SlideShare a Scribd company logo
1 of 25
CHAPTER 13
WIRED LANS: ETHERNET

13.3 CHANGES IN THE
STANDARD
Presented by : Malik S.Abeisat
- From 10-Mbps Standard Ethernet until it’s moving
to higher data rate , it passes through through
several changes.
- These changes actually opened the road to the
evolution of the Ethernet to become compatible
with other high-data-rate LANs.
- Here we’ll talk about some of them :
Bridged Ethernet
Switched Ethernet
Full-Duplex Ethernet

1
Bridged Ethernet
2
WHAT EXACTLY IS A BRIDGE IN
NETWORKING?
_____________________________________
A Bridge is a device that filters data traffic at a network
boundary. Bridges reduce the amount of traffic on a LAN by
dividing it into two segments. It connects on the data-link
layer, (layer 2) of the OSI model.

In the picture to the right, the data is
coming from the database server.
The bridge filters the data, sending
the data to the correct locations.

3
BRIDGED ETHERNET


The first step in the Ethernet evolution was the division of a LAN by bridges.



The term bridge was coined in the early 1980s.



Today, the terms LAN switch or (in the context of Ethernet) Ethernet switch
are used.



Bridges have two effects on an Ethernet LAN:
1- They raise the bandwidth.
2- they separate collision domains.







Bridges are intermediate systems that forward MAC frames to
destinations based on MAC addresses.
Q. Is an Ethernet hub a bridge or a repeater ? What’s the difference ?
A. It can be either a bridge or a repeater. “hub” is a product name, not an
architecture name. Modern hubs are bridges. Old ones are repeaters.The
difference is: a repeater is a layer 1 intermediate system (acts on bits)
whereas a bridge is a layer 2 intermediate system (acts on entire MAC
frames). Also: a bridge separates collision domains, a repeater does not

hub
hub

hub

4
HOW DOES A BRIDGE WORK?
___________________________
Bridges are similar to repeaters and network hubs, devices that connect at the
physical layer, however, with bridging, traffic from one network is managed
rather than simply rebroadcast to adjacent network segments.
Bridges tend to be more complex than hubs or repeaters. Bridges can analyze
incoming data packets to determine if the bridge is able to send the given
packet to another segment of the network.

Since bridging takes place at the data-link layer of the OSI model, a bridge
processes the information from each frame of data it receives. In an
Ethernet frame, this provides the MAC address of the frame's source and
destination. Bridges use two methods to resolve the network segment that
a MAC address belongs to.

5
Bridged Ethernet_Effect
1.

Raising the Bandwidth
Stations shares the total bandwidth they are provided with. When we have more
than one station they share the provided bandwidth hence we can put the bridge
we can spilt the stations so that they can share the same bandwidth but the
number of stations are less as it’s divided between stations. For example, We
have 10 stations sharing 10 mbps now if we bridge them over 5-5 stations ,we
will have 5 stations sharing the same 10mbps bandwidth, hence bridged
connection can increase the bandwidth by above mentioned method.

6
2.

Separating Collision Domains

The collision domain becomes much smaller and the
probability of collision is reduced tremendously. Without
bridging, 12 stations contend for access to the medium;
with bridging only 3 stations contend for access to the
medium.

7
Switched Ethernet
8
SWITCHED ETHERNET


Consists of a several
segments, each of which is
shared by NICs attached to it.
(Network interface controller “NIC”)

The network is segmented
into several collision domains.
 Bridges, switches, and routers
create the segment and
collision domain boundaries.
 Segments may contain hubs
and repeaters.

There is switch table and it’s build by
(media access control address “MAC”) for
each device



9
SWITCHED ETHERNET
Switch - 1 port per hub

Hub

Hub

10
11
Full-Duplex Ethernet
12
Full-duplex is a data communications term that
refers to the ability to send and receive data at the
same time.
 The full-duplex mode increases the capacity of
each domain (ex. from 10 to 20 Mbps).
 instead of using one link between the station and
the switch, the configuration uses two links:
one to transmit and one to receive.


13


In full-duplex mode, both devices can transmit and
receive to and from each other at the same time, and
there is no collision domain. This doubles the
aggregate bandwidth of the link and is sometimes
advertised as double the link speed (e.g., 200 Mbit/s).
o The elimination of the
collision domain for these
connections also means
that all the link's
bandwidth can be used by
the two devices on that
segment and that segment
length is not limited by the
need for correct collision
detection.

14
No Need for
(CSMA/CD)
15
(CSMA/CD)
Carrier Sense Multiple Access With Collision Detection


Collision: two transmissions interfere with each
other



Station that wants to transmit first listens to check if
another transmission is in progress (carrier sense).



If medium is in use, station waits; else, it transmits.



Collisions can still occur.



Transmitter waits for ACK; if no ACKs, retransmits.

16
ETHERNET: CSMA/CD
(CARRIER SENSE MULTIPLE ACCESS
WITH COLLISION DETECTION)


Access method: method of controlling how network
nodes access communications channels



CSMA/CD: Ethernet’s access method


Ethernet NICs listen on network
Wait until no nodes transmitting data over the signal on the
communications channel before transmission
 Several Ethernet nodes can be connected to a network and can
monitor traffic simultaneously


17
(Network interface controller “NIC”)
In a full-duplex switched Ethernet, each station is
connected to the switch via two separate links.
 Each station or switch can send and receive
independently without worrying about collision.
 Each link is a point-to-point dedicated path between the
station and the switch.
 There is no longer a need for carrier sensing; there is no
longer a need for collision detection. The job of the MAC
layer becomes much easier.
 The carrier sensing and collision detection functionalities
of the MAC sublayer can be turned off.


18
MAC Control
Layer
19
DEFINITION MAC




Specified by the technology being used.
Determine who can transmit and when.
Two types:


Deterministic: “Let’s take turns”.




Token-Ring, FDDI.

Non-deterministic: “First come, first serve”.


Ethernet : CSMA/CD.

20
DETERMINISTIC MAC PROTOCOL

21
NON-DETERMINISTIC MAC PROTOCOL



Carrier Sense Multiple Access with Collision Detection
(CSMA/CD).

22
USING MAC ADDRESSES

Data

A

D

Data

A

D

Destination Address
Source Address

Data

A

D

Data

A

D

23
Thanks on your attentions

Best regards
Presented by : Malik S.Abeisat

More Related Content

What's hot

Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSDr. SELVAGANESAN S
 
Data communication assignment 1
Data communication assignment 1Data communication assignment 1
Data communication assignment 1MdAbdullahAlShahed
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)k33a
 
IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11Keshav Maheshwari
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithmBushra M
 
Introduction & Wireless Transmission
Introduction & Wireless TransmissionIntroduction & Wireless Transmission
Introduction & Wireless TransmissionJoe Christensen
 
Introduction to switching & circuit switching
Introduction to switching & circuit switchingIntroduction to switching & circuit switching
Introduction to switching & circuit switchingDr Rajiv Srivastava
 
Transport services
Transport servicesTransport services
Transport servicesNavin Kumar
 
Data communication and computer networks | Network Topologies
Data communication and computer networks | Network TopologiesData communication and computer networks | Network Topologies
Data communication and computer networks | Network TopologiesMSA Technosoft
 
Multiple access control protocol
Multiple access control protocol Multiple access control protocol
Multiple access control protocol meenamunesh
 
Mobile transport layer - traditional TCP
Mobile transport layer - traditional TCPMobile transport layer - traditional TCP
Mobile transport layer - traditional TCPVishal Tandel
 
Transmission impairments(presentation)
Transmission impairments(presentation)Transmission impairments(presentation)
Transmission impairments(presentation)Vivek Kumar
 

What's hot (20)

Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
 
Arp and rarp
Arp and rarpArp and rarp
Arp and rarp
 
Data communication assignment 1
Data communication assignment 1Data communication assignment 1
Data communication assignment 1
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
 
IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
 
Introduction & Wireless Transmission
Introduction & Wireless TransmissionIntroduction & Wireless Transmission
Introduction & Wireless Transmission
 
Bridge
BridgeBridge
Bridge
 
Network software
Network softwareNetwork software
Network software
 
Introduction to switching & circuit switching
Introduction to switching & circuit switchingIntroduction to switching & circuit switching
Introduction to switching & circuit switching
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Transport services
Transport servicesTransport services
Transport services
 
Data communication and computer networks | Network Topologies
Data communication and computer networks | Network TopologiesData communication and computer networks | Network Topologies
Data communication and computer networks | Network Topologies
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
 
Multiple access control protocol
Multiple access control protocol Multiple access control protocol
Multiple access control protocol
 
Hiperlan
HiperlanHiperlan
Hiperlan
 
Mobile transport layer - traditional TCP
Mobile transport layer - traditional TCPMobile transport layer - traditional TCP
Mobile transport layer - traditional TCP
 
Satellite link design
Satellite link designSatellite link design
Satellite link design
 
transport layer
transport layertransport layer
transport layer
 
Transmission impairments(presentation)
Transmission impairments(presentation)Transmission impairments(presentation)
Transmission impairments(presentation)
 

Viewers also liked (16)

Chapter 05
Chapter 05Chapter 05
Chapter 05
 
Lans ethernet
Lans ethernetLans ethernet
Lans ethernet
 
CCNA CHAPTER 17 BY jetarvind kumar madhukar
CCNA CHAPTER 17 BY jetarvind kumar madhukarCCNA CHAPTER 17 BY jetarvind kumar madhukar
CCNA CHAPTER 17 BY jetarvind kumar madhukar
 
802.11[1]
802.11[1]802.11[1]
802.11[1]
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
LAN.
LAN.LAN.
LAN.
 
14 Wireless LAN
14 Wireless LAN14 Wireless LAN
14 Wireless LAN
 
Chapter 14
Chapter 14Chapter 14
Chapter 14
 
Wlan
WlanWlan
Wlan
 
wired lans
wired lanswired lans
wired lans
 
Ieee standards
Ieee standardsIeee standards
Ieee standards
 
Ethernet
EthernetEthernet
Ethernet
 
13 Wired Lans_Ethernet
13 Wired Lans_Ethernet13 Wired Lans_Ethernet
13 Wired Lans_Ethernet
 
12 wireless la-ns
12 wireless la-ns12 wireless la-ns
12 wireless la-ns
 
Ch 15
Ch 15Ch 15
Ch 15
 
Networking
NetworkingNetworking
Networking
 

Similar to Wired LANs: Evolution of Ethernet

chaptet 4 DC and CN.ppt
chaptet 4 DC and CN.pptchaptet 4 DC and CN.ppt
chaptet 4 DC and CN.pptEliasPetros
 
05 - Networking Components and Devices.ppt
05 - Networking Components and Devices.ppt05 - Networking Components and Devices.ppt
05 - Networking Components and Devices.pptssuserf7cd2b
 
Lecture 2 Connecting LANs, Backbone Networks, and Virtual LANs.ppt
Lecture 2   Connecting LANs, Backbone Networks, and Virtual LANs.pptLecture 2   Connecting LANs, Backbone Networks, and Virtual LANs.ppt
Lecture 2 Connecting LANs, Backbone Networks, and Virtual LANs.pptabdnazar2003
 
Networking and Data Communications
Networking and Data CommunicationsNetworking and Data Communications
Networking and Data Communicationskuramartin
 
network hardware
network hardwarenetwork hardware
network hardwaretumetr1
 
1-Lect_1.pptxLecture 5 array in PHP.pptx
1-Lect_1.pptxLecture 5 array in PHP.pptx1-Lect_1.pptxLecture 5 array in PHP.pptx
1-Lect_1.pptxLecture 5 array in PHP.pptxZahouAmel1
 
Network Connecting Devices UNIT 5
Network Connecting Devices UNIT 5Network Connecting Devices UNIT 5
Network Connecting Devices UNIT 5Raj vardhan
 
Best fit topology - lo1 part iii
Best fit topology - lo1 part iiiBest fit topology - lo1 part iii
Best fit topology - lo1 part iiiAbenezer Abiti
 
11.a review of improvement in tcp congestion control using route failure det...
11.a  review of improvement in tcp congestion control using route failure det...11.a  review of improvement in tcp congestion control using route failure det...
11.a review of improvement in tcp congestion control using route failure det...Alexander Decker
 
Capitulo 9 Exploration Network
Capitulo 9 Exploration NetworkCapitulo 9 Exploration Network
Capitulo 9 Exploration Networkfherjaramillo
 
Lan access control methods
Lan access control methodsLan access control methods
Lan access control methodsbwire sedrick
 

Similar to Wired LANs: Evolution of Ethernet (20)

chaptet 4 DC and CN.ppt
chaptet 4 DC and CN.pptchaptet 4 DC and CN.ppt
chaptet 4 DC and CN.ppt
 
05 - Networking Components and Devices.ppt
05 - Networking Components and Devices.ppt05 - Networking Components and Devices.ppt
05 - Networking Components and Devices.ppt
 
Computer networking
Computer networkingComputer networking
Computer networking
 
Cna
CnaCna
Cna
 
Chapter 4ver2
Chapter 4ver2Chapter 4ver2
Chapter 4ver2
 
Lecture 2 Connecting LANs, Backbone Networks, and Virtual LANs.ppt
Lecture 2   Connecting LANs, Backbone Networks, and Virtual LANs.pptLecture 2   Connecting LANs, Backbone Networks, and Virtual LANs.ppt
Lecture 2 Connecting LANs, Backbone Networks, and Virtual LANs.ppt
 
Networking and Data Communications
Networking and Data CommunicationsNetworking and Data Communications
Networking and Data Communications
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
network hardware
network hardwarenetwork hardware
network hardware
 
1-Lect_1.pptxLecture 5 array in PHP.pptx
1-Lect_1.pptxLecture 5 array in PHP.pptx1-Lect_1.pptxLecture 5 array in PHP.pptx
1-Lect_1.pptxLecture 5 array in PHP.pptx
 
unit5-190409094326.pdf
unit5-190409094326.pdfunit5-190409094326.pdf
unit5-190409094326.pdf
 
Network Connecting Devices UNIT 5
Network Connecting Devices UNIT 5Network Connecting Devices UNIT 5
Network Connecting Devices UNIT 5
 
Networks
Networks   Networks
Networks
 
Network devices
Network devicesNetwork devices
Network devices
 
Mobile Ad hoc network
Mobile Ad hoc networkMobile Ad hoc network
Mobile Ad hoc network
 
Best fit topology - lo1 part iii
Best fit topology - lo1 part iiiBest fit topology - lo1 part iii
Best fit topology - lo1 part iii
 
11.a review of improvement in tcp congestion control using route failure det...
11.a  review of improvement in tcp congestion control using route failure det...11.a  review of improvement in tcp congestion control using route failure det...
11.a review of improvement in tcp congestion control using route failure det...
 
Capitulo 9 Exploration Network
Capitulo 9 Exploration NetworkCapitulo 9 Exploration Network
Capitulo 9 Exploration Network
 
Lan access control methods
Lan access control methodsLan access control methods
Lan access control methods
 
chapter 5.1.pptx
chapter 5.1.pptxchapter 5.1.pptx
chapter 5.1.pptx
 

Recently uploaded

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 

Recently uploaded (20)

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

Wired LANs: Evolution of Ethernet

  • 1. CHAPTER 13 WIRED LANS: ETHERNET 13.3 CHANGES IN THE STANDARD Presented by : Malik S.Abeisat
  • 2. - From 10-Mbps Standard Ethernet until it’s moving to higher data rate , it passes through through several changes. - These changes actually opened the road to the evolution of the Ethernet to become compatible with other high-data-rate LANs. - Here we’ll talk about some of them : Bridged Ethernet Switched Ethernet Full-Duplex Ethernet 1
  • 4. WHAT EXACTLY IS A BRIDGE IN NETWORKING? _____________________________________ A Bridge is a device that filters data traffic at a network boundary. Bridges reduce the amount of traffic on a LAN by dividing it into two segments. It connects on the data-link layer, (layer 2) of the OSI model. In the picture to the right, the data is coming from the database server. The bridge filters the data, sending the data to the correct locations. 3
  • 5. BRIDGED ETHERNET  The first step in the Ethernet evolution was the division of a LAN by bridges.  The term bridge was coined in the early 1980s.  Today, the terms LAN switch or (in the context of Ethernet) Ethernet switch are used.  Bridges have two effects on an Ethernet LAN: 1- They raise the bandwidth. 2- they separate collision domains.    Bridges are intermediate systems that forward MAC frames to destinations based on MAC addresses. Q. Is an Ethernet hub a bridge or a repeater ? What’s the difference ? A. It can be either a bridge or a repeater. “hub” is a product name, not an architecture name. Modern hubs are bridges. Old ones are repeaters.The difference is: a repeater is a layer 1 intermediate system (acts on bits) whereas a bridge is a layer 2 intermediate system (acts on entire MAC frames). Also: a bridge separates collision domains, a repeater does not hub hub hub 4
  • 6. HOW DOES A BRIDGE WORK? ___________________________ Bridges are similar to repeaters and network hubs, devices that connect at the physical layer, however, with bridging, traffic from one network is managed rather than simply rebroadcast to adjacent network segments. Bridges tend to be more complex than hubs or repeaters. Bridges can analyze incoming data packets to determine if the bridge is able to send the given packet to another segment of the network. Since bridging takes place at the data-link layer of the OSI model, a bridge processes the information from each frame of data it receives. In an Ethernet frame, this provides the MAC address of the frame's source and destination. Bridges use two methods to resolve the network segment that a MAC address belongs to. 5
  • 7. Bridged Ethernet_Effect 1. Raising the Bandwidth Stations shares the total bandwidth they are provided with. When we have more than one station they share the provided bandwidth hence we can put the bridge we can spilt the stations so that they can share the same bandwidth but the number of stations are less as it’s divided between stations. For example, We have 10 stations sharing 10 mbps now if we bridge them over 5-5 stations ,we will have 5 stations sharing the same 10mbps bandwidth, hence bridged connection can increase the bandwidth by above mentioned method. 6
  • 8. 2. Separating Collision Domains The collision domain becomes much smaller and the probability of collision is reduced tremendously. Without bridging, 12 stations contend for access to the medium; with bridging only 3 stations contend for access to the medium. 7
  • 10. SWITCHED ETHERNET  Consists of a several segments, each of which is shared by NICs attached to it. (Network interface controller “NIC”) The network is segmented into several collision domains.  Bridges, switches, and routers create the segment and collision domain boundaries.  Segments may contain hubs and repeaters. There is switch table and it’s build by (media access control address “MAC”) for each device  9
  • 11. SWITCHED ETHERNET Switch - 1 port per hub Hub Hub 10
  • 12. 11
  • 14. Full-duplex is a data communications term that refers to the ability to send and receive data at the same time.  The full-duplex mode increases the capacity of each domain (ex. from 10 to 20 Mbps).  instead of using one link between the station and the switch, the configuration uses two links: one to transmit and one to receive.  13
  • 15.  In full-duplex mode, both devices can transmit and receive to and from each other at the same time, and there is no collision domain. This doubles the aggregate bandwidth of the link and is sometimes advertised as double the link speed (e.g., 200 Mbit/s). o The elimination of the collision domain for these connections also means that all the link's bandwidth can be used by the two devices on that segment and that segment length is not limited by the need for correct collision detection. 14
  • 17. (CSMA/CD) Carrier Sense Multiple Access With Collision Detection  Collision: two transmissions interfere with each other  Station that wants to transmit first listens to check if another transmission is in progress (carrier sense).  If medium is in use, station waits; else, it transmits.  Collisions can still occur.  Transmitter waits for ACK; if no ACKs, retransmits. 16
  • 18. ETHERNET: CSMA/CD (CARRIER SENSE MULTIPLE ACCESS WITH COLLISION DETECTION)  Access method: method of controlling how network nodes access communications channels  CSMA/CD: Ethernet’s access method  Ethernet NICs listen on network Wait until no nodes transmitting data over the signal on the communications channel before transmission  Several Ethernet nodes can be connected to a network and can monitor traffic simultaneously  17 (Network interface controller “NIC”)
  • 19. In a full-duplex switched Ethernet, each station is connected to the switch via two separate links.  Each station or switch can send and receive independently without worrying about collision.  Each link is a point-to-point dedicated path between the station and the switch.  There is no longer a need for carrier sensing; there is no longer a need for collision detection. The job of the MAC layer becomes much easier.  The carrier sensing and collision detection functionalities of the MAC sublayer can be turned off.  18
  • 21. DEFINITION MAC    Specified by the technology being used. Determine who can transmit and when. Two types:  Deterministic: “Let’s take turns”.   Token-Ring, FDDI. Non-deterministic: “First come, first serve”.  Ethernet : CSMA/CD. 20
  • 23. NON-DETERMINISTIC MAC PROTOCOL  Carrier Sense Multiple Access with Collision Detection (CSMA/CD). 22
  • 24. USING MAC ADDRESSES Data A D Data A D Destination Address Source Address Data A D Data A D 23
  • 25. Thanks on your attentions Best regards Presented by : Malik S.Abeisat