevent normal operation. Codes are shown
Remote Fault bit 1, Remote Fault bit 2.
00 = No error, 01 = Device Offline, 10 = Link failure, 11 = Auto-negotiation failure
Autonegotiation messages are sent repeatedly until the sender receives an acknowledgement.
The acknowledgement bit indicates the sender has received 3 sequential autonegotiation
messages with the same contents.
The next page bit is reserved for future use when more than 16 bits are required to negotiate
parameters.
Special K and D combinations identify the autonegotiation signals so they are not interpreted as
data.
Important
Points to
Cover: We’ve talked about autonegotiation before in the Fast Ethernet
section.
Here are the details about the 16 bit message pages and the
significance of each of the bits.
This shows all the different parameters that can be negotiated.
Student notes should help you present this.
Page 8 - 17
8-18
Autonegotiation Process
PHY comes up as Slave
Enter slave silent mode
No
Sniffer University
The fast link pulses are identical to the Fast Ethernet pulses. They indicate the
type of connection the system is able to use. The highest level for both sides
becomes the negotiated transmission characteristic.
Priority Connection type
1 1000BASE-T full-duplex
2 100BASE-T2 full-duplex
3 100BASE-T2
4 100BASE-TX full-duplex
5 100BASE-T4
6 100BASE-TX
7 10BASE-T full-duplex
8 10BASE-T
Important
Points to
Cover: Use this flow chart to explain the autonegotiation process and the
symbolism of the Master and Slave bits they will see in the Sniffer
screens.
They will look at this in the exercise, so you can cover it in the slide
now and let them discover it in the exercise if you have time for it.
Page 8 - 18
8-19
Autonegotiation Frame Details
Bits Parameter
0-4 Reserved
5 Full-duplex
6 Half-duplex
7 PAUSE
8 Asymmetry
direction
Sniffer University
9-11 Reserved
12 Remote Fault 1
13 Remote Fault 2
14 Acknowledgement
15 0
15 Next Page Present
This is very useful when you need to troubleshoot vendor incompatibility issues.
Important
Points to
Cover: New Slide.
Developer note: I tried very hard to get new Full Duplex and Gigabit
traces, but no one came through for me. I asked a couple of
different mailing lists and HQ people and there just don’t seem to
be many floating around.
Page 8 - 19
8-20
Autonegotiation Frame Summary
Pulses- no
addresses
32 nanosecond
timestamps
Important
Points to
Cover: Point out that there are not addresses in these signals
Page 8 - 20
8-21
10 Bit Decode of the Signals
• Right-click in the
Hex window and
select 10 Bit to see
the autonegotiation
decodes
Sniffer University
Important
Points to
Cover: This shows how to see the 10 bit decodes
Page 8 - 21
8-22
Gigabit Sniffer
Sniffer University
Important
Points to
Cover: Title Page.
This is a brief overview.
Page 8 - 22
8-23
Some Advice
Important
Points to
Cover: Capture filters!
Page 8 - 23
8-24
What if I Plug in the Wrong Sniffer?
Important
Points to
Cover: New Slide.
Slide is sufficient
Page 8 - 24
Gigabit User Interface
• Uses the standard Sniffer Pro interface with
8-25
enhancements for Gigabit technology
Sniffer University
The Gigabit Sniffer now has the Sniffer Pro interface. Due to the complexity of
the products, it and Full Duplex Ethernet will be covered in detail in a separate
High Speed Ethernet class.
Important
Points to
Cover: The Monitor screens and Expert are the same
The capture panel has a tab for Channel Info that shows counts for
each channel
The Summary window shows [A] and [B] to indicate which channel
the frame was captured from.
Page 8 - 25
8-26
Other Differences
• The Dashboard and Capture Panel show
counts for each channel
• History samples are doubled- one for each
channel
• Global Statistics shows individual channel
statistics and colored-coded graphs for each
• The Summary window shows [A] and [B] in
Sniffer University
Important
Points to
Cover: New Slide.
Page 8 - 26
8-27
Three Separate Buffers
• Adapter Memory
– 144 MB trace buffer memory
• 72 MB per channel (2)
– Configure parameters on the Tools > Options >
Gigabit tab
• Monitor or Emulation mode
• Enable Jumbo frames
Sniffer University
.
• SnifferPro software RAM
– Configure Buffer size on the Buffer tab
• Configuration process is similar to Full Duplex
Important
Points to
Cover: New Slide.
Note there are no choices for uploading since the frames are
already in the Sniffer buffer.
Page 8 - 27
8-28
More New Options
• Tools >Options
>Gigabit
– Set mode
– Enable jumbo frames
Sniffer University
The Gigabit Packet Generator has more options than the other Ethernet
Sniffers:
The Rate tab allows you to set the Interpacket Delay, Packets per seconds, and
Network Utilization
The Address tab allows you to override the source and destination address in
several different ways
The Advanced tab (single frames only) choices are: random size packets, set
data offsets, include sequence numbers, adjust timestamps and generate
certain types of errors.
The Gigabit tab allows you to set the preamble length and change the CRC.
Important
Points to
Cover: New Slide.
These two screens adjust how you want to control the buffers and
the behavior of the ports.
The Define Filter > Gigabit Ethernet tab shows up from Display >
Define Filter, but not all of the options are enabled.
The Tools > Options > Gigabit tab sets the action of the port.
Yes, you can span a gigabit port to the Sniffer. The 8021q-gig.cap
trace file shows VLAN information from a spanned gigabit port.
Page 8 - 28
8-29
Solving Gigabit Ethernet Problems
Important
Points to
Cover: These notes are based on a conversation with the Gigabit Ethernet
people in the University of New Hampshire Interoperability lab.
Page 8 - 29
8-30
Summary
Slide Title:Summary
Important
Points to
Cover: Review the section objectives and answer any remaining
questions.
Wrap up the class.
Thank them for coming.
Gather student evaluations.
Distribute certificates.
Make sure the students have deleted their probes and have them
Run > Clean to empty the CLASS directories of files they’ve saved.
Make sure that the HUBPORT3 and 4 trace files are removed.
Remove demo Sniffer software from rental PCs using the uninstall
program on the first installation disk if you have been instructed to
do that.
Page 8 - 30
9-1
Optional Technologies
Sniffer University
Important
Points to
Cover: Section 9 title slide only.
Time: The LLC section has 2 hours of material in it if a student asks for it.
Page 9 - 1
9-2
Contents
Important
Points to
Cover:
Page 9 - 2
9-3
Page 9 - 3
9-4
Objectives
Page 9 - 4
9-5
Logical Link Control
Layer
• Connection oriented or
MAC connectionless services
• Functions independently of
MAC layer
Page 9 - 5
9-6
802.2 Header Format
• The control field used in type 1 datagrams is always one byte long.
• The control field can use one or two bytes for LLC type 2.
Page 9 - 6
9-7
LLC Service Access Points (SAP)
• SAPs are a pass-through between any IEEE-compliant physical layer and any
upper-layer protocol.
• 00 is a Null SAP. Only real use at this time is by IBM which forces SAP
negotiation for connection to 3745s. This is the only SAP initially active on a
3745 so the initial request must be addressed to the Null SAP.
Page 9 - 7
9-8
SNAP Header Format
MAC Sublayer
Page 9 - 8
9-9
LLC Functions
Page 9 - 9
9-10
LLC Frame Types
• Unnumbered frames:
– Establish link connections/disconnections
– Provide link maintenance and error recovery
– Provide connectionless (datagram) support
• Supervisory frame:
– Acknowledges frames received
– Requests retransmission of frame(s)
Sniffer University
Page 9 - 10
9-11 LLC Unnumbered Frame Types
Oriented
Page 9 - 11
9-12
LLC Supervisory Frames
(Type 2 - Connection oriented only)
I Information Command/Response
Page 9 - 12
9-13
Type 1 Connectionless Services
Data Messages
Data Messages
Sniffer University
Page 9 - 13
9-14
Type 2 Connection Oriented Service
Session Setup
ACK
Disconnect
Sniffer University
ACK
Session Setup
ACK
Sequenced Data Messages
Disconnect
ACK
Page 9 - 14
9-15
Type 2 Connection Setup
Workstation Server
TEST (Optional)
TEST (Optional)
XID (Optional)
XID (Optional)
SABME P(oll)
UA F(inal)
Sniffer University
RR NR=0 P
RR NR=0 F
I NS=0 NR=0
RR NR=1
Some upper-layer applications will send TEST frames to make sure both sides
can communicate.
They may follow with one or two pairs of XID frames to negotiate the type of
connection both can support.
The first frame that establishes the connection is the SABME. You can do a
Search for text on SABME to find the first instance of a connection being setup.
Once the connection is made, the data will be sequenced and acknowledged.
The Poll bit when set to a “1” forces the other side to respond.
The Final bit is set to a “1” in the response frame.
Workstation Server
TEST (Optional)
TEST (Optional)
XID (Optional)
XID (Optional)
SABME P(oll)
UA F(inal)
RR NR=0 Poll
RR NR=0 Final
I NS=0 NR=0
RR NR=1
Page 9 - 15
9-16
Type 2 Connection Teardown
Workstation Server
DISC P
UA F*
DM
UA
Sniffer University
Workstation Server
DISC P ---------->
<---------UA* F
<---------DM*
UA -----------à
Page 9 - 16
9-17
FRMR vs. REJ
length
– Receipt of an invalid receive sequence number N(R)
– Receipt of an invalid send sequence number N(S)
• REJ is sent to:
– Request the resending of I frames starting with the frame
number N(R)
In the real-world, we see more REJs than FRMRs. REJ is preferable because
the session doesn’t need to be re-established.
Page 9 - 17
9-18
Type 3: Acknowledged Connectionless
ACK
Sniffer University
• Connectionless service
• Guaranteed in-sequence delivery of data
• Uses stop and wait flow control
LLC Type 3 was developed primarily for process control applications over a
token bus, so it is very seldom seen today.
Page 9 - 18
9-19
Decoding LLC Connection-Oriented Frames
Page 9 - 19
9-20
Understanding LLC Frame Numbering
Workstation Server
# N(R) N(S) N(R) N(S)
1 0
2 0
3 0 0
4 1 0
Sniffer University
5 1 1
6 2 1
7 2
8 3
9 4
Page 9 - 20
9-21
Common LLC Problems
• Connections get reset when one side stops responding or stops sending
correctly sequenced frames. We will see an example in the exercise.
• Unsupported LLC frame types and excessive length information fields
shouldn't happen if the implementation follows the LLC specification.
• Flow control lockup happens when a station continually sends Receive Not
Ready due to lack of buffers or other resource problems.
• Retransmissions may be happening because the sender's timer isn't set
correctly, and the sender isn't waiting long enough for acknowledgment.
Counters refer to how many times a station will retransmit. Timers and
counters are configurable.
Page 9 - 21
9-22
Exercises: Observing LLC (Ethernet)
Page 9 - 22
9-23
10BASE5
and
10BASE2
Sniffer University
Even though we have placed this further in the back of the book
now, we cannot neglect it.
Page 9 - 23
9-24
10BASE2 and 5 Components
50 Ω 50 Ohm
Terminator 10BASE5 Thick Ethernet Terminator
Transceiver
Ground
AUI cable
Sniffer University
10BASE-T Hub
Important
Points to
Cover: Terminators remove the signal from the wire and prevent
reflections back onto the wire.
Transceivers
External: Vampire tap into the thick cable or small box
attached to the AUI connector of the adapter.
Internal: On the card.
AUI Cable
NICs
Grounding rules
Ground only one end of each segment to a good earth
ground.
Page 9 - 24
9-25
10BASE5 Thick Ethernet
50 Ω 50 Ω
terminator Coax cable Transceiver terminator
AUI cable
Sniffer University
2.5m minimum separation makes sure that signal reflections, when they occur
(that is, the cable is unterminated), do not add up in phase, which would
probably blow the transceiver. The 500 meter segment does not need to be
made from a single length of cable. Cable sections can be joined together using
"N" type barrel connectors. The IEEE 802.3 specification recommends the
following when slicing thick cable:
1. Use cable sections from the same manufacturer and cable lot number, to
avoid impedance mis-match and other problems.
2. To minimize signal reflection problems, use segments that are lengths of
23.4m, 70.2m, and 117m. Since these lengths are odd integral
multiples of a half wavelength in the cable at 5 MHz, reflections do
not have a high probability of adding in phase. (A 5MHz signal is achieved
when the transceiver is outputting only alternating ones and zeros, as it
does with the preamble.)
*The maximum length of the AUI cables refers to the transmission model one
which we will discuss later.
Important
Points to
Cover: Slide and notes are adequate.
Page 9 - 25
10BASE5 Components
Thick Coax
9-26
Cable
50 Ω
terminator
Transceiver Terminal
AUI Cable
Server
Transceiver
AUI Cable Multi-Port
Transceiver
Sniffer University
Transceiver
AUI Cable Multi-Port
Repeater
50 Ω
terminator to
ground
Page 9 - 26
9-27
Signal Quality Error Test
From 802.3: "At the conclusion of the output function, the Data Terminal
Equipment opens a time window during which it expects to see the SQE signal
asserted on the Control In (collision presence) circuit. The time window begins
when CARRIER_STATUS becomes CARRIER_OFF. The duration of the window
shall be at least 4.0 microseconds but no more than 8.0 microseconds. During
the window, the Carrier Sense Function is inhibited."
SQE should be turned off on transceivers connected to repeaters
because a repeater can't be inhibited for 4.0 microseconds. It may receive bits
on its other port and need to send them. Most people just turn SQE off because
it causes confusion when counting collisions. Some transceivers and network
management tools will count the SQE test as a collision (for example, the
Collision LED may be lit when the SQE test is asserted).
Important
Points to
Cover: Turn SQE off on repeaters and hubs (that act as repeaters).
The specifications don’t say what the NIC card does if it expects
the SQE test and it doesn’t see it. It is probably driver-dependent
(that is, implementation-dependent).
It is important to note that this signal does not go out onto the
cable. It is a loop-back between the transmit side of the card,
looping through the MAU and back into the receive side of the card.
Many students talk about their collision counts going up when they
have SQE turned on. You need to ascertain if they are referring to
statistics gained by SNMP polls of the collision register on the card
(which may count these as collisions) or if they are seeing this on
cable statistics. If this is going out onto the cable, it is not obeying
IEEE rules.
Page 9 - 27
9-28
Analyzing Coax Collisions
Sniffer
Pro 3 NAI enhanced drivers required to
sense and capture collision frames
Once you understand the concepts of signal propagation delay, you can begin to
apply them to perform more precise analysis of the collision frames you find in
your Sniffer Pro analyzer traces.
As shown in the diagram above, what you will see in the trace will depend upon:
1) The point of collision.
2) The location of the Sniffer Pro analyzer relative to the collision point.
The diagram shows one collision event. However, each of the three Sniffer Pro
analyzers will show different indications of the event. This fact is key to effective
troubleshooting.
This diagram should enable you to tie together three important concepts you have learned:
1. The propagation delay of a signal on different types of media (per How long is a bit)
2. How different Ethernet physical components react during a collision (station jam signal, hub jam, etc.)
3. How different Sniffers react to the same collision event.
The scenario is as follows: Station A starts a transmission. The transmission goes both ways towards
Sniffers 1 and 2, and towards Sniffer 3. Just before the leading bit of the preamble reaches the far end of
the uppermost Ethernet segment, the station near point B starts a transmission, causing a collision at Point
B. The following concepts will help you understand the scenario:
• The station at point B will be the first station to detect the collision; what will it do? (Send a 32-bit jam
signal) Why? (To busy the wire and enable repeater R3 to detect evidence of the collision).What is the
evidence? (2 signals on the same coaxial media—R3’s and the jam from station at point B).
• Sniffer 1 will not show any evidence that a collision occurred (unless it’s a version that’s counting
preamble collisions). Why? (Because we don’t capture preamble collisions.)
• How repeaters R3 and R2 react to the collision when the jam signal reaches them. (R3 will begin to jam
96 bits back to R2; R2 will begin to jam 96 bits on the middle coaxial segment towards Station A.)
• What Station A has been doing during all this time. (Still transmitting its signal.) How much of Station
A’s signal has gotten out on the wire before the jam signal from R2 reaches it? Here is some of the
math to show the different propagation delays by differing types of media and repeaters:
Total equivalent Thicknet distance between points A & B:
59+450+ 59+231+59+933+59+59 = 450 = 2359m
2359m / 23.1 = 102 bits, or 12.75 bytes
• What will happen when the jam signal reaches Sniffer 2? (Because this is coaxial media, the
combination of Station A’s transmission and the 96-bit jam signal from R2 will cause the receive
function on Sniffer 2 to lose synchronization/clocking. When this happens, the Sniffer stops capturing
the frame and truncates it if enough of the frame – 2 bytes past the preamble – has been received.)
What sort of flag will be posted with this frame? (The “X” flag.)
• Major learning point: If someone hands you a trace file for analysis and you see the X flag posted on
truncated frames, you can say with a high degree of certainty that the trace was captured from coaxial
media!
• What will happen when Station A realizes that a collision has occurred? (Starts jamming 32 bits.) Has
this been a “legal” collision event. (Yes, because it has happened well before 64 bytes have left Station
A.)
• What does repeater R1 do when it sees evidence of the collision? (Starts jamming 96 bits onto the
lowermost Thicknet segment.) What causes R1 to sense the collision event? (The combined jam
signals from R2 and Station A.)
• What will be recorded on Sniffer 3? (Because the Sniffer was on a segment where only one signal—
the one from the lower half of R1—was being broadcast, the frame will appear similar as it does on
Sniffer 2. However, the frame will not be truncated but will be followed by R1’s jam pattern of
alternating 1’s and 0’s, that will be translated to the hex values of AA’s or 55’s.) What flags will be
posted? (R and C, but certainly not an X flag.) How many bytes of AA’s and 55’s will be shown. (This
will depend upon what the vendor has implemented as the jam pattern; remember that 96 bits are a
minimum. Generally, it is safe to assume that you will see a value of 12 bytes, plus or minus 4.)
Major learning point: Because Sniffer 3 has been on the far side of a repeater for this event, this simulates
exactly what happens in 10baseT environments. In 10baseT shared environments, a station can only
receive direct evidence of collision if the hub sends a jam signal while that station is transmitting. And since
Sniffers don’t transmit, it has to use the jam pattern to deduce that a collision occurred somewhere.
Page 9 - 28
9-29
10BASE2 Thin Ethernet
50 Ω RG 58 Cable
terminator 50 Ω
BNC Tee Connectors terminator
Sniffer University
to ground
Important
Points to
Cover: Again, focus on the termination rules.
Mention the drawing in their notes section.
Page 9 - 29
9-30
Exponential Backoff
Transmission Models 1 and 2 Details
Sniffer University
Page 9 - 30
9-31
Truncated Binary Exponential Backoff
than 2n
• n = number of times it has tried for first 10 times or n
= 10 for the 11th through 16th try
• After 16 tries, report error to the upper-layer protocol
Important
Points to
Cover: The slide is self-explanatory.
Page 9 - 31
9-32
New IEEE Maximum Topology Specs
standard
– Model 1 closely follows the 5-4-3 rule
– Model 2 assigns a value to each type and length of copper or
fiber media, which corresponds to a worst-case round-trip
delay for the Ethernet signal
The new standards allow you to mix media types in your networks.
More details on these specifications are in the appendix.
Important
Points to
Cover:
This presents the factors in the determination and states there are
two ways to calculate the maximum topology.
Factors:
Round-trip collision delay
Interpacket gap shrinkage
Page 9 - 32
9-33
Transmission Models 1 and 2
Model two is more cumbersome than model 1, but has the advantage of
extending the topology farther.
It also more accurately reflects the types of distances found in real networks.
Important
Points to
Cover: The slide is self-explanatory.
Page 9 - 33
9-34
Transmission Model 1
Important
Points to
Cover: Most similar to 5-4-3.
Page 9 - 34
9-35
Model 2 Path Delay Value
• Model 2 assigns a value to each type and length of copper
or fiber media, which corresponds to a worst-case round-trip
delay for the Ethernet signal
– The value also takes into account the repeater for any fiber or copper
segment
• Starting from the point of highest variability your network
(call it the “left end”), calculate the length of each segment
across repeaters to the farthest station on the network
(called the “right end”)
Sniffer University
The standards add an additional value of 5 to the Path Delay Value for a margin
of error.
Important
Points to
Cover: Calculations are made using two types of variables: Path Delay
Values and Interpacket Gap Shrinkage. We’ll cover the first one
here and the second one on the next slide.
A B C D E
Page 9 - 35
Transmission Model 2
(Calculating Interpacket Gap Shrinkage)
9-36
R R R R
PvvA PvvB PvvC PvvD
The starting point is called the transmitting end, the center segments are called
“mid-segments”.
The far end (“receive end”) across the last repeater is not taken into
consideration.
We will be using a network diagram in the next exercise to determine if it
passes the model 1 or 2 requirements.
Important
Points to
Cover: Here is part two.
A B C D
pvv A + pvv B + pvv C + pvv D must be less than 49 bit times
Page 9 - 36
9-37
Maximum Transmission Paths
Four Repeaters, Five Segments
Three Coax Segments
Two 10BaseT or Fiber Optic Links
Repeater Repeater
AUI AUI
Cable Cable
DTE DTE
Important
Points to
Cover: Here is a graphic representation of allowable cable lengths for
various types of media.
Page 9 - 37
9-38
Model 1Max Transmission Paths
4 Repeaters, 5 links
(1-Coax, 3-10BaseT 500m Coax
and/or 2-Fiber Optic Rptr Rptr
10Base5 Link
Set Set
Links)
100m 10BaseT Rptr
Link Set
Rptr Rptr
Set 500m Fiber Optic Links
Set
Sniffer University
Important
Points to
Cover: This is the first of two diagrams showing different allowed
maximum path configurations.
Page 9 - 38
9-39
Model 1 Max Transmission Paths
3 Repeaters, 4 link
segments (1- 1 km Rptr
10BaseFB,1- 1km FOIRL, 2- Set
400 m 10BaseFL) 25 m
ink 400 m 10BaseFL Links
F O IRL L AUI
1 km Cables
Rptr
Rptr
Set 1 km 10BaseFB Link Set
MAU DTE
4 Repeaters, 5 link
Sniffer University
Important
Points to
Cover: This is the second two of four diagrams showing different allowed
maximum path configurations.
Page 9 - 39
© Network Associates Ethernet Network Analysis and Troubleshooting
LLC, 10BASE2 & 5
Section 9 TNV-202-GUI Ethernet Network Analysis and Troubleshooting
Page 9 - 40
Section 9 Ethernet Network Analysis and Troubleshooting
Helpful Information
Page 9 - 41
Section 9 Ethernet Network Analysis and Troubleshooting
Page 9 - 42
Section 9 Ethernet Network Analysis and Troubleshooting
Page 9 - 43
Section 9 Ethernet Network Analysis and Troubleshooting
Page 9 - 44
Section 9 Ethernet Network Analysis and Troubleshooting
Page 9 - 45
Section 9 Ethernet Network Analysis and Troubleshooting
Page 9 - 46
Section 9 Ethernet Network Analysis and Troubleshooting
Page 9 - 47
Section 9 Ethernet Network Analysis and Troubleshooting
Standards
Books
Fast Ethernet, Dawn of a New Network, 1996 310 pages Howard W. Johnson,
Prentice Hall ISBN 0-13-352643-7
Page 9 - 48
Section 9 Ethernet Network Analysis and Troubleshooting
http://www.sniffer.com
Sniffer Technologies website
http://www.Standards.ieee.org/
IEEE website
http://www.idg.net/metcalfe/
Bob Metcalf’s website – the inventor of Ethernet)
http://www.ansi.org
ANSI website
http://www.iol.unh.edu
University of New Hampshire Interoperability Labs. Leaders in interoperability
testing for many new technologies. This site has links to tutorials.
http://www.gigabit.ethernet.org
The gigabit alliance website
http://www.tolly.com
Independent hardware testing and industry reports
http://www.nstl.com
National Software Test Lab – independent testing
http://www.global.his.com
Official supplier of IEEE and TIA/EIA standards documents – not free
Page 9 - 49
Instructor Exercises
Sniffer University
TNV-202-GUI
4.0-OCT2000
________________________________________________
Ethernet Network Analysis and Troubleshooting
Table of Contents
Table of Contents............................................................................................................................. 1
Exercise Section 1: Which Frames Are on the Network? ................................................................ 3
Exercise Section 1: Isolating Frame Types with Pattern Matching (Optional)................................. 7
Exercise Section 1: A Surprise at 23:00 (Optional) ....................................................................... 11
Exercise Section 2: Comparing Ethernet Data .............................................................................. 13
Exercise Section 3: Cable Specifications....................................................................................... 15
Exercise Section 4: Hubports......................................................................................................... 21
Exercise Section 4: More Problems............................................................................................... 25
Exercise Section 4: Test Your Skill ................................................................................................ 27
Exercise Section 4: Errors.............................................................................................................. 31
Exercise Section 4: Evaluating Hub Jams ..................................................................................... 35
Exercise Section 4: Ethernet Physical Errors (Optional) ............................................................... 37
Exercise Section 5: Short Circuited Bridges .................................................................................. 41
Exercise Section 5: Busy Jam ....................................................................................................... 43
Exercise Section 5: Switch Traffic (Optional)................................................................................. 47
Exercise Section 6: Fast Ethernet Troubleshooting and Back Pressure ....................................... 51
Exercise Section 6: Fast Ethernet Problems ................................................................................. 55
Exercise Section 6: 10/100 Hubs ................................................................................................... 57
Exercise Section 8: Gigabit Traffic................................................................................................. 59
Exercise Section 9: Observing LLC ............................................................................................... 63
Choices you need to make in the menus or configuration windows are in bold.
When you are navigating through a series of steps, they have been shortened and separated
with a right arrow.
Example: Pull down the Monitor menu, choose Select Filter, click Select Filter becomes
Use Monitor > Select Filter > Select Filter.
As you work through the exercises, you will be opening a series of windows. When asked to
close many of them, Sniffer Pro will ask if you want to save them. Do not save the data
unless specifically instructed to save the data.
There are more exercises here than can be done in the allotted class time. The instructor will
choose exercises that meet the needs of the majority of the students in each class. All of the
trace files needed for these exercises are on the CD in your class manual. You may wish to
work on these independently if you finish your exercises early or do them outside of class
time.
Objective: Use data pattern filters based on frame formats to determine what frame types
are in use on the network and make sure no incompatibilities exist.
Procedure: Identify the most common frame format and then eliminate all frames of that type.
When they are gone, you will see what remains. Repeat this process until you
have identified all frame types present on the network.
a. Create a new Agent for this class called "TNV202": File > Select Settings... > New.
Name it TNV202 and choose the 10/100 Ethernet adapter. Don’t copy any settings. Click
OK twice.
b. Use Display > Display Setup> General to enable the Expert and Post Analysis tabs.
(They may already be enabled.) Click OK.
2. From the Expert click on DLC layer Objects. There should be 35. The frame types for each
object (adapter) are shown in the Expert Detail panel on the lower right. Hint: on the Expert
Summary screen, identify the separator bar on the right. If you drag that up, you’ll see the
Objects listed in the upper right, highlighting each in the top right shows its details in the
lower right panel.
Click the arrow on
the top of the upper
left window to Separator bar
enlarge the right
windows. Expert Detail panel
3. Observe the frame types shown for each adapter. How many different frame types (other
than broadcast and multicast) are shown?
Just 2 types, 802.3 and Ethertype. There are actually 3 frame types in this trace file:
one standard 802.3 frame with the LLC header and 10 “Raw” Ethernet frames.
Unfortunately, the Expert doesn’t distinguish between them.
4. Display the Decode windows and click the Monitor’s Protocol Distribution icon. We’ll
use this tool to determine the protocols on the network and their distribution. We’ll need to
generate the trace file once to see the protocols. Right-click over the Decode window and
choose Send Current Buffer and click OK to send the buffer 1 time.
5. Fill in the table on the next page as you answer the questions from the Protocol Distribution
view when the entire trace has been sent (wait until the counter on the lower right goes
blank).
a. With the MAC layer and Table view selected, which protocols are listed and how many
frames were sent for each protocol?
b. Look at the Pie Chart view and note the percentages of each protocol shown by clicking
on each slice or look at the Bar Graph view and click on each bar to see the stats.)
You may want to mention that LAT is a part of DECnet, so the total is 36 packets and
46.75%
6. Close the Protocol Distribution window. From the Decode display, we can get a quick
summary of frame types by using Display > Display Setup. On the Summary Display tab,
exclude All protocols in the lower window, and then click on Ethernet to enable it. You now
see which frames are version 2, but no differentiation is made between the rest. Highlight the
non-Ethertype frames, then look in the Detail panel and note the frame types you see.
Most are “raw”, but frame 75 is 802.3 with the LLC header. There are no SNAP frames.
7. To see which station is using each protocol, click the Matrix tab.
a. With the Traffic Map showing the MAC layer, click off all protocols except Other. Ctrl
click to select all those end station addresses with “Other” traffic, then press the Visual
filter icon to display only these frames. How many frames did you get? 2
What frame type(s) are they using?
Stations HP1 012BB4 and 090009012BB4 (multicast) are using 802.3 frames with
the LLC header (SAP FC); stations DECnet 00C8CC and broadcast are using
version 2 frames (Ethertype 0804 for Chaosnet).
b. Click back on the Matrix tab (this still reflects the original trace file with all the frames).
Now enable only the IPX stations in the Matrix Traffic Map view. Ctrl click on each IPX
address to select all of them, then press the Visual filter icon and display the frames.
How many frames are there?
10
Does this agree with the number you noted in the chart above?
Yes
c. We’ll use a similar process to determine the frame types the DECnet stations are using.
Click the Matrix tab. Enable only DECnet on the MAC layer of the Traffic Map. Looking
at the pattern of the frames on the traffic map, what do you observe?
Almost all of the traffic is to and from the level one router. Only two stations are
talking to each other.
CTRL click to select all DECnet addresses, then filter them into a new window. How
many frames do you have?
35
Use Display > Display Setup > Summary Display to exclude none of the protocols.
What information is being sent?
Most are Router hellos, end node hellos and route advertisements. Only one (frame
40) carries NSP data between 51.4 and 51.30.
Version 2.
d. Last, let’s look at the IP traffic next. We’ll use a protocol filter to see those frames. Start
with the Decode tab with 77 frames (this is the original unfiltered trace file.)
e. Right click over the Summary window, choose Define Filter, then create a new profile
called IP using Profiles > New > name = IP, copy the Default filter. Click OK, then Done.
f. Now click the Advanced tab and enable only the IP and IP ARP protocols, click OK.
g. Right click over the Summary window and use Select filter to choose the IP filter. How
many frames did you get in the new window?
28
Version 2.
This is a fairly quick way of seeing what frames are on your network. The traffic map is
especially useful to see IP local router situations. If you see a lot of frames going to a router
when they should stay local, you need to look for local router diagnoses in the Expert.
In a NetWare environment, you normally see most of the client traffic going to the servers,
since it is a client-server environment. If you see a lot of traffic between servers, investigate
to see if a server is being used to forward frames that are not compatible with the intended
server’s configuration.
If you are migrating from an IPX-based network to NetWare 5 on IP and are using an
intermediate server to forward the frames to the new server, this is a normal phenomenon.
This should be an interim short-term solution, since the traffic is doubled with that
configuration.
Objective: Determine what frame formats are in use on the network and make sure no
incompatibilities exist.
Procedure: Identify the most common frame format and then eliminate all frames of that type.
When they are gone, you will see what remains. Repeat this process until you
have identified all frame types present on the network.
1. You can also use pattern match filtering to eliminate frames based on data patterns. We'll
repeat this process until you have filtered most frame types present on the network. When
the frames you want to exclude are gone, you will see what remains.
Exit the Sniffer application, then start it again so your filtered tabs start at 1. Open the file
C:\202GUI\Mixed_01.cap.
Ethernet Version 2
3. Eliminate all frames using the Ethertype in Frame 1. We'll start a new profile and configure a
hexadecimal pattern match display filter. Highlight frame 1.
a. Look at the DLC header in the Detail window and note the Ethertype here:
6003
b. From Display > Define Filter. Click Profiles > New > Name it Pattern Match,
e. Click the Data Pattern tab, click Add NOT, then Add Pattern (This window opens).
f. Make sure Pkt: 1 is displayed (If not, use the Previous button).
g. Click on Ethertype = 6003 (DECNET) in the DLC layer of the frame data.
h. Click Set Data. Note the pattern 60 03 is pasted in the data area above and the offset
field is updated to C.
FYI: If you wanted to do a different type of pattern match, you would need to click the
Format button and choose from Binary, ASCII, EBCDIC before pasting in the data. You
can paste up to 32 bytes of data for matching.
4. That's a start, but the filter hasn't been applied yet. Let’s apply the filter now.
a. Right click in the display window, click Select Filter and select the Display Pattern
Match filter. Note: Data Pattern should read (NOT DLC: Ethertype = 6003[DECNET]).
Click OK.
b. You should have a new Filtered x window with a frame count in the title bar.
42
5. Note this new filtered window has maintained the original frame numbers. The window should
start with frame 3, a DNS OK status frame.
V2
6. We’ll add this Ethertype to our filter to eliminate all frames with the Ethertype in the DNS OK
frame.
0800
c. Highlight DLC: Ethertype = 0800 (IP) then click on Set Data. 08 00 pastes in at C.
d. Then click OK. Your match should now look like this:
e. Hold your cursor over the AND line to see how the match has been built this far.
Click OK if it matches. Go back and fix it if it doesn't.
f. Right click in the Filtered x display window, click Select Filter > select the Display
Pattern Match filter. Click OK.
g. You should get a new Filtered x window with 15 frames that starts with a LAT change
node frame.
Is the LAT frame the same frame format as the previous frames?
Yes.
6004
a. Display > Define Filter > Data Pattern tab > Add NOT > Add Pattern.
b. Highlight Ethertype 6004 (DEC LAT), click on Set Data, then click OK.
9. Display > Select Filter > select the Display Pattern Match filter again. Click OK.
How many frames are in the new Filtered x window that pops up?
14
Novell Raw.
IPX Checksum.
c. What is the hex pattern and offset used to perform this filter?
10. First, we'll create a filter to view only the Novell Raw frames then we'll change it so we
exclude these frames along with the previously excluded Ethertype frames.
a. Since we plan to filter out the Novell Raw frames in the last step, we'll start by adding a
NOT before we add the pattern as we did before.
b. Display > Define Filter > Data Pattern tab > Add NOT > Add Pattern.
c. Highlight IPX Checksum = 0xFFFF, click on Set Data, then click OK.
d. Before we finish, remember that we want to include all of the Novell Raw frames and
exclude all of the others. To make this happen, click on the NOT left of the IPX
Checksum entry so it turns to a solid red (the NOT disappears). Your match should now
look like this:
11. Display > Select Filter > select the Pattern Match filter again. Click OK.
How many frames are in the new Filtered x window that pops up?
10
12. Review the DLC header in each frame. These should all be 802.3 Raw frames.
13. Let's change our filter to exclude these frames and see what type of frames are left in the
trace.
b. Enable the NOT above the IPX Checksum pattern by clicking on the red block.
What do you think will happen if we apply the filter to this filtered window?
You'll get the error message "No frames matched the filter!" because this window only
contains the 802.3 Raw frames (all other frames were filtered out earlier).
a. Let's go back to our original trace window by clicking the Decode tab.
b. Display > Select Filter > select the Pattern Match filter again. Click OK. How many
frames are in the new Filtered 5 window that pops up? 4
15. You have now eliminated all Novell NetWare frames and enough Version 2 traffic so that you
can easily examine the remaining frames. Answer the following questions:
a. How many standard 802.3 frames (with only an LLC header) are there?
Objective: In the real world, you often encounter unexpected results. This exercise presents
an unexpected situation and asks you to describe your findings. Your instructor
will explain the technical background causing the situation AFTER you have
done the exercise. (We don't want to spoil the surprise!)
Instructor Note: You will want to omit this exercise, demo it, or do it with the class if
you have chosen not to do the previous optional pattern match filtering exercise. The
pattern match required here is not detailed in these steps since it was detailed in the
previous exercise.
802.3 Raw as evidenced by the 802.3 Length field and missing LLC header.
3. What field will you use to eliminate all these packets to see what else might be on this
network?
4. Create a new Data Pattern match called No Raw Frames to eliminate all frames using this
frame format. Select the filter.
These frames DON'T GO AWAY! When you examine the HEX you will see the '1111'
padding bytes between the LENGTH field and the 'FFFF' checksum in the XNS Header.
Sniffer Pro assumes they are IPX and decodes them as IPX, posting a message in the
Detail window noting the incorrect IPX length field.
6. Close the window. Stop here. Do not proceed to the next exercise.
These bytes were included when IBM, Sytek (the broadband vendor) and Novell built the
IBM Broadband/Ethernet bridge. Although we don't know exactly why Novell put them
there we do know that the request came from Novell. One speculation is that something
moved data in 4 byte words and the header, when padded from 14 to 16 bytes, provided 4
even 4-byte words. You will only encounter this in some obscure environments. The
exercise is intended to give the student an opportunity to encounter a strange situation
and make reasonable observations about it. (Think about a bridge set to filter FFFF!)
Objective: To look at a series of trace files captured from different speeds of Ethernet data
and compare how they appear in the Decode windows. We’ll start at 10 Mbps
data and work to Gigabit. We are not going to do any type of response time
measurements; we’ll just look at the delta times between the frames to see how
quickly a station can get a frame into the network after the last frame completes.
We won’t look at any errors there may be, either. We’ll save that for later.
Background: The appropriate Sniffer Pro was connected to each of these networks and a file
was saved.
1. We’ll look at a 10 Mbps trace first. Open C:\202GUI\bcast.cap to the Decode window. This
is a trace where every device on the network responded to the RWHO in frame 1 about as
fast as they could get them onto the network. There are no physical errors to confuse the
timing, but there is one long pause we’ll ignore.
a. What is the range of Delta times between the ARP frames? (Ignore frame 20)
b. Click the Statistics tab. What is the line speed shown here?
10 Mbps
2. Now let’s see what’s different in the 100 Mbps screens. Open C:\202GUI\100mbfile.caz to
the Decode window.
100 Mbps
b. What is the Delta time of frame 108, one of the shortest delta times?
3. Finally, we’ll look at some Gigabit data. Open C:\202GUI\GB.cap to the Decode window.
Instructor note: There are CRC errors and Code Violations (CV) errors in this trace. The
help screens give this definition: Gigabit Ethernet uses the 8B/10B transmission code
10
to map signals into 10-bit code groups. 8B/10B coding provides a set of 2 possible
code groups. A given 10-bit code group can be categorized as either legal, showing a
positive running disparity error, showing a negative running disparity error, or as an
illegal code group. The Sniffer Pro reports a code violation when it sees a code group
that is either illegal or that has a running disparity error as compared to the previous
code group. The students will look at the help screen in the Gigabit section exercise.
1000 Mbps
b. In the Decode view, what is the Delta time of frame 16, one of the shortest delta times in
this trace? (Expand the width of the Delta Time column to see the entire value.)
0.000.000.012 = 12 nanoseconds!
c. Note that an extra 3-digit column has been added to the Delta and Relative time columns
to compensate for this faster speed. It can measure down to 32 nanoseconds.
It shows [A] and [B] to indicate which channel captured the frame. The Fast
Ethernet Full Duplex pod captures show the [A] and [B] indicators, too.
4. This has been just a short comparison of what you see in the Sniffer windows. We hope it
points out that once you learn how to use the Sniffer for one speed, you can apply those
same techniques to looking at the other speeds. In the next sections we’ll give you more
specific information on how to look in different areas to help you analyze your traffic.
3) Determine if the collisions are "Legal" or appropriate for this network design
4) Narrow the "Fault Domain" and determine the best place to start
troubleshooting this problem
Background: You have been called in to investigate problems on an Ethernet network that
was designed by someone else. As far as you can tell, the network looks like
the drawing below.
50 meters
Node 1 Thin Ethernet RG
?? Coax 58 coax
WstDig178C41
Hub Hub Hub Hub Hub Hub
1 2 3 3 3 3
Node 2
WstDig96EC2C
Node Sniffer
Bridge 3
File Server
COFFEE.1
WstDigFF965F
Student note: Note that the picture is not complete. For example, there probably were other
stations on the thin Ethernet. The Sniffer analyzer was connected somewhere
near the end of the thin Ethernet. We don't know exactly what was on the other
side of the bridge shown on the left.
Originally the Sniffer analyzer was placed at the end of the topology and saw no
errors. In the actual trace, the Sniffer analyzer was traded with Node 3 and saw
errors. Node 3 was moved to the end of the topology and worked without
incident. Client addresses and the Server COFFEE.1 all exist off of Hub 1.
Instructor Note: Questions in step 13 have been changed to reflect the actual forwarding delay
of 15 bits on the Gandolf hubs. Please review them and be ready for new
numbers! Questions 14 and 15 have also been reworded with new assumptions.
c. Under the LAN overload entry, notice the value of 50 (percent) as the threshold for LAN
Overload.
d. Click in the Lan Load field and change the value to 30 so we will be alerted when the
lower threshold is exceeded.
f. When you change these settings for your own Sniffer, adjust the Dashboard settings,
too, so it will reflect the same thresholds.
g. Open the Dashboard, click the Set Thresholds… button. Change the Utilization(%)
High Threshold setting to 30. Click OK and note the red area on the Utilization dial now
starts at 30%. (This will have no effect unless we generate some traffic for the Dashboard
to monitor.) Close the Dashboard.
a. Click on the Objects tab on the upper right. (Drag the separator bar to the bottom if the
tab is not visible on the right.) Specific information about the condition should now
appear.
b. Click the icon to see the Expert Explain on the LAN Overload symptom. Read the
explanation of the problem and possible remedies. Close the Help window when done.
e. What was the value recorded for Maximum and Average LAN Overloads?
g. Click the F7 key and observe the similar information on the Bad CRC symptom.
What are the symptoms at the DLC layer? What stations are involved?
What are the diagnoses at the DLC layer? What stations are involved?
Are any of the stations involved in the LAN Overload condition also reporting errors at the
DLC layer?
Yes, 2 out of 4 were involved in the DLC Diagnosis (WstDigFF965F and WstDig178C41
sent bad frames); 2 out of 4 were involved in the DLC Symptoms (WstDigFF965F and
Gandlf100738 sent or received Runt frames).
6. Press the Decode tab to display the data. Enable Relative time if the column is not visible.
What is the total time of this capture?
7. In the next few steps we are going to try to determine what, if any, correlation exists between
the LAN Overload condition and the bad frames. This is a common approach used by
analysts when troubleshooting.
Are the bad frames the result of excessive collisions that will occur whenever utilization
on an Ethernet network starts to reach a critical state?
If so, with the topology involved, at what maximum point within a frame could one expect
damage to occur?
In this example, one simple way to begin to rule out a correlation is to look for bad frames
occurring at times when no LAN overload condition exists.
8. Reference the time you recorded earlier for the start and duration of the LAN Overload, let's
use a filter to display only bad frames.
a. Select Display > Define Filter > Profiles > New. Name it allbadframes. Click OK and
Done…
c. Disable Packet Type Normal, which will leave only problem frames enabled. Click OK.
d. Select the allbadframes display filter. Display > Select Filter > allbadframes > OK. A
new Filtered x window should open with 2503 frames.
9. Zoom in (F4) on the Summary window. We’re going to examine the Status column.
a. Enable the Summary Display Optional Fields, Status, Absolute Time and Bytes (Len)
by clicking on Display > Display Setup > Summary Display > Optional Fields. Click
OK.
10. Scroll over to the far right-hand column and scan through the Absolute Time values.
a. Did most of the bad frames happen during the LAN Overload?
The bad frames were happening before the LAN Overload, during the LAN Overload,
and after the LAN Overload. (Expert shows military time, decode shows AM, PM)
b. In your judgement, are the bad frames the result of the LAN Overload condition?
The error frames are not just due to the network being busy.
11. Scan through the LEN (Bytes) column values. The Sniffer stops capturing a frame when a
collision causes the bits to no longer be recognizable.
With a network only 50 meters in length, would you expect to see collisions occurring so far
into the Ethernet frames?
No
12. We're now going to determine how far into the frames collision damage is occurring. To do
that, you will need to define and select a new display filter.
c. OK > Done.
e. In the Packet Type text window, clear all of the boxes except for the Collision box.
g. Display > Select Filter... When you select the Collisions filter, you should see a new
Filtered x window appear with 21 frames.
h. Zoom into the Summary window and observe the LEN (bytes) column.
11 bytes
13. With a network of six repeaters in series and a total cable distance of fifty meters between
end stations in the collision domain, do the collision frame sizes seem appropriate?
(Hint: each of these hubs adds about 15 bit times of latency to the network. Also, in 10BaseT
each bit is 17.7 meters long.)
To determine the answer to this question, let's calculate the round trip delay: (use the
Windows calculator if you like)
b. Total Hub Latency in bit times = latency of each hub * number of hubs:
h. Compare your calculations to what you’re seeing on the Sniffer Pro analyzer. Does your
worst case calculation concur?
The collisions (maximum of 11 Bytes) are “Legal” (appropriate) for this network
design. These collisions are also within 64 bytes, which is an IEEE "LEGAL"
collision.
14. Was the fact that the network broke the 5-4-3 rule the reason the collision is occurring so far
into the frame?
No, the network is only 50m or “3 bits” in length. The accumulated propagation delay
of the 6 hubs is what caused the collision to occur so far into the frame.
15. Will extending the length of each of the hub lengths to their maximum of 100m cause “late
th
collisions” that occur beyond the 64 byte mark in the frame?
Potentially yes.
16. In the next few steps, we are going to look at a conversation in the original trace file and
attempt to isolate the location of the problem on this LAN. Note that on the network diagram,
the Sniffer Pro is behind the suspect cable. Sniffer Pro will therefore, see “error” frames from
this conversation that really do not exist due to the intermittent cable problem.
d. Click on the Display Filter icon to filter on this node, a new Filtered x window appears.
f. Notice that throughout the conversation between these two nodes, not one frame is re-
sent – even the runt frames!
It must be.
h. Apply your filter for Collision frames. Are there any collisions in the conversation
between these two nodes?
No
i. There are Runt frames in the trace file between these two nodes. What are they if not the
results of a collision? To find out, define a new filter for Runt frames only and select it.
17. Based on the errors reported in the Sniffer, is the conversation working correctly?
18. Where is the "Fault Domain" and what is causing this problem?
The conversation is working correctly between the workstation and the server -- so
something is damaging the frames between the workstation and the Sniffer.
19. If you could physically inspect the cabling in the Fault Domain, you would notice a piece of
ARCnet cable (RG62) connecting a machine to the Thinnet (RG58) segment.
Yes!
Objective: Use two related trace files to isolate the cause of physical errors on a 10BASE-T
network. Evaluate traces taken by the DOS Sniffer with Sniffer Pro.
We are going to show you how you can use a single Sniffer Pro to perform analysis and
comparison on two trace files.
10BaseT Hub
Hubport 1: Sniffer on known good port
Hubport 2: Sniffer on suspect port
NetWare client: Novell~FAA
NetWare File Server: 3Com~704
Fact Two: Another Sniffer analyzer is plugged into a known good port. Both Sniffer analyzers
were capturing simultaneously.
2. Think about different ways to approach isolating the source of the problem. What have you
come up with?
3. Use the Display menu > Display Setup..., disable the Expert tab.
5. Use Window > Tile to display both files simultaneously and do a frame to frame comparison.
Hubport2.cap? 75
7. These two trace files start at different frames because the captures could not be started at
exactly the same time. You will need to "align" the two trace files to start at the same frame.
Think about different ways to approach aligning the two trace files to start at the same packet
before continuing with the lab.
8. We're going to align the two trace files by examining the first frame in Hubport1.cap for a
unique string of data and then search for that string in Hubport2.cap.
a. In frame 1 of Hubport1.cap, notice the NCP read command ("Read 512 at 2812416").
The offset value (2812416) is the unique string we will use to align these trace files.
c. Use the Find Frame feature to find the first frame that matches this string:
d. Click OK.
Frame 5
If the "found frame" in Hubport2.cap matches the first frame in Hubport1.cap, can we
assume that the rest of the trace will match as well?
10. Since we have found a frame in Hubport2.cap that matches Frame 1 in Hubport1.cap, we
should be able to select all of the rest of the frames as well. If we select these frames as a
group, we should have a file that matches Hubport1.cap exactly. Let's give it a try:
d. Click Select.
Note: The boxes to the far left of frames 5 to the end of the trace should contain an X.
A new window titled Snif(n) should appear (The “n” represents a number). The new
window should have 71 frames and be aligned frame for frame with Hubport1.cap. We
don’t need the Hubport2.cap file any longer so close it now.
11. Do a quick comparison of the first few frames to verify that the traces are aligned.
12. Choose Window menu > Tile so we can see parts of both windows.
13. The next thing we need to do is quickly search through each of the trace files to locate any
bad Ethernet frames. We'll use the Find Frame feature again:
a. Highlight the Snif(n) window, select Alt-F3 (the Find Frame window should pop up).
Choose the Status tab and select all frame error boxes under Trigger, then select OK.
b. Were any bad frames located? If so, write down the frame number(s) here:
Yes – Frame 40
No
One trace was captured from a known good port on the hub, the other was taken
from a suspect port.
15. While looking at the Hubport1.cap Summary view, use Display > Go to Frame, to go to the
frame number of the bad frame from the Snif(n) window (recorded in Step 13).
Compare the two frames in each of the windows. Have you gotten closer to isolating the
problem?
You should be able to see that the frame is damaged in one trace and is not in the
other- think about the situation that might cause this to happen.
You may think the problem in frame 40 of HUBPORT2.cap was caused by a collision.
But if it were a collision, HUBPORT1.cap would have seen a damaged frame also. In
addition, if a collision had occurred, the NetWare client would have retransmitted the
data. But in HUBPORT1.cap , we can see that the client and the server seem to think
there was nothing wrong with frame 40. It seems that only the Sniffer analyzer on
hubport 2 saw a problem. In fact, that was the case: the port was bad. The hub took a
good frame off the backplane and output a bad frame at the bad port only.
16. Use Display > Display Setup and Enable the Expert tab on the General window and close
all open windows without saving.
Objective: Evaluate and describe the traffic from a network that was experiencing problems.
1. Open the file C:\202GUI\BADCABLE.cap. What are the Expert diagnosis and symptoms at
the DLC layer? How many are there?
1 diagnosis - High rate of physical errors, 18 symptoms - Runt frame, DLC source
address multicast and DLC source address broadcast.
View the Decode window. How many frames are there in this trace?
56 frames
b. Based on the number of Runt, Alignment and Bad CRC frames, do you think there's a
problem?
Absolutely! 56 out of 79 frames in error is a 71% error rate. We'll discuss later
some of the “rules of thumb” for excessive damaged frames.
What is the range of the size (in bytes) of the damaged frames?
2 ~ 566 bytes
Do you think this is a hardware-related problem? How would you describe the damaged
frames?
Yes. Many of the longer damaged frames include more than 8 bytes of FFs.
Consider using binary search method to isolate the problem and identify where the
damage is occurring.
The problem here is that someone put his own plugs on UTP and incorrectly
connected the wire pairs so there was no Common Mode Rejection of noise. It might
as well have been flat satin wire. The FFFFs show that noise was affecting the traffic
and changing the 0 bits to 1s. Unfortunately, noise is not always so obvious and does
not always leave the telltale FFFFs.
Hint: Consider using the Sniffer Pro Ethernet Error Analysis table located before the
exercise slides in your student guide.
1. Configure the Display options to show DLC addresses in the Summary view
Display > Display Setup > Summary Display tab > disable Show Network Addresses
2. For each of the following files, write down the characteristics of the damaged frames (length,
any pattern present at the end of the frame, whether frame appears to be repeated, etc.) and
assess the probable type of frame corruption demonstrated in the trace. Assume that the
trace shows a representative sample of the error. Close each window when you’ve answered
the questions. Choose between:
• Normal collisions
• Propagation delay
• Reflected signals
• Electrical noise
• Hardware problems
a. C:\202GUI\01.cap
Sniffer Pro shows collision indication in the Status column. The Hex window shows
that the bad frame, Frame 2, is perfectly truncated at Byte 12, indicating that this trace
was taken from coaxial-based media. Frame 3 is most likely a retransmission of Frame
2.
Probable cause: Legal local coax collision. This trace came from a pulp and paper mill
where the thick and thinnet cables were occasionally run over by forklifts carrying a
large roll of paper. The steel pipe that was embedded in the grooved concrete floor (it
carried the coax) had become crushed over time. The problem always surfaced for a
moment whenever the forklifts ran over the crushed pipe containing the coax cable
b. C:\202GUI\05.cap
(Note: For a detailed review of this trace file, please consult the document "trace file
addendum" located at the back of this manual.)
Legal and late collisions caused by a faulty (crushed) cable. Sniffer Pro shows frames
with collision indication in the Status column. Also, the Summary window indicates
that the collision on frames 4 and 6 occurred after 64 bytes. This is accurate, but on
these larger size frames it is difficult to tell if the frames have been truncated because
Sniffer Pro does not decode past the DLC layer. So we can't tell (from layer 3 info) how
big the frame was supposed to be unless we manually draw out the layer 3 details.
(Protocol forcing does not give us an option for the DECnet DRP protocol, only LAT.)
c. C:\202GUI\06.cap
Sniffer Pro shows frames with collision indication in the Status column.
All are small 24 byte frames. Contains DLC addresses, no pattern at end of frame.
Probable cause: If this were truly representative of the traffic, it's probably signal
reflection.
d. C:\202GUI\16.cap
Variable but small-sized frames. All have 11-12 bytes of 55s, representing hub/repeater
jam, appended to 43 bytes of data.
Probable cause: repeated collisions on a remote 10BASE-T network. They look like
reflections but cannot be. Remember, the majority of the signal moves towards the
termination and will not be reflected back. That means that in a full-size 32-byte
network, the collision can never be more than one-half the network – that’s 16 bytes
from the center to the unterminated end and 16 bytes back towards the sender headed
towards the termination. That’s 32 bytes total.
This is jut a “lucky break”. The frames were selected to create the individual trace to
ensure the students learned to identify this pattern as hub jam, not reflection. It is
strictly coincidental that the collision occurs 55 bytes into the frame.
e. C:\202GUI\17.cap
Sniffer Pro indicates that frames 5 through 8 are damaged by collisions. Frame 7 and
frame 8 are late collisions, as indicated in the Summary and Expert views.
Four damaged frames come from same source. Frames 5 and 6 are truncated at byte
42. Frames 7 and 8 are truncated late at byte 86. Frames 7 and 8 are evidence of late
collisions combined with signal reflection. There are possibly multiple problems with
this network.
Sniffer Pro reports Alignment and CRC errors in the decode Status column.
The Expert doesn’t report any errors other than the Global CRC errors. This may seem
odd with so many problems in this trace. The answer is that the Expert builds the
object database from addresses seen in frames without CRC errors. Then, when it sees
what it knows is a valid address associated with a problem frame it reports the
Symptom/Diagnoses.
Since every frame in this trace has a CRC error, the Expert never builds the object
database, never learns the valid addresses and therefore has nothing to associate a
Symptom/Diagnoses with even though the addresses here are most likely valid – the
Expert would not have learned that.
If you need to demonstrate this, load FRAGS.cap. Select the allbadframes filter. You
will have a decode full of Alignment, Fragment and Runt frames. Select a few of one
kind and Save Selected. You will notice that Alignment and Fragment frames all have
CRC errors and the Expert will not learn about any DLC objects associated with those
frames. However, Runt frames do not have a CRC error and the Expert will learn about
those DLC objects.
4. Use Display > Display Setup > Summary Display to reset the Display option to Show
Network Addresses.
1. Open the file C:\202GUI\FRAGS.cap. Click on the Decode tab and note the frame count.
How many frames?
1173
2. Let's investigate how many of the frames in this trace have been damaged in some way.
Apply the allbadframes filter to only show the bad frames.
111
111 bad frames in 1173 is more than a 9% error rate. It certainly warrants more of an
investigation.
3. Look at the detail of frame 1. This should be part of a conversation between [192.9.200.150]
pc150 and [192.9.200.203] natco-4. The subnet mask for these devices is 255.255.255.0.
Are they on the same or different subnets?
The same subnet.
947
5. Now let’s analyze the conversation between these two stations. Right click on the current
Filtered x window and choose Create New Filtered Window. This will allow Expert analysis
of these frames. The new window should be named FilteredFramesx.cap.
a. Use the search function to find any frames that contain physical errors (or other
symptoms):
Display > Find Frame > Expert tab > Any symptom/diagnosis string > Down > OK.
Use F3 to repeat the search.
b. When a bad frame occurs, notice who is sending the frame and the C/R sequence, does
the conversation recover after each error?
Yes, for error frames up to Frame 940. Starting with Frame 941 it does not recover.
Both are receiving bad frames. This would rule out a bad NIC card in one of the
nodes
d. Repeat the process to find and analyze all of the error frames in this conversation. How
many symptom frames are there?
17 frames have symptoms, some are physical errors, others are NFS problems.
e. Apply the allbadframes filter to this trace to see how many frames contain physical
errors. How many frames do we see in the new filtered trace?
11
Alignment errors
11 errors in 947 frames equals slightly more than 1% errors. This does not seem to
be a problem.
h. Use F4 to zoom in the Hex window and look at the damaged frames. What do you notice
about the damage?
4 of the frames show 5555s . All frames are damaged beyond 64 bytes.
5555s are evidence of hardware problems or collisions. If they are collisions, they all
extend beyond 64 bytes and would be late or illegal collisions indicating a possible out
of spec network or propagation delay.
7. Press the Decode tab to return to the FilteredFramesx.cap display window with 947 frames.
GoTo Frame 943 and evaluate the conversation.
No, we see PC150 sending messages but Natco-4 never responds. The
conversation always recovered prior to frame 943.
206.953.080 seconds!
A number of problems or changes in the physical network could cause the network
to go down for this amount of time (over 3 minutes!)- all of them caused by human
intervention.
8. Based on what we know now, draw a diagram of this network including the cabling, PC150
and Natco-4, the repeater, the Sniffer, and any other devices that you can identify. Use the
diagram to try and isolate the problem.
Procedure: Open these trace files and answer the questions for each:
C:\202GUI\19.cap
C:\202GUI\20.cap
C:\202GUI\BAD03.cap
a. File 19.cap
b. File 20.cap
c. File BAD03.cap
Instructor Notes:
From the Hex view point out the characteristics of a hub jam as seen on the Sniffer
analyzer: 5555555s. May also see AAAAAAs. Hubs are repeaters. When they detect a
collision off of a port, they will jam and ensure at least 96 bits. The first 62 bits are
defined by IEEE to be 10101010...
Presumably the real preamble came from the sender of the frame. A collision occurred.
It was followed by the repeater's jam. The repeater jam is 96 bits. When we see 8 bytes
of AA or 55, we are seeing the first 64 bits of the jam. The remaining 32 bits are used by
the Sniffer Pro analyzer for the CRC check and thus are not visible.
Objective: Determine whether apparent frame errors should be counted as part of overall
Network statistics.
Background: The parallel tasking feature of many Ethernet cards can throw off baseline
statistics unless you know what to look for.
1. Manually create address book entries for the two stations communicating in this trace. Assign
the name Server to 161.69.97.200 and Client to 161.69.97.202. Enable Show network
address in Display < Display Setup > Summary Display.
2. Open and display the trace file C:\202GUI\BADCRC.cap. Press the Decode tab to display
the data.
3. In Frame 1, we see Client (NGC 030B4D) issue an SMB Read command for 32 kb of data,
starting at offset 3964928 (00803c00h) for the file handle (F=) 1009.
4. Frames 2 and onwards show Server using NetBIOS to move 1460-byte blocks of data (over
a TCP connection) until the TCP window is filled and an acknowledgement is received. (Note
that the first block of data is 1456 bytes.)
Bad CRC
978 bytes
c. From the information within the IP header, what size frame did the IP stack on Server
indicate that it was sending to the DLC layer for encapsulation?
1500 bytes – a maximum size frame. The Sniffer also notes the frame was
retransmitted in frame 13, but the Summary window associates it with frame 14. Frame
13 is the retransmission looking at the hex data and the TCP sequence number.
5. Let's change our display to show only the TCP protocol information:
b. Click on the All button on the bottom to exclude all protocols, then press T repeatedly
until you find Transmission Control Protocol. Uncheck the box for it, then click on OK.
d. Lastly, adjust the width of the Summary column in the main display to allow the ACK,
SEQ, LEN and WIN values to be displayed.
(Instructor Note: Note that the column will retain this length for all future trace files
until you change it again, or until you delete the Sniffer.INI file in your operating
system's configuration files directory.)
6. Examine the LEN= value in the Summary view for Frame 6. What is the value? 924 bytes
a. Look at the Len(Bytes) column in the Summary window. How many bytes are there in the
frame? 978 bytes
b. What it the IP total length? 1500 (Sniffer is showing the actual length of the data in
the Summary panel line rather than what was originally sent.)
a. Does this appear consistent with the times for previous exchanges of data between these
two stations? No, it is much longer.
Frame 2, from the sequence number 60142096. (If you go back to frame 2, the Sniffer
tells you it was retransmitted in frame 8.)
It did not receive an ACK from Client before before the retransmit timer expired.
8. Look for the retransmitted frame that has the same SEQ number as frame 6 (the bad frame).
Frame 13 (The first line of the TCP header in frame 6 points us to frame 13)
9. To confirm that the communication continues normally, compare Client's next SMB Read in
Frame 38 with that of Frame 1. Is the Read 32KB further into file 1009? Look in the SMB
detail of this frame at “Starting offset.”
Yes, the next read is 32KB further into the file, 3997696.
10. We have just seen a scenario where a corrupted Ethernet frame causes the upper layer
protocol to time out and retransmit. Now, let's examine a scenario where things do not
proceed as we expect.
11. Close the trace file, in preparation to load a new one. Also, return to the Display Setup >
Summary Display tab, and click on the None button to clear all the protocol filters. Click OK.
12. Click on the Address Book icon on the main toolbar. Change the Server's address to
206.116.6.132, and the Client's address to 206.116.6.135.
When you have edited both stations, close the address book.
13. Open the trace file C:\202GUI\BADCRC-1.cap and click on the Decode tab to display the
frames.
14. In Frame 1 Client opens the file PRO40A1.TMP. In Frame 3 it issues a command to the
server of Write Block Raw 65520 bytes at offset 0 of the file. Then Client starts sending the
data using NetBIOS in frames 4 and 5. Frame 6 is a TCP Ack to frames 4 and 5.
15. Frame 7 shows Server's response to Client's write request in frame 3. Look in the SMB Write
Raw Data header. It indicates Server is ready to write the data Client will send. The Bytes
actually written shows 0, the bytes remaining to be read is 65535 (actually a little more
than the client said it would send.) Evidently it has not read the NetBIOS data sent in frames
4 and 5 yet.
16. In Frame 8 we see Client use NetBIOS to write another 1456 bytes of data.
17. Examine the Status and LENgth columns in the Summary view along with the Detail window
of Frame 9.
a. What kind of error does SnifferPro post against the frame? CRC error
c. What type of problem do we normally associate with this type of frame corruption?
Electrical noise
18. Now examine Frame 10. With the exception of the actual frame length, do Frames 9 and 10
appear to be the same? To be sure, compare the unique IP Identification fields, IP Length
fields, the unique TCP Sequence numbers and Hex ASCII data patterns.
Both Frames 9 and 10 are identical: same IP Identification fields (14342, incremented
by at least one for each frame sent), same IP Length fields of 1500 (although the first
frame contains considerably less than 1500 bytes), and same TCP Sequence numbers
(60550401). Even the TCP Checksum fields are the same, although the first frame
contains less data than the second frame, which means the Checksum must be
different as Sniffer analyzer points out (8722). The Hex data matches to the point of
corruption.
19. When a frame is damaged in transit that is not the result of a legal collision, the receiver will
request the SMB Write again. Does this occur?
No, Server does not request the write again in Frame 73. In fact, the client continues
onward, with Server's permission, in writing the next 64KB of data in Frame 75.
20. Now examine the Delta time between Frames 9 and 10.
a. How much time elapses between when Expert Sniffer Analyzer sees the beginning of
Frame 9 and when it sees the beginning of Frame 10?
b. How is it possible that Client knew it had sent an undersized and error frame and
compensated by retransmitting it immediately?
Normally, it is impossible for a sender to know it transmitted a bad frame or that its
frame became damaged in transit and, subsequently, retransmit it immediately.
Normally, the receiver's transport layer protocol makes the decision to have the
original frame retransmitted properly, which may include repeating the entire write
process of all 64KB as we saw in the earlier example.
c. After reviewing a typical retransmission as in the earlier trace file, doesn't this seem more
like "magic" than a protocol with a structured retransmission mechanism at work?
Yes, this does defy convention and seems more like magic than normal
communication.
21. Use F8 repeatedly to advance to Frame 17. Use the same method to compare Frames 17
and 19. Does the earlier situation repeat itself or is this a different problem?
22. There is a general performance guideline for baselining that suggests a network segment
should have no more than one CRC error per MB of data seen "on the wire."
There are 2 physical errors, specifically CRC errors, for 153,902 bytes seen “on the
wire”. If 1 CRC error for 1MB of data = 100%, then 2 CRC errors for 154KB = 1,300%.
This exceeds the guideline substantially!
23. It may be difficult for us to speculate as to what is causing the CRC-error frames to be
retransmitted so quickly in the second trace file. In reality, it is the implementation of a
relatively new performance feature called “early transmit”. The frame is copied from the PC's
memory buffer directly to the network, instead of going through the NIC's memory buffer first.
Unfortunately, the PC in this trace file couldn't provide the data fast enough to the NIC card,
which was creating and transmitting the frame simultaneously. Subsequently, the first frame
was undersized and aborted. Fortunately, the entire frame was ready for transmittal the
second time, in both instances.
There are actually two scenarios that can cause this kind of problem. One scenario
involves incompatibilities between PCI-based personal computers and PCI-based
Ethernet NICs. Another scenario involves “early transmit.” This trace file deals with
“early transmit” of newer high performance NIC cards with “parallel tasking” or
“pipelining” features. This trace file came from a client and server using 100Mhz
Pentium PCs with 64MB of RAM and 3COM 3C59x PCI-bus based Ethernet NICs.
Although the PCs were fast, the NIC was faster. (Note that an operating system and
concurrently executing applications can also bog down a fast PC so as to cause the
transmit underrun situation.) Periodically, the PC couldn't provide the data for an entire
frame before the NIC had sensed the 10BASET network was free and started sending
the frame it was creating “on the fly.” The result is a 516 byte frame instead of a 1514
(Sniffer analyzer interprets the last 4 bytes in an Ethernet frame as the CRC and
doesn't show them to us). SMC uses an Early Transmit Threshold (ETT) of 64 bytes
with an increment of 8 bytes for each transmit underrun situation. It appears as though
3COM uses an ETT of 516B.
Background: The network was in its initial stages of development. There were very few actual
users connected at this time. New users were being added and the network
topology was changing. Not all bridges in use were managed bridges. The few
users that were connected were complaining of extremely slow response time
and sessions that were disconnecting. There were no problems with the physical
layer. The design of the network provided for redundant backup paths. Spanning
Tree would prevent the occurrence of network loops.
Instructor Note: This trace file was taken in a lab network. The bridges were buffering and
were doing 8:1 compression. The WAN links are true full-duplex.
192 Kb Sniffer
Bridge Bridge Pro
analyzer
192 Kb
Bridge Bridge
4. Select the DLC Objects. How many station (non-broadcast) addresses are displayed?
6. Does this seem logical, given the number of devices detected by the Sniffer Pro?
Not really.
10. Press the End key to go to the last frame of the trace. How many frames were captured?
12,406.
How long did it take for all the frames to be captured by Sniffer Pro?
1.576 seconds.
Either that the adapter is streaming with the same frame or there is a bridging loop in
the network. In fact, this is indicative of a bridging loop. All the frames are copies of
the same frame endlessly circulating the network. If there had been more stations then
you would see two, maybe three stations at the maximum, transmitting.
12. If the speed of the bridged links was 10 Mbps instead of the two 192 Kbps links, what effect
do you think it would have on the utilization value?
Nearly 100%.
Background: The network has been using hubs for some time. NetWare’s Pburst was recently
installed to improve the throughput when reading files from and writing files to the
file server. Due to the volume of complaints about network response time, a
switch was installed to give the file server the equivalent of its own 10 Mbps
Ethernet segment. Network performance was not improved.
Sniffer Switch
Pro Hub
10 Mbps
NetWare
NetWare Server
Clients
18
Instructor note: the DOS Sniffer showed 13. Sniffer Pro counts all stations receiving valid
frames as objects, even if they have not transmitted any frames.
LAN overload.
10.096 seconds
c. Press the Decode tab. Using the value in the Relative Time column at the end of the
trace, can you determine if this symptom was occurring throughout the duration of the
trace?
Yes, the trace took 10.61 seconds total; Sniffer Pro adds the minimum time that the
LAN will remain at overload before resolving itself, if it does.
5. Back in the Expert view, double-click on the LAN overload symptom to display more detail
related to the problem. (Drag the separator bar to the bottom if you do not see the Objects
tab on the top right.)
6. Given the number of DLC addresses identified by the Sniffer analyzer does it seem logical
that we have a switch loop in our network?
Not really. There are too many stations participating for a loop to be the cause.
Do the Delta times posted by the Sniffer analyzer seem consistent with a switch or bridge
loop in our network?
No. They are larger than one would expect to see with a loop. They are not the same
frame, either.
9. Frame 1 shows an NCP command to open a file. The destination address of A1.1 is the
address of the Novell File Server. If you cannot see the entire client address, adjust the width
of both of the address columns until the entire address is visible.
10. Let's take a look at the lower two layers to see what's happening there.
11. Looking through the frames, do you see signs of physically damaged frames?
8 or 9 bytes of AAAAAs for the destination address and question marks for the source
address. Each frame is also 8 or 9 bytes long.
13. With the network topology (type of equipment and design) and indicators from the data, what
conclusions do you reach?
This is most likely not a Signal Reflection problem. We are using hubs and switches
exclusively. These devices reduce the network to a series of point-to-point links with a
bus compliance. Each station transmits its data to the hub/switch; the hub/switch
either repeats or switches the data to the appropriate port.
The transmit leads from each device are a discreet pair, as are the receive leads.
We are witnessing Hub Jams (either from the hub or the switch).
The real problem is that the server is still on a 10Mbps link. By installing a switch we
have done nothing to eliminate the bottleneck in the network (it is now the switch
instead of the cable segment that existed earlier).
The switch will also introduce one full frame of latency to all buffered frames. If the
server is responding to the client, then the client port must buffer the incoming client
frames. This really adds latency to all transactions and is a classic example of poor
network design. Switches can be very helpful, provided they are deployed correctly.
Objective: To view several types of frames captured in a switched network. You will look at
typical switch-related protocols and the different VLAN tagging encapsulation
methods.
Background: The first trace was captured using the Switch Expert control to SPAN a port to
the Sniffer port. Several protocols are used in this switched environment:
Spanning Tree BPDUs, VTP (Cisco Virtual Trunk Protocol) to maintain the tree
of switches, Cisco ISL (Interswitch Link Protocol) encapsulation, CDP (Cisco
Discovery Protocol), and DISL (Cisco Dynamic Inter-Switch Link). We are not
going to explore the proprietary protocols, but will look at the ISL headers and
use the Expert information to learn how to troubleshoot from it. Most of the data
has been stripped out of the trace. You can also see the switch’s MIB data when
you attach to a switch. Once you get the port mirrored, the captured data looks
pretty much like other Sniffer traffic with added VLAN information and switch
traffic.
VTP versions different, VLAN not operational, Spanning Tree Topology Change,
VLAN removed from Domain
40 – from the upper right panel, there are 36 VLANs, 2 domains and 2 segments.
Note that some of them are FDDI and Token Ring in addition to the Ethernet
VLANs.
e. We’ll limit our exploration to the Global layer. It looks like that will provide us a lot of
things to learn!
2. The Global layer symptom “Spanning Tree Topology Change” is related to BPDU frames.
We’ll start there. The Expert gives us a lot of help in determining what has happened.
3. With all five of the Expert windows open, highlight the symptom associated with VLAN #1,
then look at the lower right panel to see the information shown about the BEFORE and
AFTER configuration. If we had a good network map, it would be very easy to see how the
mesh has changed with this information. It’s a lot better than trying to make sense of the
series of frames on our own!
a. What is the Priority ID of the root bridge before and after the change?
4. Click the Decode tab. Look at the details of the first BPDU frame. What type of encapsulation
is it using? Are all the frames encapsulated?
No, all the frames are not encapsulated. Some of the DISL frames have just a DISL
header with two parts: one that looks like a version 2 DLC header followed by a
“Pseudo LLC/SNAP header” that contains the DISL information. CDP frames are not
encapsulated, either. They look like standard LLC/SNAP frames. (In the original
unfiltered trace, there were also NSAP frames that were not encapsulated.)
5. Notice that frame 9 has a different “Pri” number from the earlier frames. Look at the BPDU
header of frame 9. Compare the BPDU header information with frames 1-8. What is different
about the flags in this frame?
a. Compare the root ID in frame 8 and frame 9. Does this agree with what we saw in the
Expert?
6. Since these frames didn’t apply to the information we saw in the Expert, go back to the
Expert and highlight the VLAN #1 Spanning Tree Topology Change symptom, then press
the Expert’s Display Filter icon.
7. Compare the root identifier in frames 9 and 113. Does this match what we saw in the Expert?
Yes, this is what triggered the symptom. The BPDUs in the trace allowed the
Expert to build the BEFORE and AFTER table.
8. Let’s go back to the Expert and look at those VLAN changes we saw.
a. Look at the Global symptoms and highlight the VTP Versions Different symptom. Click
on the ? help icon to see what this symptom means. From the lower right panel, what
was the last VTP version received? 2
b. What VLAN was removed? 333 We can assume this is related to the VTP version
problem. If you look at the VLAN Removed from Domain symptom, you’ll see that it is
this same VLAN and the incorrect version shows in these panels.
c. Click on the TNV layer in the Detail Tree in the center bottom panel. What is the VTP
version being used? 1
e. Highlight the VTP Versions Different symptom, then click on the Display Filter icon to
see the frames associated with this symptom. Find the VTP frames and locate the frame
that shows version 2. Which frame shows version 2? Frame 64
What is the updater's IP address? 161.69.225.250 This and the DLC address should
make it quite easy to locate the device that needs the upgrade.
If you want to isolate the VTP frames, you’ll need to do a data pattern match filter on the
SNAP Type = 203 (VTP) which pastes 20 03 at offset 2E. (There are 12 in the trace.)
f. In the Expert, highlight one of the VLAN Not Operational symptoms and click the ? help
button to get some information about what caused this symptom. Note the reason for the
non-operational state shown in the lower right window. This information will help you
reconfigure the devices so you can bring them up.
# 2 is Undefined, # 10 shows MTU Too Big For Trunk, # 11 shows MTU Too Big For
Device, and # 12 shows Suspended.
g. If you want to find the frame(s) that triggered these symptoms, go to the Decode window
and right click, then Find Frame. Type MTU too big and click to search in the Detail
window and disable match case.
Frame 106 shows all the VLAN that are “Not Operational”.
9. Last, let’s look at some 802.1Q headers. This trace is using ISL, so we’ll close it and look at
another trace. Open C:\NAI\202GUI\8021q.cap. This trace is pretty clean, fortunately, so
we’ll just look at the frames in the Decode window.
a. Scroll up in the Detail window and look at the 8021Q headers. It’s pretty simple- showing
just the 8100 protocol type field that identifies this field as a tag, then the next byte
showing the frame priority, tunnel type and the VLAN ID. Remember that the Ethertype
field shown in this header actually belongs to the part of the DLC header – the tag is
inserted between the source DLC address and the type/length field.
b. Scroll down to one of the 1518 byte frames just to see how the Sniffer labels these
maximum size 1518 byte Ethernet frames that have the 4 byte header added. There is no
CRC error posted, but you will see a TCP checksum error message.
c. We may see longer frames in the future as the specifications are changed to make
Ethernet more efficient at the higher speeds.
10. Close the 8021q.cap trace and open C:\202GUI\8021q-gig.cap trace. This is a trace taken
from the trunk between gigabit switches, since we see the VLAN tags in the frames and the
telltale full-duplex channel identifiers in the Status column. The Statistics tab shows the link
is 1000 Mbps.
11. Check the tag header in the Detail window. Is it like the one we saw from the 100 Mbps link?
Yes
12. There are some frames labeled Oversize in this trace. Evidently the Sniffer allows 1518 byte
802.1Q frames because it knows the tag adds 4 bytes to the maximum size Ethernet frame.
Because these are greater than 1518 bytes, it labels them as Oversize.
13. Remember that Sniffer Pro’s switch Expert and Control functions also shows the MIB data for
switches. MIB data allows you to see the version of the switch’s operating system and
statistics for each module, port and VLAN. This is covered in more detail in the TNV-201-DSP
and TNV-112-GUI classes.
Background: Both trace files were taken from switched Fast Ethernet networks. They have
several problems. We'll use the Expert to tell us about them.
1. Open C:\202GUI\100MBFIL.caz.
2. Look at the Expert. What symptoms do you see at the Global layer?
Broadcast/Multicast Storm.
Thirteen. Several of them are DECnet stations, which tends to be a very “chatty”
Protocol.
Lots of runts and “DLC address is a multicast address” caused by frame corruption in
the destination address field. If you highlight a station with this symptom in the upper
right window and look at the DLC addresses in the Detail tree, you’ll see that many of
them have 5s or As in the address.
4. Look at the Decode window and frame 13.Decnet stations periodically send these “Hello”
frames.
DECnet0033B9 (WISHPB)
b. Highlight that address in the Expert DLC object list and click on the Display Filter icon.
A new Filtered x window with 6 frames will open. Enable Relative Time column if not
shown. How often is 46.307 sending these “Hello” frames?
5. Apply your allbadframes filter to the unfiltered Decode window. How many frames have
errors?
219.
a. Of the 6059 frames in the original trace, what is the percentage of frames with physical
errors?
219/6059 = 3.6%. This is outside what is considered normal and should be corrected.
b. Analyze the problem by looking at the hex of the damaged frames. What conclusions can
you draw?
Frames are damaged anywhere from 2 to 51 bytes into the frame. AAAAs and 5555s
appear in most of the damaged frames. We’d rule out normal collisions because there
are far more than 8 bytes of AAAAs and 5555s. It is most likely a hardware problem or
backpressure. (We don’t have the story on this trace.) We’d need a network map or the
actual network to probe further. Fix the physical problems before moving on to the
upper layer problems.
6. Let’s look at a couple of traces with backpressure so you will recognize it. System Engineers
gave these traces to us. They were captured from different networks using different hubs.
Close the 100mbfil.caz window and open the C:\202GUI\Backpres.cap trace file. This is a
filtered trace that shows only bad frames. Normally, backpressure will not have such a
catastrophic effect on the network. What data patterns do you see in Decode window?
12 to 20 bytes (a few are larger). This trace was from Michelle Coomes when she was
at 3Com.
7. Now open the C:\202GUI\Backpres2.cap trace file. From the Expert, what symptoms or
diagnoses do you see at the DLC layer?
8. View the Decode window and look at the hex data for the frame with this symptom. What
type of errors do you see in this frame?
9. Follow the sequence of the bytes and offsets in this file transfer. Frame 9 below the damaged
frame, you’ll see a burst frame from the client requesting retransmission of the frame that got
damaged. Look in the Detail window for the offset and size. Which frame retransmits the
damaged frame?
Use Two station format to show this sequence. Disable Show Network Addresses,
then use the Matrix to set a filter on the 2 MAC addresses. It becomes very easy to
see the effects of the backpressure on the transfer and how the upper layers handle
any collisions that result.
The server sends packets 5, 6, 7 and 8 with the data, but 6 gets damaged.
The client comes back in frame 9 with the request for the missing frame
This trace came from a company that was having problems from a line running in the
proximity of a generator in a warehouse using cat 5 cabling. The errors coming from
the EMI was overflowing the buffer on the 10/100 switch so the switch was sending
out the backpressure. To solve the situation the customer installed a fiber zip cord and
it worked. This proves the point that the backpressure was not the problem but the EMI
was. I hope this fills in the gaps for everyone. Michael "Mickey" Giovingo
10. These are two examples of backpressure sent by switches to slow the stations. Evidently
the buffer is full and they need to slow things down so they can free buffer space.
Remember that the specification allows the switch to send preamble bits (alternating ones
and zeros) to keep the line busy. This shows up as 5s or As in the traces. If the vendor
chooses to use another bit pattern, you will see other bit patterns.
11. To determine the bit pattern for your switches, capture during a busy period and look for
frames with suspicious patterns. Disable backpressure on your switch, while capturing a
trace. See which patterns are missing. Document the information for your co-workers.
12. If you see a lot of “errors” like this on your Fast Ethernet segments, look at where the back
pressure bits show up in the frames to ensure you don’t have a different problem. You may
need to segment a network if the switch is unable to keep up with the normal traffic.
Background: Several Windows NT workstations were copying files across the network in a
Sniffer University classroom. The stations were connected to a 100 Mbps hub.
Many errors caused slow response times. In spite of the problems shown here,
most stations did not experience much difficulty. This trace was captured with a
filter set to capture only physical error frames.
1. Open C:\202GUI\Big_bad_rich.caz. What problems does the Expert see and how long did
they last?
Bad CRC errors at the global layer, lasting 3 minutes, 45 seconds and 723 ms
3. Look at the Decode window. What type of errors are reported in the status column?
4. What conclusions can you draw from what you’ve learned in class?
The 55s are collision data that are the result of the two colliders and the hub all
jamming at about the same time. On bigger networks, the jam is accumulated. On
small networks, the jam overwrites each other. Result: big networks can have 8 to 12
bytes of jam, small networks can have 0 to 8 bytes of jam, depending on where it
started in the frame or preamble.
The partial frames showing the conversation from 10.10.0.7 (NGC 100D4E) to 10.10.0.9
(NGC 100EF8) show CRC errors, probably due to a marginal or failing card.
Objective: Explore traces taken from 10 Mbps and 100 Mbps ports on a single autosensing
hub (multi-port repeater) to see if there are differences in what each port sees.
Background: Two Sniffers were attached to a hub, one was attached at 10 Mbps, the other at
100 Mbps. Each port on the hub was capable of either speed. We could assume
there were two backplanes in the hub, one for each speed with a link between
them to propagate traffic to all ports.
Instructors: These traces are from Steve Hammill. They were taken from the Hawking
10/100 multiport repeater that is advertised as a hub. Each port autosenses
the speed of the connection. Any ports that are not the same speed have
the frames bridged between them. There are other issues in these traces
that are not related to the forwarding we point out in this exercise. Stay
away from them unless you are cornered or are prepared to discuss them!
2. How many frames are in the Hawk10b.enc trace? 130 The Hawk100b.enc trace? 42
(This does not imply that there is a difference in what the Sniffers saw, it may just be a matter
of when each was started and stopped.)
Hawk10b.enc has 2 ICMP redirect symptoms and 1 Router Storm diagnosis at the
Station layer, and 1 WINS No Response diagnosis at the Session layer.
There are different object counts at the Session, Connection, Station and Subnet
layers, too.
4. Adjust each window so it occupies one half of the screen vertically so you can compare the
traces frame by frame. Press F4 to zoom each Summary panel. Look at the frame data so
you can align the first matching frames side by side. What are the first two identical frames?
Frames 1-5 in each trace are identical. Starting at frame 6, the Hawk100b.enc has
frames that are not found in the Hawk10b.enc trace.
5. Let’s see if we can filter out some of the frames to get an idea of the criteria this device is
using to forward the frames. First let’s find out how many are broadcast frames. Create a new
profile called Broadcast. Use the Address tab, leave the Address type set to Hardware,
then click the + in front of the Broadcast/Multicast Address icon. Scroll down and highlight
Broadcast(FFFFFFFFFFFF), drag it to the top Station 1 field, click in the Station 2 top field to
select Any, then click OK. Select this filter on each trace. How many frames are there in each
trace?
Both have 24 broadcast frames, so we know the hub forwarded all of those as it should
have.
6. Now go back to your Broadcast filter and click the Exclude button and apply the filter to
each of the Decode-tabbed windows again. How many non-broadcast frames are in each
trace?
7. Click the Host Table tab for each trace and compare the IP addresses. How many hosts are
in each trace and which ones appear in each trace?
8. Change the layer to MAC. How many DLC addresses are in each trace?
The same six devices appear in both traces. This means there is at least one router.
9. What conclusions can you draw from the behavior of this hub/multiport repeater?
This device seems to be doing more than bridging the frames between the backplane.
It is forwarding frames based on criteria above the datalink layer.
Note that only the Ping and ARP frames between .13 and .192 are in the Hawk100b.enc
trace.
These frames are also in the Hawk10b.enc trace, but there are lots of WINS “Refresh
Name” frames in the Hawk10b.enc that aren’t in the Hawk100b.enc trace.
All the WINS non-broadcast frames were filtered by the hub on the 100 Mbps port.
10. This seems like non-standard behavior. You may want to do a similar check of any odd
connection problems you see on your 10/100 hubs. You may find that this type of behavior
might impact what you see on the Sniffer, security devices, network management tools, etc.
11. Enlarge both trace file windows to normal size, then close them. Stop here. Do not go on to
the next exercise unless directed by your instructor.
Background: The first trace was taken as a Gigabit Ethernet device was initializing. We will
follow the sequence of frames each side sent. The second trace was captured on
a network and has many Expert symptoms.
1. Use File > Select Settings to create a new Gigabit agent. Click New. Name it Gigabit and
choose the Network Associates Gigabit Ethernet PCI Adapter_x from the Network
Adapter drop-down list. Don’t copy any settings. Click OK twice. Click OK on the “Failed to
Set Monitor Mode” message. You should see Gigabit, SX in the title bar. Ignore the blinking
“Channels A and B Link Faults” indicator in the title bar.
1 ç All zeros
2 All zeros è
6 Idle è
7 All zeros è
11 Idle è
12 ç Idle
3. Though we don’t see definitive frames where both agree in this trace, we can assume they
will settle on Symmetric Pauses and Full Duplex as the highest common denominator. They
will maintain this mode until they are reset or reboot. The rule is to acknowledge after a side
has received 3 consecutive identical frames. These devices do not seem to follow the rule.
There is no field to indicate the media type in use.
4. Notice the 10 bit decodes in the Hex panel are automatically enabled for autonegotiation
signals.
5. The proof of success lies in seeing whether the devices go on to exchange data (we don’t
see that in this trace). If they do, then the inconsistencies with the specification don’t matter. If
they don’t exchange data, you have the frames to follow to see where the sides disagree and
work from that point. Close this file.
6. Open C:\202GUI\GB.cap. You will see in the Expert that this trace file has 5 Time-to-Live
Expiring symptoms at the Station layer. We won’t worry about those – that’s for another
course! We can do some examination of the Global symptom of a Bad CRC.
7. Looking in the Decode window, we see that almost every frame has a symptom associated
with it. Let’s pull in only the frames with bad CRCs. From Display > Define Filter > Profiles
> New name the filter CRC Errors, click Done and OK. On the Advanced tab select 3 only
the CRC errors. Now right-click on the Summary window and choose Select Filter from the
menu and choose the CRC Errors filter. A new window will open with 24 frames showing
CRC and CV (code violation) errors.
8. Use Help > Help Topics > Find. Wait while the help files build. Enter code vi to find the
explanation for these. Highlight the Code Violation Errors in the bottom panel and click
Display. Close the Help screen when you’ve learned how the Sniffer makes this
determination.
9. Do you see any single source address that might indicate a bad card?
No, there are several different IP source addresses, though all of them are sent to the
same IP and DLC multicast address.
10. Let’s look for evidence of physical damage or other erroneous data in these frames. Tab into
the Hex window and press F4 to zoom it. Now press F8 to advance one frame at a time. Do
you see evidence of physical damage?
11. Now click back on the Decode tab to view the entire trace again. We’ll check to see if any of
these frames were retransmitted. Highlight frame 10 and note the IP identification number
in the frame. ID = 52848.
12. Right-click and choose Find Frame, type in this ID number in the text search window and
click the Detail window radio button, then click OK. Repeat this for a couple of the other CRC
error frames. Are they retransmitted?
No, they are not, so it appears the other side got them OK.
13. Let’s do one last thing with this trace. Right-click over the Hex window and choose 10 Bit so
we can see the 10 bit decodes. (This is automatically enabled for Autonegotiation frames, but
you must set it manually for gigabit data frames.) Scroll through the Hex window to see how
this data looks. You will see some Carrier Extend and idle bits at the end of most of them.
Even though Carrier Extend was developed for half-duplex links, one or more are inserted
between each frame in full-duplex mode, too.
14. We don’t have more information on this trace to tell you how this was resolved. We hope this
has given you some confidence that you can use the skills you’ve learned here to analyze
Gigabit Ethernet frames.
Use File > Select Settings to return to your 10/100 Ethernet agent.
Objective: Use the Sniffer Pro Network Analyzer Display options to study an LLC session.
Background: This trace file was taken from a Fast Ethernet network running Windows NT4
running on NetBIOS and LLC.
2. View the Detail of frame 1. Is this an Ethernet Version 2 or 802.3 frame? 802.3 frame.
3. Use Display > Display Setup > Summary Display to enable Two-station format and
exclude All protocols, then click Logical Link Control to enable only LLC, click OK.
LLC TYPE 2 (connection-oriented). There are send [N(S)] and receive [N(R)] numbers
for connection-oriented sequencing. There are also two bytes in the Control Field in
the hex window.
6. Which is the first frame where data is sent? Who sent it? What sequence number is sent?
Dell D45AE8 sends a UA in frame 108 and that’s the end of this session.
10. What was the purpose of all those frames where no LLC data was sent? Hint: Enable the
display of all protocols in Display > Display Setup > Summary Display > enable Show all
layers, then click None at the bottom.
The first LLC data frame (14) carried the NetBIOS session initialization frame.
Frame 18 begins the CIFS/SMB protocol negotiation and account setup process
Once that is done, it appears that the LLC frames are just keep alives. There is no
upper layer activity.
CIFS/SMB ends the session in frame 105 and LLC disconnects in frame 107.
11. Close all open windows without saving and disable Two-station format.
12. Shut down the Sniffer. We hope this class will enable you to effectively troubleshoot your
Ethernet networks back at your company