SlideShare ist ein Scribd-Unternehmen logo
1 von 48
Underlying Technologies
Ethernet
Computer Networks
Tutun Juhana
Telecommunication Engineering
School of Electrical Engineering & Informatics
Institut Teknologi Bandung
3
WIRED LOCAL AREA NETWORKS
2
• A local area network (LAN) is a computer
network that is designed for a limited
geographic area such as a building or a
campus
• Most LANs today are also linked to a wide
area network (WAN) or the Internet
3
IEEE Standard Project 802, designed to
regulate the manufacturing and
interconnectivity between different LANs
FDDI
Fiber Distributed Data Interface
Token Ring
Token Bus
ATM LAN
4
IEEE Standards
• Project 802 is a way of specifying
functions of the physical layer and the data
link layer of major LAN protocols
5
The Ethernet
• Robert Melancton
"Bob" Metcalfe
(born April 7,1946)
is an electrical
engineer from the
United States who
co-invented
Ethernet
6
Frame Format
‘Length” used by
IEEE standard to
define the number of
bytes in the data field
“Type” used by
original Ethernet to
define upper-layer
protocol using the
frame
7
Frame Length
Reason for the maximum length restriction:
1. To reduce the size of the buffer (memory was very expensive when Ethernet was
designed)
2. It prevents one station from monopolizing the shared medium
• The minimum length restriction is required for the correct operation of CSMA/CD
• If the upper-layer packet is less than 46 bytes, padding is added to make up the
difference
8
Addressing
• Each station on an Ethernet network has its own
network interface card (NIC)
• The NIC provides the station with a 6-byte
physical address
9
• Ethernet Address
– The address normally is referred to as the
data link address, physical address, or MAC
address
10
11
Example:
• 00-14-22 OUI for Dell
• 00-04-DC for Nortel
• 00-40-96 for Cisco
• 00-30-BD for Belkin
• The address is sent left-to-right, byte by byte
• For each byte, it is sent right-to-left, bit by bit
• Example
– Show how the address 47:20:1B:2E:08:EE is sent out
on line
12
Unicast, Multicast, and Broadcast Addresses
• A source address is always a unicast
address
– the frame comes from only one station
• The destination address can be unicast,
multicast, or broadcast
13
• The broadcast address is a special case of
the multicast address; the recipients are all
the stations on the LAN
14
• Define the type of the following destination
addresses
– 4A:30:10:21:10:1A
– 47:20:1B:2E:08:EE
– FF:FF:FF:FF:FF:FF
15
Ethernet Evolution
16
STANDARD ETHERNET
17
Access Method: CSMA/CD
• The IEEE 802.3 standard defines carrier
sense multiple access with collision
detection (CSMA/CD) as the access
method for traditional Ethernet
18
• Stations on a traditional Ethernet can be
connected together using a physical bus or star
topology, but the logical topology is always a bus
19
Physical star, logically bus topology
Physical bus topology
• The medium (channel) is shared between stations and only one station at
a time can use it
• All stations receive a frame sent by a station (broadcasting)
• The real destination keeps the frame while the rest drop it
• How can we be
sure that two
stations are not
using the medium at
the same time?
• If they do, their
frames will collide
with each other
20
21
• To minimize the chance of collision and,
therefore, increase the performance, the
CSMA method was developed
22
• Carrier sense multiple access (CSMA)
requires that each station first listen to the
medium (or check the state of the
medium) before sending
– sense before transmit, or
– listen before talk
• CSMA can reduce the possibility of
collision, but it cannot eliminate it
– The possibility of collision still exists because
of propagation delay 23
Space/time model of a collision in CSMA
24
Collision of the first bit in CSMA/CD
• A transmits for the duration t4 - t1; C transmits for the duration t3 - t2
 for the protocol to work, the length of any frame divided by the bit
rate in this protocol must be more than either of these durations
• Before sending the last bit of the frame, the sending station must
detect a collision, if any, and abort the transmission  because, once
the entire frame is sent, station does not keep a copy of the frame and
does not monitor the line for collision detection 25
Minimum Frame Size
26
The worst collision on a shared bus
http://cnp3book.info.ucl.ac.be/lan/lan/
27
• The frame transmission time Tfr must be at
least two times the maximum propagation
time Tp
• Example
– In the standard Ethernet, if the maximum
propagation time is 25.6 μs, what is the
minimum size of the frame?
28
CSMA/CD flow diagram
29
The station transmits
and receives
continuously and
simultaneously
(using two different
ports)
Implementation
30
FAST ETHERNET
31
• IEEE created Fast Ethernet under the name 802.3u
• Fast Ethernet is backward-compatible with Standard
Ethernet, but 10 times faster (100 Mbps)
• The goals of Fast Ethernet:
1. Upgrade the data rate to 100 Mbps
2. Make it compatible with Standard Ethernet
3. Keep the same 48-bit address.
4. Keep the same frame format.
5. Keep the same minimum and maximum frame lengths
32
MAC Sublayer
• Keep only the star topology
– There are two choices: half duplex and full duplex
– In the half-duplex approach, the stations are
connected via a hub
– in the full-duplex approach, the connection is made
via a switch with buffers at each port
• The access method is the same (CSMA/CD) for
the half-duplex approach
• For full-duplex there is no need for CSMA/CD
– The implementations keep CSMA/CD for backward
compatibility with Standard Ethernet
33
Autonegotiation
• Autonegotiation allows two
devices to negotiate the mode
or data rate of operation
• It was designed particularly for
the following purposes:
– To allow incompatible devices to
connect to one another
– To allow one device to have
multiple capabilities
– To allow a station to check a
hub’s capabilities.
34
Implementation
35
GIGABIT ETHERNET
36
• Gigabit Ethernet (IEEE 802.3z)
• The goals of the Gigabit Ethernet:
1. Upgrade the data rate to 1 Gbps
2. Make it compatible with Standard or Fast Ethernet
3. Use the same 48-bit address
4. Use the same frame format
5. Keep the same minimum and maximum frame
lengths.
6. To support autonegotiation as defined in Fast
Ethernet
37
MAC Sublayer
• A main consideration: keep the MAC
sublayer untouched  To achieve a data
rate of 1 Gbps, this was no longer possible
• Gigabit Ethernet has two distinctive
approaches for medium access
1. Half-duplex
2. Full-duplex
• Almost all implementations of Gigabit
Ethernet follow the full-duplex approach
38
Full-Duplex Mode
• There is a central switch connected to all
computers or other switches
– Each switch has buffers for each input port in which
data are stored until they are transmitted
• There is no collision in this mode  CSMA/CD
is not used
• The maximum length of the cable is determined
by the signal attenuation in the cable, not by the
collision detection process
39
Half-Duplex Mode
• A switch can be replaced by a hub  a
collision might occur  CSMA/CD is used
 the maximum length of the network is
totally dependent on the minimum frame
size
• Three solutions have been defined:
1. Traditional
2. Carrier extension
3. Frame bursting
40
• Traditional approach
– Keep the minimum frame length 512 bits
– The maximum network length only 25 m
(because the length of a bit is 1/100 shorter
than in standard Ethernet)
• It may not even be long enough to connect the
computers in one single office
41
• Carrier Extension
– Increase the minimum frame length  512 bytes (4096 bits) 
8 times longer
– It forces a station to add extension bits (padding) to any frame
that is less than 4096 bits
– The maximum length of the network can be increased 8 times
to a length of 200 m
– This allows a length of 100 m from the hub to the station
42
RRRRRRRRRRRRRFrame
Carrier Extension
512 bytes
Carrier Extension is very inefficient if we
have a series of short frames to send (each
frame carries redundant data)
43
• Frame Bursting
– To improve efficiency, frame bursting was proposed
– Instead of adding an extension to each frame,
multiple frames are sent
• To make these multiple frames look like one frame, padding
is added between the frames (96 bits) so that the channel is
not idle  The method deceives other stations into thinking
that a very large frame has been transmitted
44
512 bytes
ExtensionFrame Frame Frame Frame
Frame burst
Maximum frame burst is 8192 bytes
Gigabit Ethernet Implementation
45
TEN-GIGABIT ETHERNET
46
• Ten-Gigabit Ethernet standard : IEEE802.3ae
• The goals :
1. Upgrade the data rate to 10 Gbps.
2. Make it compatible with Standard, Fast, and Gigabit Ethernet.
3. Use the same 48-bit address.
4. Use the same frame format.
5. Keep the same minimum and maximum frame lengths.
6. Allow the interconnection of existing LANs into a metropolitan
area network (MAN) or a wide area network (WAN)
7. Make Ethernet compatible with technologies such as Frame
Relay and ATM.
47
Implementation
• Ten-Gigabit Ethernet operates only in full
duplex mode  no need for contention 
CSMA/CD is not used
48

Weitere ähnliche Inhalte

Was ist angesagt?

Network layer
Network layerNetwork layer
Network layersbkbca
 
Network layer ip address assignment and routing
Network layer ip address assignment and routingNetwork layer ip address assignment and routing
Network layer ip address assignment and routingHamzahMohammed4
 
Final Presentation on the Network layer
Final Presentation on the Network layerFinal Presentation on the Network layer
Final Presentation on the Network layerZee Haak
 
Routing table and routing algorithms
Routing table and routing algorithmsRouting table and routing algorithms
Routing table and routing algorithmslavanyapathy
 
Ethernet protocol
Ethernet protocolEthernet protocol
Ethernet protocolTom Chou
 
Lecture 3 network layer
Lecture 3 network layerLecture 3 network layer
Lecture 3 network layerRonoh Kennedy
 
Ethernet 19 20
Ethernet 19 20Ethernet 19 20
Ethernet 19 20rajeshvbe
 
IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5Vicky Kumar
 
Computer Network
Computer NetworkComputer Network
Computer NetworkRubaya Mim
 
Ethernet,token ring
Ethernet,token ring Ethernet,token ring
Ethernet,token ring Hareem Naz
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network LayerManoj Kumar
 
Computer networks unit ii
Computer networks    unit iiComputer networks    unit ii
Computer networks unit iiJAIGANESH SEKAR
 
Networking and Data Communications
Networking and Data CommunicationsNetworking and Data Communications
Networking and Data Communicationskuramartin
 

Was ist angesagt? (20)

Media Access Layer
Media Access LayerMedia Access Layer
Media Access Layer
 
Network layer
Network layerNetwork layer
Network layer
 
Network layer ip address assignment and routing
Network layer ip address assignment and routingNetwork layer ip address assignment and routing
Network layer ip address assignment and routing
 
Final Presentation on the Network layer
Final Presentation on the Network layerFinal Presentation on the Network layer
Final Presentation on the Network layer
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Routing
RoutingRouting
Routing
 
Mod5
Mod5Mod5
Mod5
 
Routing table and routing algorithms
Routing table and routing algorithmsRouting table and routing algorithms
Routing table and routing algorithms
 
Ethernet protocol
Ethernet protocolEthernet protocol
Ethernet protocol
 
Lecture 3 network layer
Lecture 3 network layerLecture 3 network layer
Lecture 3 network layer
 
Ethernet 19 20
Ethernet 19 20Ethernet 19 20
Ethernet 19 20
 
IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5
 
Computer Network
Computer NetworkComputer Network
Computer Network
 
IP Routing
IP RoutingIP Routing
IP Routing
 
Ethernet,token ring
Ethernet,token ring Ethernet,token ring
Ethernet,token ring
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network Layer
 
Computer networks unit ii
Computer networks    unit iiComputer networks    unit ii
Computer networks unit ii
 
Networking and Data Communications
Networking and Data CommunicationsNetworking and Data Communications
Networking and Data Communications
 
Link state routing protocol
Link state routing protocolLink state routing protocol
Link state routing protocol
 
Network layer logical addressing
Network layer logical addressingNetwork layer logical addressing
Network layer logical addressing
 

Andere mochten auch

Andere mochten auch (6)

Direct Link Lan
Direct Link LanDirect Link Lan
Direct Link Lan
 
Arp
ArpArp
Arp
 
Ch12
Ch12Ch12
Ch12
 
Ethernet tutorial
Ethernet tutorialEthernet tutorial
Ethernet tutorial
 
Ethernet technology
Ethernet technologyEthernet technology
Ethernet technology
 
Ethernet - Networking presentation
Ethernet - Networking presentationEthernet - Networking presentation
Ethernet - Networking presentation
 

Ähnlich wie Et3003 sem2-1314-3 ethernets

Ähnlich wie Et3003 sem2-1314-3 ethernets (20)

IEEE standard
IEEE standardIEEE standard
IEEE standard
 
Lan basic
Lan basicLan basic
Lan basic
 
ETHERNET IEEE802.pptx
ETHERNET IEEE802.pptxETHERNET IEEE802.pptx
ETHERNET IEEE802.pptx
 
Fast_Ethernet.ppt
Fast_Ethernet.pptFast_Ethernet.ppt
Fast_Ethernet.ppt
 
Network architecture
Network architectureNetwork architecture
Network architecture
 
FAST ETHERNET
FAST ETHERNET FAST ETHERNET
FAST ETHERNET
 
Chapter-10.pptx
Chapter-10.pptxChapter-10.pptx
Chapter-10.pptx
 
Advance ethernet
Advance ethernetAdvance ethernet
Advance ethernet
 
01 coms 525 tcpip - networking concepts review
01   coms 525 tcpip - networking concepts review01   coms 525 tcpip - networking concepts review
01 coms 525 tcpip - networking concepts review
 
Communication Networks basics and very important topic
Communication Networks basics and very important topicCommunication Networks basics and very important topic
Communication Networks basics and very important topic
 
Computer Networks IEEE 802.3 standard-2021.pptx
Computer Networks IEEE 802.3 standard-2021.pptxComputer Networks IEEE 802.3 standard-2021.pptx
Computer Networks IEEE 802.3 standard-2021.pptx
 
Basic switch and switch configuration.pptx
Basic switch and switch configuration.pptxBasic switch and switch configuration.pptx
Basic switch and switch configuration.pptx
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
QSpiders - Dod Model
QSpiders - Dod ModelQSpiders - Dod Model
QSpiders - Dod Model
 
ethernet nn
ethernet                                         nnethernet                                         nn
ethernet nn
 
CCNA BASIC SWITCHING AND SWITCH CONFIGURATION
CCNA BASIC SWITCHING AND SWITCH CONFIGURATIONCCNA BASIC SWITCHING AND SWITCH CONFIGURATION
CCNA BASIC SWITCHING AND SWITCH CONFIGURATION
 
IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11
 
CISSP - Chapter 4 - Network Topology
CISSP - Chapter 4 - Network TopologyCISSP - Chapter 4 - Network Topology
CISSP - Chapter 4 - Network Topology
 
Lan
LanLan
Lan
 
Cn blue tooth
Cn blue toothCn blue tooth
Cn blue tooth
 

Mehr von Tutun Juhana

What should you prepare for industry 4.0 era
What should you prepare for industry 4.0 eraWhat should you prepare for industry 4.0 era
What should you prepare for industry 4.0 eraTutun Juhana
 
Internet of Things Security
Internet of Things SecurityInternet of Things Security
Internet of Things SecurityTutun Juhana
 
ET4045-3-attacks-1
ET4045-3-attacks-1ET4045-3-attacks-1
ET4045-3-attacks-1Tutun Juhana
 
ET4045-2-cryptography-3
ET4045-2-cryptography-3ET4045-2-cryptography-3
ET4045-2-cryptography-3Tutun Juhana
 
ET4045-2-cryptography-2
ET4045-2-cryptography-2ET4045-2-cryptography-2
ET4045-2-cryptography-2Tutun Juhana
 
ET4045-2-cryptography-1-2014
ET4045-2-cryptography-1-2014ET4045-2-cryptography-1-2014
ET4045-2-cryptography-1-2014Tutun Juhana
 
ET4045-1-Introduction-2014
ET4045-1-Introduction-2014ET4045-1-Introduction-2014
ET4045-1-Introduction-2014Tutun Juhana
 
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)Tutun Juhana
 
Switching Techniques (Lecture #2 ET3003 Sem1 2014/2015)
Switching Techniques (Lecture #2 ET3003 Sem1 2014/2015)Switching Techniques (Lecture #2 ET3003 Sem1 2014/2015)
Switching Techniques (Lecture #2 ET3003 Sem1 2014/2015)Tutun Juhana
 
Introduction to Computer Networks (Lecture #1 ET3003 Sem1 2014/2015)
Introduction to Computer Networks (Lecture #1 ET3003 Sem1 2014/2015)Introduction to Computer Networks (Lecture #1 ET3003 Sem1 2014/2015)
Introduction to Computer Networks (Lecture #1 ET3003 Sem1 2014/2015)Tutun Juhana
 
Et3003 sem2-1314-10 vlans
Et3003 sem2-1314-10 vlansEt3003 sem2-1314-10 vlans
Et3003 sem2-1314-10 vlansTutun Juhana
 
ET3003-1 introduction (Semester II 2013-2014)
ET3003-1 introduction (Semester II 2013-2014)ET3003-1 introduction (Semester II 2013-2014)
ET3003-1 introduction (Semester II 2013-2014)Tutun Juhana
 
ET3003-2 OSI-TCPIP (Semester II 2013-2014)
ET3003-2 OSI-TCPIP (Semester II 2013-2014)ET3003-2 OSI-TCPIP (Semester II 2013-2014)
ET3003-2 OSI-TCPIP (Semester II 2013-2014)Tutun Juhana
 
6 2 transport layer (tcp)
6 2 transport layer (tcp)6 2 transport layer (tcp)
6 2 transport layer (tcp)Tutun Juhana
 
Transport Layer (UDP)
Transport Layer (UDP)Transport Layer (UDP)
Transport Layer (UDP)Tutun Juhana
 
Network layer Part 7
Network layer Part 7Network layer Part 7
Network layer Part 7Tutun Juhana
 
Transport Layer Part 1
Transport Layer Part 1Transport Layer Part 1
Transport Layer Part 1Tutun Juhana
 

Mehr von Tutun Juhana (20)

What should you prepare for industry 4.0 era
What should you prepare for industry 4.0 eraWhat should you prepare for industry 4.0 era
What should you prepare for industry 4.0 era
 
Internet of Things Security
Internet of Things SecurityInternet of Things Security
Internet of Things Security
 
ET4045-3-attacks-1
ET4045-3-attacks-1ET4045-3-attacks-1
ET4045-3-attacks-1
 
ET4045-2-cryptography-3
ET4045-2-cryptography-3ET4045-2-cryptography-3
ET4045-2-cryptography-3
 
ET4045-2-cryptography-2
ET4045-2-cryptography-2ET4045-2-cryptography-2
ET4045-2-cryptography-2
 
ET4045-2-cryptography-1-2014
ET4045-2-cryptography-1-2014ET4045-2-cryptography-1-2014
ET4045-2-cryptography-1-2014
 
ET4045-1-Introduction-2014
ET4045-1-Introduction-2014ET4045-1-Introduction-2014
ET4045-1-Introduction-2014
 
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
 
Switching Techniques (Lecture #2 ET3003 Sem1 2014/2015)
Switching Techniques (Lecture #2 ET3003 Sem1 2014/2015)Switching Techniques (Lecture #2 ET3003 Sem1 2014/2015)
Switching Techniques (Lecture #2 ET3003 Sem1 2014/2015)
 
Introduction to Computer Networks (Lecture #1 ET3003 Sem1 2014/2015)
Introduction to Computer Networks (Lecture #1 ET3003 Sem1 2014/2015)Introduction to Computer Networks (Lecture #1 ET3003 Sem1 2014/2015)
Introduction to Computer Networks (Lecture #1 ET3003 Sem1 2014/2015)
 
Et3003 sem2-1314-10 vlans
Et3003 sem2-1314-10 vlansEt3003 sem2-1314-10 vlans
Et3003 sem2-1314-10 vlans
 
ET3003-1 introduction (Semester II 2013-2014)
ET3003-1 introduction (Semester II 2013-2014)ET3003-1 introduction (Semester II 2013-2014)
ET3003-1 introduction (Semester II 2013-2014)
 
ET3003-2 OSI-TCPIP (Semester II 2013-2014)
ET3003-2 OSI-TCPIP (Semester II 2013-2014)ET3003-2 OSI-TCPIP (Semester II 2013-2014)
ET3003-2 OSI-TCPIP (Semester II 2013-2014)
 
IPv6 Introduction
IPv6 IntroductionIPv6 Introduction
IPv6 Introduction
 
6 2 transport layer (tcp)
6 2 transport layer (tcp)6 2 transport layer (tcp)
6 2 transport layer (tcp)
 
VLANs
VLANsVLANs
VLANs
 
Application Layer
Application LayerApplication Layer
Application Layer
 
Transport Layer (UDP)
Transport Layer (UDP)Transport Layer (UDP)
Transport Layer (UDP)
 
Network layer Part 7
Network layer Part 7Network layer Part 7
Network layer Part 7
 
Transport Layer Part 1
Transport Layer Part 1Transport Layer Part 1
Transport Layer Part 1
 

Kürzlich hochgeladen

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 

Kürzlich hochgeladen (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Et3003 sem2-1314-3 ethernets

  • 1. Underlying Technologies Ethernet Computer Networks Tutun Juhana Telecommunication Engineering School of Electrical Engineering & Informatics Institut Teknologi Bandung 3
  • 2. WIRED LOCAL AREA NETWORKS 2
  • 3. • A local area network (LAN) is a computer network that is designed for a limited geographic area such as a building or a campus • Most LANs today are also linked to a wide area network (WAN) or the Internet 3
  • 4. IEEE Standard Project 802, designed to regulate the manufacturing and interconnectivity between different LANs FDDI Fiber Distributed Data Interface Token Ring Token Bus ATM LAN 4
  • 5. IEEE Standards • Project 802 is a way of specifying functions of the physical layer and the data link layer of major LAN protocols 5
  • 6. The Ethernet • Robert Melancton "Bob" Metcalfe (born April 7,1946) is an electrical engineer from the United States who co-invented Ethernet 6
  • 7. Frame Format ‘Length” used by IEEE standard to define the number of bytes in the data field “Type” used by original Ethernet to define upper-layer protocol using the frame 7
  • 8. Frame Length Reason for the maximum length restriction: 1. To reduce the size of the buffer (memory was very expensive when Ethernet was designed) 2. It prevents one station from monopolizing the shared medium • The minimum length restriction is required for the correct operation of CSMA/CD • If the upper-layer packet is less than 46 bytes, padding is added to make up the difference 8
  • 9. Addressing • Each station on an Ethernet network has its own network interface card (NIC) • The NIC provides the station with a 6-byte physical address 9
  • 10. • Ethernet Address – The address normally is referred to as the data link address, physical address, or MAC address 10
  • 11. 11 Example: • 00-14-22 OUI for Dell • 00-04-DC for Nortel • 00-40-96 for Cisco • 00-30-BD for Belkin
  • 12. • The address is sent left-to-right, byte by byte • For each byte, it is sent right-to-left, bit by bit • Example – Show how the address 47:20:1B:2E:08:EE is sent out on line 12
  • 13. Unicast, Multicast, and Broadcast Addresses • A source address is always a unicast address – the frame comes from only one station • The destination address can be unicast, multicast, or broadcast 13
  • 14. • The broadcast address is a special case of the multicast address; the recipients are all the stations on the LAN 14
  • 15. • Define the type of the following destination addresses – 4A:30:10:21:10:1A – 47:20:1B:2E:08:EE – FF:FF:FF:FF:FF:FF 15
  • 18. Access Method: CSMA/CD • The IEEE 802.3 standard defines carrier sense multiple access with collision detection (CSMA/CD) as the access method for traditional Ethernet 18
  • 19. • Stations on a traditional Ethernet can be connected together using a physical bus or star topology, but the logical topology is always a bus 19 Physical star, logically bus topology Physical bus topology • The medium (channel) is shared between stations and only one station at a time can use it • All stations receive a frame sent by a station (broadcasting) • The real destination keeps the frame while the rest drop it
  • 20. • How can we be sure that two stations are not using the medium at the same time? • If they do, their frames will collide with each other 20
  • 21. 21
  • 22. • To minimize the chance of collision and, therefore, increase the performance, the CSMA method was developed 22
  • 23. • Carrier sense multiple access (CSMA) requires that each station first listen to the medium (or check the state of the medium) before sending – sense before transmit, or – listen before talk • CSMA can reduce the possibility of collision, but it cannot eliminate it – The possibility of collision still exists because of propagation delay 23
  • 24. Space/time model of a collision in CSMA 24
  • 25. Collision of the first bit in CSMA/CD • A transmits for the duration t4 - t1; C transmits for the duration t3 - t2  for the protocol to work, the length of any frame divided by the bit rate in this protocol must be more than either of these durations • Before sending the last bit of the frame, the sending station must detect a collision, if any, and abort the transmission  because, once the entire frame is sent, station does not keep a copy of the frame and does not monitor the line for collision detection 25
  • 26. Minimum Frame Size 26 The worst collision on a shared bus http://cnp3book.info.ucl.ac.be/lan/lan/
  • 27. 27 • The frame transmission time Tfr must be at least two times the maximum propagation time Tp
  • 28. • Example – In the standard Ethernet, if the maximum propagation time is 25.6 μs, what is the minimum size of the frame? 28
  • 29. CSMA/CD flow diagram 29 The station transmits and receives continuously and simultaneously (using two different ports)
  • 32. • IEEE created Fast Ethernet under the name 802.3u • Fast Ethernet is backward-compatible with Standard Ethernet, but 10 times faster (100 Mbps) • The goals of Fast Ethernet: 1. Upgrade the data rate to 100 Mbps 2. Make it compatible with Standard Ethernet 3. Keep the same 48-bit address. 4. Keep the same frame format. 5. Keep the same minimum and maximum frame lengths 32
  • 33. MAC Sublayer • Keep only the star topology – There are two choices: half duplex and full duplex – In the half-duplex approach, the stations are connected via a hub – in the full-duplex approach, the connection is made via a switch with buffers at each port • The access method is the same (CSMA/CD) for the half-duplex approach • For full-duplex there is no need for CSMA/CD – The implementations keep CSMA/CD for backward compatibility with Standard Ethernet 33
  • 34. Autonegotiation • Autonegotiation allows two devices to negotiate the mode or data rate of operation • It was designed particularly for the following purposes: – To allow incompatible devices to connect to one another – To allow one device to have multiple capabilities – To allow a station to check a hub’s capabilities. 34
  • 37. • Gigabit Ethernet (IEEE 802.3z) • The goals of the Gigabit Ethernet: 1. Upgrade the data rate to 1 Gbps 2. Make it compatible with Standard or Fast Ethernet 3. Use the same 48-bit address 4. Use the same frame format 5. Keep the same minimum and maximum frame lengths. 6. To support autonegotiation as defined in Fast Ethernet 37
  • 38. MAC Sublayer • A main consideration: keep the MAC sublayer untouched  To achieve a data rate of 1 Gbps, this was no longer possible • Gigabit Ethernet has two distinctive approaches for medium access 1. Half-duplex 2. Full-duplex • Almost all implementations of Gigabit Ethernet follow the full-duplex approach 38
  • 39. Full-Duplex Mode • There is a central switch connected to all computers or other switches – Each switch has buffers for each input port in which data are stored until they are transmitted • There is no collision in this mode  CSMA/CD is not used • The maximum length of the cable is determined by the signal attenuation in the cable, not by the collision detection process 39
  • 40. Half-Duplex Mode • A switch can be replaced by a hub  a collision might occur  CSMA/CD is used  the maximum length of the network is totally dependent on the minimum frame size • Three solutions have been defined: 1. Traditional 2. Carrier extension 3. Frame bursting 40
  • 41. • Traditional approach – Keep the minimum frame length 512 bits – The maximum network length only 25 m (because the length of a bit is 1/100 shorter than in standard Ethernet) • It may not even be long enough to connect the computers in one single office 41
  • 42. • Carrier Extension – Increase the minimum frame length  512 bytes (4096 bits)  8 times longer – It forces a station to add extension bits (padding) to any frame that is less than 4096 bits – The maximum length of the network can be increased 8 times to a length of 200 m – This allows a length of 100 m from the hub to the station 42 RRRRRRRRRRRRRFrame Carrier Extension 512 bytes
  • 43. Carrier Extension is very inefficient if we have a series of short frames to send (each frame carries redundant data) 43
  • 44. • Frame Bursting – To improve efficiency, frame bursting was proposed – Instead of adding an extension to each frame, multiple frames are sent • To make these multiple frames look like one frame, padding is added between the frames (96 bits) so that the channel is not idle  The method deceives other stations into thinking that a very large frame has been transmitted 44 512 bytes ExtensionFrame Frame Frame Frame Frame burst Maximum frame burst is 8192 bytes
  • 47. • Ten-Gigabit Ethernet standard : IEEE802.3ae • The goals : 1. Upgrade the data rate to 10 Gbps. 2. Make it compatible with Standard, Fast, and Gigabit Ethernet. 3. Use the same 48-bit address. 4. Use the same frame format. 5. Keep the same minimum and maximum frame lengths. 6. Allow the interconnection of existing LANs into a metropolitan area network (MAN) or a wide area network (WAN) 7. Make Ethernet compatible with technologies such as Frame Relay and ATM. 47
  • 48. Implementation • Ten-Gigabit Ethernet operates only in full duplex mode  no need for contention  CSMA/CD is not used 48