Ethernet.ppt

Ethernet
Dr.T.Thendral, Assistant Professor, SRCW
• Ethernet Cabling
• Manchester Encoding
• The Ethernet MAC Sublayer Protocol
• The Binary Exponential Backoff Algorithm
• Ethernet Performance
• Switched Ethernet
• Fast Ethernet
• Gigabit Ethernet
• IEEE 802.2: Logical Link Control
• Retrospective on Ethernet
Dr.T.Thendral, Assistant Professor, SRCW
Ethernet Cabling
• Finished our general discussion of channel allocation
protocols
• It is time to see how these principles apply to real
systems, in particular, LANs
• IEEE has standardized a number of local area networks
and metropolitan area networks under the name of
IEEE 802
• The most important of the survivors are 802.3
(Ethernet) and 802.11 (wireless LAN)
• With 802.15 (Bluetooth) and 802.16 (wireless MAN)
• Ethernet, the protocols and recent developments in
highspeed (gigabit) Ethernet
Dr.T.Thendral, Assistant Professor, SRCW
Ethernet Cabling
• ''Ethernet'' refers to the cable (the ether)
• Four types of cabling are commonly used, as
shown in Fig
Dr.T.Thendral, Assistant Professor, SRCW
• Detecting cable breaks, excessive length, bad taps, or loose
connectors can be a major problem with this media
• For this reason, techniques have been developed to track them
down
• Basically, a pulse of known shape is injected into the cable
• If the pulse hits an obstacle or the end of the cable, an echo will be
generated and sent back
• By carefully timing the interval between sending the pulse and
receiving the echo, it is possible to localize the origin of the echo
• This technique is called time domain reflectometry
• The problems associated with finding cable breaks drove systems
toward a different kind of wiring pattern, in which all stations have
a cable running to a central hub in which they are all connected
electrically
Dr.T.Thendral, Assistant Professor, SRCW
• Three wiring schemes are illustrated in Fig
Dr.T.Thendral, Assistant Professor, SRCW
• For 10Base5, a transceiver is clamped securely
around the cable so that its tap makes contact
with the inner core
• The transceiver contains the electronics that
handle carrier detection and collision detection
• When a collision is detected, the transceiver also
puts a special invalid signal on the cable to ensure
that all other transceivers also realize that a
collision has occurred
Dr.T.Thendral, Assistant Professor, SRCW
• 10Base5: a transceiver cable or drop cable
connects the transceiver to an interface board in
the computer
• The interface board contains a controller chip
that transmits frames to, and receives frames
from, the transceiver.
• 10Base2: The connection to the cable is just a
passive BNC T-junction connector
• The transceiver electronics are on the controller
board, and each station always has its own
transceiver.
Dr.T.Thendral, Assistant Professor, SRCW
• 10Base-T: There is no shared cable at all, just the
hub (a box full of electronics) to which each
station is connected by a dedicated (i.e., not
shared) cable
• A fourth cabling option for Ethernet is 10Base-F,
which uses fiber optics
• This alternative is expensive due to the cost of
the connectors and terminators, but it has
excellent noise immunity and is the method of
choice when running between buildings
Dr.T.Thendral, Assistant Professor, SRCW
• A repeater is a physical layer device
• It receives, amplifies (regenerates), and retransmits signals in both
directions
• As far as the software is concerned, a series of cable segments
connected by repeaters is no different from a single cable (except
for some delay introduced by the repeaters)
Dr.T.Thendral, Assistant Professor, SRCW
Manchester Encoding
• None of the versions of Ethernet uses straight binary encoding
with 0 volts for a 0 bit and 5 volts for a 1 bit because it leads to
ambiguities
• The start, end, or middle of each bit without reference to an
external clock
• Two such approaches are called Manchester encoding and
differential Manchester encoding
• With Manchester encoding, each bit period is divided into two
equal intervals
• A binary 1 bit is sent by having the voltage set high during
the first interval and low in the second one
• A binary 0 is just the reverse: first low and then high
Dr.T.Thendral, Assistant Professor, SRCW
Manchester encoding is shown in Fig. 4-16(b)
Differential Manchester encoding, shown in Fig. 4-16(c), is a variation of basic
Manchester encoding
Dr.T.Thendral, Assistant Professor, SRCW
The Ethernet MAC Sublayer Protocol
• The original DIX (DEC, Intel, Xerox) frame
structure is shown in Fig
• Each frame starts with a Preamble of 8 bytes
• The frame contains two addresses, one for the
destination and one for the source
• When a frame is sent to a group address, all the
stations in the group receive it
• Sending to a group of stations is called multicast
• The address consisting of all 1 bits is reserved for
broadcast
Dr.T.Thendral, Assistant Professor, SRCW
Dr.T.Thendral, Assistant Professor, SRCW
• Station tries to transmit a very short frame, it is conceivable that
a collision occurs, but the transmission completes before the
noise burst gets back at 2τ
• The sender will then incorrectly conclude that the frame was
successfully sent
• To prevent this situation from occurring, all frames must take
more than 2τ to send so that the transmission is still taking place
when the noise burst gets back to the sender.
Dr.T.Thendral, Assistant Professor, SRCW
• The final Ethernet field is the Checksum
• It is effectively a 32-bit hash code of the data
• If some data bits are erroneously received (due to
noise on the cable), the checksum will almost
certainly be wrong and the error will be detected
• The checksum algorithm is a cyclic redundancy check
(CRC)
• It just does error detection, not forward error
correction
Dr.T.Thendral, Assistant Professor, SRCW
The Binary Exponential Backoff Algorithm
• In general, after i collisions, a random number between 0 and
2i
• - 1 is chosen, and that number of slots is skipped
• However, after ten collisions have been reached, the
randomization interval is frozen at a maximum of 1023 slots
• After 16 collisions, the controller throws in the towel and
reports failure back to the computer
• Further recovery is up to higher layers
• This algorithm, called binary exponential backoff
Dr.T.Thendral, Assistant Professor, SRCW
Ethernet Performance
• The performance of Ethernet under conditions of heavy and
constant load, that is, k stations always ready to transmit
• A rigorous analysis of the binary exponential backoff
algorithm is complicated
• Instead, we will follow Metcalfe and Boggs (1976) and
assume a constant retransmission probability in each slot
• The channel efficiency is plotted versus number of ready
stations
Dr.T.Thendral, Assistant Professor, SRCW
Dr.T.Thendral, Assistant Professor, SRCW
Switched Ethernet
• The heart of this system is a switch containing a high-
speed backplane and room for typically 4 to 32 plug-
in line cards, each containing one to eight connectors
• Most often, each connector has a 10Base-T twisted
pair connection to a single host computer
Dr.T.Thendral, Assistant Professor, SRCW
Figure 4-20. A simple example of switched Ethernet.
Dr.T.Thendral, Assistant Professor, SRCW
Fast Ethernet
• To pump up the speed, various industry groups
proposed two new ring-based optical LANs
• One was called FDDI (Fiber Distributed Data
Interface) and the other was called Fibre Channel
• In any event, the failure of the optical LANs to
catch fire left a gap for garden-variety
• Ethernet at speeds above 10 Mbps
• Many installations needed more bandwidth and
thus had numerous 10-Mbps LANs connected by
a maze of repeaters, bridges, routers, and
gateways
Dr.T.Thendral, Assistant Professor, SRCW
• The 802.3 committee decided to go with a
souped-up Ethernet for three primary reasons:
• 1. The need to be backward compatible with
existing Ethernet LANs.
• 2. The fear that a new protocol might have
unforeseen problems.
• 3. The desire to get the job done before the
technology changed
Dr.T.Thendral, Assistant Professor, SRCW
Gigabit Ethernet
• Fast Ethernet standard when the 802
committee began working on a yet faster
Ethernet (1995)
• It was quickly dubbed gigabit Ethernet and
was ratified by IEEE in 1998 under the name
802.3z
Dr.T.Thendral, Assistant Professor, SRCW
• In the simplest gigabit Ethernet configuration, illustrated in
Fig. 4-22(a), two computers are directly connected to each
other
• common case, having a switch or a hub connected to multiple
computers
• and possibly additional switches or hubs, as shown in Fig. 4-
22(b)
• In both configurations each individual Ethernet cable has
exactly two devices on it, no more and no fewer
Dr.T.Thendral, Assistant Professor, SRCW
Dr.T.Thendral, Assistant Professor, SRCW
• Gigabit Ethernet uses new encoding rules on the
fibers
• The following two rules were used in making the
choices:
• 1. No codeword may have more than four identical
bits in a row.
• 2. No codeword may have more than six 0s or six 1s.
Dr.T.Thendral, Assistant Professor, SRCW
• There are also systems in which an error-
controlled, flow-controlled data link protocol
is desired
• IEEE has defined one that can run on top of
Ethernet and the other 802 protocols
• In addition, this protocol, called LLC (Logical
Link Control)
Dr.T.Thendral, Assistant Professor, SRCW
• LLC forms the upper half of the data link layer, with the
MAC sublayer below it, as shown in Fig
• Typical usage of LLC is as follows
• The network layer on the sending machine passes a packet to
LLC, using the LLC access primitives
• The LLC sublayer then adds an LLC header, containing
sequence and acknowledgement numbers
Dr.T.Thendral, Assistant Professor, SRCW
Retrospective on Ethernet
• Ethernet has been around for over 20 years and has
no serious competitors in sight, so it is likely to be
around for many years to come
• Few CPU architectures, operating systems, or
programming languages have been king of the
mountain for two decades going on three
• the main reason for it that Ethernet is simple and
flexible
• Ethernet has been able to evolve in certain crucial
ways
Dr.T.Thendral, Assistant Professor, SRCW
1 von 30

Más contenido relacionado

Similar a Ethernet.ppt(20)

lecture01_tm.pptxlecture01_tm.pptx
lecture01_tm.pptx
KashifIshaq102 views
A427 nic cardA427 nic card
A427 nic card
surajbhai513 views
NFPhysical Layer.pptxNFPhysical Layer.pptx
NFPhysical Layer.pptx
mmmm1111111 views
Lan basicLan basic
Lan basic
Online 1.4K views
Et3003 sem2-1314-3 ethernetsEt3003 sem2-1314-3 ethernets
Et3003 sem2-1314-3 ethernets
Tutun Juhana1.1K views
Chapter 1 ppt by dmbChapter 1 ppt by dmb
Chapter 1 ppt by dmb
dhanashrisabale128 views
Networking HMT-1Networking HMT-1
Networking HMT-1
ImranulHasan689 views
Wireless LANs PPT.pptWireless LANs PPT.ppt
Wireless LANs PPT.ppt
DrTThendralCompSci100 views
Railway ofc trainingRailway ofc training
Railway ofc training
Sreerup Chowdhury1.4K views
Networking Chapter 4Networking Chapter 4
Networking Chapter 4
mlrbrown1.1K views
osi osi
osi
Leenesh567 views
Ieee 802 standardIeee 802 standard
Ieee 802 standard
santoshkumar3075167 views
Asynchronous Transfer Mode  ATMAsynchronous Transfer Mode  ATM
Asynchronous Transfer Mode ATM
Madhumita Tamhane7.2K views
Ethernet_Networking2.pptEthernet_Networking2.ppt
Ethernet_Networking2.ppt
KowsalyaJayakumar210 views
Network in briefNetwork in brief
Network in brief
Himant Prasansu193 views

Más de DrTThendralCompSci(20)

The Application Layer.pptThe Application Layer.ppt
The Application Layer.ppt
DrTThendralCompSci95 views
Transport Layer.pptxTransport Layer.pptx
Transport Layer.pptx
DrTThendralCompSci68 views
SOFTWARE QUALITY ASSURANCE.pptSOFTWARE QUALITY ASSURANCE.ppt
SOFTWARE QUALITY ASSURANCE.ppt
DrTThendralCompSci248 views
Software Configuration Management.pptSoftware Configuration Management.ppt
Software Configuration Management.ppt
DrTThendralCompSci12 views
UNIT TESTING.pptxUNIT TESTING.pptx
UNIT TESTING.pptx
DrTThendralCompSci114 views
SOFTWARE TESTING.pptxSOFTWARE TESTING.pptx
SOFTWARE TESTING.pptx
DrTThendralCompSci357 views
Software design and Software engineering.pptxSoftware design and Software engineering.pptx
Software design and Software engineering.pptx
DrTThendralCompSci105 views
NETWORK LAYER.pptNETWORK LAYER.ppt
NETWORK LAYER.ppt
DrTThendralCompSci185 views
Bluetooth.pptBluetooth.ppt
Bluetooth.ppt
DrTThendralCompSci107 views
MEDIUM-ACCESS CONTROL SUB LAYER.pptMEDIUM-ACCESS CONTROL SUB LAYER.ppt
MEDIUM-ACCESS CONTROL SUB LAYER.ppt
DrTThendralCompSci150 views
Software design and Software engineering.pptxSoftware design and Software engineering.pptx
Software design and Software engineering.pptx
DrTThendralCompSci249 views
Software prototyping.pptxSoftware prototyping.pptx
Software prototyping.pptx
DrTThendralCompSci146 views
Requirement Engineering.pptRequirement Engineering.ppt
Requirement Engineering.ppt
DrTThendralCompSci130 views
EFFECTIVE MODULAR DESIGN.pptxEFFECTIVE MODULAR DESIGN.pptx
EFFECTIVE MODULAR DESIGN.pptx
DrTThendralCompSci296 views
UNIT I.pptUNIT I.ppt
UNIT I.ppt
DrTThendralCompSci352 views
PHYSICAL LAYER.pptPHYSICAL LAYER.ppt
PHYSICAL LAYER.ppt
DrTThendralCompSci301 views
PROCESS MODELS.pptPROCESS MODELS.ppt
PROCESS MODELS.ppt
DrTThendralCompSci393 views
COMPUTER NETWORKCOMPUTER NETWORK
COMPUTER NETWORK
DrTThendralCompSci233 views

Último(20)

ICANNICANN
ICANN
RajaulKarim2057 views
Azure DevOps Pipeline setup for Mule APIs #36Azure DevOps Pipeline setup for Mule APIs #36
Azure DevOps Pipeline setup for Mule APIs #36
MysoreMuleSoftMeetup75 views
Structure and Functions of Cell.pdfStructure and Functions of Cell.pdf
Structure and Functions of Cell.pdf
Nithya Murugan142 views
Streaming Quiz 2023.pdfStreaming Quiz 2023.pdf
Streaming Quiz 2023.pdf
Quiz Club NITW87 views
ANATOMY AND PHYSIOLOGY UNIT 1 { PART-1}ANATOMY AND PHYSIOLOGY UNIT 1 { PART-1}
ANATOMY AND PHYSIOLOGY UNIT 1 { PART-1}
DR .PALLAVI PATHANIA156 views
Sociology KS5Sociology KS5
Sociology KS5
WestHatch50 views
Lecture: Open InnovationLecture: Open Innovation
Lecture: Open Innovation
Michal Hron82 views
Dance KS5 BreakdownDance KS5 Breakdown
Dance KS5 Breakdown
WestHatch52 views
Gopal Chakraborty Memorial Quiz 2.0 Prelims.pptxGopal Chakraborty Memorial Quiz 2.0 Prelims.pptx
Gopal Chakraborty Memorial Quiz 2.0 Prelims.pptx
Debapriya Chakraborty221 views
GSoC 2024GSoC 2024
GSoC 2024
DeveloperStudentClub1049 views
Class 10 English  lesson plansClass 10 English  lesson plans
Class 10 English lesson plans
Tariq KHAN172 views
Nico Baumbach IMR Media ComponentNico Baumbach IMR Media Component
Nico Baumbach IMR Media Component
InMediaRes1186 views
231112 (WR) v1  ChatGPT OEB 2023.pdf231112 (WR) v1  ChatGPT OEB 2023.pdf
231112 (WR) v1 ChatGPT OEB 2023.pdf
WilfredRubens.com100 views
ICS3211_lecture 08_2023.pdfICS3211_lecture 08_2023.pdf
ICS3211_lecture 08_2023.pdf
Vanessa Camilleri68 views
ACTIVITY BOOK key water sports.pptxACTIVITY BOOK key water sports.pptx
ACTIVITY BOOK key water sports.pptx
Mar Caston Palacio132 views
Narration lesson plan.docxNarration lesson plan.docx
Narration lesson plan.docx
Tariq KHAN90 views

Ethernet.ppt

  • 2. • Ethernet Cabling • Manchester Encoding • The Ethernet MAC Sublayer Protocol • The Binary Exponential Backoff Algorithm • Ethernet Performance • Switched Ethernet • Fast Ethernet • Gigabit Ethernet • IEEE 802.2: Logical Link Control • Retrospective on Ethernet Dr.T.Thendral, Assistant Professor, SRCW
  • 3. Ethernet Cabling • Finished our general discussion of channel allocation protocols • It is time to see how these principles apply to real systems, in particular, LANs • IEEE has standardized a number of local area networks and metropolitan area networks under the name of IEEE 802 • The most important of the survivors are 802.3 (Ethernet) and 802.11 (wireless LAN) • With 802.15 (Bluetooth) and 802.16 (wireless MAN) • Ethernet, the protocols and recent developments in highspeed (gigabit) Ethernet Dr.T.Thendral, Assistant Professor, SRCW
  • 4. Ethernet Cabling • ''Ethernet'' refers to the cable (the ether) • Four types of cabling are commonly used, as shown in Fig Dr.T.Thendral, Assistant Professor, SRCW
  • 5. • Detecting cable breaks, excessive length, bad taps, or loose connectors can be a major problem with this media • For this reason, techniques have been developed to track them down • Basically, a pulse of known shape is injected into the cable • If the pulse hits an obstacle or the end of the cable, an echo will be generated and sent back • By carefully timing the interval between sending the pulse and receiving the echo, it is possible to localize the origin of the echo • This technique is called time domain reflectometry • The problems associated with finding cable breaks drove systems toward a different kind of wiring pattern, in which all stations have a cable running to a central hub in which they are all connected electrically Dr.T.Thendral, Assistant Professor, SRCW
  • 6. • Three wiring schemes are illustrated in Fig Dr.T.Thendral, Assistant Professor, SRCW
  • 7. • For 10Base5, a transceiver is clamped securely around the cable so that its tap makes contact with the inner core • The transceiver contains the electronics that handle carrier detection and collision detection • When a collision is detected, the transceiver also puts a special invalid signal on the cable to ensure that all other transceivers also realize that a collision has occurred Dr.T.Thendral, Assistant Professor, SRCW
  • 8. • 10Base5: a transceiver cable or drop cable connects the transceiver to an interface board in the computer • The interface board contains a controller chip that transmits frames to, and receives frames from, the transceiver. • 10Base2: The connection to the cable is just a passive BNC T-junction connector • The transceiver electronics are on the controller board, and each station always has its own transceiver. Dr.T.Thendral, Assistant Professor, SRCW
  • 9. • 10Base-T: There is no shared cable at all, just the hub (a box full of electronics) to which each station is connected by a dedicated (i.e., not shared) cable • A fourth cabling option for Ethernet is 10Base-F, which uses fiber optics • This alternative is expensive due to the cost of the connectors and terminators, but it has excellent noise immunity and is the method of choice when running between buildings Dr.T.Thendral, Assistant Professor, SRCW
  • 10. • A repeater is a physical layer device • It receives, amplifies (regenerates), and retransmits signals in both directions • As far as the software is concerned, a series of cable segments connected by repeaters is no different from a single cable (except for some delay introduced by the repeaters) Dr.T.Thendral, Assistant Professor, SRCW
  • 11. Manchester Encoding • None of the versions of Ethernet uses straight binary encoding with 0 volts for a 0 bit and 5 volts for a 1 bit because it leads to ambiguities • The start, end, or middle of each bit without reference to an external clock • Two such approaches are called Manchester encoding and differential Manchester encoding • With Manchester encoding, each bit period is divided into two equal intervals • A binary 1 bit is sent by having the voltage set high during the first interval and low in the second one • A binary 0 is just the reverse: first low and then high Dr.T.Thendral, Assistant Professor, SRCW
  • 12. Manchester encoding is shown in Fig. 4-16(b) Differential Manchester encoding, shown in Fig. 4-16(c), is a variation of basic Manchester encoding Dr.T.Thendral, Assistant Professor, SRCW
  • 13. The Ethernet MAC Sublayer Protocol • The original DIX (DEC, Intel, Xerox) frame structure is shown in Fig • Each frame starts with a Preamble of 8 bytes • The frame contains two addresses, one for the destination and one for the source • When a frame is sent to a group address, all the stations in the group receive it • Sending to a group of stations is called multicast • The address consisting of all 1 bits is reserved for broadcast Dr.T.Thendral, Assistant Professor, SRCW
  • 15. • Station tries to transmit a very short frame, it is conceivable that a collision occurs, but the transmission completes before the noise burst gets back at 2τ • The sender will then incorrectly conclude that the frame was successfully sent • To prevent this situation from occurring, all frames must take more than 2τ to send so that the transmission is still taking place when the noise burst gets back to the sender. Dr.T.Thendral, Assistant Professor, SRCW
  • 16. • The final Ethernet field is the Checksum • It is effectively a 32-bit hash code of the data • If some data bits are erroneously received (due to noise on the cable), the checksum will almost certainly be wrong and the error will be detected • The checksum algorithm is a cyclic redundancy check (CRC) • It just does error detection, not forward error correction Dr.T.Thendral, Assistant Professor, SRCW
  • 17. The Binary Exponential Backoff Algorithm • In general, after i collisions, a random number between 0 and 2i • - 1 is chosen, and that number of slots is skipped • However, after ten collisions have been reached, the randomization interval is frozen at a maximum of 1023 slots • After 16 collisions, the controller throws in the towel and reports failure back to the computer • Further recovery is up to higher layers • This algorithm, called binary exponential backoff Dr.T.Thendral, Assistant Professor, SRCW
  • 18. Ethernet Performance • The performance of Ethernet under conditions of heavy and constant load, that is, k stations always ready to transmit • A rigorous analysis of the binary exponential backoff algorithm is complicated • Instead, we will follow Metcalfe and Boggs (1976) and assume a constant retransmission probability in each slot • The channel efficiency is plotted versus number of ready stations Dr.T.Thendral, Assistant Professor, SRCW
  • 20. Switched Ethernet • The heart of this system is a switch containing a high- speed backplane and room for typically 4 to 32 plug- in line cards, each containing one to eight connectors • Most often, each connector has a 10Base-T twisted pair connection to a single host computer Dr.T.Thendral, Assistant Professor, SRCW
  • 21. Figure 4-20. A simple example of switched Ethernet. Dr.T.Thendral, Assistant Professor, SRCW
  • 22. Fast Ethernet • To pump up the speed, various industry groups proposed two new ring-based optical LANs • One was called FDDI (Fiber Distributed Data Interface) and the other was called Fibre Channel • In any event, the failure of the optical LANs to catch fire left a gap for garden-variety • Ethernet at speeds above 10 Mbps • Many installations needed more bandwidth and thus had numerous 10-Mbps LANs connected by a maze of repeaters, bridges, routers, and gateways Dr.T.Thendral, Assistant Professor, SRCW
  • 23. • The 802.3 committee decided to go with a souped-up Ethernet for three primary reasons: • 1. The need to be backward compatible with existing Ethernet LANs. • 2. The fear that a new protocol might have unforeseen problems. • 3. The desire to get the job done before the technology changed Dr.T.Thendral, Assistant Professor, SRCW
  • 24. Gigabit Ethernet • Fast Ethernet standard when the 802 committee began working on a yet faster Ethernet (1995) • It was quickly dubbed gigabit Ethernet and was ratified by IEEE in 1998 under the name 802.3z Dr.T.Thendral, Assistant Professor, SRCW
  • 25. • In the simplest gigabit Ethernet configuration, illustrated in Fig. 4-22(a), two computers are directly connected to each other • common case, having a switch or a hub connected to multiple computers • and possibly additional switches or hubs, as shown in Fig. 4- 22(b) • In both configurations each individual Ethernet cable has exactly two devices on it, no more and no fewer Dr.T.Thendral, Assistant Professor, SRCW
  • 27. • Gigabit Ethernet uses new encoding rules on the fibers • The following two rules were used in making the choices: • 1. No codeword may have more than four identical bits in a row. • 2. No codeword may have more than six 0s or six 1s. Dr.T.Thendral, Assistant Professor, SRCW
  • 28. • There are also systems in which an error- controlled, flow-controlled data link protocol is desired • IEEE has defined one that can run on top of Ethernet and the other 802 protocols • In addition, this protocol, called LLC (Logical Link Control) Dr.T.Thendral, Assistant Professor, SRCW
  • 29. • LLC forms the upper half of the data link layer, with the MAC sublayer below it, as shown in Fig • Typical usage of LLC is as follows • The network layer on the sending machine passes a packet to LLC, using the LLC access primitives • The LLC sublayer then adds an LLC header, containing sequence and acknowledgement numbers Dr.T.Thendral, Assistant Professor, SRCW
  • 30. Retrospective on Ethernet • Ethernet has been around for over 20 years and has no serious competitors in sight, so it is likely to be around for many years to come • Few CPU architectures, operating systems, or programming languages have been king of the mountain for two decades going on three • the main reason for it that Ethernet is simple and flexible • Ethernet has been able to evolve in certain crucial ways Dr.T.Thendral, Assistant Professor, SRCW