SlideShare uma empresa Scribd logo
1 de 16
SWITCHED LAN, FAST ETHERNET,
FAST ETHERNET AND LAYER
MODEL
PRESENTER
HAMNA SHAHZAD
LAN SWITCHING
 LAN switching is a form of packet switching used in LAN.
 Switching Tech. is crucial in network design.
 Switching included on layer 2, layer 3 and layer 4.
 Layer 2 switching include:
 Hardware based bridging.
 Wire speed/non blocking forwarding.
 Low latency rate.
 Layer 2 switching is highly efficient used for workgroup connectivity.
LAN SWITCHING ON LAYER 3
 Layer 3 switching perform following action:
 Determine path based on logical addressing
 Process and informs to any option info.
 Update SNMP.
 Provide security.
 Flow accounting/ flow control.
 Quality of service.
 Low latency.
LAN SWITCHING ON LAYER 4
 Layer 4 switching provide additional datagram inspection by reading the port numbers found in transport
layer header to make transport decision.
 The largest benefit of is that network admin. configure a layer 4 switch to priorities data traffic by
applications which means Quality of Service can be defined for each user.
FAST ETHERNET
 Fast Ethernet is a local area network (LAN) transmission standard that provides a data rate of 100 megabits
per second (referred to as "100BASE-T").
 Fast Ethernet cards connect to networks at a rate of 100 Mbps. Mbps while Gigabit network cards can
connect at speeds up to 1000mb/s.
 The main difference between the two is speed.
 A fast Ethernet card can run on bandwidths at 100mb/s while a gigabit Ethernet can run at ten times that
speed.
 Ethernet is the most widely installed local area network (LAN) technology. Ethernet is a link layer protocol in
the TCP/IP stack, describing how networked devices can format data for transmission to other network
devices on the same network segment, and how to put that data out on the network connection
What is the best Ethernet cable?
 If you have a modern router and modern Ethernet-enabled devices, you can get faster speeds — up to 10
Gb/s from 1 Gb/s — by using Cat-6 or Cat-6a cables instead of Cat-5 or Cat-5e cables. The rest of your
hardware has to support it, but you won't get those above 1 Gb/s speeds unless you have good enough
cables.
 It may be full duplex or half duplex depend upon type of network design.
100 BASE T
 100 BASE T networks star topology used and UTP cable are also used.
 10BASE-T used Cat3 cabling. However, Cat5 or later cabling is typically used today.
 10 Mbps Ethernet is considered to be classic Ethernet
 Have two parts one for transmission one for receiving.
 It may be half duplex.
100 BASE FX
 Also used star topology.
 Use fiber optic cable.
 Although the encoding, decoding, and clock
recovery procedures are the same for both
media, the signal transmission is different -
electrical pulses (100BASE TX) in copper and
light pulses(100BASE FX) in optical fiber.
 Have two parts one for transmission one for
receiving.
 It may be full duplex.
 Segment length 200m.
100 BASE TX
 Also used star topology.
 UTP copper cable category 5.
 The 4B/5B encoding is used for 100BASE-TX
Ethernet.
 Category 5 convert data into signals.
 However, unlike 10BASE-T, 100BASE-TX networks
typically use a switch at the center of the star
instead of a hub.
 Have two parts one for transmission one for
receiving.
 Segment length 100m.
FAST ETHERNET AND
LAYER MODEL
 Ethernet operates in the lower two layers of
the OSI model:
 The Data Link layer and the Physical layer.
FAST Ethernet - Layer 1 and Layer 2
 All Fast Ethernet variants use a star topology.
 Fast Ethernet at Layer 1 involves signals, bit streams that travel on the media, physical components
that put signals on media, and various topologies.
 Fast Ethernet Layer 1 performs a key role in the communication that takes place between devices, but
each of its functions has limitations.
 Ethernet separates the functions of the Data Link layer into two distinct sublayers: the Logical Link
Control (LLC) sublayer and the Media Access Control (MAC) sublayer
 Fast Ethernet at Layer 2 addresses these limitations.
CONT….
 The Data Link sublayers contribute
significantly to technological compatibility
and computer communications.
 The MAC sublayer is concerned with the
physical components that will be used to
communicate the information and prepares
the data for transmission over the media.
 The Logical Link Control (LLC) sublayer
remains relatively independent of the
physical equipment that will be used for the
communication process.
Logical Link Control - Connecting to the Upper
Layers
 For Ethernet, the IEEE 802.2 standard describes the LLC sublayer functions, and the 802.3 standard
describes the MAC sublayer and the Physical layer functions.
 Logical Link Control handles the communication between the upper layers and the networking software,
and the lower layers, typically the hardware.
 The LLC sublayer takes the network protocol data, which is typically an IPv4 packet, and adds control
information to help deliver the packet to the destination node.
 Layer 2 communicates with the upper layers through LLC. LLC is implemented in software, and its
implementation is independent of the physical equipment.
 In a computer, the LLC can be considered the driver software for the Network Interface Card (NIC).
MAC - Getting Data to the Media
 Media Access Control (MAC) is the lower Ethernet sublayer of the Data Link
layer. Media Access Control is implemented by hardware, typically in the
computer Network Interface Card (NIC).
 The Ethernet MAC sublayer has two primary responsibilities:
 Data Encapsulation
 Media Access Control
ETHERNET ON PHYSICAL
LAYER
 As a technology associated with the Physical layer,
Ethernet specifies and implements encoding and
decoding schemes that enable frame bits to be carried
as signals across the media.
 Ethernet devices make use of a broad range of cable
and connector specifications.
 Ethernet uses UTP copper cables and optical fiber to
interconnect network devices via intermediary devices
such as hubs and switches.
Thank You!

Mais conteúdo relacionado

Mais procurados (20)

UNIT-5 IoT Reference Architecture.pdf
UNIT-5 IoT Reference Architecture.pdfUNIT-5 IoT Reference Architecture.pdf
UNIT-5 IoT Reference Architecture.pdf
 
OSI MODEL
    OSI MODEL    OSI MODEL
OSI MODEL
 
Unit 1 - mobile computing introduction
Unit 1 - mobile computing introductionUnit 1 - mobile computing introduction
Unit 1 - mobile computing introduction
 
HiperLAN.ppt
HiperLAN.pptHiperLAN.ppt
HiperLAN.ppt
 
Vlan
Vlan Vlan
Vlan
 
Lecture 5
Lecture 5Lecture 5
Lecture 5
 
TOKEN BUS & TOKEN RING.ppt
TOKEN BUS & TOKEN RING.pptTOKEN BUS & TOKEN RING.ppt
TOKEN BUS & TOKEN RING.ppt
 
Optical Fiber Communication
Optical Fiber CommunicationOptical Fiber Communication
Optical Fiber Communication
 
Ethernet
EthernetEthernet
Ethernet
 
Wan technology
Wan technologyWan technology
Wan technology
 
Computer network layers
Computer network layersComputer network layers
Computer network layers
 
Mobile computing
Mobile computing Mobile computing
Mobile computing
 
Data Link Layer
Data Link LayerData Link Layer
Data Link Layer
 
IEEE 802.11
IEEE 802.11IEEE 802.11
IEEE 802.11
 
Framing Protocols
Framing ProtocolsFraming Protocols
Framing Protocols
 
Ngn
NgnNgn
Ngn
 
Networking Standards And Protocols
Networking Standards And ProtocolsNetworking Standards And Protocols
Networking Standards And Protocols
 
Trends In Telecommunication Services
Trends In Telecommunication ServicesTrends In Telecommunication Services
Trends In Telecommunication Services
 
TCP over wireless slides
TCP over wireless slidesTCP over wireless slides
TCP over wireless slides
 
IoT Networking Part 2
IoT Networking Part 2IoT Networking Part 2
IoT Networking Part 2
 

Semelhante a SWITCHED LAN, FAST ETHERNET, FAST ETHERNET AND LAYER MODEL

Capitulo 9 Exploration Network
Capitulo 9 Exploration NetworkCapitulo 9 Exploration Network
Capitulo 9 Exploration Networkfherjaramillo
 
Local Area Network – Wired LAN
Local Area Network – Wired LANLocal Area Network – Wired LAN
Local Area Network – Wired LANRaj vardhan
 
Ethernet Computer network
Ethernet Computer networkEthernet Computer network
Ethernet Computer networkmiteshppt
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionShubham Khedekar
 
Ethernet - Networking presentation
Ethernet - Networking presentationEthernet - Networking presentation
Ethernet - Networking presentationViet Nguyen
 
The IP network is a virtual network and must rely on a link layer ne.pdf
The IP network is a virtual network and must rely on a link layer ne.pdfThe IP network is a virtual network and must rely on a link layer ne.pdf
The IP network is a virtual network and must rely on a link layer ne.pdfSALES97
 
Networking and Data Communications
Networking and Data CommunicationsNetworking and Data Communications
Networking and Data Communicationskuramartin
 
A Boost for Ethernet to the Home
A Boost for Ethernet to the HomeA Boost for Ethernet to the Home
A Boost for Ethernet to the HomeCaroleHackenberg
 
Ethernet and token ring
Ethernet and token ringEthernet and token ring
Ethernet and token ringAbhijeet Shah
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 

Semelhante a SWITCHED LAN, FAST ETHERNET, FAST ETHERNET AND LAYER MODEL (20)

Capitulo 9 Exploration Network
Capitulo 9 Exploration NetworkCapitulo 9 Exploration Network
Capitulo 9 Exploration Network
 
Advance ethernet
Advance ethernetAdvance ethernet
Advance ethernet
 
Chapter 4ver2
Chapter 4ver2Chapter 4ver2
Chapter 4ver2
 
NET1.PPT
NET1.PPTNET1.PPT
NET1.PPT
 
Local Area Network – Wired LAN
Local Area Network – Wired LANLocal Area Network – Wired LAN
Local Area Network – Wired LAN
 
CCNA Report
CCNA ReportCCNA Report
CCNA Report
 
Ethernet Computer network
Ethernet Computer networkEthernet Computer network
Ethernet Computer network
 
Technical Ethernet
Technical EthernetTechnical Ethernet
Technical Ethernet
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer Description
 
Ethernet - Networking presentation
Ethernet - Networking presentationEthernet - Networking presentation
Ethernet - Networking presentation
 
Introduction to network security and lan technology
Introduction to network security and lan technologyIntroduction to network security and lan technology
Introduction to network security and lan technology
 
01 pengenalan
01 pengenalan01 pengenalan
01 pengenalan
 
The IP network is a virtual network and must rely on a link layer ne.pdf
The IP network is a virtual network and must rely on a link layer ne.pdfThe IP network is a virtual network and must rely on a link layer ne.pdf
The IP network is a virtual network and must rely on a link layer ne.pdf
 
Networking and Data Communications
Networking and Data CommunicationsNetworking and Data Communications
Networking and Data Communications
 
A Boost for Ethernet to the Home
A Boost for Ethernet to the HomeA Boost for Ethernet to the Home
A Boost for Ethernet to the Home
 
Sem 1 Ch 7
Sem 1 Ch 7Sem 1 Ch 7
Sem 1 Ch 7
 
5 Lan
5 Lan5 Lan
5 Lan
 
Ethernet_Networks
Ethernet_NetworksEthernet_Networks
Ethernet_Networks
 
Ethernet and token ring
Ethernet and token ringEthernet and token ring
Ethernet and token ring
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 

Último

BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptx
BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptxBT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptx
BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptxNeo4j
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIES VE
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Hiroshi SHIBATA
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...CzechDreamin
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераMark Opanasiuk
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...marcuskenyatta275
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsLeah Henrickson
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfFIDO Alliance
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyUXDXConf
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireExakis Nelite
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfFIDO Alliance
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Patrick Viafore
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfFIDO Alliance
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty SecureFemke de Vroome
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastUXDXConf
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...FIDO Alliance
 

Último (20)

BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptx
BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptxBT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptx
BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptx
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System Strategy
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty Secure
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at Comcast
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 

SWITCHED LAN, FAST ETHERNET, FAST ETHERNET AND LAYER MODEL

  • 1. SWITCHED LAN, FAST ETHERNET, FAST ETHERNET AND LAYER MODEL
  • 3. LAN SWITCHING  LAN switching is a form of packet switching used in LAN.  Switching Tech. is crucial in network design.  Switching included on layer 2, layer 3 and layer 4.  Layer 2 switching include:  Hardware based bridging.  Wire speed/non blocking forwarding.  Low latency rate.  Layer 2 switching is highly efficient used for workgroup connectivity.
  • 4. LAN SWITCHING ON LAYER 3  Layer 3 switching perform following action:  Determine path based on logical addressing  Process and informs to any option info.  Update SNMP.  Provide security.  Flow accounting/ flow control.  Quality of service.  Low latency.
  • 5. LAN SWITCHING ON LAYER 4  Layer 4 switching provide additional datagram inspection by reading the port numbers found in transport layer header to make transport decision.  The largest benefit of is that network admin. configure a layer 4 switch to priorities data traffic by applications which means Quality of Service can be defined for each user.
  • 6. FAST ETHERNET  Fast Ethernet is a local area network (LAN) transmission standard that provides a data rate of 100 megabits per second (referred to as "100BASE-T").  Fast Ethernet cards connect to networks at a rate of 100 Mbps. Mbps while Gigabit network cards can connect at speeds up to 1000mb/s.  The main difference between the two is speed.  A fast Ethernet card can run on bandwidths at 100mb/s while a gigabit Ethernet can run at ten times that speed.  Ethernet is the most widely installed local area network (LAN) technology. Ethernet is a link layer protocol in the TCP/IP stack, describing how networked devices can format data for transmission to other network devices on the same network segment, and how to put that data out on the network connection
  • 7. What is the best Ethernet cable?  If you have a modern router and modern Ethernet-enabled devices, you can get faster speeds — up to 10 Gb/s from 1 Gb/s — by using Cat-6 or Cat-6a cables instead of Cat-5 or Cat-5e cables. The rest of your hardware has to support it, but you won't get those above 1 Gb/s speeds unless you have good enough cables.  It may be full duplex or half duplex depend upon type of network design.
  • 8. 100 BASE T  100 BASE T networks star topology used and UTP cable are also used.  10BASE-T used Cat3 cabling. However, Cat5 or later cabling is typically used today.  10 Mbps Ethernet is considered to be classic Ethernet  Have two parts one for transmission one for receiving.  It may be half duplex.
  • 9. 100 BASE FX  Also used star topology.  Use fiber optic cable.  Although the encoding, decoding, and clock recovery procedures are the same for both media, the signal transmission is different - electrical pulses (100BASE TX) in copper and light pulses(100BASE FX) in optical fiber.  Have two parts one for transmission one for receiving.  It may be full duplex.  Segment length 200m. 100 BASE TX  Also used star topology.  UTP copper cable category 5.  The 4B/5B encoding is used for 100BASE-TX Ethernet.  Category 5 convert data into signals.  However, unlike 10BASE-T, 100BASE-TX networks typically use a switch at the center of the star instead of a hub.  Have two parts one for transmission one for receiving.  Segment length 100m.
  • 10. FAST ETHERNET AND LAYER MODEL  Ethernet operates in the lower two layers of the OSI model:  The Data Link layer and the Physical layer.
  • 11. FAST Ethernet - Layer 1 and Layer 2  All Fast Ethernet variants use a star topology.  Fast Ethernet at Layer 1 involves signals, bit streams that travel on the media, physical components that put signals on media, and various topologies.  Fast Ethernet Layer 1 performs a key role in the communication that takes place between devices, but each of its functions has limitations.  Ethernet separates the functions of the Data Link layer into two distinct sublayers: the Logical Link Control (LLC) sublayer and the Media Access Control (MAC) sublayer  Fast Ethernet at Layer 2 addresses these limitations.
  • 12. CONT….  The Data Link sublayers contribute significantly to technological compatibility and computer communications.  The MAC sublayer is concerned with the physical components that will be used to communicate the information and prepares the data for transmission over the media.  The Logical Link Control (LLC) sublayer remains relatively independent of the physical equipment that will be used for the communication process.
  • 13. Logical Link Control - Connecting to the Upper Layers  For Ethernet, the IEEE 802.2 standard describes the LLC sublayer functions, and the 802.3 standard describes the MAC sublayer and the Physical layer functions.  Logical Link Control handles the communication between the upper layers and the networking software, and the lower layers, typically the hardware.  The LLC sublayer takes the network protocol data, which is typically an IPv4 packet, and adds control information to help deliver the packet to the destination node.  Layer 2 communicates with the upper layers through LLC. LLC is implemented in software, and its implementation is independent of the physical equipment.  In a computer, the LLC can be considered the driver software for the Network Interface Card (NIC).
  • 14. MAC - Getting Data to the Media  Media Access Control (MAC) is the lower Ethernet sublayer of the Data Link layer. Media Access Control is implemented by hardware, typically in the computer Network Interface Card (NIC).  The Ethernet MAC sublayer has two primary responsibilities:  Data Encapsulation  Media Access Control
  • 15. ETHERNET ON PHYSICAL LAYER  As a technology associated with the Physical layer, Ethernet specifies and implements encoding and decoding schemes that enable frame bits to be carried as signals across the media.  Ethernet devices make use of a broad range of cable and connector specifications.  Ethernet uses UTP copper cables and optical fiber to interconnect network devices via intermediary devices such as hubs and switches.