SlideShare a Scribd company logo
1 of 39
Chapter 13
Wired LANs: Ethernet

13.1

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
13-1 IEEE STANDARDS
In 1985, the Computer Society of the IEEE started a
project, called Project 802, to set standards to enable
intercommunication among equipment from a variety
of manufacturers. Project 802 is a way of specifying
functions of the physical layer and the data link layer
of major LAN protocols.
Topics discussed in this section:
Data Link Layer
Physical Layer
13.2
Figure 13.1 IEEE standard for LANs

13.3
13-2 STANDARD ETHERNET
The original Ethernet was created in 1976 at Xerox’s
Palo Alto Research Center (PARC). Since then, it has
gone through four generations. We briefly discuss the
Standard (or traditional) Ethernet in this section.

Topics discussed in this section:
MAC Sublayer
Physical Layer

13.4
Figure 13.3 Ethernet evolution through four generations

13.5
Figure 13.4 802.3 MAC frame

13.6
Figure 13.5 Minimum and maximum lengths

13.7
Note

Frame length:
Minimum: 64 bytes (512 bits)
Maximum: 1518 bytes (12,144 bits)

13.8
Figure 13.6 Example of an Ethernet address in hexadecimal notation

13.9
Figure 13.7 Unicast and multicast addresses

13.10
Note

The least significant bit of the first byte
defines the type of address.
If the bit is 0, the address is unicast;
otherwise, it is multicast.

13.11
Note

The broadcast destination address is a
special case of the multicast address in
which all bits are 1s.

13.12
Example 13.1
Define the type of the following destination addresses:
a. 4A:30:10:21:10:1A
b. 47:20:1B:2E:08:EE
c. FF:FF:FF:FF:FF:FF
Solution
To find the type of the address, we need to look at the
second hexadecimal digit from the left. If it is even, the
address is unicast. If it is odd, the address is multicast. If
all digits are F’s, the address is broadcast. Therefore, we
have the following:
a. This is a unicast address because A in binary is 1010.
b. This is a multicast address because 7 in binary is 0111.
c. This is a broadcast address because all digits are F’s.
13.13
Example 13.2
Show how the address 47:20:1B:2E:08:EE is sent out on
line.
Solution
The address is sent left-to-right, byte by byte; for each
byte, it is sent right-to-left, bit by bit, as shown below:

13.14
Figure 13.8 Categories of Standard Ethernet

13.15
Figure 13.9 Encoding in a Standard Ethernet implementation

13.16
Figure 13.10 10Base5 implementation

13.17
Figure 13.11 10Base2 implementation

13.18
Figure 13.12 10Base-T implementation

13.19
Figure 13.13 10Base-F implementation

13.20
Table 13.1 Summary of Standard Ethernet implementations

13.21
13-3 CHANGES IN THE STANDARD
The 10-Mbps Standard Ethernet has gone through
several changes before moving to the higher data
rates. These changes actually opened the road to the
evolution of the Ethernet to become compatible with
other high-data-rate LANs.
Topics discussed in this section:
Bridged Ethernet
Switched Ethernet
Full-Duplex Ethernet
13.22
Figure 13.14 Sharing bandwidth

13.23
Figure 13.15 A network with and without a bridge

13.24
Figure 13.16 Collision domains in an unbridged network and a bridged network

13.25
Figure 13.17 Switched Ethernet

13.26
Figure 13.18 Full-duplex switched Ethernet

13.27
13-4 FAST ETHERNET
Fast Ethernet was designed to compete with LAN
protocols such as FDDI or Fiber Channel. IEEE
created Fast Ethernet under the name 802.3u. Fast
Ethernet is backward-compatible with Standard
Ethernet, but it can transmit data 10 times faster at a
rate of 100 Mbps.
Topics discussed in this section:
MAC Sublayer
Physical Layer
13.28
Figure 13.19 Fast Ethernet topology

13.29
Figure 13.20 Fast Ethernet implementations

13.30
Figure 13.21 Encoding for Fast Ethernet implementation

13.31
Table 13.2 Summary of Fast Ethernet implementations

13.32
13-5 GIGABIT ETHERNET
The need for an even higher data rate resulted in the
design of the Gigabit Ethernet protocol (1000 Mbps).
The IEEE committee calls the standard 802.3z.

Topics discussed in this section:
MAC Sublayer
Physical Layer
Ten-Gigabit Ethernet
13.33
Note

In the full-duplex mode of Gigabit
Ethernet, there is no collision;
the maximum length of the cable is
determined by the signal attenuation
in the cable.

13.34
Figure 13.22 Topologies of Gigabit Ethernet

13.35
Figure 13.23 Gigabit Ethernet implementations

13.36
Figure 13.24 Encoding in Gigabit Ethernet implementations

13.37
Table 13.3 Summary of Gigabit Ethernet implementations

13.38
Table 13.4 Summary of Ten-Gigabit Ethernet implementations

13.39

More Related Content

What's hot (18)

Chapter 14
Chapter 14Chapter 14
Chapter 14
 
Ch18
Ch18Ch18
Ch18
 
Chapter 15
Chapter 15Chapter 15
Chapter 15
 
09 Using Telephone_and_Cable_Networks_for_Data_Transmission
09 Using Telephone_and_Cable_Networks_for_Data_Transmission09 Using Telephone_and_Cable_Networks_for_Data_Transmission
09 Using Telephone_and_Cable_Networks_for_Data_Transmission
 
02 Network Models
02 Network Models02 Network Models
02 Network Models
 
Ch07
Ch07Ch07
Ch07
 
Ch17
Ch17Ch17
Ch17
 
Ethernet
EthernetEthernet
Ethernet
 
Ch09
Ch09Ch09
Ch09
 
Ch 15
Ch 15Ch 15
Ch 15
 
08 Switching
08 Switching08 Switching
08 Switching
 
Ch21
Ch21Ch21
Ch21
 
Fa2c4eb1e3582a1a36255a82b258cb03a7dc
Fa2c4eb1e3582a1a36255a82b258cb03a7dcFa2c4eb1e3582a1a36255a82b258cb03a7dc
Fa2c4eb1e3582a1a36255a82b258cb03a7dc
 
20CS2008 Computer Networks
20CS2008 Computer Networks 20CS2008 Computer Networks
20CS2008 Computer Networks
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Ch15
Ch15Ch15
Ch15
 
12 Multiple Access
12 Multiple Access12 Multiple Access
12 Multiple Access
 

Similar to 10 wired lan (20)

ch13-ethernet.ppt
ch13-ethernet.pptch13-ethernet.ppt
ch13-ethernet.ppt
 
2
22
2
 
Ethernet
EthernetEthernet
Ethernet
 
SYBSC IT COMPUTER NETWORKS UNIT III Wired LANS: Ethernet
SYBSC IT COMPUTER NETWORKS UNIT III Wired LANS: EthernetSYBSC IT COMPUTER NETWORKS UNIT III Wired LANS: Ethernet
SYBSC IT COMPUTER NETWORKS UNIT III Wired LANS: Ethernet
 
ch13_AM.ppt
ch13_AM.pptch13_AM.ppt
ch13_AM.ppt
 
wired lans
wired lanswired lans
wired lans
 
3c ethernet
3c ethernet3c ethernet
3c ethernet
 
IT_210_Week06_Forouzan_Chapter_13.ppt
IT_210_Week06_Forouzan_Chapter_13.pptIT_210_Week06_Forouzan_Chapter_13.ppt
IT_210_Week06_Forouzan_Chapter_13.ppt
 
ETHERNET
ETHERNETETHERNET
ETHERNET
 
Wired LANs
Wired LANsWired LANs
Wired LANs
 
COMPUTER NETWORKS UNIT 1
COMPUTER NETWORKS UNIT 1COMPUTER NETWORKS UNIT 1
COMPUTER NETWORKS UNIT 1
 
Ch02.ppt
Ch02.pptCh02.ppt
Ch02.ppt
 
OSI open system interconnection LAYERS.pdf
OSI open system interconnection LAYERS.pdfOSI open system interconnection LAYERS.pdf
OSI open system interconnection LAYERS.pdf
 
Ethernet 802.3.pptx
Ethernet 802.3.pptxEthernet 802.3.pptx
Ethernet 802.3.pptx
 
Ethernet_Networks
Ethernet_NetworksEthernet_Networks
Ethernet_Networks
 
Intro_Net_91407.ppt
Intro_Net_91407.pptIntro_Net_91407.ppt
Intro_Net_91407.ppt
 
Intro_Net_91407.ppt
Intro_Net_91407.pptIntro_Net_91407.ppt
Intro_Net_91407.ppt
 
Intro_Net_91407 (2).ppt
Intro_Net_91407 (2).pptIntro_Net_91407 (2).ppt
Intro_Net_91407 (2).ppt
 
Intro_Net_91407.ppt
Intro_Net_91407.pptIntro_Net_91407.ppt
Intro_Net_91407.ppt
 
2.(3)OSI and TCP layer.ppt
2.(3)OSI and TCP layer.ppt2.(3)OSI and TCP layer.ppt
2.(3)OSI and TCP layer.ppt
 

More from ampas03

Digital 131341 t 27623-analisis kualitas-tinjauan literatur
Digital 131341 t 27623-analisis kualitas-tinjauan literaturDigital 131341 t 27623-analisis kualitas-tinjauan literatur
Digital 131341 t 27623-analisis kualitas-tinjauan literaturampas03
 
Dasar telekomunikasi
Dasar telekomunikasiDasar telekomunikasi
Dasar telekomunikasiampas03
 
komunikasi serat optik
komunikasi serat optikkomunikasi serat optik
komunikasi serat optikampas03
 
Serat Optik
Serat OptikSerat Optik
Serat Optikampas03
 
Network layer m6
Network layer m6Network layer m6
Network layer m6ampas03
 
Materi s-parameter
Materi s-parameterMateri s-parameter
Materi s-parameterampas03
 
Matching impedance
Matching impedanceMatching impedance
Matching impedanceampas03
 
Makalah phase shift keying
Makalah phase shift keyingMakalah phase shift keying
Makalah phase shift keyingampas03
 
Jaringan dan teknologi fiber opti kkkkkkk
Jaringan dan teknologi fiber opti kkkkkkkJaringan dan teknologi fiber opti kkkkkkk
Jaringan dan teknologi fiber opti kkkkkkkampas03
 
Datalink layer m5
Datalink layer m5Datalink layer m5
Datalink layer m5ampas03
 
Bounce diagram technique
Bounce diagram techniqueBounce diagram technique
Bounce diagram techniqueampas03
 
Bahan presentasi
Bahan presentasiBahan presentasi
Bahan presentasiampas03
 
Bab 4 perkembangan dan kemajuan sistem komunikasi bergerak
Bab 4 perkembangan dan kemajuan sistem komunikasi bergerakBab 4 perkembangan dan kemajuan sistem komunikasi bergerak
Bab 4 perkembangan dan kemajuan sistem komunikasi bergerakampas03
 
Bab 3 konsep sistem komunikasi bergerak
Bab 3 konsep sistem komunikasi bergerakBab 3 konsep sistem komunikasi bergerak
Bab 3 konsep sistem komunikasi bergerakampas03
 
Bab 2 arsitektur sistem komunikasi bergerak
Bab 2 arsitektur sistem komunikasi bergerakBab 2 arsitektur sistem komunikasi bergerak
Bab 2 arsitektur sistem komunikasi bergerakampas03
 
Bab 1 pendahuluan
Bab 1 pendahuluanBab 1 pendahuluan
Bab 1 pendahuluanampas03
 
10 hub bridgeswitch
10 hub bridgeswitch10 hub bridgeswitch
10 hub bridgeswitchampas03
 
9 multiple access
9 multiple access9 multiple access
9 multiple accessampas03
 
5 multiplexing dan media transmisi(1)
5 multiplexing dan media transmisi(1)5 multiplexing dan media transmisi(1)
5 multiplexing dan media transmisi(1)ampas03
 

More from ampas03 (20)

Digital 131341 t 27623-analisis kualitas-tinjauan literatur
Digital 131341 t 27623-analisis kualitas-tinjauan literaturDigital 131341 t 27623-analisis kualitas-tinjauan literatur
Digital 131341 t 27623-analisis kualitas-tinjauan literatur
 
Dasar telekomunikasi
Dasar telekomunikasiDasar telekomunikasi
Dasar telekomunikasi
 
komunikasi serat optik
komunikasi serat optikkomunikasi serat optik
komunikasi serat optik
 
Serat Optik
Serat OptikSerat Optik
Serat Optik
 
Network layer m6
Network layer m6Network layer m6
Network layer m6
 
Materi s-parameter
Materi s-parameterMateri s-parameter
Materi s-parameter
 
Matching impedance
Matching impedanceMatching impedance
Matching impedance
 
Makalah phase shift keying
Makalah phase shift keyingMakalah phase shift keying
Makalah phase shift keying
 
Komdat
KomdatKomdat
Komdat
 
Jaringan dan teknologi fiber opti kkkkkkk
Jaringan dan teknologi fiber opti kkkkkkkJaringan dan teknologi fiber opti kkkkkkk
Jaringan dan teknologi fiber opti kkkkkkk
 
Datalink layer m5
Datalink layer m5Datalink layer m5
Datalink layer m5
 
Bounce diagram technique
Bounce diagram techniqueBounce diagram technique
Bounce diagram technique
 
Bahan presentasi
Bahan presentasiBahan presentasi
Bahan presentasi
 
Bab 4 perkembangan dan kemajuan sistem komunikasi bergerak
Bab 4 perkembangan dan kemajuan sistem komunikasi bergerakBab 4 perkembangan dan kemajuan sistem komunikasi bergerak
Bab 4 perkembangan dan kemajuan sistem komunikasi bergerak
 
Bab 3 konsep sistem komunikasi bergerak
Bab 3 konsep sistem komunikasi bergerakBab 3 konsep sistem komunikasi bergerak
Bab 3 konsep sistem komunikasi bergerak
 
Bab 2 arsitektur sistem komunikasi bergerak
Bab 2 arsitektur sistem komunikasi bergerakBab 2 arsitektur sistem komunikasi bergerak
Bab 2 arsitektur sistem komunikasi bergerak
 
Bab 1 pendahuluan
Bab 1 pendahuluanBab 1 pendahuluan
Bab 1 pendahuluan
 
10 hub bridgeswitch
10 hub bridgeswitch10 hub bridgeswitch
10 hub bridgeswitch
 
9 multiple access
9 multiple access9 multiple access
9 multiple access
 
5 multiplexing dan media transmisi(1)
5 multiplexing dan media transmisi(1)5 multiplexing dan media transmisi(1)
5 multiplexing dan media transmisi(1)
 

Recently uploaded

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 

Recently uploaded (20)

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 

10 wired lan

  • 1. Chapter 13 Wired LANs: Ethernet 13.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
  • 2. 13-1 IEEE STANDARDS In 1985, the Computer Society of the IEEE started a project, called Project 802, to set standards to enable intercommunication among equipment from a variety of manufacturers. Project 802 is a way of specifying functions of the physical layer and the data link layer of major LAN protocols. Topics discussed in this section: Data Link Layer Physical Layer 13.2
  • 3. Figure 13.1 IEEE standard for LANs 13.3
  • 4. 13-2 STANDARD ETHERNET The original Ethernet was created in 1976 at Xerox’s Palo Alto Research Center (PARC). Since then, it has gone through four generations. We briefly discuss the Standard (or traditional) Ethernet in this section. Topics discussed in this section: MAC Sublayer Physical Layer 13.4
  • 5. Figure 13.3 Ethernet evolution through four generations 13.5
  • 6. Figure 13.4 802.3 MAC frame 13.6
  • 7. Figure 13.5 Minimum and maximum lengths 13.7
  • 8. Note Frame length: Minimum: 64 bytes (512 bits) Maximum: 1518 bytes (12,144 bits) 13.8
  • 9. Figure 13.6 Example of an Ethernet address in hexadecimal notation 13.9
  • 10. Figure 13.7 Unicast and multicast addresses 13.10
  • 11. Note The least significant bit of the first byte defines the type of address. If the bit is 0, the address is unicast; otherwise, it is multicast. 13.11
  • 12. Note The broadcast destination address is a special case of the multicast address in which all bits are 1s. 13.12
  • 13. Example 13.1 Define the type of the following destination addresses: a. 4A:30:10:21:10:1A b. 47:20:1B:2E:08:EE c. FF:FF:FF:FF:FF:FF Solution To find the type of the address, we need to look at the second hexadecimal digit from the left. If it is even, the address is unicast. If it is odd, the address is multicast. If all digits are F’s, the address is broadcast. Therefore, we have the following: a. This is a unicast address because A in binary is 1010. b. This is a multicast address because 7 in binary is 0111. c. This is a broadcast address because all digits are F’s. 13.13
  • 14. Example 13.2 Show how the address 47:20:1B:2E:08:EE is sent out on line. Solution The address is sent left-to-right, byte by byte; for each byte, it is sent right-to-left, bit by bit, as shown below: 13.14
  • 15. Figure 13.8 Categories of Standard Ethernet 13.15
  • 16. Figure 13.9 Encoding in a Standard Ethernet implementation 13.16
  • 17. Figure 13.10 10Base5 implementation 13.17
  • 18. Figure 13.11 10Base2 implementation 13.18
  • 19. Figure 13.12 10Base-T implementation 13.19
  • 20. Figure 13.13 10Base-F implementation 13.20
  • 21. Table 13.1 Summary of Standard Ethernet implementations 13.21
  • 22. 13-3 CHANGES IN THE STANDARD The 10-Mbps Standard Ethernet has gone through several changes before moving to the higher data rates. These changes actually opened the road to the evolution of the Ethernet to become compatible with other high-data-rate LANs. Topics discussed in this section: Bridged Ethernet Switched Ethernet Full-Duplex Ethernet 13.22
  • 23. Figure 13.14 Sharing bandwidth 13.23
  • 24. Figure 13.15 A network with and without a bridge 13.24
  • 25. Figure 13.16 Collision domains in an unbridged network and a bridged network 13.25
  • 26. Figure 13.17 Switched Ethernet 13.26
  • 27. Figure 13.18 Full-duplex switched Ethernet 13.27
  • 28. 13-4 FAST ETHERNET Fast Ethernet was designed to compete with LAN protocols such as FDDI or Fiber Channel. IEEE created Fast Ethernet under the name 802.3u. Fast Ethernet is backward-compatible with Standard Ethernet, but it can transmit data 10 times faster at a rate of 100 Mbps. Topics discussed in this section: MAC Sublayer Physical Layer 13.28
  • 29. Figure 13.19 Fast Ethernet topology 13.29
  • 30. Figure 13.20 Fast Ethernet implementations 13.30
  • 31. Figure 13.21 Encoding for Fast Ethernet implementation 13.31
  • 32. Table 13.2 Summary of Fast Ethernet implementations 13.32
  • 33. 13-5 GIGABIT ETHERNET The need for an even higher data rate resulted in the design of the Gigabit Ethernet protocol (1000 Mbps). The IEEE committee calls the standard 802.3z. Topics discussed in this section: MAC Sublayer Physical Layer Ten-Gigabit Ethernet 13.33
  • 34. Note In the full-duplex mode of Gigabit Ethernet, there is no collision; the maximum length of the cable is determined by the signal attenuation in the cable. 13.34
  • 35. Figure 13.22 Topologies of Gigabit Ethernet 13.35
  • 36. Figure 13.23 Gigabit Ethernet implementations 13.36
  • 37. Figure 13.24 Encoding in Gigabit Ethernet implementations 13.37
  • 38. Table 13.3 Summary of Gigabit Ethernet implementations 13.38
  • 39. Table 13.4 Summary of Ten-Gigabit Ethernet implementations 13.39