Time
15 hours 34 minutes
Difficulty
Intermediate
CEU/CPE
20

Video Description

Encapsulation/Decapsulation and ARP Our next lesson will discuss Encapsulation/Decapsulation and ARP or Address Resolution Protocol. As an FYI, feel free to visit http://subnettingquestions.com/ to gain more experience in subnet masking. We'll diagram and demonstrate what the layer 3 packet data unit looks like and examine it components such as the Frame Check Sequence and explain what its function is. We'll diagram and explain what Encapsulation is, how the Decapsulation process work, what the ARP process is and demonstrate how they are interrelated.

Video Transcription

00:04
the next topic of discussion
00:06
is going to be the process of encapsulation and de encapsulation
00:11
couple together
00:13
with
00:14
art or the our process R stands for
00:19
address resolution protocol. Actually, before I move on to their, I should mention that there is a site online where you can go practice your sub netting
00:29
and the site is called some netting questions dot com. Great site. You go on that. It asked you a question, and then you say show answer. I'll show you the answer and then you do the next question and so on and so forth.
00:40
So the site is submitting questions dot com. So before we move on to the end, Cap de encapsulation and our process,
00:49
I wanted to show you what the protocol data unit called a packet at Layer three looks like,
00:56
Well, a packet
00:58
pretty much looks like a like a frame except the address fields.
01:03
Instead of a Mac address, you have an I P address. And again the first field is the destination I p address field. The second field is the source I P address field.
01:15
Then you have the data field and the frame check sequence. The frame check sequence houses the cyclic redundancy check, and it works exactly the same way as it does with the frame onto encapsulation de encapsulation and AARP Host one and host too
01:33
are residing on the same land. Sometimes I get asked, the question is host one and host you. Are they connected to a switch? Is there a switch in the middle? The answer is most definitely Yes.
01:42
But however, here I have drawn a logical dry graham, not a physical diagram. In a logical diagram, you exclude switches.
01:52
So yes, there is a layer to switch here in the middle. But I have excluded that from this diagram Host ones I p addresses 10 10 10 1 and host, whose I P address is 10 10 10 to host. One wants to ping host too.
02:08
At this point,
02:10
I have to talk about what Ping is.
02:14
Ping is basically a testing utility, and Ping works with the protocol
02:21
Internet Control Messaging Protocol, or ICMP. I see him. Ping has two parts and echo and an echo reply. So basically, if Host One wants to ping host to on host one from the command prompt you were typing
02:38
10 10 10 dot too.
02:43
And Host one would send out an Echo ICMP message down to host two and host to Will read that message and send back an echo reply or icmp Echo reply. Having said that, let's get back to the diagram Host one wants to playing host to
02:59
So does host one. No, its own I p address. Yes, just host one knew its host, Whose I p address. Yes. So Host one creates a packet with the source i p 10 10 10 1 and Destination I p 10 10 10 to
03:15
now let's assume host ones. Once again, Mac address is a And of course, as always, this is not 48 bits. It's only 16 bits, but we're going to assume it's a
03:30
we're gonna pretend this is 48 bits
03:32
and host Who's Mac address is B B B B Host one has already created a packet with source I P 10 10 10 1 and Destination I P 10 10 10 to
03:44
next to transmit over the local data link. Remember, even though there's a switch in the middle boat Host one and host who are on one data link,
03:53
a switch is one data link.
03:57
By default, Host one needs to create an Internet frame
04:01
because you use their two for transmission or the local data link. So Host one needs to create and eaten it frame.
04:10
Do. Send that packet over to host, too.
04:14
Host One needs host. Who's Mac address to create the friend host. One already knows its own Mac address is a butt host. One does not know host who's Mac address, which is B B B B.
04:29
So at this point, Host One generates an address resolution protocol request,
04:36
which is a broadcast.
04:40
So Host one generates
04:42
and our request
04:44
requesting for the Mac address off the device with I p
04:47
10 10
04:50
10 to. So host one is actually saying, whoever has I p 10 10 10 to please send me your Mac address.
05:00
Now this our request is a broadcast. It is actually sent to the destination address. 255
05:10
255
05:12
255
05:14
255 Which is the all networks, all sub nets broadcast address. Everybody's gonna hear it. If there were other hosts here, they would hear it too. But I'm trying to keep it simple.
05:26
Do you explain this concept. Host one generates an art request, which is a broadcast asking for the Mac address of the device with the I P 10 10 10 to
05:34
and host one transmits that broadcast host who receives that broadcast
05:41
and looks inside
05:43
and finds that
05:45
its own I p is 10 10 10 to
05:46
so Host two replies through the Our broadcast, and the R
05:51
reply is actually a unique cast back to the I P address of Host One, So the odd reply will be sent to 10 10 10 1
06:00
Host two replies with its own Mac address in the art reply, which is B B B B.
06:08
At this point,
06:10
Host one has the Mac address off host to host. One has its own Mac address and host one also has the Mac address off host, too.
06:20
This is the function of our are basically resolved. I p addresses to their relevance Mac addresses and then stores it in a table so this process will only happen once on Host one. Once host one has host two's Mac address, resolved once it has a binding in the table that say's
06:41
I P 10 10 10 to has a Mac
06:44
B B, B B.
06:47
It won't need to go through this. Our process a second time.
06:51
Next host one in capsule eights,
06:58
the original ICMP packet and puts it inside of the Internet frame that it created the Internet frame that it created as a sore smack off A and destination Mac of B B B B.
07:09
So the frame would look something like this.
07:13
So the destination Mac would be be be be be
07:17
the source. Mac would be a a
07:21
a
07:23
a. Then you have
07:26
the frame check sequence housing the CRC. As I said, Host one will encapsulate the original ICMP packet inside of the frame and put it inside the data portion of the frame
07:40
so the package will actually be sitting inside off the frame. The destination I p would be 10 10
07:46
10
07:47
to the source. I p would be 10 10
07:53
10
07:54
one,
07:55
And then you have the data and the frame check sequence housing the C. R. C. The act of encapsulation means I take the layer three packet and I put it in the data portion of the frame,
08:07
which is what we see here. This is the data portion of the frame. Host one will then transmit the frame over to host to host. Two will receive the frame and match the destination. Mac address field in the frame with its own Mac
08:24
once it matches Host Who will discover or know that this frame belongs to me. It was meant for me
08:31
host to At this moment will de encapsulate the frame and extract the original packet. Basically discard the frame and extract the original packet.
08:41
Then host to will match the destination i p address
08:46
in the packet with its own I P address, which is docked to hair and not to hear since it matches host to will send back the ICMP echo reply
08:58
that concludes
09:01
the AARP encapsulation the encapsulation portion of this lecture.
09:05
Next we will learn how to configure I P addresses on our routers and then we will see this process in action

Up Next

Cisco CCNA

Our free, online, self-paced CCNA training teaches students to install, configure, troubleshoot and operate LAN, WAN and dial access services for medium-sized networks. You'll also learn how to describe the operation of data networks.

Instructed By

Instructor Profile Image
Junaid Memon
Instructor