SlideShare une entreprise Scribd logo
1  sur  30
Ethernet
Dr.T.Thendral, Assistant Professor, SRCW
• Ethernet Cabling
• Manchester Encoding
• The Ethernet MAC Sublayer Protocol
• The Binary Exponential Backoff Algorithm
• Ethernet Performance
• Switched Ethernet
• Fast Ethernet
• Gigabit Ethernet
• IEEE 802.2: Logical Link Control
• Retrospective on Ethernet
Dr.T.Thendral, Assistant Professor, SRCW
Ethernet Cabling
• Finished our general discussion of channel allocation
protocols
• It is time to see how these principles apply to real
systems, in particular, LANs
• IEEE has standardized a number of local area networks
and metropolitan area networks under the name of
IEEE 802
• The most important of the survivors are 802.3
(Ethernet) and 802.11 (wireless LAN)
• With 802.15 (Bluetooth) and 802.16 (wireless MAN)
• Ethernet, the protocols and recent developments in
highspeed (gigabit) Ethernet
Dr.T.Thendral, Assistant Professor, SRCW
Ethernet Cabling
• ''Ethernet'' refers to the cable (the ether)
• Four types of cabling are commonly used, as
shown in Fig
Dr.T.Thendral, Assistant Professor, SRCW
• Detecting cable breaks, excessive length, bad taps, or loose
connectors can be a major problem with this media
• For this reason, techniques have been developed to track them
down
• Basically, a pulse of known shape is injected into the cable
• If the pulse hits an obstacle or the end of the cable, an echo will be
generated and sent back
• By carefully timing the interval between sending the pulse and
receiving the echo, it is possible to localize the origin of the echo
• This technique is called time domain reflectometry
• The problems associated with finding cable breaks drove systems
toward a different kind of wiring pattern, in which all stations have
a cable running to a central hub in which they are all connected
electrically
Dr.T.Thendral, Assistant Professor, SRCW
• Three wiring schemes are illustrated in Fig
Dr.T.Thendral, Assistant Professor, SRCW
• For 10Base5, a transceiver is clamped securely
around the cable so that its tap makes contact
with the inner core
• The transceiver contains the electronics that
handle carrier detection and collision detection
• When a collision is detected, the transceiver also
puts a special invalid signal on the cable to ensure
that all other transceivers also realize that a
collision has occurred
Dr.T.Thendral, Assistant Professor, SRCW
• 10Base5: a transceiver cable or drop cable
connects the transceiver to an interface board in
the computer
• The interface board contains a controller chip
that transmits frames to, and receives frames
from, the transceiver.
• 10Base2: The connection to the cable is just a
passive BNC T-junction connector
• The transceiver electronics are on the controller
board, and each station always has its own
transceiver.
Dr.T.Thendral, Assistant Professor, SRCW
• 10Base-T: There is no shared cable at all, just the
hub (a box full of electronics) to which each
station is connected by a dedicated (i.e., not
shared) cable
• A fourth cabling option for Ethernet is 10Base-F,
which uses fiber optics
• This alternative is expensive due to the cost of
the connectors and terminators, but it has
excellent noise immunity and is the method of
choice when running between buildings
Dr.T.Thendral, Assistant Professor, SRCW
• A repeater is a physical layer device
• It receives, amplifies (regenerates), and retransmits signals in both
directions
• As far as the software is concerned, a series of cable segments
connected by repeaters is no different from a single cable (except
for some delay introduced by the repeaters)
Dr.T.Thendral, Assistant Professor, SRCW
Manchester Encoding
• None of the versions of Ethernet uses straight binary encoding
with 0 volts for a 0 bit and 5 volts for a 1 bit because it leads to
ambiguities
• The start, end, or middle of each bit without reference to an
external clock
• Two such approaches are called Manchester encoding and
differential Manchester encoding
• With Manchester encoding, each bit period is divided into two
equal intervals
• A binary 1 bit is sent by having the voltage set high during
the first interval and low in the second one
• A binary 0 is just the reverse: first low and then high
Dr.T.Thendral, Assistant Professor, SRCW
Manchester encoding is shown in Fig. 4-16(b)
Differential Manchester encoding, shown in Fig. 4-16(c), is a variation of basic
Manchester encoding
Dr.T.Thendral, Assistant Professor, SRCW
The Ethernet MAC Sublayer Protocol
• The original DIX (DEC, Intel, Xerox) frame
structure is shown in Fig
• Each frame starts with a Preamble of 8 bytes
• The frame contains two addresses, one for the
destination and one for the source
• When a frame is sent to a group address, all the
stations in the group receive it
• Sending to a group of stations is called multicast
• The address consisting of all 1 bits is reserved for
broadcast
Dr.T.Thendral, Assistant Professor, SRCW
Dr.T.Thendral, Assistant Professor, SRCW
• Station tries to transmit a very short frame, it is conceivable that
a collision occurs, but the transmission completes before the
noise burst gets back at 2τ
• The sender will then incorrectly conclude that the frame was
successfully sent
• To prevent this situation from occurring, all frames must take
more than 2τ to send so that the transmission is still taking place
when the noise burst gets back to the sender.
Dr.T.Thendral, Assistant Professor, SRCW
• The final Ethernet field is the Checksum
• It is effectively a 32-bit hash code of the data
• If some data bits are erroneously received (due to
noise on the cable), the checksum will almost
certainly be wrong and the error will be detected
• The checksum algorithm is a cyclic redundancy check
(CRC)
• It just does error detection, not forward error
correction
Dr.T.Thendral, Assistant Professor, SRCW
The Binary Exponential Backoff Algorithm
• In general, after i collisions, a random number between 0 and
2i
• - 1 is chosen, and that number of slots is skipped
• However, after ten collisions have been reached, the
randomization interval is frozen at a maximum of 1023 slots
• After 16 collisions, the controller throws in the towel and
reports failure back to the computer
• Further recovery is up to higher layers
• This algorithm, called binary exponential backoff
Dr.T.Thendral, Assistant Professor, SRCW
Ethernet Performance
• The performance of Ethernet under conditions of heavy and
constant load, that is, k stations always ready to transmit
• A rigorous analysis of the binary exponential backoff
algorithm is complicated
• Instead, we will follow Metcalfe and Boggs (1976) and
assume a constant retransmission probability in each slot
• The channel efficiency is plotted versus number of ready
stations
Dr.T.Thendral, Assistant Professor, SRCW
Dr.T.Thendral, Assistant Professor, SRCW
Switched Ethernet
• The heart of this system is a switch containing a high-
speed backplane and room for typically 4 to 32 plug-
in line cards, each containing one to eight connectors
• Most often, each connector has a 10Base-T twisted
pair connection to a single host computer
Dr.T.Thendral, Assistant Professor, SRCW
Figure 4-20. A simple example of switched Ethernet.
Dr.T.Thendral, Assistant Professor, SRCW
Fast Ethernet
• To pump up the speed, various industry groups
proposed two new ring-based optical LANs
• One was called FDDI (Fiber Distributed Data
Interface) and the other was called Fibre Channel
• In any event, the failure of the optical LANs to
catch fire left a gap for garden-variety
• Ethernet at speeds above 10 Mbps
• Many installations needed more bandwidth and
thus had numerous 10-Mbps LANs connected by
a maze of repeaters, bridges, routers, and
gateways
Dr.T.Thendral, Assistant Professor, SRCW
• The 802.3 committee decided to go with a
souped-up Ethernet for three primary reasons:
• 1. The need to be backward compatible with
existing Ethernet LANs.
• 2. The fear that a new protocol might have
unforeseen problems.
• 3. The desire to get the job done before the
technology changed
Dr.T.Thendral, Assistant Professor, SRCW
Gigabit Ethernet
• Fast Ethernet standard when the 802
committee began working on a yet faster
Ethernet (1995)
• It was quickly dubbed gigabit Ethernet and
was ratified by IEEE in 1998 under the name
802.3z
Dr.T.Thendral, Assistant Professor, SRCW
• In the simplest gigabit Ethernet configuration, illustrated in
Fig. 4-22(a), two computers are directly connected to each
other
• common case, having a switch or a hub connected to multiple
computers
• and possibly additional switches or hubs, as shown in Fig. 4-
22(b)
• In both configurations each individual Ethernet cable has
exactly two devices on it, no more and no fewer
Dr.T.Thendral, Assistant Professor, SRCW
Dr.T.Thendral, Assistant Professor, SRCW
• Gigabit Ethernet uses new encoding rules on the
fibers
• The following two rules were used in making the
choices:
• 1. No codeword may have more than four identical
bits in a row.
• 2. No codeword may have more than six 0s or six 1s.
Dr.T.Thendral, Assistant Professor, SRCW
• There are also systems in which an error-
controlled, flow-controlled data link protocol
is desired
• IEEE has defined one that can run on top of
Ethernet and the other 802 protocols
• In addition, this protocol, called LLC (Logical
Link Control)
Dr.T.Thendral, Assistant Professor, SRCW
• LLC forms the upper half of the data link layer, with the
MAC sublayer below it, as shown in Fig
• Typical usage of LLC is as follows
• The network layer on the sending machine passes a packet to
LLC, using the LLC access primitives
• The LLC sublayer then adds an LLC header, containing
sequence and acknowledgement numbers
Dr.T.Thendral, Assistant Professor, SRCW
Retrospective on Ethernet
• Ethernet has been around for over 20 years and has
no serious competitors in sight, so it is likely to be
around for many years to come
• Few CPU architectures, operating systems, or
programming languages have been king of the
mountain for two decades going on three
• the main reason for it that Ethernet is simple and
flexible
• Ethernet has been able to evolve in certain crucial
ways
Dr.T.Thendral, Assistant Professor, SRCW

Contenu connexe

Similaire à Ethernet.ppt

Networking Chapter 4
Networking Chapter 4Networking Chapter 4
Networking Chapter 4
mlrbrown
 

Similaire à Ethernet.ppt (20)

Computer Networks IEEE 802.3 standard-2021.pptx
Computer Networks IEEE 802.3 standard-2021.pptxComputer Networks IEEE 802.3 standard-2021.pptx
Computer Networks IEEE 802.3 standard-2021.pptx
 
lecture01_tm.pptx
lecture01_tm.pptxlecture01_tm.pptx
lecture01_tm.pptx
 
A427 nic card
A427 nic cardA427 nic card
A427 nic card
 
NFPhysical Layer.pptx
NFPhysical Layer.pptxNFPhysical Layer.pptx
NFPhysical Layer.pptx
 
Lan basic
Lan basicLan basic
Lan basic
 
14929 UNIT STANDARD DESCRIBE COMPUTER CABLING.pptx
14929 UNIT STANDARD DESCRIBE COMPUTER CABLING.pptx14929 UNIT STANDARD DESCRIBE COMPUTER CABLING.pptx
14929 UNIT STANDARD DESCRIBE COMPUTER CABLING.pptx
 
Protocol and Interfaces - IPv4, IPv6, X.25 Protocol, X.75 Protocol
Protocol and Interfaces - IPv4, IPv6, X.25 Protocol, X.75 ProtocolProtocol and Interfaces - IPv4, IPv6, X.25 Protocol, X.75 Protocol
Protocol and Interfaces - IPv4, IPv6, X.25 Protocol, X.75 Protocol
 
Protocols and Interfaces - IPv4, IPv6, X.25, X.75
Protocols and Interfaces - IPv4, IPv6, X.25, X.75Protocols and Interfaces - IPv4, IPv6, X.25, X.75
Protocols and Interfaces - IPv4, IPv6, X.25, X.75
 
Et3003 sem2-1314-3 ethernets
Et3003 sem2-1314-3 ethernetsEt3003 sem2-1314-3 ethernets
Et3003 sem2-1314-3 ethernets
 
Advanced TCP/IP-based Industrial Networking for Engineers & Technicians
Advanced TCP/IP-based Industrial Networking for Engineers & TechniciansAdvanced TCP/IP-based Industrial Networking for Engineers & Technicians
Advanced TCP/IP-based Industrial Networking for Engineers & Technicians
 
Data communications_Network_Model (1).pdf
Data communications_Network_Model (1).pdfData communications_Network_Model (1).pdf
Data communications_Network_Model (1).pdf
 
Chapter 1 Introduction to computer networks ppt by DMB
Chapter 1 Introduction to computer networks ppt by DMBChapter 1 Introduction to computer networks ppt by DMB
Chapter 1 Introduction to computer networks ppt by DMB
 
Chapter 1 ppt by dmb
Chapter 1 ppt by dmbChapter 1 ppt by dmb
Chapter 1 ppt by dmb
 
Networking HMT-1
Networking HMT-1Networking HMT-1
Networking HMT-1
 
Wireless LANs PPT.ppt
Wireless LANs PPT.pptWireless LANs PPT.ppt
Wireless LANs PPT.ppt
 
Railway ofc training
Railway ofc trainingRailway ofc training
Railway ofc training
 
Networking Chapter 4
Networking Chapter 4Networking Chapter 4
Networking Chapter 4
 
osi
osi osi
osi
 
Ieee 802 standard
Ieee 802 standardIeee 802 standard
Ieee 802 standard
 
Asynchronous Transfer Mode ATM
Asynchronous Transfer Mode  ATMAsynchronous Transfer Mode  ATM
Asynchronous Transfer Mode ATM
 

Plus de DrTThendralCompSci

Unit 1 - Introduction to Software Engineering.ppt
Unit 1 - Introduction to Software Engineering.pptUnit 1 - Introduction to Software Engineering.ppt
Unit 1 - Introduction to Software Engineering.ppt
DrTThendralCompSci
 

Plus de DrTThendralCompSci (20)

Loader and linker.pptx
Loader and linker.pptxLoader and linker.pptx
Loader and linker.pptx
 
The Application Layer.ppt
The Application Layer.pptThe Application Layer.ppt
The Application Layer.ppt
 
Transport Layer.pptx
Transport Layer.pptxTransport Layer.pptx
Transport Layer.pptx
 
SOFTWARE QUALITY ASSURANCE.ppt
SOFTWARE QUALITY ASSURANCE.pptSOFTWARE QUALITY ASSURANCE.ppt
SOFTWARE QUALITY ASSURANCE.ppt
 
Software Configuration Management.ppt
Software Configuration Management.pptSoftware Configuration Management.ppt
Software Configuration Management.ppt
 
UNIT TESTING.pptx
UNIT TESTING.pptxUNIT TESTING.pptx
UNIT TESTING.pptx
 
SOFTWARE TESTING.pptx
SOFTWARE TESTING.pptxSOFTWARE TESTING.pptx
SOFTWARE TESTING.pptx
 
Software design and Software engineering.pptx
Software design and Software engineering.pptxSoftware design and Software engineering.pptx
Software design and Software engineering.pptx
 
NETWORK LAYER.ppt
NETWORK LAYER.pptNETWORK LAYER.ppt
NETWORK LAYER.ppt
 
Bluetooth.ppt
Bluetooth.pptBluetooth.ppt
Bluetooth.ppt
 
MEDIUM-ACCESS CONTROL SUB LAYER.ppt
MEDIUM-ACCESS CONTROL SUB LAYER.pptMEDIUM-ACCESS CONTROL SUB LAYER.ppt
MEDIUM-ACCESS CONTROL SUB LAYER.ppt
 
Software design and Software engineering.pptx
Software design and Software engineering.pptxSoftware design and Software engineering.pptx
Software design and Software engineering.pptx
 
Software prototyping.pptx
Software prototyping.pptxSoftware prototyping.pptx
Software prototyping.pptx
 
Requirement Engineering.ppt
Requirement Engineering.pptRequirement Engineering.ppt
Requirement Engineering.ppt
 
Unit 1 - Introduction to Software Engineering.ppt
Unit 1 - Introduction to Software Engineering.pptUnit 1 - Introduction to Software Engineering.ppt
Unit 1 - Introduction to Software Engineering.ppt
 
EFFECTIVE MODULAR DESIGN.pptx
EFFECTIVE MODULAR DESIGN.pptxEFFECTIVE MODULAR DESIGN.pptx
EFFECTIVE MODULAR DESIGN.pptx
 
UNIT I.ppt
UNIT I.pptUNIT I.ppt
UNIT I.ppt
 
PHYSICAL LAYER.ppt
PHYSICAL LAYER.pptPHYSICAL LAYER.ppt
PHYSICAL LAYER.ppt
 
PROCESS MODELS.ppt
PROCESS MODELS.pptPROCESS MODELS.ppt
PROCESS MODELS.ppt
 
Unit 1 - Introduction to Software Engineering.ppt
Unit 1 - Introduction to Software Engineering.pptUnit 1 - Introduction to Software Engineering.ppt
Unit 1 - Introduction to Software Engineering.ppt
 

Dernier

Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
EADTU
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
AnaAcapella
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
Peter Brusilovsky
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
CaitlinCummins3
 

Dernier (20)

Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
 
Including Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdfIncluding Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdf
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
 
Trauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesTrauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical Principles
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024
 
Improved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppImproved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio App
 
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportBasic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
 
Supporting Newcomer Multilingual Learners
Supporting Newcomer  Multilingual LearnersSupporting Newcomer  Multilingual Learners
Supporting Newcomer Multilingual Learners
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptx
 
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
 
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
 
Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...
 

Ethernet.ppt

  • 2. • Ethernet Cabling • Manchester Encoding • The Ethernet MAC Sublayer Protocol • The Binary Exponential Backoff Algorithm • Ethernet Performance • Switched Ethernet • Fast Ethernet • Gigabit Ethernet • IEEE 802.2: Logical Link Control • Retrospective on Ethernet Dr.T.Thendral, Assistant Professor, SRCW
  • 3. Ethernet Cabling • Finished our general discussion of channel allocation protocols • It is time to see how these principles apply to real systems, in particular, LANs • IEEE has standardized a number of local area networks and metropolitan area networks under the name of IEEE 802 • The most important of the survivors are 802.3 (Ethernet) and 802.11 (wireless LAN) • With 802.15 (Bluetooth) and 802.16 (wireless MAN) • Ethernet, the protocols and recent developments in highspeed (gigabit) Ethernet Dr.T.Thendral, Assistant Professor, SRCW
  • 4. Ethernet Cabling • ''Ethernet'' refers to the cable (the ether) • Four types of cabling are commonly used, as shown in Fig Dr.T.Thendral, Assistant Professor, SRCW
  • 5. • Detecting cable breaks, excessive length, bad taps, or loose connectors can be a major problem with this media • For this reason, techniques have been developed to track them down • Basically, a pulse of known shape is injected into the cable • If the pulse hits an obstacle or the end of the cable, an echo will be generated and sent back • By carefully timing the interval between sending the pulse and receiving the echo, it is possible to localize the origin of the echo • This technique is called time domain reflectometry • The problems associated with finding cable breaks drove systems toward a different kind of wiring pattern, in which all stations have a cable running to a central hub in which they are all connected electrically Dr.T.Thendral, Assistant Professor, SRCW
  • 6. • Three wiring schemes are illustrated in Fig Dr.T.Thendral, Assistant Professor, SRCW
  • 7. • For 10Base5, a transceiver is clamped securely around the cable so that its tap makes contact with the inner core • The transceiver contains the electronics that handle carrier detection and collision detection • When a collision is detected, the transceiver also puts a special invalid signal on the cable to ensure that all other transceivers also realize that a collision has occurred Dr.T.Thendral, Assistant Professor, SRCW
  • 8. • 10Base5: a transceiver cable or drop cable connects the transceiver to an interface board in the computer • The interface board contains a controller chip that transmits frames to, and receives frames from, the transceiver. • 10Base2: The connection to the cable is just a passive BNC T-junction connector • The transceiver electronics are on the controller board, and each station always has its own transceiver. Dr.T.Thendral, Assistant Professor, SRCW
  • 9. • 10Base-T: There is no shared cable at all, just the hub (a box full of electronics) to which each station is connected by a dedicated (i.e., not shared) cable • A fourth cabling option for Ethernet is 10Base-F, which uses fiber optics • This alternative is expensive due to the cost of the connectors and terminators, but it has excellent noise immunity and is the method of choice when running between buildings Dr.T.Thendral, Assistant Professor, SRCW
  • 10. • A repeater is a physical layer device • It receives, amplifies (regenerates), and retransmits signals in both directions • As far as the software is concerned, a series of cable segments connected by repeaters is no different from a single cable (except for some delay introduced by the repeaters) Dr.T.Thendral, Assistant Professor, SRCW
  • 11. Manchester Encoding • None of the versions of Ethernet uses straight binary encoding with 0 volts for a 0 bit and 5 volts for a 1 bit because it leads to ambiguities • The start, end, or middle of each bit without reference to an external clock • Two such approaches are called Manchester encoding and differential Manchester encoding • With Manchester encoding, each bit period is divided into two equal intervals • A binary 1 bit is sent by having the voltage set high during the first interval and low in the second one • A binary 0 is just the reverse: first low and then high Dr.T.Thendral, Assistant Professor, SRCW
  • 12. Manchester encoding is shown in Fig. 4-16(b) Differential Manchester encoding, shown in Fig. 4-16(c), is a variation of basic Manchester encoding Dr.T.Thendral, Assistant Professor, SRCW
  • 13. The Ethernet MAC Sublayer Protocol • The original DIX (DEC, Intel, Xerox) frame structure is shown in Fig • Each frame starts with a Preamble of 8 bytes • The frame contains two addresses, one for the destination and one for the source • When a frame is sent to a group address, all the stations in the group receive it • Sending to a group of stations is called multicast • The address consisting of all 1 bits is reserved for broadcast Dr.T.Thendral, Assistant Professor, SRCW
  • 15. • Station tries to transmit a very short frame, it is conceivable that a collision occurs, but the transmission completes before the noise burst gets back at 2τ • The sender will then incorrectly conclude that the frame was successfully sent • To prevent this situation from occurring, all frames must take more than 2τ to send so that the transmission is still taking place when the noise burst gets back to the sender. Dr.T.Thendral, Assistant Professor, SRCW
  • 16. • The final Ethernet field is the Checksum • It is effectively a 32-bit hash code of the data • If some data bits are erroneously received (due to noise on the cable), the checksum will almost certainly be wrong and the error will be detected • The checksum algorithm is a cyclic redundancy check (CRC) • It just does error detection, not forward error correction Dr.T.Thendral, Assistant Professor, SRCW
  • 17. The Binary Exponential Backoff Algorithm • In general, after i collisions, a random number between 0 and 2i • - 1 is chosen, and that number of slots is skipped • However, after ten collisions have been reached, the randomization interval is frozen at a maximum of 1023 slots • After 16 collisions, the controller throws in the towel and reports failure back to the computer • Further recovery is up to higher layers • This algorithm, called binary exponential backoff Dr.T.Thendral, Assistant Professor, SRCW
  • 18. Ethernet Performance • The performance of Ethernet under conditions of heavy and constant load, that is, k stations always ready to transmit • A rigorous analysis of the binary exponential backoff algorithm is complicated • Instead, we will follow Metcalfe and Boggs (1976) and assume a constant retransmission probability in each slot • The channel efficiency is plotted versus number of ready stations Dr.T.Thendral, Assistant Professor, SRCW
  • 20. Switched Ethernet • The heart of this system is a switch containing a high- speed backplane and room for typically 4 to 32 plug- in line cards, each containing one to eight connectors • Most often, each connector has a 10Base-T twisted pair connection to a single host computer Dr.T.Thendral, Assistant Professor, SRCW
  • 21. Figure 4-20. A simple example of switched Ethernet. Dr.T.Thendral, Assistant Professor, SRCW
  • 22. Fast Ethernet • To pump up the speed, various industry groups proposed two new ring-based optical LANs • One was called FDDI (Fiber Distributed Data Interface) and the other was called Fibre Channel • In any event, the failure of the optical LANs to catch fire left a gap for garden-variety • Ethernet at speeds above 10 Mbps • Many installations needed more bandwidth and thus had numerous 10-Mbps LANs connected by a maze of repeaters, bridges, routers, and gateways Dr.T.Thendral, Assistant Professor, SRCW
  • 23. • The 802.3 committee decided to go with a souped-up Ethernet for three primary reasons: • 1. The need to be backward compatible with existing Ethernet LANs. • 2. The fear that a new protocol might have unforeseen problems. • 3. The desire to get the job done before the technology changed Dr.T.Thendral, Assistant Professor, SRCW
  • 24. Gigabit Ethernet • Fast Ethernet standard when the 802 committee began working on a yet faster Ethernet (1995) • It was quickly dubbed gigabit Ethernet and was ratified by IEEE in 1998 under the name 802.3z Dr.T.Thendral, Assistant Professor, SRCW
  • 25. • In the simplest gigabit Ethernet configuration, illustrated in Fig. 4-22(a), two computers are directly connected to each other • common case, having a switch or a hub connected to multiple computers • and possibly additional switches or hubs, as shown in Fig. 4- 22(b) • In both configurations each individual Ethernet cable has exactly two devices on it, no more and no fewer Dr.T.Thendral, Assistant Professor, SRCW
  • 27. • Gigabit Ethernet uses new encoding rules on the fibers • The following two rules were used in making the choices: • 1. No codeword may have more than four identical bits in a row. • 2. No codeword may have more than six 0s or six 1s. Dr.T.Thendral, Assistant Professor, SRCW
  • 28. • There are also systems in which an error- controlled, flow-controlled data link protocol is desired • IEEE has defined one that can run on top of Ethernet and the other 802 protocols • In addition, this protocol, called LLC (Logical Link Control) Dr.T.Thendral, Assistant Professor, SRCW
  • 29. • LLC forms the upper half of the data link layer, with the MAC sublayer below it, as shown in Fig • Typical usage of LLC is as follows • The network layer on the sending machine passes a packet to LLC, using the LLC access primitives • The LLC sublayer then adds an LLC header, containing sequence and acknowledgement numbers Dr.T.Thendral, Assistant Professor, SRCW
  • 30. Retrospective on Ethernet • Ethernet has been around for over 20 years and has no serious competitors in sight, so it is likely to be around for many years to come • Few CPU architectures, operating systems, or programming languages have been king of the mountain for two decades going on three • the main reason for it that Ethernet is simple and flexible • Ethernet has been able to evolve in certain crucial ways Dr.T.Thendral, Assistant Professor, SRCW