Ethernet.ppt

Ethernet
Dr.T.Thendral, Assistant Professor, SRCW
• Ethernet Cabling
• Manchester Encoding
• The Ethernet MAC Sublayer Protocol
• The Binary Exponential Backoff Algorithm
• Ethernet Performance
• Switched Ethernet
• Fast Ethernet
• Gigabit Ethernet
• IEEE 802.2: Logical Link Control
• Retrospective on Ethernet
Dr.T.Thendral, Assistant Professor, SRCW
Ethernet Cabling
• Finished our general discussion of channel allocation
protocols
• It is time to see how these principles apply to real
systems, in particular, LANs
• IEEE has standardized a number of local area networks
and metropolitan area networks under the name of
IEEE 802
• The most important of the survivors are 802.3
(Ethernet) and 802.11 (wireless LAN)
• With 802.15 (Bluetooth) and 802.16 (wireless MAN)
• Ethernet, the protocols and recent developments in
highspeed (gigabit) Ethernet
Dr.T.Thendral, Assistant Professor, SRCW
Ethernet Cabling
• ''Ethernet'' refers to the cable (the ether)
• Four types of cabling are commonly used, as
shown in Fig
Dr.T.Thendral, Assistant Professor, SRCW
• Detecting cable breaks, excessive length, bad taps, or loose
connectors can be a major problem with this media
• For this reason, techniques have been developed to track them
down
• Basically, a pulse of known shape is injected into the cable
• If the pulse hits an obstacle or the end of the cable, an echo will be
generated and sent back
• By carefully timing the interval between sending the pulse and
receiving the echo, it is possible to localize the origin of the echo
• This technique is called time domain reflectometry
• The problems associated with finding cable breaks drove systems
toward a different kind of wiring pattern, in which all stations have
a cable running to a central hub in which they are all connected
electrically
Dr.T.Thendral, Assistant Professor, SRCW
• Three wiring schemes are illustrated in Fig
Dr.T.Thendral, Assistant Professor, SRCW
• For 10Base5, a transceiver is clamped securely
around the cable so that its tap makes contact
with the inner core
• The transceiver contains the electronics that
handle carrier detection and collision detection
• When a collision is detected, the transceiver also
puts a special invalid signal on the cable to ensure
that all other transceivers also realize that a
collision has occurred
Dr.T.Thendral, Assistant Professor, SRCW
• 10Base5: a transceiver cable or drop cable
connects the transceiver to an interface board in
the computer
• The interface board contains a controller chip
that transmits frames to, and receives frames
from, the transceiver.
• 10Base2: The connection to the cable is just a
passive BNC T-junction connector
• The transceiver electronics are on the controller
board, and each station always has its own
transceiver.
Dr.T.Thendral, Assistant Professor, SRCW
• 10Base-T: There is no shared cable at all, just the
hub (a box full of electronics) to which each
station is connected by a dedicated (i.e., not
shared) cable
• A fourth cabling option for Ethernet is 10Base-F,
which uses fiber optics
• This alternative is expensive due to the cost of
the connectors and terminators, but it has
excellent noise immunity and is the method of
choice when running between buildings
Dr.T.Thendral, Assistant Professor, SRCW
• A repeater is a physical layer device
• It receives, amplifies (regenerates), and retransmits signals in both
directions
• As far as the software is concerned, a series of cable segments
connected by repeaters is no different from a single cable (except
for some delay introduced by the repeaters)
Dr.T.Thendral, Assistant Professor, SRCW
Manchester Encoding
• None of the versions of Ethernet uses straight binary encoding
with 0 volts for a 0 bit and 5 volts for a 1 bit because it leads to
ambiguities
• The start, end, or middle of each bit without reference to an
external clock
• Two such approaches are called Manchester encoding and
differential Manchester encoding
• With Manchester encoding, each bit period is divided into two
equal intervals
• A binary 1 bit is sent by having the voltage set high during
the first interval and low in the second one
• A binary 0 is just the reverse: first low and then high
Dr.T.Thendral, Assistant Professor, SRCW
Manchester encoding is shown in Fig. 4-16(b)
Differential Manchester encoding, shown in Fig. 4-16(c), is a variation of basic
Manchester encoding
Dr.T.Thendral, Assistant Professor, SRCW
The Ethernet MAC Sublayer Protocol
• The original DIX (DEC, Intel, Xerox) frame
structure is shown in Fig
• Each frame starts with a Preamble of 8 bytes
• The frame contains two addresses, one for the
destination and one for the source
• When a frame is sent to a group address, all the
stations in the group receive it
• Sending to a group of stations is called multicast
• The address consisting of all 1 bits is reserved for
broadcast
Dr.T.Thendral, Assistant Professor, SRCW
Dr.T.Thendral, Assistant Professor, SRCW
• Station tries to transmit a very short frame, it is conceivable that
a collision occurs, but the transmission completes before the
noise burst gets back at 2τ
• The sender will then incorrectly conclude that the frame was
successfully sent
• To prevent this situation from occurring, all frames must take
more than 2τ to send so that the transmission is still taking place
when the noise burst gets back to the sender.
Dr.T.Thendral, Assistant Professor, SRCW
• The final Ethernet field is the Checksum
• It is effectively a 32-bit hash code of the data
• If some data bits are erroneously received (due to
noise on the cable), the checksum will almost
certainly be wrong and the error will be detected
• The checksum algorithm is a cyclic redundancy check
(CRC)
• It just does error detection, not forward error
correction
Dr.T.Thendral, Assistant Professor, SRCW
The Binary Exponential Backoff Algorithm
• In general, after i collisions, a random number between 0 and
2i
• - 1 is chosen, and that number of slots is skipped
• However, after ten collisions have been reached, the
randomization interval is frozen at a maximum of 1023 slots
• After 16 collisions, the controller throws in the towel and
reports failure back to the computer
• Further recovery is up to higher layers
• This algorithm, called binary exponential backoff
Dr.T.Thendral, Assistant Professor, SRCW
Ethernet Performance
• The performance of Ethernet under conditions of heavy and
constant load, that is, k stations always ready to transmit
• A rigorous analysis of the binary exponential backoff
algorithm is complicated
• Instead, we will follow Metcalfe and Boggs (1976) and
assume a constant retransmission probability in each slot
• The channel efficiency is plotted versus number of ready
stations
Dr.T.Thendral, Assistant Professor, SRCW
Dr.T.Thendral, Assistant Professor, SRCW
Switched Ethernet
• The heart of this system is a switch containing a high-
speed backplane and room for typically 4 to 32 plug-
in line cards, each containing one to eight connectors
• Most often, each connector has a 10Base-T twisted
pair connection to a single host computer
Dr.T.Thendral, Assistant Professor, SRCW
Figure 4-20. A simple example of switched Ethernet.
Dr.T.Thendral, Assistant Professor, SRCW
Fast Ethernet
• To pump up the speed, various industry groups
proposed two new ring-based optical LANs
• One was called FDDI (Fiber Distributed Data
Interface) and the other was called Fibre Channel
• In any event, the failure of the optical LANs to
catch fire left a gap for garden-variety
• Ethernet at speeds above 10 Mbps
• Many installations needed more bandwidth and
thus had numerous 10-Mbps LANs connected by
a maze of repeaters, bridges, routers, and
gateways
Dr.T.Thendral, Assistant Professor, SRCW
• The 802.3 committee decided to go with a
souped-up Ethernet for three primary reasons:
• 1. The need to be backward compatible with
existing Ethernet LANs.
• 2. The fear that a new protocol might have
unforeseen problems.
• 3. The desire to get the job done before the
technology changed
Dr.T.Thendral, Assistant Professor, SRCW
Gigabit Ethernet
• Fast Ethernet standard when the 802
committee began working on a yet faster
Ethernet (1995)
• It was quickly dubbed gigabit Ethernet and
was ratified by IEEE in 1998 under the name
802.3z
Dr.T.Thendral, Assistant Professor, SRCW
• In the simplest gigabit Ethernet configuration, illustrated in
Fig. 4-22(a), two computers are directly connected to each
other
• common case, having a switch or a hub connected to multiple
computers
• and possibly additional switches or hubs, as shown in Fig. 4-
22(b)
• In both configurations each individual Ethernet cable has
exactly two devices on it, no more and no fewer
Dr.T.Thendral, Assistant Professor, SRCW
Dr.T.Thendral, Assistant Professor, SRCW
• Gigabit Ethernet uses new encoding rules on the
fibers
• The following two rules were used in making the
choices:
• 1. No codeword may have more than four identical
bits in a row.
• 2. No codeword may have more than six 0s or six 1s.
Dr.T.Thendral, Assistant Professor, SRCW
• There are also systems in which an error-
controlled, flow-controlled data link protocol
is desired
• IEEE has defined one that can run on top of
Ethernet and the other 802 protocols
• In addition, this protocol, called LLC (Logical
Link Control)
Dr.T.Thendral, Assistant Professor, SRCW
• LLC forms the upper half of the data link layer, with the
MAC sublayer below it, as shown in Fig
• Typical usage of LLC is as follows
• The network layer on the sending machine passes a packet to
LLC, using the LLC access primitives
• The LLC sublayer then adds an LLC header, containing
sequence and acknowledgement numbers
Dr.T.Thendral, Assistant Professor, SRCW
Retrospective on Ethernet
• Ethernet has been around for over 20 years and has
no serious competitors in sight, so it is likely to be
around for many years to come
• Few CPU architectures, operating systems, or
programming languages have been king of the
mountain for two decades going on three
• the main reason for it that Ethernet is simple and
flexible
• Ethernet has been able to evolve in certain crucial
ways
Dr.T.Thendral, Assistant Professor, SRCW
1 de 30

Recomendados

DATA-LINK LAYER.ppt por
DATA-LINK LAYER.pptDATA-LINK LAYER.ppt
DATA-LINK LAYER.pptDrTThendralCompSci
348 visualizações52 slides
Ethernet 19 20 por
Ethernet 19 20Ethernet 19 20
Ethernet 19 20rajeshvbe
152 visualizações43 slides
Chapter 3 Networking por
Chapter 3 NetworkingChapter 3 Networking
Chapter 3 Networkingmlrbrown
1.8K visualizações62 slides
Dc lec-03 (topologies) por
Dc lec-03  (topologies)Dc lec-03  (topologies)
Dc lec-03 (topologies)diaryinc
1.2K visualizações37 slides

Mais conteúdo relacionado

Similar a Ethernet.ppt

lecture01_tm.pptx por
lecture01_tm.pptxlecture01_tm.pptx
lecture01_tm.pptxKashifIshaq10
2 visualizações28 slides
A427 nic card por
A427 nic cardA427 nic card
A427 nic cardsurajbhai
513 visualizações21 slides
NFPhysical Layer.pptx por
NFPhysical Layer.pptxNFPhysical Layer.pptx
NFPhysical Layer.pptxmmmm11111
12 visualizações37 slides
Lan basic por
Lan basicLan basic
Lan basicOnline
1.4K visualizações24 slides
Protocol and Interfaces - IPv4, IPv6, X.25 Protocol, X.75 Protocol por
Protocol and Interfaces - IPv4, IPv6, X.25 Protocol, X.75 ProtocolProtocol and Interfaces - IPv4, IPv6, X.25 Protocol, X.75 Protocol
Protocol and Interfaces - IPv4, IPv6, X.25 Protocol, X.75 ProtocolPradnya Saval
59 visualizações54 slides
Protocols and Interfaces - IPv4, IPv6, X.25, X.75 por
Protocols and Interfaces - IPv4, IPv6, X.25, X.75Protocols and Interfaces - IPv4, IPv6, X.25, X.75
Protocols and Interfaces - IPv4, IPv6, X.25, X.75Pradnya Saval
118 visualizações54 slides

Similar a Ethernet.ppt(20)

lecture01_tm.pptx por KashifIshaq10
lecture01_tm.pptxlecture01_tm.pptx
lecture01_tm.pptx
KashifIshaq102 visualizações
A427 nic card por surajbhai
A427 nic cardA427 nic card
A427 nic card
surajbhai513 visualizações
NFPhysical Layer.pptx por mmmm11111
NFPhysical Layer.pptxNFPhysical Layer.pptx
NFPhysical Layer.pptx
mmmm1111112 visualizações
Lan basic por Online
Lan basicLan basic
Lan basic
Online 1.4K visualizações
Protocol and Interfaces - IPv4, IPv6, X.25 Protocol, X.75 Protocol por Pradnya Saval
Protocol and Interfaces - IPv4, IPv6, X.25 Protocol, X.75 ProtocolProtocol and Interfaces - IPv4, IPv6, X.25 Protocol, X.75 Protocol
Protocol and Interfaces - IPv4, IPv6, X.25 Protocol, X.75 Protocol
Pradnya Saval59 visualizações
Protocols and Interfaces - IPv4, IPv6, X.25, X.75 por Pradnya Saval
Protocols and Interfaces - IPv4, IPv6, X.25, X.75Protocols and Interfaces - IPv4, IPv6, X.25, X.75
Protocols and Interfaces - IPv4, IPv6, X.25, X.75
Pradnya Saval118 visualizações
Et3003 sem2-1314-3 ethernets por Tutun Juhana
Et3003 sem2-1314-3 ethernetsEt3003 sem2-1314-3 ethernets
Et3003 sem2-1314-3 ethernets
Tutun Juhana1.1K visualizações
Advanced TCP/IP-based Industrial Networking for Engineers & Technicians por Living Online
Advanced TCP/IP-based Industrial Networking for Engineers & TechniciansAdvanced TCP/IP-based Industrial Networking for Engineers & Technicians
Advanced TCP/IP-based Industrial Networking for Engineers & Technicians
Living Online553 visualizações
Data communications_Network_Model (1).pdf por SujanTimalsina5
Data communications_Network_Model (1).pdfData communications_Network_Model (1).pdf
Data communications_Network_Model (1).pdf
SujanTimalsina53 visualizações
Chapter 1 ppt by dmb por dhanashrisabale1
Chapter 1 ppt by dmbChapter 1 ppt by dmb
Chapter 1 ppt by dmb
dhanashrisabale128 visualizações
Chapter 1 Introduction to computer networks ppt by DMB por dhanashrisabale1
Chapter 1 Introduction to computer networks ppt by DMBChapter 1 Introduction to computer networks ppt by DMB
Chapter 1 Introduction to computer networks ppt by DMB
dhanashrisabale120 visualizações
Networking HMT-1 por ImranulHasan6
Networking HMT-1Networking HMT-1
Networking HMT-1
ImranulHasan689 visualizações
Wireless LANs PPT.ppt por DrTThendralCompSci
Wireless LANs PPT.pptWireless LANs PPT.ppt
Wireless LANs PPT.ppt
DrTThendralCompSci103 visualizações
Railway ofc training por Sreerup Chowdhury
Railway ofc trainingRailway ofc training
Railway ofc training
Sreerup Chowdhury1.4K visualizações
Networking Chapter 4 por mlrbrown
Networking Chapter 4Networking Chapter 4
Networking Chapter 4
mlrbrown1.1K visualizações
osi por Leenesh
osi osi
osi
Leenesh567 visualizações
Ieee 802 standard por santoshkumar3075
Ieee 802 standardIeee 802 standard
Ieee 802 standard
santoshkumar3075168 visualizações
Asynchronous Transfer Mode ATM por Madhumita Tamhane
Asynchronous Transfer Mode  ATMAsynchronous Transfer Mode  ATM
Asynchronous Transfer Mode ATM
Madhumita Tamhane7.2K visualizações
Ethernet_Networking2.ppt por KowsalyaJayakumar2
Ethernet_Networking2.pptEthernet_Networking2.ppt
Ethernet_Networking2.ppt
KowsalyaJayakumar210 visualizações
Network in brief por Himant Prasansu
Network in briefNetwork in brief
Network in brief
Himant Prasansu193 visualizações

Mais de DrTThendralCompSci

The Application Layer.ppt por
The Application Layer.pptThe Application Layer.ppt
The Application Layer.pptDrTThendralCompSci
99 visualizações35 slides
Transport Layer.pptx por
Transport Layer.pptxTransport Layer.pptx
Transport Layer.pptxDrTThendralCompSci
76 visualizações28 slides
SOFTWARE QUALITY ASSURANCE.ppt por
SOFTWARE QUALITY ASSURANCE.pptSOFTWARE QUALITY ASSURANCE.ppt
SOFTWARE QUALITY ASSURANCE.pptDrTThendralCompSci
250 visualizações30 slides
Software Configuration Management.ppt por
Software Configuration Management.pptSoftware Configuration Management.ppt
Software Configuration Management.pptDrTThendralCompSci
12 visualizações23 slides
UNIT TESTING.pptx por
UNIT TESTING.pptxUNIT TESTING.pptx
UNIT TESTING.pptxDrTThendralCompSci
114 visualizações21 slides
SOFTWARE TESTING.pptx por
SOFTWARE TESTING.pptxSOFTWARE TESTING.pptx
SOFTWARE TESTING.pptxDrTThendralCompSci
362 visualizações48 slides

Mais de DrTThendralCompSci(20)

The Application Layer.ppt por DrTThendralCompSci
The Application Layer.pptThe Application Layer.ppt
The Application Layer.ppt
DrTThendralCompSci99 visualizações
Transport Layer.pptx por DrTThendralCompSci
Transport Layer.pptxTransport Layer.pptx
Transport Layer.pptx
DrTThendralCompSci76 visualizações
SOFTWARE QUALITY ASSURANCE.ppt por DrTThendralCompSci
SOFTWARE QUALITY ASSURANCE.pptSOFTWARE QUALITY ASSURANCE.ppt
SOFTWARE QUALITY ASSURANCE.ppt
DrTThendralCompSci250 visualizações
Software Configuration Management.ppt por DrTThendralCompSci
Software Configuration Management.pptSoftware Configuration Management.ppt
Software Configuration Management.ppt
DrTThendralCompSci12 visualizações
UNIT TESTING.pptx por DrTThendralCompSci
UNIT TESTING.pptxUNIT TESTING.pptx
UNIT TESTING.pptx
DrTThendralCompSci114 visualizações
SOFTWARE TESTING.pptx por DrTThendralCompSci
SOFTWARE TESTING.pptxSOFTWARE TESTING.pptx
SOFTWARE TESTING.pptx
DrTThendralCompSci362 visualizações
Software design and Software engineering.pptx por DrTThendralCompSci
Software design and Software engineering.pptxSoftware design and Software engineering.pptx
Software design and Software engineering.pptx
DrTThendralCompSci105 visualizações
NETWORK LAYER.ppt por DrTThendralCompSci
NETWORK LAYER.pptNETWORK LAYER.ppt
NETWORK LAYER.ppt
DrTThendralCompSci189 visualizações
MEDIUM-ACCESS CONTROL SUB LAYER.ppt por DrTThendralCompSci
MEDIUM-ACCESS CONTROL SUB LAYER.pptMEDIUM-ACCESS CONTROL SUB LAYER.ppt
MEDIUM-ACCESS CONTROL SUB LAYER.ppt
DrTThendralCompSci155 visualizações
Software design and Software engineering.pptx por DrTThendralCompSci
Software design and Software engineering.pptxSoftware design and Software engineering.pptx
Software design and Software engineering.pptx
DrTThendralCompSci253 visualizações
Software prototyping.pptx por DrTThendralCompSci
Software prototyping.pptxSoftware prototyping.pptx
Software prototyping.pptx
DrTThendralCompSci148 visualizações
Requirement Engineering.ppt por DrTThendralCompSci
Requirement Engineering.pptRequirement Engineering.ppt
Requirement Engineering.ppt
DrTThendralCompSci130 visualizações
Unit 1 - Introduction to Software Engineering.ppt por DrTThendralCompSci
Unit 1 - Introduction to Software Engineering.pptUnit 1 - Introduction to Software Engineering.ppt
Unit 1 - Introduction to Software Engineering.ppt
DrTThendralCompSci211 visualizações
EFFECTIVE MODULAR DESIGN.pptx por DrTThendralCompSci
EFFECTIVE MODULAR DESIGN.pptxEFFECTIVE MODULAR DESIGN.pptx
EFFECTIVE MODULAR DESIGN.pptx
DrTThendralCompSci309 visualizações
PHYSICAL LAYER.ppt por DrTThendralCompSci
PHYSICAL LAYER.pptPHYSICAL LAYER.ppt
PHYSICAL LAYER.ppt
DrTThendralCompSci302 visualizações
PROCESS MODELS.ppt por DrTThendralCompSci
PROCESS MODELS.pptPROCESS MODELS.ppt
PROCESS MODELS.ppt
DrTThendralCompSci397 visualizações
Unit 1 - Introduction to Software Engineering.ppt por DrTThendralCompSci
Unit 1 - Introduction to Software Engineering.pptUnit 1 - Introduction to Software Engineering.ppt
Unit 1 - Introduction to Software Engineering.ppt
DrTThendralCompSci247 visualizações
COMPUTER NETWORK por DrTThendralCompSci
COMPUTER NETWORKCOMPUTER NETWORK
COMPUTER NETWORK
DrTThendralCompSci244 visualizações

Último

GCSE Music por
GCSE MusicGCSE Music
GCSE MusicWestHatch
47 visualizações50 slides
Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant... por
Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant...Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant...
Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant...Ms. Pooja Bhandare
166 visualizações45 slides
GCSE Media por
GCSE MediaGCSE Media
GCSE MediaWestHatch
48 visualizações46 slides
Classification of crude drugs.pptx por
Classification of crude drugs.pptxClassification of crude drugs.pptx
Classification of crude drugs.pptxGayatriPatra14
104 visualizações13 slides
Monthly Information Session for MV Asterix (November) por
Monthly Information Session for MV Asterix (November)Monthly Information Session for MV Asterix (November)
Monthly Information Session for MV Asterix (November)Esquimalt MFRC
91 visualizações26 slides
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively por
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyPECB
651 visualizações18 slides

Último(20)

GCSE Music por WestHatch
GCSE MusicGCSE Music
GCSE Music
WestHatch47 visualizações
Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant... por Ms. Pooja Bhandare
Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant...Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant...
Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant...
Ms. Pooja Bhandare166 visualizações
GCSE Media por WestHatch
GCSE MediaGCSE Media
GCSE Media
WestHatch48 visualizações
Classification of crude drugs.pptx por GayatriPatra14
Classification of crude drugs.pptxClassification of crude drugs.pptx
Classification of crude drugs.pptx
GayatriPatra14104 visualizações
Monthly Information Session for MV Asterix (November) por Esquimalt MFRC
Monthly Information Session for MV Asterix (November)Monthly Information Session for MV Asterix (November)
Monthly Information Session for MV Asterix (November)
Esquimalt MFRC91 visualizações
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively por PECB
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
PECB 651 visualizações
The Accursed House by Émile Gaboriau por DivyaSheta
The Accursed House  by Émile GaboriauThe Accursed House  by Émile Gaboriau
The Accursed House by Émile Gaboriau
DivyaSheta234 visualizações
JQUERY.pdf por ArthyR3
JQUERY.pdfJQUERY.pdf
JQUERY.pdf
ArthyR396 visualizações
GCSE Spanish por WestHatch
GCSE SpanishGCSE Spanish
GCSE Spanish
WestHatch53 visualizações
Jibachha publishing Textbook.docx por DrJibachhaSahVetphys
Jibachha publishing Textbook.docxJibachha publishing Textbook.docx
Jibachha publishing Textbook.docx
DrJibachhaSahVetphys53 visualizações
GCSE Geography por WestHatch
GCSE GeographyGCSE Geography
GCSE Geography
WestHatch47 visualizações
MercerJesse2.1Doc.pdf por jessemercerail
MercerJesse2.1Doc.pdfMercerJesse2.1Doc.pdf
MercerJesse2.1Doc.pdf
jessemercerail280 visualizações
The basics - information, data, technology and systems.pdf por JonathanCovena1
The basics - information, data, technology and systems.pdfThe basics - information, data, technology and systems.pdf
The basics - information, data, technology and systems.pdf
JonathanCovena1156 visualizações
Recap of our Class por Corinne Weisgerber
Recap of our ClassRecap of our Class
Recap of our Class
Corinne Weisgerber100 visualizações
Java Simplified: Understanding Programming Basics por Akshaj Vadakkath Joshy
Java Simplified: Understanding Programming BasicsJava Simplified: Understanding Programming Basics
Java Simplified: Understanding Programming Basics
Akshaj Vadakkath Joshy532 visualizações
Retail Store Scavenger Hunt.pptx por jmurphy154
Retail Store Scavenger Hunt.pptxRetail Store Scavenger Hunt.pptx
Retail Store Scavenger Hunt.pptx
jmurphy15447 visualizações
CUNY IT Picciano.pptx por apicciano
CUNY IT Picciano.pptxCUNY IT Picciano.pptx
CUNY IT Picciano.pptx
apicciano56 visualizações

Ethernet.ppt

  • 2. • Ethernet Cabling • Manchester Encoding • The Ethernet MAC Sublayer Protocol • The Binary Exponential Backoff Algorithm • Ethernet Performance • Switched Ethernet • Fast Ethernet • Gigabit Ethernet • IEEE 802.2: Logical Link Control • Retrospective on Ethernet Dr.T.Thendral, Assistant Professor, SRCW
  • 3. Ethernet Cabling • Finished our general discussion of channel allocation protocols • It is time to see how these principles apply to real systems, in particular, LANs • IEEE has standardized a number of local area networks and metropolitan area networks under the name of IEEE 802 • The most important of the survivors are 802.3 (Ethernet) and 802.11 (wireless LAN) • With 802.15 (Bluetooth) and 802.16 (wireless MAN) • Ethernet, the protocols and recent developments in highspeed (gigabit) Ethernet Dr.T.Thendral, Assistant Professor, SRCW
  • 4. Ethernet Cabling • ''Ethernet'' refers to the cable (the ether) • Four types of cabling are commonly used, as shown in Fig Dr.T.Thendral, Assistant Professor, SRCW
  • 5. • Detecting cable breaks, excessive length, bad taps, or loose connectors can be a major problem with this media • For this reason, techniques have been developed to track them down • Basically, a pulse of known shape is injected into the cable • If the pulse hits an obstacle or the end of the cable, an echo will be generated and sent back • By carefully timing the interval between sending the pulse and receiving the echo, it is possible to localize the origin of the echo • This technique is called time domain reflectometry • The problems associated with finding cable breaks drove systems toward a different kind of wiring pattern, in which all stations have a cable running to a central hub in which they are all connected electrically Dr.T.Thendral, Assistant Professor, SRCW
  • 6. • Three wiring schemes are illustrated in Fig Dr.T.Thendral, Assistant Professor, SRCW
  • 7. • For 10Base5, a transceiver is clamped securely around the cable so that its tap makes contact with the inner core • The transceiver contains the electronics that handle carrier detection and collision detection • When a collision is detected, the transceiver also puts a special invalid signal on the cable to ensure that all other transceivers also realize that a collision has occurred Dr.T.Thendral, Assistant Professor, SRCW
  • 8. • 10Base5: a transceiver cable or drop cable connects the transceiver to an interface board in the computer • The interface board contains a controller chip that transmits frames to, and receives frames from, the transceiver. • 10Base2: The connection to the cable is just a passive BNC T-junction connector • The transceiver electronics are on the controller board, and each station always has its own transceiver. Dr.T.Thendral, Assistant Professor, SRCW
  • 9. • 10Base-T: There is no shared cable at all, just the hub (a box full of electronics) to which each station is connected by a dedicated (i.e., not shared) cable • A fourth cabling option for Ethernet is 10Base-F, which uses fiber optics • This alternative is expensive due to the cost of the connectors and terminators, but it has excellent noise immunity and is the method of choice when running between buildings Dr.T.Thendral, Assistant Professor, SRCW
  • 10. • A repeater is a physical layer device • It receives, amplifies (regenerates), and retransmits signals in both directions • As far as the software is concerned, a series of cable segments connected by repeaters is no different from a single cable (except for some delay introduced by the repeaters) Dr.T.Thendral, Assistant Professor, SRCW
  • 11. Manchester Encoding • None of the versions of Ethernet uses straight binary encoding with 0 volts for a 0 bit and 5 volts for a 1 bit because it leads to ambiguities • The start, end, or middle of each bit without reference to an external clock • Two such approaches are called Manchester encoding and differential Manchester encoding • With Manchester encoding, each bit period is divided into two equal intervals • A binary 1 bit is sent by having the voltage set high during the first interval and low in the second one • A binary 0 is just the reverse: first low and then high Dr.T.Thendral, Assistant Professor, SRCW
  • 12. Manchester encoding is shown in Fig. 4-16(b) Differential Manchester encoding, shown in Fig. 4-16(c), is a variation of basic Manchester encoding Dr.T.Thendral, Assistant Professor, SRCW
  • 13. The Ethernet MAC Sublayer Protocol • The original DIX (DEC, Intel, Xerox) frame structure is shown in Fig • Each frame starts with a Preamble of 8 bytes • The frame contains two addresses, one for the destination and one for the source • When a frame is sent to a group address, all the stations in the group receive it • Sending to a group of stations is called multicast • The address consisting of all 1 bits is reserved for broadcast Dr.T.Thendral, Assistant Professor, SRCW
  • 15. • Station tries to transmit a very short frame, it is conceivable that a collision occurs, but the transmission completes before the noise burst gets back at 2τ • The sender will then incorrectly conclude that the frame was successfully sent • To prevent this situation from occurring, all frames must take more than 2τ to send so that the transmission is still taking place when the noise burst gets back to the sender. Dr.T.Thendral, Assistant Professor, SRCW
  • 16. • The final Ethernet field is the Checksum • It is effectively a 32-bit hash code of the data • If some data bits are erroneously received (due to noise on the cable), the checksum will almost certainly be wrong and the error will be detected • The checksum algorithm is a cyclic redundancy check (CRC) • It just does error detection, not forward error correction Dr.T.Thendral, Assistant Professor, SRCW
  • 17. The Binary Exponential Backoff Algorithm • In general, after i collisions, a random number between 0 and 2i • - 1 is chosen, and that number of slots is skipped • However, after ten collisions have been reached, the randomization interval is frozen at a maximum of 1023 slots • After 16 collisions, the controller throws in the towel and reports failure back to the computer • Further recovery is up to higher layers • This algorithm, called binary exponential backoff Dr.T.Thendral, Assistant Professor, SRCW
  • 18. Ethernet Performance • The performance of Ethernet under conditions of heavy and constant load, that is, k stations always ready to transmit • A rigorous analysis of the binary exponential backoff algorithm is complicated • Instead, we will follow Metcalfe and Boggs (1976) and assume a constant retransmission probability in each slot • The channel efficiency is plotted versus number of ready stations Dr.T.Thendral, Assistant Professor, SRCW
  • 20. Switched Ethernet • The heart of this system is a switch containing a high- speed backplane and room for typically 4 to 32 plug- in line cards, each containing one to eight connectors • Most often, each connector has a 10Base-T twisted pair connection to a single host computer Dr.T.Thendral, Assistant Professor, SRCW
  • 21. Figure 4-20. A simple example of switched Ethernet. Dr.T.Thendral, Assistant Professor, SRCW
  • 22. Fast Ethernet • To pump up the speed, various industry groups proposed two new ring-based optical LANs • One was called FDDI (Fiber Distributed Data Interface) and the other was called Fibre Channel • In any event, the failure of the optical LANs to catch fire left a gap for garden-variety • Ethernet at speeds above 10 Mbps • Many installations needed more bandwidth and thus had numerous 10-Mbps LANs connected by a maze of repeaters, bridges, routers, and gateways Dr.T.Thendral, Assistant Professor, SRCW
  • 23. • The 802.3 committee decided to go with a souped-up Ethernet for three primary reasons: • 1. The need to be backward compatible with existing Ethernet LANs. • 2. The fear that a new protocol might have unforeseen problems. • 3. The desire to get the job done before the technology changed Dr.T.Thendral, Assistant Professor, SRCW
  • 24. Gigabit Ethernet • Fast Ethernet standard when the 802 committee began working on a yet faster Ethernet (1995) • It was quickly dubbed gigabit Ethernet and was ratified by IEEE in 1998 under the name 802.3z Dr.T.Thendral, Assistant Professor, SRCW
  • 25. • In the simplest gigabit Ethernet configuration, illustrated in Fig. 4-22(a), two computers are directly connected to each other • common case, having a switch or a hub connected to multiple computers • and possibly additional switches or hubs, as shown in Fig. 4- 22(b) • In both configurations each individual Ethernet cable has exactly two devices on it, no more and no fewer Dr.T.Thendral, Assistant Professor, SRCW
  • 27. • Gigabit Ethernet uses new encoding rules on the fibers • The following two rules were used in making the choices: • 1. No codeword may have more than four identical bits in a row. • 2. No codeword may have more than six 0s or six 1s. Dr.T.Thendral, Assistant Professor, SRCW
  • 28. • There are also systems in which an error- controlled, flow-controlled data link protocol is desired • IEEE has defined one that can run on top of Ethernet and the other 802 protocols • In addition, this protocol, called LLC (Logical Link Control) Dr.T.Thendral, Assistant Professor, SRCW
  • 29. • LLC forms the upper half of the data link layer, with the MAC sublayer below it, as shown in Fig • Typical usage of LLC is as follows • The network layer on the sending machine passes a packet to LLC, using the LLC access primitives • The LLC sublayer then adds an LLC header, containing sequence and acknowledgement numbers Dr.T.Thendral, Assistant Professor, SRCW
  • 30. Retrospective on Ethernet • Ethernet has been around for over 20 years and has no serious competitors in sight, so it is likely to be around for many years to come • Few CPU architectures, operating systems, or programming languages have been king of the mountain for two decades going on three • the main reason for it that Ethernet is simple and flexible • Ethernet has been able to evolve in certain crucial ways Dr.T.Thendral, Assistant Professor, SRCW