station attached to that port. The transmission of the jammed packet will last the same length of time as the original data packet. Stations that receive a jammed packet will discard it because the CRC (Cyclic Redundancy Check) field of the packet is incorrect.
To perform intrusion control, the
1.Determine the source address of the station transmitting the data. This means that the transmitting station must be allowed to transmit the following portions of the Ethernet packet:
∙
∙
∙
∙
Preamble (56 bits)
Starting delimiter (8 bits)
Destination address (48 bits)
Source address (48 bits)
2.Once the source address of the transmitting station is determined, the
3.The
4.The media module will process the security message and start jamming or passing the packet. This process takes 8
As can be seen, from the time that the source address of the frame is seen by the
7.11.1.2 Eavesdropping Protection
To perform eavesdropping protection, the
1.Determine the destination address of the station transmitting the data. This means that the transmitting station must be allowed to transmit the following portions of the Ethernet packet:
∙
∙
∙
Preamble (56 bits)
Starting delimiter (8 bits)
Destination address (48 bits)
2.As soon as the
3.The
4.The media modules will process the security message and jam or pass the packet. This process takes 8
Chapter 7. 8260 Ethernet Modules 123