SlideShare a Scribd company logo
1 of 31
Active Learning Assignment
Prepared by
Tejoy Vachhrajani(160110116057), Bhavik Vashi (160110116061),
Khyati Valera (160110116059)
Topic : Ethernet and Switches
Computer Networks (2140709)
2nd
Year B.E. (Information Technology) A.Y. 2017-18 Semester 4
G H Patel College of Engineering and Technology
Department of Information Technology
Date: 28th
Feb, 2018 Batch: 1D16Group No: D5
What Is Ethernet?
 A local-area network (LAN) protocol developed by Xerox.
 Corporation in cooperation with DEC and Intel in 1976.
 Ethernet uses a bus or star topology and supports data transfer rates of
10/100/1000 Mbps.
 The Ethernet specification served as the basis for the IEEE 802.3 standard, which
specifies the physical and lower software layers.
 Ethernet uses the CSMA/CD access method to handle simultaneous demands.
 Ethernet defines the lower two layers of the OSI Reference Model.
Ethernet Frame Structure
Ethernet Frame Structure
Preamble
Ethernet frame starts with 7-Bytes Preamble. This is pattern of
alternative 0’s and 1’s which indicates starting of the frame and allow
sender and receiver to establish bit synchronization.
Initially, PRE (Preamble) was introduced to allow for the loss of few bits
due to signal delays. But todays high-speed Ethernet don’t need
Preamble to protect the frame bits.
Ethernet Frame Structure
Start of frame delimiter (SFD)
This is a 1-Byte field which is always set to 10101011.
SFD indicates that upcoming bits are starting of frame, which is
destination address.
Sometimes SFD is considered the part of PRE, this is the reason
Ethernet Frame Structure
Destination Address – This is 6-Byte field which contains the MAC
address of machine for which data is destined.
Source Address – This is a 6-Byte field which contains the MAC
address of source machine.
As Source Address is always an individual address (Unicast), the least
significant bit of first byte is always 0..
Length – Length is a 2-Byte field, which indicates the length of entire
Ethernet Frame Structure
Destination Address – This is 6-Byte field which contains the MAC
address of machine for which data is destined.
Source Address – This is a 6-Byte field which contains the MAC
address of source machine.
As Source Address is always an individual address (Unicast), the least
significant bit of first byte is always 0..
Length – Length is a 2-Byte field, which indicates the length of entire
Ethernet Frame Structure
Data – This is the place where actual data is inserted, also known
as Payload.
Both IP header and data will be inserted here, if Internet Protocol is
used over Ethernet. The maximum data present may be as long as 1500
Bytes.
Cyclic Redundancy Check (CRC) – CRC is 4 Byte field. This field
contains 32-bits hash code of data, which is generated over Destination
Address, Source Address, Length and Data field.
Ethernet Frame Structure
Data –  This is the place where actual data is inserted, also known
as Payload.
Both IP header and data will be inserted here, if Internet Protocol is
used over Ethernet. The maximum data present may be as long as 1500
Bytes.
Cyclic Redundancy Check (CRC) – CRC is 4 Byte field. This field
contains 32-bits hash code of data, which is generated over Destination
Address, Source Address, Length and Data field.
Ethernet Cabling
Twisted Pair Cables
– Pairs of wires are twisted around one another.
– Each pair consists of two insulated copper wires
twisted together.
– High quality twisted pair cables have about 1 to 3
twists per inch.
– Twisted pair cables are used with the following
Ethernet physical layers:
• 10Base-T, 100Base-TX, 100Base-T2, 100Base-T4, and
1000Base-T
Ethernet Cabling
Coaxial Cables
– A solid center conductor is surrounded by an
insulating spacer.
• Insulating spacer in turn is surrounded by a tubular outer
conductor (usually a braid, foil or both).
– The entire assembly is then covered with an
insulating and protective outer layer.
– Coaxial cables have a wide bandwidth and are
capable of carrying many data, voice, and video
conversations simultaneously
Ethernet Cabling
Fiber Optics Cable
– Fiber optic cabling is a technology where electrical signals are converted into optical signals,
transmitted through a thin glass fiber, and re-converted into electrical signals.
– It is used on FOIRL, 10Base-FL, 10Base-FB, 10Base-FP, 100Base-FX, 1000Base-LX, and
1000Base-SX.
– Fiber optic cabling is constructed of three concentric layers:
1. The core : Is the central region of an optical fiber through
which light is transmitted.
2. The cladding: Is the material in the middle layer.
3. The protective layer: serves to protect the core and
cladding from damage.
CSMA / CD
CSMA/CD signifies carrier-sense multiple
access with collision detection,describes how
the Ethernet protocol regulates communication
among nodes.
Before a station transmits, it checks if another
station is transmitting. If the medium is quiet, the
station recognizes that this is an appropriate time
to transmit.
CSMA / CD
Limitations of Ethernet
Electrical signals propagate along a cable very quickly,
but they weaken as they travel, and electrical
interference from neighboring devices can scramble the
signal.
Distance limitation on the maximum separation between
two devices (called the network diameter) on an
Ethernet network.
In CSMA/CD only a single device can transmit at a given
time.
Interconnecting Devices
HUBS
- Connects two or more devices without having to connect to
each other directly.
 -uses twisted pair cable.
 -basic function: forward the data it received from a connected
device to all other connected devices regardless of whether the
data is destined for the device.
-comes in variety of shapes and sizes:
Interconnecting Devices
HUBS
Are of three types:
1. Passive Hubs:
provides a pathway for signals to travel
does not need power to operate
2. Active Hubs:
provides a pathway for signals to travel
regenerates the signals before passing it on
requires power to operate
3. Intelligent Hubs:
performs all the jobs of active and passive
helps in troubleshooting by pointing the actual
location of the problem.
Interconnecting Devices
HUBS
Interconnecting Devices
SWITCHES
• forwards data packages to only the destined device
• checks the MAC address found in the NIC to do so
• by forwarding the data to only the destined device, it reduces the number
of
collision in the network
• uses three methods to deal with the data’s as they arrive:
1. Cut through:
o Begins to forward the package as soon as it arrives
o No error checking performed
o Packet is moved quickly
2. Store and forward
o Waits to receive the entire package before forwarding it
o Basic error checking is performed
3. Fragment Free
o Built on the speed advantage of cut through
o Forwards package in fragments
Interconnecting Devices
SWITCHES
Interconnecting Devices
ROUTERS
• most commonly used to connect a home computer to an ISP
• derives it’s name from the fact that it can route data from onenetwork to
another.
• when it receives a packet of data, it reads the header of the
packet to determine the destination address.
• when address is determined, it looks in it’s routing table to see whether it knows
how to reach the destination.
•If it does know how to reach the destination it then forwards the data to the
next hop on the route.The next hop could be the final destination or another
router
Interconnecting Devices
ROUTERS
Switches:-
• A switch is a device in a computer network that connects
together other devices.
• Multiple data cables are plugged into a switch to enable
communication between different networked devices.
• Switches manage the flow of data across a network by
transmitting a received network packet only to the one or
more devices for which the packet is intended.
• Each networked device connected to a switch can be
identified by its network address, allowing the switch to
direct the flow of traffic maximizing the security and
efficiency of the network.
Switches:-
• Layer 1 Switch:-
• An Ethernet hub is a simple layer 1 network device
that does not manage any of the traffic coming
through it.
• Any packet entering a port is repeated to the output of
every other port except for the port of entry.
• A repeater hub can therefore only receive and forward
at a single speed.
• Since every packet is repeated on every other port,
packet collisions affect the entire network, limiting its
overall capacity.
Switches:-
• Layer 2 Switch:-
• Layer 2 switch performs at the physical and data link
layer.
• It is a bridge with many ports and a design that allows
better performance.
• Layer 2 switch operates using physical network
address identify individual devices.
Switches:-
• Layer 3 Switch:-
• Layer 3 switches use IP address that identifies location
on the network.
• They identifies the network/IP address as well as
physical devices.
• It finds the best way to send the packet to destination.
Switches:-
• Layer 4 Switch:-
• Layer 4 of the OSI model co-ordinates communication
between system.
• Layer 4 switch are capable of identifying which
application protocol (http , smtp ,ftp).
• Layer 4 checks the port number and supply the data
to next level.
Switches:-
• Layer 7 Switch:-
• Layer-7 switches may distribute the load based on uniform
resource locators (URLs), or by using some installation-
specific technique to recognize application-level
transactions.
• A layer-7 switch may include a web cache and participate
in a content delivery network (CDN).
Switches:-
ADVANTAGES OF SWITCHES
Switches increase available network bandwidth.
Switches reduce the workload on individual computers.
Switches increase network performance.
Networks that include switches experience fewer frame collisions
because switches create collision domains for each connection (a
process called micro segmentation).
Switches connect directly to workstations.
Switches:-
DISADVANTAGES OF SWITCHES
They are more expensive compare to network bridges.
Network connectivity issues are difficult to be traced through the network switch.
Broadcast traffic may be troublesome.
If switches are in promiscuous mode, they are vulnerable to security attacks e.g.
spoofing IP address or capturing of ethernet frames.
Proper design and configuration is needed in order to handle multicast packets.
While limiting broadcasts, they are not as good as routers.


More Related Content

What's hot (20)

IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11
 
Ethernet,token ring
Ethernet,token ring Ethernet,token ring
Ethernet,token ring
 
Ethernet
EthernetEthernet
Ethernet
 
Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer
 
Network Topologies
Network TopologiesNetwork Topologies
Network Topologies
 
Chapter5
Chapter5Chapter5
Chapter5
 
Network Layer by-adeel
Network Layer by-adeelNetwork Layer by-adeel
Network Layer by-adeel
 
Glimpse of carrier ethernet
Glimpse of carrier ethernetGlimpse of carrier ethernet
Glimpse of carrier ethernet
 
Computer networking
Computer networkingComputer networking
Computer networking
 
Ethernet
EthernetEthernet
Ethernet
 
Ethernet Frames Explained
Ethernet Frames ExplainedEthernet Frames Explained
Ethernet Frames Explained
 
Basic networking
Basic networkingBasic networking
Basic networking
 
Computer Network
Computer NetworkComputer Network
Computer Network
 
8251 a basic
8251 a basic8251 a basic
8251 a basic
 
Topologies
TopologiesTopologies
Topologies
 
Networking and Data Communications
Networking and Data CommunicationsNetworking and Data Communications
Networking and Data Communications
 
Computer network (12)
Computer network (12)Computer network (12)
Computer network (12)
 
Computer network switches & their structures
Computer network switches & their structuresComputer network switches & their structures
Computer network switches & their structures
 
Computer network transmission channel & topology
Computer network transmission channel & topologyComputer network transmission channel & topology
Computer network transmission channel & topology
 
IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5
 

Similar to Ethernet and switches

DISTIBUTED OPERATING SYSTEM
DISTIBUTED  OPERATING SYSTEM DISTIBUTED  OPERATING SYSTEM
DISTIBUTED OPERATING SYSTEM AjithaG9
 
COMPUTER NETWORKING SYSTEM
COMPUTER NETWORKING SYSTEMCOMPUTER NETWORKING SYSTEM
COMPUTER NETWORKING SYSTEMprapti borthakur
 
Advanced Network Chapter I: Which is very best lecture note
Advanced Network Chapter I: Which is very best lecture noteAdvanced Network Chapter I: Which is very best lecture note
Advanced Network Chapter I: Which is very best lecture noteabdisani3
 
Ethernet and token ring
Ethernet and token ringEthernet and token ring
Ethernet and token ringAbhijeet Shah
 
Capitulo 9 Exploration Network
Capitulo 9 Exploration NetworkCapitulo 9 Exploration Network
Capitulo 9 Exploration Networkfherjaramillo
 
presentation_internet.pptx
presentation_internet.pptxpresentation_internet.pptx
presentation_internet.pptxbantisworld
 
Welcome to Computer Networks
Welcome to Computer NetworksWelcome to Computer Networks
Welcome to Computer Networksfarhan516
 
A427 nic card
A427 nic cardA427 nic card
A427 nic cardsurajbhai
 
Basics of OSI and TCP IP Layers
Basics of OSI and TCP IP LayersBasics of OSI and TCP IP Layers
Basics of OSI and TCP IP Layershafsabanu
 
FDDI and SONET by Er.Anup-(IOE)
FDDI and SONET  by Er.Anup-(IOE)FDDI and SONET  by Er.Anup-(IOE)
FDDI and SONET by Er.Anup-(IOE)Anup Bista
 
Concept of networking
Concept of networkingConcept of networking
Concept of networkingsumit dimri
 

Similar to Ethernet and switches (20)

Network Devices
Network DevicesNetwork Devices
Network Devices
 
LAN TECHNOLOGLES
 LAN TECHNOLOGLES LAN TECHNOLOGLES
LAN TECHNOLOGLES
 
DISTIBUTED OPERATING SYSTEM
DISTIBUTED  OPERATING SYSTEM DISTIBUTED  OPERATING SYSTEM
DISTIBUTED OPERATING SYSTEM
 
COMPUTER NETWORKING SYSTEM
COMPUTER NETWORKING SYSTEMCOMPUTER NETWORKING SYSTEM
COMPUTER NETWORKING SYSTEM
 
Ethernet lan
Ethernet lanEthernet lan
Ethernet lan
 
Osi(1)
Osi(1)Osi(1)
Osi(1)
 
Advanced Network Chapter I: Which is very best lecture note
Advanced Network Chapter I: Which is very best lecture noteAdvanced Network Chapter I: Which is very best lecture note
Advanced Network Chapter I: Which is very best lecture note
 
Ethernet and token ring
Ethernet and token ringEthernet and token ring
Ethernet and token ring
 
Capitulo 9 Exploration Network
Capitulo 9 Exploration NetworkCapitulo 9 Exploration Network
Capitulo 9 Exploration Network
 
presentation_internet.pptx
presentation_internet.pptxpresentation_internet.pptx
presentation_internet.pptx
 
Mod9
Mod9Mod9
Mod9
 
Ethernet
EthernetEthernet
Ethernet
 
LAN
LANLAN
LAN
 
Welcome to Computer Networks
Welcome to Computer NetworksWelcome to Computer Networks
Welcome to Computer Networks
 
A427 nic card
A427 nic cardA427 nic card
A427 nic card
 
Basics of OSI and TCP IP Layers
Basics of OSI and TCP IP LayersBasics of OSI and TCP IP Layers
Basics of OSI and TCP IP Layers
 
Chapter 4ver2
Chapter 4ver2Chapter 4ver2
Chapter 4ver2
 
FDDI and SONET by Er.Anup-(IOE)
FDDI and SONET  by Er.Anup-(IOE)FDDI and SONET  by Er.Anup-(IOE)
FDDI and SONET by Er.Anup-(IOE)
 
Concept of networking
Concept of networkingConcept of networking
Concept of networking
 
lis508p02a-10.ppt
lis508p02a-10.pptlis508p02a-10.ppt
lis508p02a-10.ppt
 

More from Bhavik Vashi

Runge Kutta Method
Runge Kutta Method Runge Kutta Method
Runge Kutta Method Bhavik Vashi
 
Rate monotonic scheduling- Operating System
Rate monotonic scheduling- Operating SystemRate monotonic scheduling- Operating System
Rate monotonic scheduling- Operating SystemBhavik Vashi
 
Data Structure Radix Sort
Data Structure Radix SortData Structure Radix Sort
Data Structure Radix SortBhavik Vashi
 
File management in OS
File management in OSFile management in OS
File management in OSBhavik Vashi
 
Types of Constructor in C++
Types of Constructor in C++Types of Constructor in C++
Types of Constructor in C++Bhavik Vashi
 
Parallel processing (simd and mimd)
Parallel processing (simd and mimd)Parallel processing (simd and mimd)
Parallel processing (simd and mimd)Bhavik Vashi
 
Fiscal Policy & Monetary Policy
Fiscal Policy & Monetary PolicyFiscal Policy & Monetary Policy
Fiscal Policy & Monetary PolicyBhavik Vashi
 
Projection of lines
Projection of linesProjection of lines
Projection of linesBhavik Vashi
 
Most Successful People & Personality
Most Successful People & Personality Most Successful People & Personality
Most Successful People & Personality Bhavik Vashi
 
Global Need of the World
Global Need of the WorldGlobal Need of the World
Global Need of the WorldBhavik Vashi
 
Functions of stdio conio
Functions of stdio   conio Functions of stdio   conio
Functions of stdio conio Bhavik Vashi
 
Impact of social media
Impact of social mediaImpact of social media
Impact of social mediaBhavik Vashi
 

More from Bhavik Vashi (20)

Aws ec2
Aws ec2Aws ec2
Aws ec2
 
MACRO PROCESSOR
MACRO PROCESSORMACRO PROCESSOR
MACRO PROCESSOR
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Linear Sorting
Linear SortingLinear Sorting
Linear Sorting
 
Colormodels
ColormodelsColormodels
Colormodels
 
Kruskal Algorithm
Kruskal AlgorithmKruskal Algorithm
Kruskal Algorithm
 
Runge Kutta Method
Runge Kutta Method Runge Kutta Method
Runge Kutta Method
 
Rate monotonic scheduling- Operating System
Rate monotonic scheduling- Operating SystemRate monotonic scheduling- Operating System
Rate monotonic scheduling- Operating System
 
Data Structure Radix Sort
Data Structure Radix SortData Structure Radix Sort
Data Structure Radix Sort
 
File management in OS
File management in OSFile management in OS
File management in OS
 
Types of Constructor in C++
Types of Constructor in C++Types of Constructor in C++
Types of Constructor in C++
 
Parallel processing (simd and mimd)
Parallel processing (simd and mimd)Parallel processing (simd and mimd)
Parallel processing (simd and mimd)
 
Fiscal Policy & Monetary Policy
Fiscal Policy & Monetary PolicyFiscal Policy & Monetary Policy
Fiscal Policy & Monetary Policy
 
Diwali Light
Diwali LightDiwali Light
Diwali Light
 
Heat transfer
Heat transferHeat transfer
Heat transfer
 
Projection of lines
Projection of linesProjection of lines
Projection of lines
 
Most Successful People & Personality
Most Successful People & Personality Most Successful People & Personality
Most Successful People & Personality
 
Global Need of the World
Global Need of the WorldGlobal Need of the World
Global Need of the World
 
Functions of stdio conio
Functions of stdio   conio Functions of stdio   conio
Functions of stdio conio
 
Impact of social media
Impact of social mediaImpact of social media
Impact of social media
 

Recently uploaded

Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwaitjaanualu31
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Ramkumar k
 
Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257subhasishdas79
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...drmkjayanthikannan
 
8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessor8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessorAshwiniTodkar4
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdfKamal Acharya
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptAfnanAhmad53
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdfKamal Acharya
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...josephjonse
 
Path loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata ModelPath loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata ModelDrAjayKumarYadav4
 
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesLinux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesRashidFaridChishti
 
Introduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptxIntroduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptxhublikarsn
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdfKamal Acharya
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...Amil baba
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"mphochane1998
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network DevicesChandrakantDivate1
 

Recently uploaded (20)

Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessor8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessor
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .ppt
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
 
Path loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata ModelPath loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata Model
 
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesLinux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Introduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptxIntroduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptx
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 

Ethernet and switches

  • 1. Active Learning Assignment Prepared by Tejoy Vachhrajani(160110116057), Bhavik Vashi (160110116061), Khyati Valera (160110116059) Topic : Ethernet and Switches Computer Networks (2140709) 2nd Year B.E. (Information Technology) A.Y. 2017-18 Semester 4 G H Patel College of Engineering and Technology Department of Information Technology Date: 28th Feb, 2018 Batch: 1D16Group No: D5
  • 2. What Is Ethernet?  A local-area network (LAN) protocol developed by Xerox.  Corporation in cooperation with DEC and Intel in 1976.  Ethernet uses a bus or star topology and supports data transfer rates of 10/100/1000 Mbps.  The Ethernet specification served as the basis for the IEEE 802.3 standard, which specifies the physical and lower software layers.  Ethernet uses the CSMA/CD access method to handle simultaneous demands.  Ethernet defines the lower two layers of the OSI Reference Model.
  • 4. Ethernet Frame Structure Preamble Ethernet frame starts with 7-Bytes Preamble. This is pattern of alternative 0’s and 1’s which indicates starting of the frame and allow sender and receiver to establish bit synchronization. Initially, PRE (Preamble) was introduced to allow for the loss of few bits due to signal delays. But todays high-speed Ethernet don’t need Preamble to protect the frame bits.
  • 5. Ethernet Frame Structure Start of frame delimiter (SFD) This is a 1-Byte field which is always set to 10101011. SFD indicates that upcoming bits are starting of frame, which is destination address. Sometimes SFD is considered the part of PRE, this is the reason
  • 6. Ethernet Frame Structure Destination Address – This is 6-Byte field which contains the MAC address of machine for which data is destined. Source Address – This is a 6-Byte field which contains the MAC address of source machine. As Source Address is always an individual address (Unicast), the least significant bit of first byte is always 0.. Length – Length is a 2-Byte field, which indicates the length of entire
  • 7. Ethernet Frame Structure Destination Address – This is 6-Byte field which contains the MAC address of machine for which data is destined. Source Address – This is a 6-Byte field which contains the MAC address of source machine. As Source Address is always an individual address (Unicast), the least significant bit of first byte is always 0.. Length – Length is a 2-Byte field, which indicates the length of entire
  • 8. Ethernet Frame Structure Data – This is the place where actual data is inserted, also known as Payload. Both IP header and data will be inserted here, if Internet Protocol is used over Ethernet. The maximum data present may be as long as 1500 Bytes. Cyclic Redundancy Check (CRC) – CRC is 4 Byte field. This field contains 32-bits hash code of data, which is generated over Destination Address, Source Address, Length and Data field.
  • 9. Ethernet Frame Structure Data –  This is the place where actual data is inserted, also known as Payload. Both IP header and data will be inserted here, if Internet Protocol is used over Ethernet. The maximum data present may be as long as 1500 Bytes. Cyclic Redundancy Check (CRC) – CRC is 4 Byte field. This field contains 32-bits hash code of data, which is generated over Destination Address, Source Address, Length and Data field.
  • 10. Ethernet Cabling Twisted Pair Cables – Pairs of wires are twisted around one another. – Each pair consists of two insulated copper wires twisted together. – High quality twisted pair cables have about 1 to 3 twists per inch. – Twisted pair cables are used with the following Ethernet physical layers: • 10Base-T, 100Base-TX, 100Base-T2, 100Base-T4, and 1000Base-T
  • 12. Ethernet Cabling Fiber Optics Cable – Fiber optic cabling is a technology where electrical signals are converted into optical signals, transmitted through a thin glass fiber, and re-converted into electrical signals. – It is used on FOIRL, 10Base-FL, 10Base-FB, 10Base-FP, 100Base-FX, 1000Base-LX, and 1000Base-SX. – Fiber optic cabling is constructed of three concentric layers: 1. The core : Is the central region of an optical fiber through which light is transmitted. 2. The cladding: Is the material in the middle layer. 3. The protective layer: serves to protect the core and cladding from damage.
  • 13. CSMA / CD CSMA/CD signifies carrier-sense multiple access with collision detection,describes how the Ethernet protocol regulates communication among nodes. Before a station transmits, it checks if another station is transmitting. If the medium is quiet, the station recognizes that this is an appropriate time to transmit.
  • 15. Limitations of Ethernet Electrical signals propagate along a cable very quickly, but they weaken as they travel, and electrical interference from neighboring devices can scramble the signal. Distance limitation on the maximum separation between two devices (called the network diameter) on an Ethernet network. In CSMA/CD only a single device can transmit at a given time.
  • 17. Interconnecting Devices HUBS Are of three types: 1. Passive Hubs: provides a pathway for signals to travel does not need power to operate 2. Active Hubs: provides a pathway for signals to travel regenerates the signals before passing it on requires power to operate 3. Intelligent Hubs: performs all the jobs of active and passive helps in troubleshooting by pointing the actual location of the problem.
  • 19. Interconnecting Devices SWITCHES • forwards data packages to only the destined device • checks the MAC address found in the NIC to do so • by forwarding the data to only the destined device, it reduces the number of collision in the network • uses three methods to deal with the data’s as they arrive: 1. Cut through: o Begins to forward the package as soon as it arrives o No error checking performed o Packet is moved quickly 2. Store and forward o Waits to receive the entire package before forwarding it o Basic error checking is performed 3. Fragment Free o Built on the speed advantage of cut through o Forwards package in fragments
  • 21. Interconnecting Devices ROUTERS • most commonly used to connect a home computer to an ISP • derives it’s name from the fact that it can route data from onenetwork to another. • when it receives a packet of data, it reads the header of the packet to determine the destination address. • when address is determined, it looks in it’s routing table to see whether it knows how to reach the destination. •If it does know how to reach the destination it then forwards the data to the next hop on the route.The next hop could be the final destination or another router
  • 23. Switches:- • A switch is a device in a computer network that connects together other devices. • Multiple data cables are plugged into a switch to enable communication between different networked devices. • Switches manage the flow of data across a network by transmitting a received network packet only to the one or more devices for which the packet is intended. • Each networked device connected to a switch can be identified by its network address, allowing the switch to direct the flow of traffic maximizing the security and efficiency of the network.
  • 24. Switches:- • Layer 1 Switch:- • An Ethernet hub is a simple layer 1 network device that does not manage any of the traffic coming through it. • Any packet entering a port is repeated to the output of every other port except for the port of entry. • A repeater hub can therefore only receive and forward at a single speed. • Since every packet is repeated on every other port, packet collisions affect the entire network, limiting its overall capacity.
  • 25. Switches:- • Layer 2 Switch:- • Layer 2 switch performs at the physical and data link layer. • It is a bridge with many ports and a design that allows better performance. • Layer 2 switch operates using physical network address identify individual devices.
  • 26. Switches:- • Layer 3 Switch:- • Layer 3 switches use IP address that identifies location on the network. • They identifies the network/IP address as well as physical devices. • It finds the best way to send the packet to destination.
  • 27. Switches:- • Layer 4 Switch:- • Layer 4 of the OSI model co-ordinates communication between system. • Layer 4 switch are capable of identifying which application protocol (http , smtp ,ftp). • Layer 4 checks the port number and supply the data to next level.
  • 28. Switches:- • Layer 7 Switch:- • Layer-7 switches may distribute the load based on uniform resource locators (URLs), or by using some installation- specific technique to recognize application-level transactions. • A layer-7 switch may include a web cache and participate in a content delivery network (CDN).
  • 29. Switches:- ADVANTAGES OF SWITCHES Switches increase available network bandwidth. Switches reduce the workload on individual computers. Switches increase network performance. Networks that include switches experience fewer frame collisions because switches create collision domains for each connection (a process called micro segmentation). Switches connect directly to workstations.
  • 30. Switches:- DISADVANTAGES OF SWITCHES They are more expensive compare to network bridges. Network connectivity issues are difficult to be traced through the network switch. Broadcast traffic may be troublesome. If switches are in promiscuous mode, they are vulnerable to security attacks e.g. spoofing IP address or capturing of ethernet frames. Proper design and configuration is needed in order to handle multicast packets. While limiting broadcasts, they are not as good as routers.
  • 31.