SlideShare une entreprise Scribd logo
1  sur  20
Ethernet IEEE 802.3
Ethernet
IEEE 802.3 – Ethernet
Uses CSMA/CD technology. So Ethernet is a multiple access network. i.e.,
set of nodes send and receive frames over a shared link.
 CSMA/CD (Carrier sense Multiple Access / Collision Detect),
 Carrier sense – all nodes can distinguish between an idle and a busy line.
 Collision Detect – node listens as it transmit and can therefore detect when a
frame it is transmitting has collided with a frame transmitted by another node.
Uses ALOHA as the root protocol.
Digital Equipment Corporation and Intel joined Xerox to define 10Mbps
Ethernet standard in 1978.
This standard formed the basis for IEEE standard 802.3
Ethernet
Physical Mediums,
It includes 100Mbps fast Ethernet & 1000Mbps or 1Gbps
Gigabit Ethernet.
Others are 10Base5, 10Base2, 10BaseT, 100BaseT,
1Base5, 10Broad36.
Fast Ethernet
100 Base T4
–4 pairs of UTP
100 Base X
100 Base Tx
–2 pairs of UTP or STP
100 Base Tx
–2 optical fibers
Ethernet
Physical Properties,
 Initially Ethernet was implemented on a coaxial cable up to 500m.
 This cable is similar to the type used for cableTV except that it typically has an
impedance of 50 ohms instead of cable TV’s 75 ohms.
 Hosts connect to an Ethernet segment by tapping into it.
Transceiver,
 Small device directly attached to the tap that detects when the line is idle
and drives signal when the host is transmitting.
 It also receives incoming signal.
 The transceiver is connected to an Ethernet adaptor which is plugged into
the host.
 Protocol is implemented on the adaptor.
Ethernet
Ethernet
Repeater,
 Multiple Ethernet segments can be joined together by a repeater.
 It forwards a digital signal.
 No more than four repeaters may be positioned between any pair of hosts.
 Ethernet has a total reach of only 2500m.
 Any signal placed on the Ethernet by a host is broadcast over the entire network.
 Signal is propagated in both directions.
 Repeaters forward the signal on all outgoing segments.
 Terminators attached to the end of each segment absorb the signals.
 Ethernet uses Manchester encoding scheme.
Ethernet
In 10 Base 2 (thin Ethernet), the cable is thin, so T-joint spliced into the
cable instead of tap the cable. Therefore 10 Base 2 is used in daisy chain
configuration.
With 10 Base T, the common configuration is to have several point
segments coming out of a multiway repeater called Hub.
Ethernet
Access Protocol,
The algorithm is commonly called Ethernet’s Media Access Control (MAC).
 MAC is implemented on the network adaptor.
Ethernet
Preamble – allows the receiver to synchronize with signal (sequence of
alternating 0s & 1s)
Src & dest addr – unique address belongs to the adaptor in the source
and destination host.
Type – packet type acts as demux key to identify the higher level
protocol.
Data – original data up to 1500 bytes.
Minimally a frame must contain at least 46 bytes of data, because frame
must be long enough to detect collision.
CRC – error detection code.
Ethernet
Ethernet Addresses
 Every Ethernet host in the world has a unique Ethernet addresses.
 This address belongs to the adaptor on the host.
 It is usually burnt in to the ROM.
 Ethernet addresses are typically printed in a human readable format.
 Sequence of six numbers separated by colons.
 1 byte of the 6 bytes address is given by a pair of hexadecimal digits, one for each of
the 4 bit nibbles in the byte.
e.g,
8:0:2b:e4:b1:2 – 00001000 00000000 00101011 11100100 10110001 00000010
 To ensure that every adaptor gets a unique address, each manufacturer of Ethernet
device is allocated a different prefix that must be prepended to the address every
adaptor they build.
e.g,
AMD has assigned the 24bit prefix 8:0:20
Ethernet
EthernetTransmitting Algorithm
When the adaptor has a frame to send & line is idle, it transmits the frame
immediately.
The upper bound of 1500bytes in the message means that the
adaptor can occupy the line for a fixed length of time.
When the adaptor has a frame to send and the line is busy, it waits for the
line to go idle then transmits immediately.
Ethernet is said to be 1 – persistent protocol, because an adaptor with the
frame to send transmits with probability 1 whenever a busy line goes idle.
Ethernet
Since there is no centralized control, it is possible for two or more
adaptors to begin transmitting at the same time.
Either because both found the line to be idle.
or, both been waiting for a busy line to become idle.
When this happens, the two or more frames are said to be collide on the
network.
Ethernet
Collision Detection
Since Ethernet supports collision detection, so each sender is able to
determine that a collision in progress.
At the moment an adaptor detects that, its frame is colliding with another,
Transmitter will send a 32 bit jamming sequence with 64-bit
preamble (totally 96 bits)
This 96 bit frame is called as runt frame.
Ethernet
Worst cast scenario, (two nodes are at opposite ends of the Ethernet)
To know, the frame it just sent did not collide with another frame, the
transmitter may need to send as many as 512 bits.
512 bits (64 bytes) -> 14 bytes of header + 46 bytes of data + 4 bytes of
CRC
Why 512 bits & why its length is limited to 2500m?
The farther apart two nodes are, the longer it takes for a frame sent by
one to reach the other and the network is vulnerable to collision during
this time.
Ethernet
Fig. (a) A sends a frame at time t; (b) A’s frame arrives at B
at time t + d; (c) B begins transmitting at time t + d and
collides with A’s frame; (d) B’s runt (32-bit) frame arrives at
A at time t + 2d.
Ethernet
‘A’ begins transmitting frame at time ‘t’
 The first bit of A’s frame arrives at ‘B’ at time t + d, where d is one link
latency.
 Suppose an instant before host A’s frame arrives, host B begins to
transmit its own frame.
B’s frame will immediately collide with A’s frame and this frame collision
will be detected by host B.
Ethernet
Host B will send the 32 bit jamming sequence.
 Host A will not know that the collision occurred until B’s frame reaches it,
which will happen at t + (2*d)
Host A must continue to transmit until this time in order to detect
collision.
Determined delay in the maximally configured Ethernet (2500m long) is
51.2 s. i.e., delay on 10Mbps Ethernet corresponds to 512 bits.
By limiting the maximum length of the Ethernet to 2500m we can limit the
Ethernet’s maximum latency to 51.2 s (fairly small value). So the access
algorithm works efficiently.
Ethernet
Exponential Back off,
Once an adaptor has detected a collision & stopped its transmission, it
waits a certain amount of time and tries again.
Each time the adaptor tries to transmit but fails, it doubles the amount of
time it waits before trying again.
This strategy of doubling the delay interval between each
retransmission attempt is known as exponential back off.
Ethernet
The adaptor first delays either 0 or 51.2 s selected at random.
If this effort fails, it then waits 0, 51.2s, 102.4s, 153.6s… before trying
again.
i.e., k * 51.2s, k= 0,1,2,3.
After the third collision, it waits k * 51.2s, k=0… 23 – 1
In general, the algorithm randomly selects a ‘k’ between 0 and 2n – 1 &
waits for k * 51.2s where ‘n’ is the number of collisions experienced so
far.
Ethernet
Advantages
 Ethernets are easy to administer & maintain.
 There are no switches that can fail & no routing and configuration tables that have to be
kept up to date.
 Easy to add a new host to the network.
 In expensive (i.e., cable is cheap)
Disadvantages
 Ethernets work best under lightly loaded conditions.
 Most Ethernets are used in conservative way.
 Most Ethernets are far shorter than 2500m with a round trip delay of closer to 5s than
51.2s.

Contenu connexe

Tendances

IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11Keshav Maheshwari
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSDr. SELVAGANESAN S
 
MOBILE COMMUNICATION
MOBILE COMMUNICATIONMOBILE COMMUNICATION
MOBILE COMMUNICATIONjunnubabu
 
Switching Techniques
Switching TechniquesSwitching Techniques
Switching Techniquestameemyousaf
 
Introduction to switching & circuit switching
Introduction to switching & circuit switchingIntroduction to switching & circuit switching
Introduction to switching & circuit switchingDr Rajiv Srivastava
 
Flow & Error Control
Flow & Error ControlFlow & Error Control
Flow & Error Controltameemyousaf
 
Ethernet Computer network
Ethernet Computer networkEthernet Computer network
Ethernet Computer networkmiteshppt
 
The mac layer
The mac layerThe mac layer
The mac layeraazamk
 
Distance Vector & Link state Routing Algorithm
Distance Vector & Link state Routing AlgorithmDistance Vector & Link state Routing Algorithm
Distance Vector & Link state Routing AlgorithmMOHIT AGARWAL
 
Wireless LANs(IEEE802.11) Architecture
Wireless LANs(IEEE802.11) Architecture Wireless LANs(IEEE802.11) Architecture
Wireless LANs(IEEE802.11) Architecture Raj vardhan
 
User datagram protocol (udp)
User datagram protocol (udp)User datagram protocol (udp)
User datagram protocol (udp)Ramola Dhande
 
Ch 19 Network-layer protocols Section 1
Ch 19  Network-layer protocols Section 1Ch 19  Network-layer protocols Section 1
Ch 19 Network-layer protocols Section 1Hossam El-Deen Osama
 
ATM Networking Concept
ATM Networking ConceptATM Networking Concept
ATM Networking ConceptTushar Ranjan
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocolsMenaga Selvaraj
 

Tendances (20)

IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
 
MOBILE COMMUNICATION
MOBILE COMMUNICATIONMOBILE COMMUNICATION
MOBILE COMMUNICATION
 
Switching Techniques
Switching TechniquesSwitching Techniques
Switching Techniques
 
Introduction to switching & circuit switching
Introduction to switching & circuit switchingIntroduction to switching & circuit switching
Introduction to switching & circuit switching
 
Flow & Error Control
Flow & Error ControlFlow & Error Control
Flow & Error Control
 
Framing in data link layer
Framing in data link layerFraming in data link layer
Framing in data link layer
 
Ethernet Computer network
Ethernet Computer networkEthernet Computer network
Ethernet Computer network
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
6lowpan
6lowpan6lowpan
6lowpan
 
The mac layer
The mac layerThe mac layer
The mac layer
 
Distance Vector & Link state Routing Algorithm
Distance Vector & Link state Routing AlgorithmDistance Vector & Link state Routing Algorithm
Distance Vector & Link state Routing Algorithm
 
Wireless LANs(IEEE802.11) Architecture
Wireless LANs(IEEE802.11) Architecture Wireless LANs(IEEE802.11) Architecture
Wireless LANs(IEEE802.11) Architecture
 
IS-95 Cdma
IS-95 CdmaIS-95 Cdma
IS-95 Cdma
 
User datagram protocol (udp)
User datagram protocol (udp)User datagram protocol (udp)
User datagram protocol (udp)
 
Ch 19 Network-layer protocols Section 1
Ch 19  Network-layer protocols Section 1Ch 19  Network-layer protocols Section 1
Ch 19 Network-layer protocols Section 1
 
5 IEEE standards
5  IEEE standards5  IEEE standards
5 IEEE standards
 
ATM Networking Concept
ATM Networking ConceptATM Networking Concept
ATM Networking Concept
 
Ethernet
EthernetEthernet
Ethernet
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
 

En vedette

Ethernet - Networking presentation
Ethernet - Networking presentationEthernet - Networking presentation
Ethernet - Networking presentationViet Nguyen
 
Ethernet protocol
Ethernet protocolEthernet protocol
Ethernet protocolTom Chou
 
Seminar report of optical ethernet
Seminar report of optical ethernetSeminar report of optical ethernet
Seminar report of optical ethernetMohammad Waziruddin
 
Community Based Writing Tawnya 2006
Community Based Writing   Tawnya 2006Community Based Writing   Tawnya 2006
Community Based Writing Tawnya 2006Kevin Hodgson
 
3 12 2008 Myths & Realities Of Democratic Trustee Governance Of Public Commun...
3 12 2008 Myths & Realities Of Democratic Trustee Governance Of Public Commun...3 12 2008 Myths & Realities Of Democratic Trustee Governance Of Public Commun...
3 12 2008 Myths & Realities Of Democratic Trustee Governance Of Public Commun...michelletscott
 
Ethernet oam-tutorial srinath-beldona
Ethernet oam-tutorial srinath-beldonaEthernet oam-tutorial srinath-beldona
Ethernet oam-tutorial srinath-beldonaPuran Pangeni
 
Gigabit Ethernet
Gigabit EthernetGigabit Ethernet
Gigabit EthernetManasa K
 
M.A.C (Medium Access Control)
M.A.C (Medium Access Control)M.A.C (Medium Access Control)
M.A.C (Medium Access Control)JaironLanda
 
10 gigabit ethernet technology
10 gigabit ethernet technology10 gigabit ethernet technology
10 gigabit ethernet technologyLikan Patra
 
Domain name system presentation
Domain name system presentationDomain name system presentation
Domain name system presentationAnchit Dhingra
 
Rrjeta kompjuterike leksion 1
Rrjeta kompjuterike leksion 1  Rrjeta kompjuterike leksion 1
Rrjeta kompjuterike leksion 1 Xhendris Ismaili
 

En vedette (20)

Ethernet - Networking presentation
Ethernet - Networking presentationEthernet - Networking presentation
Ethernet - Networking presentation
 
Framing Protocols
Framing ProtocolsFraming Protocols
Framing Protocols
 
Ethernet protocol
Ethernet protocolEthernet protocol
Ethernet protocol
 
Ethernet technology
Ethernet technologyEthernet technology
Ethernet technology
 
Seminar report of optical ethernet
Seminar report of optical ethernetSeminar report of optical ethernet
Seminar report of optical ethernet
 
Framing
FramingFraming
Framing
 
Community Based Writing Tawnya 2006
Community Based Writing   Tawnya 2006Community Based Writing   Tawnya 2006
Community Based Writing Tawnya 2006
 
3 12 2008 Myths & Realities Of Democratic Trustee Governance Of Public Commun...
3 12 2008 Myths & Realities Of Democratic Trustee Governance Of Public Commun...3 12 2008 Myths & Realities Of Democratic Trustee Governance Of Public Commun...
3 12 2008 Myths & Realities Of Democratic Trustee Governance Of Public Commun...
 
Types of paragraph
Types of paragraphTypes of paragraph
Types of paragraph
 
Ethernet
EthernetEthernet
Ethernet
 
Ethernet oam-tutorial srinath-beldona
Ethernet oam-tutorial srinath-beldonaEthernet oam-tutorial srinath-beldona
Ethernet oam-tutorial srinath-beldona
 
Gigabit Ethernet
Gigabit EthernetGigabit Ethernet
Gigabit Ethernet
 
Mac sub layer
Mac sub layerMac sub layer
Mac sub layer
 
Rrjetat kompjuterike
Rrjetat kompjuterikeRrjetat kompjuterike
Rrjetat kompjuterike
 
M.A.C (Medium Access Control)
M.A.C (Medium Access Control)M.A.C (Medium Access Control)
M.A.C (Medium Access Control)
 
10 gigabit ethernet technology
10 gigabit ethernet technology10 gigabit ethernet technology
10 gigabit ethernet technology
 
Domain name system presentation
Domain name system presentationDomain name system presentation
Domain name system presentation
 
OSI MODEL
    OSI MODEL    OSI MODEL
OSI MODEL
 
Rrjeta kompjuterike leksion 1
Rrjeta kompjuterike leksion 1  Rrjeta kompjuterike leksion 1
Rrjeta kompjuterike leksion 1
 
Protocol & Type of Networks
Protocol & Type of NetworksProtocol & Type of Networks
Protocol & Type of Networks
 

Similaire à Ethernet

Ethernet 19 20
Ethernet 19 20Ethernet 19 20
Ethernet 19 20rajeshvbe
 
F06_Lecture7_etherne..
F06_Lecture7_etherne..F06_Lecture7_etherne..
F06_Lecture7_etherne..webhostingguy
 
IT_210_Week06_Forouzan_Chapter_13.ppt
IT_210_Week06_Forouzan_Chapter_13.pptIT_210_Week06_Forouzan_Chapter_13.ppt
IT_210_Week06_Forouzan_Chapter_13.pptشحرة فؤاد
 
MEDIUM ACCESS CONTROL Sublayer IN CN.ppt
MEDIUM ACCESS CONTROL Sublayer IN CN.pptMEDIUM ACCESS CONTROL Sublayer IN CN.ppt
MEDIUM ACCESS CONTROL Sublayer IN CN.pptssuser35e92d
 
3-MACSublayer.ppt
3-MACSublayer.ppt3-MACSublayer.ppt
3-MACSublayer.pptDigiPlexus
 
Chapter 2 -_lan_network_design - Network Design
Chapter 2 -_lan_network_design - Network DesignChapter 2 -_lan_network_design - Network Design
Chapter 2 -_lan_network_design - Network Designnakomuri
 
Ethernet networking
Ethernet networkingEthernet networking
Ethernet networkingRaghu nath
 
Advanced TCP/IP-based Industrial Networking for Engineers & Technicians
Advanced TCP/IP-based Industrial Networking for Engineers & TechniciansAdvanced TCP/IP-based Industrial Networking for Engineers & Technicians
Advanced TCP/IP-based Industrial Networking for Engineers & TechniciansLiving Online
 
Data communication part2
Data communication part2Data communication part2
Data communication part2Melvin Cabatuan
 

Similaire à Ethernet (20)

CS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKSCS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKS
 
Ethernet 19 20
Ethernet 19 20Ethernet 19 20
Ethernet 19 20
 
Mod9
Mod9Mod9
Mod9
 
Ethernet
EthernetEthernet
Ethernet
 
IEEE Standards
IEEE StandardsIEEE Standards
IEEE Standards
 
Mac
MacMac
Mac
 
F06_Lecture7_etherne..
F06_Lecture7_etherne..F06_Lecture7_etherne..
F06_Lecture7_etherne..
 
6 Ethernet
6 Ethernet6 Ethernet
6 Ethernet
 
Advance ethernet
Advance ethernetAdvance ethernet
Advance ethernet
 
IT_210_Week06_Forouzan_Chapter_13.ppt
IT_210_Week06_Forouzan_Chapter_13.pptIT_210_Week06_Forouzan_Chapter_13.ppt
IT_210_Week06_Forouzan_Chapter_13.ppt
 
Chapter 4ver2
Chapter 4ver2Chapter 4ver2
Chapter 4ver2
 
MEDIUM ACCESS CONTROL Sublayer IN CN.ppt
MEDIUM ACCESS CONTROL Sublayer IN CN.pptMEDIUM ACCESS CONTROL Sublayer IN CN.ppt
MEDIUM ACCESS CONTROL Sublayer IN CN.ppt
 
3-MACSublayer.ppt
3-MACSublayer.ppt3-MACSublayer.ppt
3-MACSublayer.ppt
 
Chapter 2 -_lan_network_design - Network Design
Chapter 2 -_lan_network_design - Network DesignChapter 2 -_lan_network_design - Network Design
Chapter 2 -_lan_network_design - Network Design
 
Fast_Ethernet.ppt
Fast_Ethernet.pptFast_Ethernet.ppt
Fast_Ethernet.ppt
 
Ethernet networking
Ethernet networkingEthernet networking
Ethernet networking
 
Lecture5
Lecture5Lecture5
Lecture5
 
Advanced TCP/IP-based Industrial Networking for Engineers & Technicians
Advanced TCP/IP-based Industrial Networking for Engineers & TechniciansAdvanced TCP/IP-based Industrial Networking for Engineers & Technicians
Advanced TCP/IP-based Industrial Networking for Engineers & Technicians
 
Data communication part2
Data communication part2Data communication part2
Data communication part2
 
Ethernet copy
Ethernet   copyEthernet   copy
Ethernet copy
 

Plus de selvakumar_b1985 (20)

Triggering transmission
Triggering transmissionTriggering transmission
Triggering transmission
 
Token ring
Token ringToken ring
Token ring
 
Subnetting
SubnettingSubnetting
Subnetting
 
Email Security
Email SecurityEmail Security
Email Security
 
RIP - Routing Information Protocol
RIP - Routing Information ProtocolRIP - Routing Information Protocol
RIP - Routing Information Protocol
 
Physical Mediums
Physical MediumsPhysical Mediums
Physical Mediums
 
OSPF - Routing Protocol
OSPF - Routing ProtocolOSPF - Routing Protocol
OSPF - Routing Protocol
 
Layering and Architecture
Layering and ArchitectureLayering and Architecture
Layering and Architecture
 
Issues in Data Link Layer
Issues in Data Link LayerIssues in Data Link Layer
Issues in Data Link Layer
 
Internetworking - IP
Internetworking - IPInternetworking - IP
Internetworking - IP
 
ICMP
ICMPICMP
ICMP
 
Hybrid Channel Access Link
Hybrid Channel Access LinkHybrid Channel Access Link
Hybrid Channel Access Link
 
Hypertext Transfer Protocol
Hypertext Transfer ProtocolHypertext Transfer Protocol
Hypertext Transfer Protocol
 
Addressing Scheme IPv4
Addressing Scheme IPv4Addressing Scheme IPv4
Addressing Scheme IPv4
 
File Transfer Protocol
File Transfer ProtocolFile Transfer Protocol
File Transfer Protocol
 
Flow Control
Flow ControlFlow Control
Flow Control
 
FDDI
FDDIFDDI
FDDI
 
Error control
Error controlError control
Error control
 
DNS
DNS DNS
DNS
 
DHCP
DHCPDHCP
DHCP
 

Dernier

2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projectssmsksolar
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086anil_gaur
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...soginsider
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoordharasingh5698
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...tanu pandey
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfRagavanV2
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringmulugeta48
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayEpec Engineered Technologies
 
22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf203318pmpc
 

Dernier (20)

2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf
 

Ethernet

  • 2. Ethernet IEEE 802.3 – Ethernet Uses CSMA/CD technology. So Ethernet is a multiple access network. i.e., set of nodes send and receive frames over a shared link.  CSMA/CD (Carrier sense Multiple Access / Collision Detect),  Carrier sense – all nodes can distinguish between an idle and a busy line.  Collision Detect – node listens as it transmit and can therefore detect when a frame it is transmitting has collided with a frame transmitted by another node. Uses ALOHA as the root protocol. Digital Equipment Corporation and Intel joined Xerox to define 10Mbps Ethernet standard in 1978. This standard formed the basis for IEEE standard 802.3
  • 3. Ethernet Physical Mediums, It includes 100Mbps fast Ethernet & 1000Mbps or 1Gbps Gigabit Ethernet. Others are 10Base5, 10Base2, 10BaseT, 100BaseT, 1Base5, 10Broad36. Fast Ethernet 100 Base T4 –4 pairs of UTP 100 Base X 100 Base Tx –2 pairs of UTP or STP 100 Base Tx –2 optical fibers
  • 4. Ethernet Physical Properties,  Initially Ethernet was implemented on a coaxial cable up to 500m.  This cable is similar to the type used for cableTV except that it typically has an impedance of 50 ohms instead of cable TV’s 75 ohms.  Hosts connect to an Ethernet segment by tapping into it. Transceiver,  Small device directly attached to the tap that detects when the line is idle and drives signal when the host is transmitting.  It also receives incoming signal.  The transceiver is connected to an Ethernet adaptor which is plugged into the host.  Protocol is implemented on the adaptor.
  • 6. Ethernet Repeater,  Multiple Ethernet segments can be joined together by a repeater.  It forwards a digital signal.  No more than four repeaters may be positioned between any pair of hosts.  Ethernet has a total reach of only 2500m.  Any signal placed on the Ethernet by a host is broadcast over the entire network.  Signal is propagated in both directions.  Repeaters forward the signal on all outgoing segments.  Terminators attached to the end of each segment absorb the signals.  Ethernet uses Manchester encoding scheme.
  • 7. Ethernet In 10 Base 2 (thin Ethernet), the cable is thin, so T-joint spliced into the cable instead of tap the cable. Therefore 10 Base 2 is used in daisy chain configuration. With 10 Base T, the common configuration is to have several point segments coming out of a multiway repeater called Hub.
  • 8. Ethernet Access Protocol, The algorithm is commonly called Ethernet’s Media Access Control (MAC).  MAC is implemented on the network adaptor.
  • 9. Ethernet Preamble – allows the receiver to synchronize with signal (sequence of alternating 0s & 1s) Src & dest addr – unique address belongs to the adaptor in the source and destination host. Type – packet type acts as demux key to identify the higher level protocol. Data – original data up to 1500 bytes. Minimally a frame must contain at least 46 bytes of data, because frame must be long enough to detect collision. CRC – error detection code.
  • 10. Ethernet Ethernet Addresses  Every Ethernet host in the world has a unique Ethernet addresses.  This address belongs to the adaptor on the host.  It is usually burnt in to the ROM.  Ethernet addresses are typically printed in a human readable format.  Sequence of six numbers separated by colons.  1 byte of the 6 bytes address is given by a pair of hexadecimal digits, one for each of the 4 bit nibbles in the byte. e.g, 8:0:2b:e4:b1:2 – 00001000 00000000 00101011 11100100 10110001 00000010  To ensure that every adaptor gets a unique address, each manufacturer of Ethernet device is allocated a different prefix that must be prepended to the address every adaptor they build. e.g, AMD has assigned the 24bit prefix 8:0:20
  • 11. Ethernet EthernetTransmitting Algorithm When the adaptor has a frame to send & line is idle, it transmits the frame immediately. The upper bound of 1500bytes in the message means that the adaptor can occupy the line for a fixed length of time. When the adaptor has a frame to send and the line is busy, it waits for the line to go idle then transmits immediately. Ethernet is said to be 1 – persistent protocol, because an adaptor with the frame to send transmits with probability 1 whenever a busy line goes idle.
  • 12. Ethernet Since there is no centralized control, it is possible for two or more adaptors to begin transmitting at the same time. Either because both found the line to be idle. or, both been waiting for a busy line to become idle. When this happens, the two or more frames are said to be collide on the network.
  • 13. Ethernet Collision Detection Since Ethernet supports collision detection, so each sender is able to determine that a collision in progress. At the moment an adaptor detects that, its frame is colliding with another, Transmitter will send a 32 bit jamming sequence with 64-bit preamble (totally 96 bits) This 96 bit frame is called as runt frame.
  • 14. Ethernet Worst cast scenario, (two nodes are at opposite ends of the Ethernet) To know, the frame it just sent did not collide with another frame, the transmitter may need to send as many as 512 bits. 512 bits (64 bytes) -> 14 bytes of header + 46 bytes of data + 4 bytes of CRC Why 512 bits & why its length is limited to 2500m? The farther apart two nodes are, the longer it takes for a frame sent by one to reach the other and the network is vulnerable to collision during this time.
  • 15. Ethernet Fig. (a) A sends a frame at time t; (b) A’s frame arrives at B at time t + d; (c) B begins transmitting at time t + d and collides with A’s frame; (d) B’s runt (32-bit) frame arrives at A at time t + 2d.
  • 16. Ethernet ‘A’ begins transmitting frame at time ‘t’  The first bit of A’s frame arrives at ‘B’ at time t + d, where d is one link latency.  Suppose an instant before host A’s frame arrives, host B begins to transmit its own frame. B’s frame will immediately collide with A’s frame and this frame collision will be detected by host B.
  • 17. Ethernet Host B will send the 32 bit jamming sequence.  Host A will not know that the collision occurred until B’s frame reaches it, which will happen at t + (2*d) Host A must continue to transmit until this time in order to detect collision. Determined delay in the maximally configured Ethernet (2500m long) is 51.2 s. i.e., delay on 10Mbps Ethernet corresponds to 512 bits. By limiting the maximum length of the Ethernet to 2500m we can limit the Ethernet’s maximum latency to 51.2 s (fairly small value). So the access algorithm works efficiently.
  • 18. Ethernet Exponential Back off, Once an adaptor has detected a collision & stopped its transmission, it waits a certain amount of time and tries again. Each time the adaptor tries to transmit but fails, it doubles the amount of time it waits before trying again. This strategy of doubling the delay interval between each retransmission attempt is known as exponential back off.
  • 19. Ethernet The adaptor first delays either 0 or 51.2 s selected at random. If this effort fails, it then waits 0, 51.2s, 102.4s, 153.6s… before trying again. i.e., k * 51.2s, k= 0,1,2,3. After the third collision, it waits k * 51.2s, k=0… 23 – 1 In general, the algorithm randomly selects a ‘k’ between 0 and 2n – 1 & waits for k * 51.2s where ‘n’ is the number of collisions experienced so far.
  • 20. Ethernet Advantages  Ethernets are easy to administer & maintain.  There are no switches that can fail & no routing and configuration tables that have to be kept up to date.  Easy to add a new host to the network.  In expensive (i.e., cable is cheap) Disadvantages  Ethernets work best under lightly loaded conditions.  Most Ethernets are used in conservative way.  Most Ethernets are far shorter than 2500m with a round trip delay of closer to 5s than 51.2s.