SlideShare une entreprise Scribd logo
1  sur  5
Télécharger pour lire hors ligne
Ethernet Frame
• A Ethernet Frame is a physical layer communications transmission, comprised of 6 fields
which are assembled to transmit any higher layer protocol over an Ethernet fabric.
• A IP Packet is a formatted unit of data which can be transmitted across numerous physical
topologies including Ethernet, Serial, SONET and ATM.
• The important thing to understand is that a frame always refers to the physical medium.
References to enhancements in the physical medium like larger than standard Ethernet
frames are called “Jumbo Frames”, not “Jumbo Packets”
A IEEE 802.3 Ethernet Frame is composed of 6 segments which are described in detail below.
Preamble:
The 802.3 specification divides the preamble into two sections. The
first section is a 56 bit (7 byte) field plus a 1 byte field called the
starting frame delimiter (SFD). The preamble is not typically used in
modern Ethernet networks as its function is to provide signal start-
up time for 10Mbps Ethernet signals. Modern 100Mbps, 1000Mbps
or 10Gbps Ethernet use constant signalling, which avoids the need
for the preamble.
The preamble is preserved for today’s Ethernet transmissions
speeds to avoid making any changes to the Ethernet frame format. The preamble, while listed as a
part of the actual Ethernet frame is technically not part of the frame as it is added to the front of
the frame by the NIC just before the frame is put on the wire. The start of frame delimiter is a 1
byte field that serves as a signal to the NIC that the data immediately following the SFD is the
beginning of the actual frame.
Destination and Source Address:
These two sections of the frame are likely the most commonly understood in
that they contain the MAC address for the source “transmitting system” and
the destination “target system”.
Type / Length
The type / length field is used to identify what higher-level network protocol is
being carried in the frame (example: TCP/IP)
Data / Payload
The data / payload field is what we typically consider most important as
it is the data in which we are transmitting. The diagram specifies a range
between a minimum of 46 bytes and maximum of 1500 bytes. A
standard Ethernet frame has a maximum payload of 1500 bytes, frames
over 1500 bytes are considered Jumbo Frames.
Frame Check Sequence (CRC)
The end of the frame contains a 32 bit field which is a Cyclic Redundancy
Checksum (CRC). This is a mechanism to check the integrity of a frame upon
arrival at it’s destination. The CRC is generated by applying a polynomial to bits
which make up the frame at transmission. This same polynomial is used at the
receiving station to verify the contents of the frame have not changed in
transmission
Introduction of the 802.1q VLAN tag
VLAN tagging has traditionally been used to interconnect infrastructure routers and switches.
Through these VLAN tagged connections multiple VLANs can be transported across a single logical or
physical link. In recent years it has become very popular to connect end-points using VLAN trunking
and have a endpoint exist in multiple VLANs. An example of this includes using a NetApp FAS
controller directly connected to a Ethernet switch, using VLAN tagging to isolate different protocols
or users to specific VLANs. When VLAN tagging is introduced the size of the Ethernet frame expands
to accommodate the VLAN tag. The following diagram depicts our Ethernet frame used in the
previous example, except that it now depicts the presence of a VLAN tag.
The 802.1q VLAN tag introduces a 4 byte tag which follows the source address field in the frame.
This tag is separated into two, 2 byte segments. The first 2 byte segment is the Tag Protocol
Identifier (TPID). The value in the 2 byte field is always 0x8100 which simply identifies the frame as
a IEEE 802.1q tagged frame. The second 2 byte segment is the Tag Control Information (TCI). The
tag control information field is further segmented by the first 3 bits being used to carry priority
information based on the values defined in the 802.1p standard. This field ensures that 802.1p
priorities can be extended to VLANs by providing space within the tag to indicate traffic priorities.
The remaining bits in the TCI contain the VLAN identifier (VID) which provides the means to
uniquely identify the VLAN to which the frame is a member of.
Introducing the VLAN tag expands the maximum standard frame size to 1522 bytes.
MTU or Maximum Transmission Unit size
Windows:
Linux:
MTU Capture:
Jumbo Frames:
“With Jumbo Frames you must standardize everything to the same frame size”
Diagram depicting Jumbo Frame, without VLAN tagging
Diagram of a Jumbo Frame with VLAN tagging
The following diagram illustrates the configuration requirements for a network infrastructure which
has enabled Jumbo Frames for two server VLANs, while still supporting standard frames for a legacy
server VLAN and connecting a NetApp FAS controller via a VLAN Trunk.

Contenu connexe

Tendances

Spanning tree protocol
Spanning tree protocolSpanning tree protocol
Spanning tree protocolMuuluu
 
IEEE 802 Standard for Computer Networks
IEEE 802 Standard for Computer NetworksIEEE 802 Standard for Computer Networks
IEEE 802 Standard for Computer NetworksPradeep Kumar TS
 
TOKEN BUS & TOKEN RING.ppt
TOKEN BUS & TOKEN RING.pptTOKEN BUS & TOKEN RING.ppt
TOKEN BUS & TOKEN RING.pptshanthishyam
 
Internetworking
InternetworkingInternetworking
InternetworkingRaghu nath
 
Local Area Network – Wired LAN
Local Area Network – Wired LANLocal Area Network – Wired LAN
Local Area Network – Wired LANRaj vardhan
 
Spanning tree protocol (stp)
Spanning tree protocol (stp)Spanning tree protocol (stp)
Spanning tree protocol (stp)RaghulR21
 
Reference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPReference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPMukesh Chinta
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layerNaiyan Noor
 
Ethernet Computer network
Ethernet Computer networkEthernet Computer network
Ethernet Computer networkmiteshppt
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)k33a
 
Token Ring : 802.5
Token Ring : 802.5Token Ring : 802.5
Token Ring : 802.5Pnkj_Sharma
 
TCP - Transmission Control Protocol
TCP - Transmission Control ProtocolTCP - Transmission Control Protocol
TCP - Transmission Control ProtocolPeter R. Egli
 
Carrier-sense multiple access with collision avoidance CSMA/CA
Carrier-sense multiple access with collision avoidance CSMA/CACarrier-sense multiple access with collision avoidance CSMA/CA
Carrier-sense multiple access with collision avoidance CSMA/CASoumen Santra
 

Tendances (20)

Tcp ip
Tcp ipTcp ip
Tcp ip
 
Vlan
Vlan Vlan
Vlan
 
Spanning tree protocol
Spanning tree protocolSpanning tree protocol
Spanning tree protocol
 
IEEE 802 Standard for Computer Networks
IEEE 802 Standard for Computer NetworksIEEE 802 Standard for Computer Networks
IEEE 802 Standard for Computer Networks
 
TOKEN BUS & TOKEN RING.ppt
TOKEN BUS & TOKEN RING.pptTOKEN BUS & TOKEN RING.ppt
TOKEN BUS & TOKEN RING.ppt
 
Internetworking
InternetworkingInternetworking
Internetworking
 
Local Area Network – Wired LAN
Local Area Network – Wired LANLocal Area Network – Wired LAN
Local Area Network – Wired LAN
 
Chap 8 switching
Chap 8 switchingChap 8 switching
Chap 8 switching
 
Bgp protocol
Bgp protocolBgp protocol
Bgp protocol
 
Layer 2 switching
Layer 2 switchingLayer 2 switching
Layer 2 switching
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
ICMP
ICMPICMP
ICMP
 
Spanning tree protocol (stp)
Spanning tree protocol (stp)Spanning tree protocol (stp)
Spanning tree protocol (stp)
 
Reference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPReference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IP
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
 
Ethernet Computer network
Ethernet Computer networkEthernet Computer network
Ethernet Computer network
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
 
Token Ring : 802.5
Token Ring : 802.5Token Ring : 802.5
Token Ring : 802.5
 
TCP - Transmission Control Protocol
TCP - Transmission Control ProtocolTCP - Transmission Control Protocol
TCP - Transmission Control Protocol
 
Carrier-sense multiple access with collision avoidance CSMA/CA
Carrier-sense multiple access with collision avoidance CSMA/CACarrier-sense multiple access with collision avoidance CSMA/CA
Carrier-sense multiple access with collision avoidance CSMA/CA
 

Similaire à Ethernet Frames Explained

Ethernet and token ring
Ethernet and token ringEthernet and token ring
Ethernet and token ringAbhijeet Shah
 
Advanced TCP/IP-based Industrial Networking for Engineers & Technicians
Advanced TCP/IP-based Industrial Networking for Engineers & TechniciansAdvanced TCP/IP-based Industrial Networking for Engineers & Technicians
Advanced TCP/IP-based Industrial Networking for Engineers & TechniciansLiving Online
 
Fa2c4eb1e3582a1a36255a82b258cb03a7dc
Fa2c4eb1e3582a1a36255a82b258cb03a7dcFa2c4eb1e3582a1a36255a82b258cb03a7dc
Fa2c4eb1e3582a1a36255a82b258cb03a7dcsatriyo aris
 
Fa2c4eb1e3582a1a36255a82b258cb03a7dc
Fa2c4eb1e3582a1a36255a82b258cb03a7dcFa2c4eb1e3582a1a36255a82b258cb03a7dc
Fa2c4eb1e3582a1a36255a82b258cb03a7dcsatriyo aris
 
IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5Vicky Kumar
 
IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5Eslam Abdou
 
Networks A2
Networks  A2Networks  A2
Networks A2aeneas
 
Bt0072 computer networks 1
Bt0072 computer networks  1Bt0072 computer networks  1
Bt0072 computer networks 1Techglyphs
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network LayerManoj Kumar
 

Similaire à Ethernet Frames Explained (20)

Ethernet
EthernetEthernet
Ethernet
 
Chapter9
Chapter9Chapter9
Chapter9
 
Chapter-10.pptx
Chapter-10.pptxChapter-10.pptx
Chapter-10.pptx
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
 
Ethernet and token ring
Ethernet and token ringEthernet and token ring
Ethernet and token ring
 
6 Ethernet
6 Ethernet6 Ethernet
6 Ethernet
 
Advanced TCP/IP-based Industrial Networking for Engineers & Technicians
Advanced TCP/IP-based Industrial Networking for Engineers & TechniciansAdvanced TCP/IP-based Industrial Networking for Engineers & Technicians
Advanced TCP/IP-based Industrial Networking for Engineers & Technicians
 
Fa2c4eb1e3582a1a36255a82b258cb03a7dc
Fa2c4eb1e3582a1a36255a82b258cb03a7dcFa2c4eb1e3582a1a36255a82b258cb03a7dc
Fa2c4eb1e3582a1a36255a82b258cb03a7dc
 
Fa2c4eb1e3582a1a36255a82b258cb03a7dc
Fa2c4eb1e3582a1a36255a82b258cb03a7dcFa2c4eb1e3582a1a36255a82b258cb03a7dc
Fa2c4eb1e3582a1a36255a82b258cb03a7dc
 
Ethernet_Networks
Ethernet_NetworksEthernet_Networks
Ethernet_Networks
 
IEEE Standards
IEEE StandardsIEEE Standards
IEEE Standards
 
Interprocess Message Formats
Interprocess Message FormatsInterprocess Message Formats
Interprocess Message Formats
 
IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5
 
IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5
 
Networks A2
Networks  A2Networks  A2
Networks A2
 
Unit 3 - Data Link Layer - Part A
Unit 3 - Data Link Layer - Part AUnit 3 - Data Link Layer - Part A
Unit 3 - Data Link Layer - Part A
 
LAN TECHNOLOGLES
 LAN TECHNOLOGLES LAN TECHNOLOGLES
LAN TECHNOLOGLES
 
LAN
LANLAN
LAN
 
Bt0072 computer networks 1
Bt0072 computer networks  1Bt0072 computer networks  1
Bt0072 computer networks 1
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network Layer
 

Dernier

How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 

Dernier (20)

How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 

Ethernet Frames Explained

  • 1. Ethernet Frame • A Ethernet Frame is a physical layer communications transmission, comprised of 6 fields which are assembled to transmit any higher layer protocol over an Ethernet fabric. • A IP Packet is a formatted unit of data which can be transmitted across numerous physical topologies including Ethernet, Serial, SONET and ATM. • The important thing to understand is that a frame always refers to the physical medium. References to enhancements in the physical medium like larger than standard Ethernet frames are called “Jumbo Frames”, not “Jumbo Packets” A IEEE 802.3 Ethernet Frame is composed of 6 segments which are described in detail below. Preamble: The 802.3 specification divides the preamble into two sections. The first section is a 56 bit (7 byte) field plus a 1 byte field called the starting frame delimiter (SFD). The preamble is not typically used in modern Ethernet networks as its function is to provide signal start- up time for 10Mbps Ethernet signals. Modern 100Mbps, 1000Mbps or 10Gbps Ethernet use constant signalling, which avoids the need for the preamble. The preamble is preserved for today’s Ethernet transmissions speeds to avoid making any changes to the Ethernet frame format. The preamble, while listed as a part of the actual Ethernet frame is technically not part of the frame as it is added to the front of the frame by the NIC just before the frame is put on the wire. The start of frame delimiter is a 1 byte field that serves as a signal to the NIC that the data immediately following the SFD is the beginning of the actual frame.
  • 2. Destination and Source Address: These two sections of the frame are likely the most commonly understood in that they contain the MAC address for the source “transmitting system” and the destination “target system”. Type / Length The type / length field is used to identify what higher-level network protocol is being carried in the frame (example: TCP/IP) Data / Payload The data / payload field is what we typically consider most important as it is the data in which we are transmitting. The diagram specifies a range between a minimum of 46 bytes and maximum of 1500 bytes. A standard Ethernet frame has a maximum payload of 1500 bytes, frames over 1500 bytes are considered Jumbo Frames. Frame Check Sequence (CRC) The end of the frame contains a 32 bit field which is a Cyclic Redundancy Checksum (CRC). This is a mechanism to check the integrity of a frame upon arrival at it’s destination. The CRC is generated by applying a polynomial to bits which make up the frame at transmission. This same polynomial is used at the receiving station to verify the contents of the frame have not changed in transmission Introduction of the 802.1q VLAN tag VLAN tagging has traditionally been used to interconnect infrastructure routers and switches. Through these VLAN tagged connections multiple VLANs can be transported across a single logical or physical link. In recent years it has become very popular to connect end-points using VLAN trunking and have a endpoint exist in multiple VLANs. An example of this includes using a NetApp FAS controller directly connected to a Ethernet switch, using VLAN tagging to isolate different protocols or users to specific VLANs. When VLAN tagging is introduced the size of the Ethernet frame expands to accommodate the VLAN tag. The following diagram depicts our Ethernet frame used in the previous example, except that it now depicts the presence of a VLAN tag.
  • 3. The 802.1q VLAN tag introduces a 4 byte tag which follows the source address field in the frame. This tag is separated into two, 2 byte segments. The first 2 byte segment is the Tag Protocol Identifier (TPID). The value in the 2 byte field is always 0x8100 which simply identifies the frame as a IEEE 802.1q tagged frame. The second 2 byte segment is the Tag Control Information (TCI). The tag control information field is further segmented by the first 3 bits being used to carry priority information based on the values defined in the 802.1p standard. This field ensures that 802.1p priorities can be extended to VLANs by providing space within the tag to indicate traffic priorities. The remaining bits in the TCI contain the VLAN identifier (VID) which provides the means to uniquely identify the VLAN to which the frame is a member of. Introducing the VLAN tag expands the maximum standard frame size to 1522 bytes. MTU or Maximum Transmission Unit size Windows: Linux:
  • 4. MTU Capture: Jumbo Frames: “With Jumbo Frames you must standardize everything to the same frame size” Diagram depicting Jumbo Frame, without VLAN tagging Diagram of a Jumbo Frame with VLAN tagging
  • 5. The following diagram illustrates the configuration requirements for a network infrastructure which has enabled Jumbo Frames for two server VLANs, while still supporting standard frames for a legacy server VLAN and connecting a NetApp FAS controller via a VLAN Trunk.