SlideShare a Scribd company logo
1 of 34
EthernetPushpa
Computer Networking
• A group of computer systems or any hardware device linked together
Through communication channel Facilitate communication and
resource sharing.
OSI Model
• There are n number of users who use computer network and are
located over the world.
• So to ensure national and worldwide data communication systems
can be developed and are compatible to each other.
• ISO has developed OSI model. ISO stands for international
organization of Standardization.
• This is called a model for open system interconnection(OSI) and is
normally called as OSI model.
7-Layer Architecture
Physical Layer
• Representation of Bits: Data in this layer consist of stream of bits.
• Data Rate: This layer defines the rate of transmission which is the number of bits per
second.
• Synchronization: It deals with the synchronization of the transmitter and receiver.The
sender and receiver are synchronized at bit level.
• Interface: The physical layer defines the transmission interface between device and
transmission medium.
• Line configuration: This layer connects device with the medium: point to point
configuration and Multipoint configuration.
• Topologies: Device must be connected using the following topologies: Mesh,Star,Ring
and Bus.
• Transmission Modes: Physical layer defines the direction of transmission between two
devices: Simplex,Half Duplex,Full Duplex.
• Transmission: Deals with base band and broadband transmission.
Base Band and Broad Band
• Base Band:
• Data is sent as digital signals through the media as a single channel that uses
the entire bandwidth of the media.
• Base band comm is bi-directional, which means that the same channel can be
used to send and receive signals.
• In baseband, frequency division multiplexing is not possible.
• Broadband:
• Broad band sends information in the form of an analog signal.
• Each transmission is assigned to a portion of the bandwidth, hence multiple
transmissions are possible at the same time.
• Broadband communication is unidirectional, so in order to send and
receive,two pathways are needed.
Data Link Layer
• Framing: Frames are the stream of bits received from the network layer into
manageable data units. This division of stream of bits is done by Data link layer.
• Physical Addressing: The data link layer adds a header to the frame in order to
define physical address of the sender or receiver of the frame, if the frames are
to be distributed to different systems on the network.
• Flow control: A flow control mechanism for frames to be sent.
• Error control: Error control is achieved by adding a trailer at the end of the frame.
Duplication of frames are also prevented by using this mechanism.Data link layer
adds mechanism to prevent duplication of frames.
• Access control: Protocols of this layer determine which of the devices has control
over the link at any given time, when two or more devices are connected to the
same link.
Network Layer
• The main aim of this layer is to deliver packets from source to
destination across multiple links(networks).
• If two computers(system) are connected on the same link then there
is no need for a network layer.
• It routes the signal through different channels to the other end and
acts as a network controller.
• It also divides the outgoing messages into packets and to assemble
incoming packets into messages for higher levels.
Transport Layer
• Transport layer breaks the message (data)into small units so that they
are handled more efficiently by the network layer and ensures that
message arrives in order by checking error and flow control.
• Service point Addressing: Transport layer header includes service
point address which is port address. This layer gets the message to
the correct process on the computer unlike Network layer, which gets
each packet to the correct computer.
• Segmentation and Reassembling: A message is divided into segments,
each segment contains sequence number, which enables this layer in
reassembling the message. Message is reassembled correctly upon
arrival at the destination and replaces packets which were lost is
transmission.
Continue..
• Connection Control: It includes 2 types: Connectionless Transport
Layer and Connection Oriented Transport Layer.
• Flow Control: In this layer, flow control is performed end to end.
• Error Control: Error control is performed end to end in this layer to
ensure that the complete message arrives at the receiving transport
layer without any error. Error correction is done through
retransmission.
Session Layer
• Its main aim is to establish, maintain and synchronize the interaction
between communicating system. Session layer manages and synchronize the
conversation between two different applications.
• Transfer of data from one destination to another session layer stream of
data are marked and are resynchronized properly, so that the ends of the
messages are not cut prematurely and data loss is avoided.
• Dialog Control: This layer allows two system to start communication with
each other in half-duplex or full –duplex.
• Synchronization: This layer allows a process to add checkpoints which are
considered as synchronization points into stream of data.
• Example: If a system is sending a file of 800 pages, adding checkpoints after
every 50 pages is recommended. This ensures that 50 pages unit is
successfully received and acknowledged. This is beneficial at the time of
crash as if a crash happens att page number 110.there is no need to
retransmit 1to100 pages.
Presentation Layer
• The primary goal of this layer is to take care of the syntax and semantics of
the information exchanged between two communicating systems.
Presentation layer takes care that the data is sent in such a way that the
receiver will understand the information (data) and will be able to use the
data. Languages(syntax)can be differ of the two communication systems.
Under this condition presentation layer plays a role translator.
• Transaction: Before being transmitted, information in the form of
characters and numbers should be changed to bit stream. The presentation
layer is responsible for interoperability between encoding methods as
different computers use different encoding methods. It translates the data
between the formats the network requires and the format the computer.
Continue..
• Encryption: It carries out encryption at the transmitter and
decryption at the receiver.
• Compression: It carries out data compression to reduce the
bandwidth of the data to be transmitted. The primary role of Data
compression is to reduce the number of bits to be transmitted. It is
important in transmitting multimedia such as audio, video,text etc.
Application Layer
• It is the top most layer of OSI Model. Manipulation of data(information)in
various ways is done in this layer which enables user or software to get
access to the network. Some services provided by this layer includes:E-
mail, transferring of files, distributing the result to user, directory services,
network resource etc.
• Mail services: This layer provides the basic for E-mail forwarding and
storage.
• Network Virtual Terminal: It allows a user to log on to a remote host. The
application creates software emulation of a terminal at the remote host.
Users computer talks to the software terminal which in turn talks to the
host and vice versa. Then the remote host believes it is communicating
with one of its own terminals and allows user to log on.
Continue..
• Directory Services: This layer provides access for global information
about various services.
• File Transfer, Access and Management(FTAM):It is a standard
mechanism to access files and manages it. Users can access files in a
remote computer and manage it. They can also retrieve files from a
remote computer.
IEEE Standards
Topologies
• Bus network topology -- Also known as backbone network topology, this configuration
connects all devices to a main cable via drop lines. The advantages of bus network
topology lie in its simplicity, as there is less cable required than in alternative topologies,
which makes for easy installation.
• Mesh network topology -- A dedicated point-to-point link connects each device on the
network to another device on the network, only carrying data between two devices.
• Ring network topology -- Two dedicated point-to-point links connect a device to the two
devices located on either side of it, creating a ring of devices through which data is
forwarded via repeaters until it reaches the target device.
• Star network topology -- The most common network topology, star topology connects
each device in the network to a central hub. Devices can only communicate with each
other indirectly through the central hub.
• Hybrid network topology -- Any combination of two or more topologies is a hybrid
topology.
• Tree network topology -- This topology consists of a parent-child hierarchy in which star
networks are interconnected via bus networks. Nodes branch out linearly from one root
node, and two connected nodes only share one mutual connection
Ethernet
• Standard for connecting computer to computer or other digital device
• The term Ethernet refers to the family of local-area-
network(LAN)Products covered by the IEEE 802.3 standard that
defines what is commonly known as the CSMA/CD protocol.
• Ethernet LAN consist of network nodes and interconnecting media.
Ethernet Network Elements
• Data terminal equipment(DTE)
--Source/destination of data
--PC
• Data communication equipment (DCE)
--Receive/forward the information
--Repeater ,routers
Ethernet and OSI
Ethernet MAC Layer
• Data encapsulation, including frame assembly before transmission,
and frame parsing/error detection during and after reception.
• Media access control, including initiation of frame transmission and
recovery from transmission failure
Ethernet MAC Client
• LLC(Logic Link Control):
• If the units is DTE
• If provides the interface between MAC and Upper layers
• Bridge entity:
• If the unit is DCE
• LAN to LAN interface
CSMA/CD
• Carrier Sense:
• Each station continuously listens for traffic on the medium to determine when
gaps between frame transmission occur.
• Multiple access:
• Stations may begin transmitting any time they detect that the network is
quite.
• Collision detect:
• If two or more station in the same CSMA/CD network (collision domain)begin
transmitting at approximately the same time,the bit stream from the
transmitting stations will interfere (collide)with each other,and both
transmissions will be unreable
Half Duplex Full Duplex
• Half Duplex:
• Transmission only in one direction
• Employs CSMA/CD and retransmits if collision is detected
• Not efficient
• Full Duplex:
• Two pairs of wires
• Fast data transmission than half duplex
• Collision does not happen in full duplex
Frame and Packet
• Frame :Data unit at data link layer
• Packet: Data unit at network layer and above.
Ethernet Frames
Ethernet Frame
Destination Address
• A destination MAC address of ff:ff:ff:ff:ff:ff indicates a broadcast,
meaning the packet is sent from one host to any other on that
network.
• A destination MAC address where the low-order bit of the first byte is
set indicates a Multicast, meaning the packet is sent from one host to
all hosts on the network interested in packets sent to that MAC
address.
Type/Length
• The field is interpreted as a length field if it has a value <=1500
• A type field if it has a value > 1500
• 0-1500 length field
Pad
• The minimum length of ethernet frame is 64 bytes
• If the frames has lesser number of bytes then extra bits are added to
the frame, those are called padding
Jumbo Frames
• JUMBO frames are introduced in order to increase the maximum size
of the MAC client Data field, larger frames would provide more
efficient use of the network Bandwidth while reducing the number of
frames that have to be processed.
• JUMBO frames has the capacity to carry bytes from 64bytes(min
size)to 9000bytes(max size).
• The 8870 value is actually a reserved Length/Type field assignment
that indicates frames as JUMBO.
Pause frames
• Flow control operation known as “PAUSE” frames are includes in
10GBE as it supports the full duplex mode.
• The 8808 value is actually a reserved Length/Type field. Length/Type
field is followed by 2 bytes of MAC control Opcode(00-01)and 2bytes
of MAC control parameter(timer=00-00 to FF-FF)with a unique DA(01-
80-C2-00-00-01)in MAC DA field.
• PAUSE frames considers 64bytes as Minimum size and 1518 bytes as
Maximum size for Normal frames and 1522 bytes when tagged.
• Transmitter MAC should not transmit the frames once it receives
pause frames from receiver until the time duration specified in the
pause timer.
Thank you

More Related Content

What's hot

data-link layer protocols
data-link layer protocols  data-link layer protocols
data-link layer protocols BE Smârt
 
Data and Computer Communication
Data and Computer CommunicationData and Computer Communication
Data and Computer CommunicationNaqeeb Ullah Kakar
 
Topic : X.25, Frame relay and ATM
Topic :  X.25, Frame relay and ATMTopic :  X.25, Frame relay and ATM
Topic : X.25, Frame relay and ATMDr Rajiv Srivastava
 
HDLC & basic protocols
HDLC & basic protocolsHDLC & basic protocols
HDLC & basic protocolsAkhil Kaushik
 
Congetion Control.pptx
Congetion Control.pptxCongetion Control.pptx
Congetion Control.pptxNaveen Dubey
 
Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer Dr. SELVAGANESAN S
 
HDLC and Point to point protocol
HDLC and Point to point protocolHDLC and Point to point protocol
HDLC and Point to point protocolKinza Razzaq
 
VTU 5TH SEM CSE COMPUTER NETWORKS-1 (DATA COMMUNICATION) SOLVED PAPERS
VTU 5TH SEM CSE COMPUTER NETWORKS-1 (DATA COMMUNICATION)  SOLVED PAPERSVTU 5TH SEM CSE COMPUTER NETWORKS-1 (DATA COMMUNICATION)  SOLVED PAPERS
VTU 5TH SEM CSE COMPUTER NETWORKS-1 (DATA COMMUNICATION) SOLVED PAPERSvtunotesbysree
 
Umts system architecture
Umts system architectureUmts system architecture
Umts system architectureMidhun S
 
Open shortest path first (ospf)
Open shortest path first (ospf)Open shortest path first (ospf)
Open shortest path first (ospf)Respa Peter
 
IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11Keshav Maheshwari
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithmBushra M
 
logical addressing
logical addressinglogical addressing
logical addressingSagar Gor
 
QOS (Quality of Services) - Computer Networks
 QOS (Quality of Services) - Computer Networks QOS (Quality of Services) - Computer Networks
QOS (Quality of Services) - Computer NetworksIIIT Manipur
 
Physical layer OSI Model & Transmission Media
Physical layer OSI Model & Transmission MediaPhysical layer OSI Model & Transmission Media
Physical layer OSI Model & Transmission MediaMukesh Chinta
 

What's hot (20)

data-link layer protocols
data-link layer protocols  data-link layer protocols
data-link layer protocols
 
Data link layer
Data link layer Data link layer
Data link layer
 
Data and Computer Communication
Data and Computer CommunicationData and Computer Communication
Data and Computer Communication
 
Topic : X.25, Frame relay and ATM
Topic :  X.25, Frame relay and ATMTopic :  X.25, Frame relay and ATM
Topic : X.25, Frame relay and ATM
 
HDLC & basic protocols
HDLC & basic protocolsHDLC & basic protocols
HDLC & basic protocols
 
Ethernet
EthernetEthernet
Ethernet
 
Congetion Control.pptx
Congetion Control.pptxCongetion Control.pptx
Congetion Control.pptx
 
Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer
 
HDLC and Point to point protocol
HDLC and Point to point protocolHDLC and Point to point protocol
HDLC and Point to point protocol
 
Mobile computing (Wireless) Medium Access Control (MAC)
Mobile computing (Wireless) Medium Access Control (MAC)Mobile computing (Wireless) Medium Access Control (MAC)
Mobile computing (Wireless) Medium Access Control (MAC)
 
VTU 5TH SEM CSE COMPUTER NETWORKS-1 (DATA COMMUNICATION) SOLVED PAPERS
VTU 5TH SEM CSE COMPUTER NETWORKS-1 (DATA COMMUNICATION)  SOLVED PAPERSVTU 5TH SEM CSE COMPUTER NETWORKS-1 (DATA COMMUNICATION)  SOLVED PAPERS
VTU 5TH SEM CSE COMPUTER NETWORKS-1 (DATA COMMUNICATION) SOLVED PAPERS
 
Umts system architecture
Umts system architectureUmts system architecture
Umts system architecture
 
Open shortest path first (ospf)
Open shortest path first (ospf)Open shortest path first (ospf)
Open shortest path first (ospf)
 
IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
 
X.25 and frame relay
X.25 and frame relayX.25 and frame relay
X.25 and frame relay
 
IPv4
IPv4IPv4
IPv4
 
logical addressing
logical addressinglogical addressing
logical addressing
 
QOS (Quality of Services) - Computer Networks
 QOS (Quality of Services) - Computer Networks QOS (Quality of Services) - Computer Networks
QOS (Quality of Services) - Computer Networks
 
Physical layer OSI Model & Transmission Media
Physical layer OSI Model & Transmission MediaPhysical layer OSI Model & Transmission Media
Physical layer OSI Model & Transmission Media
 

Similar to Basics of Ethernet

Similar to Basics of Ethernet (20)

Osi layer and network protocol
Osi layer and network protocolOsi layer and network protocol
Osi layer and network protocol
 
Osi
OsiOsi
Osi
 
unit1 network model osi and tcpip.pptx
unit1  network model osi and tcpip.pptxunit1  network model osi and tcpip.pptx
unit1 network model osi and tcpip.pptx
 
tcpiposi.pptx
tcpiposi.pptxtcpiposi.pptx
tcpiposi.pptx
 
The OSI model
 The OSI model The OSI model
The OSI model
 
Protocol layer,OSI model & POP3
Protocol layer,OSI model & POP3Protocol layer,OSI model & POP3
Protocol layer,OSI model & POP3
 
Computer network layers
Computer network layersComputer network layers
Computer network layers
 
Osi layer model
Osi layer modelOsi layer model
Osi layer model
 
Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March 2020
Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March  2020Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March  2020
Concept of OSI Model_KSMS_BCA_4th_6th_Sem_Priyanka Bhattacharya_20th March 2020
 
Open Systems Interconnection (OSI)
Open Systems Interconnection (OSI)Open Systems Interconnection (OSI)
Open Systems Interconnection (OSI)
 
Network fundamentals
Network fundamentalsNetwork fundamentals
Network fundamentals
 
Osi model
Osi modelOsi model
Osi model
 
Pwani notes-Network Essentials.pp for Internet Protocoltx
Pwani notes-Network Essentials.pp  for Internet ProtocoltxPwani notes-Network Essentials.pp  for Internet Protocoltx
Pwani notes-Network Essentials.pp for Internet Protocoltx
 
Network internet
Network internetNetwork internet
Network internet
 
Networks internet
Networks internetNetworks internet
Networks internet
 
PC 106 PPT-06
PC 106 PPT-06PC 106 PPT-06
PC 106 PPT-06
 
Chapter 2 computer network PPT CN-1.pptx
Chapter 2 computer network PPT CN-1.pptxChapter 2 computer network PPT CN-1.pptx
Chapter 2 computer network PPT CN-1.pptx
 
06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.ppt
 
06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.ppt
 
Dc2 t1
Dc2 t1Dc2 t1
Dc2 t1
 

Recently uploaded

INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 

Recently uploaded (20)

INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 

Basics of Ethernet

  • 2. Computer Networking • A group of computer systems or any hardware device linked together Through communication channel Facilitate communication and resource sharing.
  • 3. OSI Model • There are n number of users who use computer network and are located over the world. • So to ensure national and worldwide data communication systems can be developed and are compatible to each other. • ISO has developed OSI model. ISO stands for international organization of Standardization. • This is called a model for open system interconnection(OSI) and is normally called as OSI model.
  • 5. Physical Layer • Representation of Bits: Data in this layer consist of stream of bits. • Data Rate: This layer defines the rate of transmission which is the number of bits per second. • Synchronization: It deals with the synchronization of the transmitter and receiver.The sender and receiver are synchronized at bit level. • Interface: The physical layer defines the transmission interface between device and transmission medium. • Line configuration: This layer connects device with the medium: point to point configuration and Multipoint configuration. • Topologies: Device must be connected using the following topologies: Mesh,Star,Ring and Bus. • Transmission Modes: Physical layer defines the direction of transmission between two devices: Simplex,Half Duplex,Full Duplex. • Transmission: Deals with base band and broadband transmission.
  • 6. Base Band and Broad Band • Base Band: • Data is sent as digital signals through the media as a single channel that uses the entire bandwidth of the media. • Base band comm is bi-directional, which means that the same channel can be used to send and receive signals. • In baseband, frequency division multiplexing is not possible. • Broadband: • Broad band sends information in the form of an analog signal. • Each transmission is assigned to a portion of the bandwidth, hence multiple transmissions are possible at the same time. • Broadband communication is unidirectional, so in order to send and receive,two pathways are needed.
  • 7. Data Link Layer • Framing: Frames are the stream of bits received from the network layer into manageable data units. This division of stream of bits is done by Data link layer. • Physical Addressing: The data link layer adds a header to the frame in order to define physical address of the sender or receiver of the frame, if the frames are to be distributed to different systems on the network. • Flow control: A flow control mechanism for frames to be sent. • Error control: Error control is achieved by adding a trailer at the end of the frame. Duplication of frames are also prevented by using this mechanism.Data link layer adds mechanism to prevent duplication of frames. • Access control: Protocols of this layer determine which of the devices has control over the link at any given time, when two or more devices are connected to the same link.
  • 8. Network Layer • The main aim of this layer is to deliver packets from source to destination across multiple links(networks). • If two computers(system) are connected on the same link then there is no need for a network layer. • It routes the signal through different channels to the other end and acts as a network controller. • It also divides the outgoing messages into packets and to assemble incoming packets into messages for higher levels.
  • 9. Transport Layer • Transport layer breaks the message (data)into small units so that they are handled more efficiently by the network layer and ensures that message arrives in order by checking error and flow control. • Service point Addressing: Transport layer header includes service point address which is port address. This layer gets the message to the correct process on the computer unlike Network layer, which gets each packet to the correct computer. • Segmentation and Reassembling: A message is divided into segments, each segment contains sequence number, which enables this layer in reassembling the message. Message is reassembled correctly upon arrival at the destination and replaces packets which were lost is transmission.
  • 10. Continue.. • Connection Control: It includes 2 types: Connectionless Transport Layer and Connection Oriented Transport Layer. • Flow Control: In this layer, flow control is performed end to end. • Error Control: Error control is performed end to end in this layer to ensure that the complete message arrives at the receiving transport layer without any error. Error correction is done through retransmission.
  • 11. Session Layer • Its main aim is to establish, maintain and synchronize the interaction between communicating system. Session layer manages and synchronize the conversation between two different applications. • Transfer of data from one destination to another session layer stream of data are marked and are resynchronized properly, so that the ends of the messages are not cut prematurely and data loss is avoided. • Dialog Control: This layer allows two system to start communication with each other in half-duplex or full –duplex. • Synchronization: This layer allows a process to add checkpoints which are considered as synchronization points into stream of data. • Example: If a system is sending a file of 800 pages, adding checkpoints after every 50 pages is recommended. This ensures that 50 pages unit is successfully received and acknowledged. This is beneficial at the time of crash as if a crash happens att page number 110.there is no need to retransmit 1to100 pages.
  • 12. Presentation Layer • The primary goal of this layer is to take care of the syntax and semantics of the information exchanged between two communicating systems. Presentation layer takes care that the data is sent in such a way that the receiver will understand the information (data) and will be able to use the data. Languages(syntax)can be differ of the two communication systems. Under this condition presentation layer plays a role translator. • Transaction: Before being transmitted, information in the form of characters and numbers should be changed to bit stream. The presentation layer is responsible for interoperability between encoding methods as different computers use different encoding methods. It translates the data between the formats the network requires and the format the computer.
  • 13. Continue.. • Encryption: It carries out encryption at the transmitter and decryption at the receiver. • Compression: It carries out data compression to reduce the bandwidth of the data to be transmitted. The primary role of Data compression is to reduce the number of bits to be transmitted. It is important in transmitting multimedia such as audio, video,text etc.
  • 14. Application Layer • It is the top most layer of OSI Model. Manipulation of data(information)in various ways is done in this layer which enables user or software to get access to the network. Some services provided by this layer includes:E- mail, transferring of files, distributing the result to user, directory services, network resource etc. • Mail services: This layer provides the basic for E-mail forwarding and storage. • Network Virtual Terminal: It allows a user to log on to a remote host. The application creates software emulation of a terminal at the remote host. Users computer talks to the software terminal which in turn talks to the host and vice versa. Then the remote host believes it is communicating with one of its own terminals and allows user to log on.
  • 15. Continue.. • Directory Services: This layer provides access for global information about various services. • File Transfer, Access and Management(FTAM):It is a standard mechanism to access files and manages it. Users can access files in a remote computer and manage it. They can also retrieve files from a remote computer.
  • 17. Topologies • Bus network topology -- Also known as backbone network topology, this configuration connects all devices to a main cable via drop lines. The advantages of bus network topology lie in its simplicity, as there is less cable required than in alternative topologies, which makes for easy installation. • Mesh network topology -- A dedicated point-to-point link connects each device on the network to another device on the network, only carrying data between two devices. • Ring network topology -- Two dedicated point-to-point links connect a device to the two devices located on either side of it, creating a ring of devices through which data is forwarded via repeaters until it reaches the target device. • Star network topology -- The most common network topology, star topology connects each device in the network to a central hub. Devices can only communicate with each other indirectly through the central hub. • Hybrid network topology -- Any combination of two or more topologies is a hybrid topology. • Tree network topology -- This topology consists of a parent-child hierarchy in which star networks are interconnected via bus networks. Nodes branch out linearly from one root node, and two connected nodes only share one mutual connection
  • 18. Ethernet • Standard for connecting computer to computer or other digital device • The term Ethernet refers to the family of local-area- network(LAN)Products covered by the IEEE 802.3 standard that defines what is commonly known as the CSMA/CD protocol. • Ethernet LAN consist of network nodes and interconnecting media.
  • 19. Ethernet Network Elements • Data terminal equipment(DTE) --Source/destination of data --PC • Data communication equipment (DCE) --Receive/forward the information --Repeater ,routers
  • 21.
  • 22. Ethernet MAC Layer • Data encapsulation, including frame assembly before transmission, and frame parsing/error detection during and after reception. • Media access control, including initiation of frame transmission and recovery from transmission failure
  • 23. Ethernet MAC Client • LLC(Logic Link Control): • If the units is DTE • If provides the interface between MAC and Upper layers • Bridge entity: • If the unit is DCE • LAN to LAN interface
  • 24. CSMA/CD • Carrier Sense: • Each station continuously listens for traffic on the medium to determine when gaps between frame transmission occur. • Multiple access: • Stations may begin transmitting any time they detect that the network is quite. • Collision detect: • If two or more station in the same CSMA/CD network (collision domain)begin transmitting at approximately the same time,the bit stream from the transmitting stations will interfere (collide)with each other,and both transmissions will be unreable
  • 25. Half Duplex Full Duplex • Half Duplex: • Transmission only in one direction • Employs CSMA/CD and retransmits if collision is detected • Not efficient • Full Duplex: • Two pairs of wires • Fast data transmission than half duplex • Collision does not happen in full duplex
  • 26. Frame and Packet • Frame :Data unit at data link layer • Packet: Data unit at network layer and above.
  • 29. Destination Address • A destination MAC address of ff:ff:ff:ff:ff:ff indicates a broadcast, meaning the packet is sent from one host to any other on that network. • A destination MAC address where the low-order bit of the first byte is set indicates a Multicast, meaning the packet is sent from one host to all hosts on the network interested in packets sent to that MAC address.
  • 30. Type/Length • The field is interpreted as a length field if it has a value <=1500 • A type field if it has a value > 1500 • 0-1500 length field
  • 31. Pad • The minimum length of ethernet frame is 64 bytes • If the frames has lesser number of bytes then extra bits are added to the frame, those are called padding
  • 32. Jumbo Frames • JUMBO frames are introduced in order to increase the maximum size of the MAC client Data field, larger frames would provide more efficient use of the network Bandwidth while reducing the number of frames that have to be processed. • JUMBO frames has the capacity to carry bytes from 64bytes(min size)to 9000bytes(max size). • The 8870 value is actually a reserved Length/Type field assignment that indicates frames as JUMBO.
  • 33. Pause frames • Flow control operation known as “PAUSE” frames are includes in 10GBE as it supports the full duplex mode. • The 8808 value is actually a reserved Length/Type field. Length/Type field is followed by 2 bytes of MAC control Opcode(00-01)and 2bytes of MAC control parameter(timer=00-00 to FF-FF)with a unique DA(01- 80-C2-00-00-01)in MAC DA field. • PAUSE frames considers 64bytes as Minimum size and 1518 bytes as Maximum size for Normal frames and 1522 bytes when tagged. • Transmitter MAC should not transmit the frames once it receives pause frames from receiver until the time duration specified in the pause timer.