SlideShare ist ein Scribd-Unternehmen logo
1 von 44
ETHERNET
802.3
WHAT IS ETHERNET ?
Ethernet is a certain type of a
local area network (LAN) which
was developed in 1972 in the
renowned PARC-research facility
of Xerox in Palo Alto by Robert
Metcalfe. In the meantime the
companies Intel, DEC and Xerox
have specified a common
standard that has been
established in the IEEE-standard
802.3.
Ethernet: It is a LAN protocol that
is used in Bus and Star topologies
and implements CSMA/CD as the
HISTORY
1969 student Robert Metcalfe (founder of 3Com in
1979) develops a Host Interface Controller for
DARPA (Defense Advanced Research Projects
Agency) in the company DEC.
1970 the ALOHA-Net (multiple access protocol) is
developed and tested at the university of Hawaii
1972 the idea is picked up by the XEROX Palo Alto
Research Center (Metcalfe works there by then).
The project goal is: experimental Ethernet
HISTORY
1976 the results of the project are published. The
companies DEC, Intel and Xerox join in the
company DIX and complete Ethernet to the market entry
stage.
1980 Ethernet version 1.0 is passed.
1981 IEEE starts standardization efforts. The Ethernet
specification is accepted without major
modifications.
1982 Publication of Ethernet version 2.0
1985 worldwide recognition of the Ethernet standard as
ISO/DIS 8802/3
HISTORY
1986 Publication of the 10Base2- and
10BroadT standards
1987 Standardization of the 10BaseT
spezification
1991 Publication of the 10BaseF standard
1994 more than 10.000 suppliers support the
Ethernet globally
1995 Standardization of the 100 Mbit/s Ethernet
1997 Standardization efforts for the Gigabit
Ethernet and presentation of first
products prior to the completion of the
standard
ETHERNET TCP/IP
Ethernet-
Header
Ethernet-DATA FCS
IP-
Header
IP-DATA
IP-
frame
TCP-
Header
TCP-DATA
TCP-
frame
Ethernet-
frame
LAYER 7
Modbus etc.
ACCESS METHOD:
CSMA/CD
Station is ready to
send
check
“Ether”
Sending of data and
checking the “Ether”
Waiting according
to back-off
algorithm
Medium
occupied
Discovered
collision
medium
available
send
jam signal
No collision
New attempt
BACK-OFF ALGORITHM
If a collision has occurred, the stations try to send
again after a certain period of time.
After the first collision there a two different back-off
times available, from which one is chosen at random.
Transmission probability is 50%
After the second consecutive collision there are four
different back-off times available, from which one is
chosen at random.
The transmission probability now is 75%
DELAY DEPENDING ON THE
NETWORK LOAD
delay
20 % 40 %
30 %
10 % 50 % 60 % 70 % 80 %
Network load
low
high High
throughput
Beginning
problems
Overload
ETHERNET ADDRESS
Also called "MAC address"
Globally unique ID for each device
Burnt into ROM, cannot be modified
Six Bytes in which manufacturer, device model and serial
number are coded
Readable with many auxiliary tools e.g. WINIPCFG
ETHERNET FRAME
Preamb
le
SF
D
DA SA LE
N
FC
S
Pad
Data
7 1 6 6 2 >=46
4
Preamble DA SA Type FCS
Pad
Data
8 6 6 2 >=46
4
Ethernet II DIX Frame:
IEEE 802.3 Frame:
Frame formats.
(a) DIX Ethernet
(b) IEEE 802.3.
802.3 MAC Frame
ETHERNET FRAME
Preamble
Trailer consisting of the bit sequence “0101010101...” serving the bit synchronization
of the receiver.
SFD (Start Frame Delimiter)
Start character consisting of the bit pattern “10101011” showing the recipient that the
actual information will follow now.
DA (Destination Address)
Evaluated by the recipient‘s address filter; only data frames destined for this recipient
will be passed on to the communication software.
SA (Source Address)
Sender‘s address
LEN (Length)
Indicates the length of the subsequent data field in Bytes according to IEEE 802.3.
ETHERNET FRAME
Data and Pad
The data field may contain 46 to 1500 user data bytes. Are there less than
46 bytes the Ethernet controller independently adds padding bytes, until
the total amount (data + pad) is 46. This miminum length is crucial for the
CSMA/CD procedure to work faultlessly. The data field can be used at will,
it only has to contain complete bytes.
FCS (Frame Check Sequence)
A check character. It is obtained by taking the rest of the division operation
from the formula representing the wide-spread cyclic- redundancy-check
procedure. This formula is applied to the bit sequence including the
address field through to the padding field. In case of en error the whole
frame is ignored, i.e. not passed on to the application program.
ETHERNET ADDRESS
WIN-NT: ipconfig /all
ETHERNET MEDIA
NAMING OF THE CABLE TYPES
Example: 10base5
 10 Transmission rate in Mbytes/s
 baseBase or Broadband (data is sent as digital signals through the media as a
single channel that uses the entire bandwidth)
 5 Segment length in 100 meters
UTP unshielded twisted pair
STP shielded twisted pair
S/STP screened shielded twisted pair
Ethernet evolution through four generations
•<data rate><Signaling method><Max segment length or cable type>
10Base5 Implementation
Connection of stations to the medium using 10Base2
10BaseT
• Uses twisted pair Cat3 cable
 Star-wire topology
• A hub functions as a repeater with additional functions
• Fewer cable problems, easier to troubleshoot than coax
• Cable length at most 100 meters
Figure: 10Base-T implementation
Figure: 10Base-F implementation
13.4 FAST ETHERNET
100 Mbps transmission rate
same frame format, media access, and collision
detection rules as 10 Mbps Ethernet
can combine 10 Mbps Ethernet and Fast Ethernet
on same network using a switch
media: twisted pair (CAT 5) or fiber optic cable (no
coax)
Star-wire topology
 Similar to 10BASE-T
CAT 3
CAT 5
Figure 13.19 Fast Ethernet topology
Figure Full-duplex switched Ethernet
Figure Switched Ethernet
GIGABIT ETHERNET
 Speed 1Gpbs
 Minimum frame length is 512 bytes
 Operates in full/half duplex modes
mostly full duplex
IEEE 802.3 CABLE TYPES
Name Cable Max. Max Cable
Segment
Length
Nodes
/segment
10Base5 thick coax 500 meters 100
10Base2 thin coax 185 meters 30
10BaseT twisted pair 100 meters 1
10BaseF Fiber Optic 2Km 1
Toplogy
Bus
Bus
Star
Star
IEEE Standard for LANs
Ethernet address
 Six bytes = 48 bits
 Flat address not hierarchical
 Burned into the NIC ROM
 First three bytes from left specify the vendor. Cisco 00-00-0C, 3Com 02-60-8C and the
last 24 bit should be created uniquely by the company
 Destination Address can be:
 Unicast: second digit from left is even (one recipient)
 Multicast: Second digit from left is odd (group of stations to receive the frame –
conferencing applications)
 Broadcast (ALL ones) (all stations receive the frame)
 Source address is always Unicast
The least significant bit of the first byte
defines the type of address.
If the bit is 0, the address is unicast;
otherwise, it is multicast.
Note
The broadcast destination address is a
special case of the multicast address in
which all bits are 1s.
Note
Unicast and Multicast Address
Frame length:
Minimum: 64 bytes (512 bits)
Maximum: 1518 bytes (12,144 bits)
Note
ETHERNET TOPOLOGIES
Figure: Topologies of Gigabit Ethernet
REPEATER / HUB
Repeater
Hub
BRIDGE
Bridge
A
B
C
D
E F
SWITCH = MULTIPORT BRIDGE
Bridge
Switch
CHARACTERISTICS OF THE
SWITCHES
Cut-Trough Switch
 noc cheking of the data frames
Store-and-Forward
 checking of the data frames
Frames with same destination
 kept in internal short term memory thus queueing them
 discard them or create collision
Broadcast messages
 go to all stations anyway (z.B. ARP) so switches are of no advantage
here
 there are specific approaches of different switch manufacturers to
reduce broadcast data traffic
TYPICAL OFFICE WIRING
Hub/Switch
Hub/Switch
Patch
field
Patch
field Network socket
Patch cable
„normal“ Cat 5 cable
RJ 45

Weitere ähnliche Inhalte

Was ist angesagt?

Chapter 7 - Data Link Control Protocols 9e
Chapter 7 - Data Link Control Protocols 9eChapter 7 - Data Link Control Protocols 9e
Chapter 7 - Data Link Control Protocols 9e
adpeer
 
Virtual Private Network (VPN).
Virtual Private Network (VPN).Virtual Private Network (VPN).
Virtual Private Network (VPN).
Debasis Chowdhury
 

Was ist angesagt? (20)

Transitioning IPv4 to IPv6
Transitioning IPv4 to IPv6Transitioning IPv4 to IPv6
Transitioning IPv4 to IPv6
 
Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)
 
What is merkle tree
What is merkle treeWhat is merkle tree
What is merkle tree
 
Chapter 7 - Data Link Control Protocols 9e
Chapter 7 - Data Link Control Protocols 9eChapter 7 - Data Link Control Protocols 9e
Chapter 7 - Data Link Control Protocols 9e
 
VLAN
VLANVLAN
VLAN
 
What is Network Address Translation (NAT)
What is Network Address Translation (NAT)What is Network Address Translation (NAT)
What is Network Address Translation (NAT)
 
Eclipse IoT Overview
Eclipse IoT OverviewEclipse IoT Overview
Eclipse IoT Overview
 
Chapter1 computer introduction note
Chapter1  computer introduction note Chapter1  computer introduction note
Chapter1 computer introduction note
 
Blockchain
BlockchainBlockchain
Blockchain
 
IPv6 - The Next next generation protocol
IPv6 - The Next next generation protocolIPv6 - The Next next generation protocol
IPv6 - The Next next generation protocol
 
Java socket programming
Java socket programmingJava socket programming
Java socket programming
 
Transmission control protocol
Transmission control protocolTransmission control protocol
Transmission control protocol
 
Introduction to Ethereum Blockchain & Smart Contract
Introduction to Ethereum Blockchain & Smart ContractIntroduction to Ethereum Blockchain & Smart Contract
Introduction to Ethereum Blockchain & Smart Contract
 
Ipv6
Ipv6Ipv6
Ipv6
 
Ch03
Ch03Ch03
Ch03
 
Tunneling vpn security and implementation
Tunneling vpn security and implementationTunneling vpn security and implementation
Tunneling vpn security and implementation
 
Virtual Private Network (VPN).
Virtual Private Network (VPN).Virtual Private Network (VPN).
Virtual Private Network (VPN).
 
IPv6 Fundamentals
IPv6 FundamentalsIPv6 Fundamentals
IPv6 Fundamentals
 
Network layer
Network layerNetwork layer
Network layer
 
Dcn ppt by roma
Dcn ppt by romaDcn ppt by roma
Dcn ppt by roma
 

Ähnlich wie Ethernet 802.3.pptx

CCNA Exam 640-802 Version 9.3
CCNA Exam 640-802 Version 9.3CCNA Exam 640-802 Version 9.3
CCNA Exam 640-802 Version 9.3
Ravi Yasas
 
Aspects Stratégiques des Réseaux
Aspects Stratégiques des RéseauxAspects Stratégiques des Réseaux
Aspects Stratégiques des Réseaux
Eric Vyncke
 
CCNA 200-301 Chapter 2-Fundamentals of Ethernet Lans.pptx
CCNA 200-301 Chapter 2-Fundamentals of Ethernet Lans.pptxCCNA 200-301 Chapter 2-Fundamentals of Ethernet Lans.pptx
CCNA 200-301 Chapter 2-Fundamentals of Ethernet Lans.pptx
BabarYunus1
 

Ähnlich wie Ethernet 802.3.pptx (20)

Networking Basics
Networking BasicsNetworking Basics
Networking Basics
 
Advanced TCP/IP-based Industrial Networking for Engineers & Technicians
Advanced TCP/IP-based Industrial Networking for Engineers & TechniciansAdvanced TCP/IP-based Industrial Networking for Engineers & Technicians
Advanced TCP/IP-based Industrial Networking for Engineers & Technicians
 
CCNA Exam 640-802 Version 9.3
CCNA Exam 640-802 Version 9.3CCNA Exam 640-802 Version 9.3
CCNA Exam 640-802 Version 9.3
 
IEEE standard
IEEE standardIEEE standard
IEEE standard
 
Best fit topology - lo1 part iv
Best fit topology - lo1 part ivBest fit topology - lo1 part iv
Best fit topology - lo1 part iv
 
IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11
 
Local Area Network – Wired LAN
Local Area Network – Wired LANLocal Area Network – Wired LAN
Local Area Network – Wired LAN
 
NET1.PPT
NET1.PPTNET1.PPT
NET1.PPT
 
Week 5 lan topology
Week 5 lan topologyWeek 5 lan topology
Week 5 lan topology
 
Ethernet_Networks
Ethernet_NetworksEthernet_Networks
Ethernet_Networks
 
Ethernet basics
Ethernet basicsEthernet basics
Ethernet basics
 
Ethernet Computer network
Ethernet Computer networkEthernet Computer network
Ethernet Computer network
 
Ethernet
EthernetEthernet
Ethernet
 
IEEE Standards
IEEE StandardsIEEE Standards
IEEE Standards
 
Ccna pres
Ccna presCcna pres
Ccna pres
 
Chap.1 ethernet introduction
Chap.1 ethernet introductionChap.1 ethernet introduction
Chap.1 ethernet introduction
 
Advance ethernet
Advance ethernetAdvance ethernet
Advance ethernet
 
Twisted Pair Ethernet
Twisted Pair EthernetTwisted Pair Ethernet
Twisted Pair Ethernet
 
Aspects Stratégiques des Réseaux
Aspects Stratégiques des RéseauxAspects Stratégiques des Réseaux
Aspects Stratégiques des Réseaux
 
CCNA 200-301 Chapter 2-Fundamentals of Ethernet Lans.pptx
CCNA 200-301 Chapter 2-Fundamentals of Ethernet Lans.pptxCCNA 200-301 Chapter 2-Fundamentals of Ethernet Lans.pptx
CCNA 200-301 Chapter 2-Fundamentals of Ethernet Lans.pptx
 

Kürzlich hochgeladen

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Kürzlich hochgeladen (20)

"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 

Ethernet 802.3.pptx

  • 2. WHAT IS ETHERNET ? Ethernet is a certain type of a local area network (LAN) which was developed in 1972 in the renowned PARC-research facility of Xerox in Palo Alto by Robert Metcalfe. In the meantime the companies Intel, DEC and Xerox have specified a common standard that has been established in the IEEE-standard 802.3. Ethernet: It is a LAN protocol that is used in Bus and Star topologies and implements CSMA/CD as the
  • 3. HISTORY 1969 student Robert Metcalfe (founder of 3Com in 1979) develops a Host Interface Controller for DARPA (Defense Advanced Research Projects Agency) in the company DEC. 1970 the ALOHA-Net (multiple access protocol) is developed and tested at the university of Hawaii 1972 the idea is picked up by the XEROX Palo Alto Research Center (Metcalfe works there by then). The project goal is: experimental Ethernet
  • 4. HISTORY 1976 the results of the project are published. The companies DEC, Intel and Xerox join in the company DIX and complete Ethernet to the market entry stage. 1980 Ethernet version 1.0 is passed. 1981 IEEE starts standardization efforts. The Ethernet specification is accepted without major modifications. 1982 Publication of Ethernet version 2.0 1985 worldwide recognition of the Ethernet standard as ISO/DIS 8802/3
  • 5. HISTORY 1986 Publication of the 10Base2- and 10BroadT standards 1987 Standardization of the 10BaseT spezification 1991 Publication of the 10BaseF standard 1994 more than 10.000 suppliers support the Ethernet globally 1995 Standardization of the 100 Mbit/s Ethernet 1997 Standardization efforts for the Gigabit Ethernet and presentation of first products prior to the completion of the standard
  • 7. ACCESS METHOD: CSMA/CD Station is ready to send check “Ether” Sending of data and checking the “Ether” Waiting according to back-off algorithm Medium occupied Discovered collision medium available send jam signal No collision New attempt
  • 8. BACK-OFF ALGORITHM If a collision has occurred, the stations try to send again after a certain period of time. After the first collision there a two different back-off times available, from which one is chosen at random. Transmission probability is 50% After the second consecutive collision there are four different back-off times available, from which one is chosen at random. The transmission probability now is 75%
  • 9. DELAY DEPENDING ON THE NETWORK LOAD delay 20 % 40 % 30 % 10 % 50 % 60 % 70 % 80 % Network load low high High throughput Beginning problems Overload
  • 10. ETHERNET ADDRESS Also called "MAC address" Globally unique ID for each device Burnt into ROM, cannot be modified Six Bytes in which manufacturer, device model and serial number are coded Readable with many auxiliary tools e.g. WINIPCFG
  • 11. ETHERNET FRAME Preamb le SF D DA SA LE N FC S Pad Data 7 1 6 6 2 >=46 4 Preamble DA SA Type FCS Pad Data 8 6 6 2 >=46 4 Ethernet II DIX Frame: IEEE 802.3 Frame: Frame formats. (a) DIX Ethernet (b) IEEE 802.3.
  • 13. ETHERNET FRAME Preamble Trailer consisting of the bit sequence “0101010101...” serving the bit synchronization of the receiver. SFD (Start Frame Delimiter) Start character consisting of the bit pattern “10101011” showing the recipient that the actual information will follow now. DA (Destination Address) Evaluated by the recipient‘s address filter; only data frames destined for this recipient will be passed on to the communication software. SA (Source Address) Sender‘s address LEN (Length) Indicates the length of the subsequent data field in Bytes according to IEEE 802.3.
  • 14. ETHERNET FRAME Data and Pad The data field may contain 46 to 1500 user data bytes. Are there less than 46 bytes the Ethernet controller independently adds padding bytes, until the total amount (data + pad) is 46. This miminum length is crucial for the CSMA/CD procedure to work faultlessly. The data field can be used at will, it only has to contain complete bytes. FCS (Frame Check Sequence) A check character. It is obtained by taking the rest of the division operation from the formula representing the wide-spread cyclic- redundancy-check procedure. This formula is applied to the bit sequence including the address field through to the padding field. In case of en error the whole frame is ignored, i.e. not passed on to the application program.
  • 17. NAMING OF THE CABLE TYPES Example: 10base5  10 Transmission rate in Mbytes/s  baseBase or Broadband (data is sent as digital signals through the media as a single channel that uses the entire bandwidth)  5 Segment length in 100 meters UTP unshielded twisted pair STP shielded twisted pair S/STP screened shielded twisted pair
  • 18. Ethernet evolution through four generations
  • 19. •<data rate><Signaling method><Max segment length or cable type>
  • 21. Connection of stations to the medium using 10Base2
  • 22. 10BaseT • Uses twisted pair Cat3 cable  Star-wire topology • A hub functions as a repeater with additional functions • Fewer cable problems, easier to troubleshoot than coax • Cable length at most 100 meters
  • 25. 13.4 FAST ETHERNET 100 Mbps transmission rate same frame format, media access, and collision detection rules as 10 Mbps Ethernet can combine 10 Mbps Ethernet and Fast Ethernet on same network using a switch media: twisted pair (CAT 5) or fiber optic cable (no coax) Star-wire topology  Similar to 10BASE-T CAT 3 CAT 5
  • 26. Figure 13.19 Fast Ethernet topology
  • 29. GIGABIT ETHERNET  Speed 1Gpbs  Minimum frame length is 512 bytes  Operates in full/half duplex modes mostly full duplex
  • 30. IEEE 802.3 CABLE TYPES Name Cable Max. Max Cable Segment Length Nodes /segment 10Base5 thick coax 500 meters 100 10Base2 thin coax 185 meters 30 10BaseT twisted pair 100 meters 1 10BaseF Fiber Optic 2Km 1 Toplogy Bus Bus Star Star
  • 32. Ethernet address  Six bytes = 48 bits  Flat address not hierarchical  Burned into the NIC ROM  First three bytes from left specify the vendor. Cisco 00-00-0C, 3Com 02-60-8C and the last 24 bit should be created uniquely by the company  Destination Address can be:  Unicast: second digit from left is even (one recipient)  Multicast: Second digit from left is odd (group of stations to receive the frame – conferencing applications)  Broadcast (ALL ones) (all stations receive the frame)  Source address is always Unicast
  • 33.
  • 34. The least significant bit of the first byte defines the type of address. If the bit is 0, the address is unicast; otherwise, it is multicast. Note
  • 35. The broadcast destination address is a special case of the multicast address in which all bits are 1s. Note
  • 37. Frame length: Minimum: 64 bytes (512 bits) Maximum: 1518 bytes (12,144 bits) Note
  • 39. Figure: Topologies of Gigabit Ethernet
  • 42. SWITCH = MULTIPORT BRIDGE Bridge Switch
  • 43. CHARACTERISTICS OF THE SWITCHES Cut-Trough Switch  noc cheking of the data frames Store-and-Forward  checking of the data frames Frames with same destination  kept in internal short term memory thus queueing them  discard them or create collision Broadcast messages  go to all stations anyway (z.B. ARP) so switches are of no advantage here  there are specific approaches of different switch manufacturers to reduce broadcast data traffic
  • 44. TYPICAL OFFICE WIRING Hub/Switch Hub/Switch Patch field Patch field Network socket Patch cable „normal“ Cat 5 cable RJ 45