SlideShare a Scribd company logo
1 of 30
SchutzvermerknachDIN34beachten
Ethernet Basics
SchutzvermerknachDIN34beachten
The diagram .. was drawn by Dr. Robert M. Metcalfe in 1976 to present Ethernet to the National Computer
Conference in June of that year.
Ethernet
SchutzvermerknachDIN34beachten
Topics
• History, Standards, Terminology
• Transmission media
• Topologies
• Protocol
• Access methods, Collision management
SchutzvermerknachDIN34beachten
What is Ethernet ?
Ethernet is a certain type of a local area network (LAN)
which was developed in 1972 in the renowned PARC-
research facility of Xerox in Palo Alto by Robert Metcalfe.
In the meantime the companies Intel, DEC and Xerox
have specified a common standard that has been
established in the IEEE-standard 802.3.
SchutzvermerknachDIN34beachten
History
• 1969 student Robert Metcalfe (founder of 3Com in
1979) develops a Host Interface Controller for
DARPA (Defense Advanced Research Projects
Agency) in the company DEC.
• 1970 the ALOHA-Net (multiple access protocol) is
developed and tested at the university of Hawaii
• 1972 the idea is picked up by the XEROX Palo Alto
Research Center (Metcalfe works there by then).
The project goal is: experimental Ethernet
SchutzvermerknachDIN34beachten
History
• 1976 the results of the project are published. The
companies DEC, Intel and Xerox join in the
company DIX and complete Ethernet to the market
entry stage.
• 1980 Ethernet version 1.0 is passed.
• 1981 IEEE starts standardization efforts. The Ethernet
specification is accepted without major
modifications.
• 1982 Publication of Ethernet version 2.0
• 1985 worldwide recognition of the Ethernet standard as
ISO/DIS 8802/3
SchutzvermerknachDIN34beachten
History
• 1986 Publication of the 10Base2- and
10BroadT standards
• 1987 Standardization of the 10BaseT
spezification
• 1991 Publication of the 10BaseF standard
• 1994 more than 10.000 suppliers support the
Ethernet globally
• 1995 Standardization of the 100 Mbit/s Ethernet
• 1997 Standardization efforts for the Gigabit
Ethernet and presentation of first products
prior to the completion of the standard
SchutzvermerknachDIN34beachten
Ethernet TCP/IP
Ethernet-
Header
Ethernet-DATA FCS
IP-
Header
IP-DATA
IP-frame
TCP-
Header
TCP-DATA
TCP-frame
Ethernet-
frame
LAYER 7
Modbus etc.
SchutzvermerknachDIN34beachten
Access method: CSMA/CD
Station is ready to
send
check
“Ether”
Sending of data and
checking the “Ether”
Waiting according
to back-off algorithm
Medium
occupied
Discovered
collision
medium
available
send
jam signal
No collision
New attempt
SchutzvermerknachDIN34beachten
Back-Off Algorithm
• If a collision has occurred, the stations try to send
again after a certain period of time.
• After the first collision there a two different back-off
times available, from which one is chosen at random.
Transmission probability is 50%
• After the second consecutive collision there are four
different back-off times available, from which one is
chosen at random.
• The transmission probability now is 75%
SchutzvermerknachDIN34beachten
Truncated Binary Exponential Back-Off-Algorithm
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
...
......
.........
...............
............
...............
...............
...............
...............
...............
...............
...............
Nuber of back-off times to be selected at random
2
4
8
16
32
64
128
256
512
1024
1024
1024
1024
1024
1024
1024
50%
75%
87,5%
93,75%
96,88%
98,44
99,22%
99,61%
99,80%
99,90%
99,90%
99,90%
99,90%
99,90%
99,90%
99,90%
SchutzvermerknachDIN34beachten
Which waiting times are used ?
• The 0...1024 fold of the double max. signal travel time
between the most remote stations + Offset is used
• With 10 Mbit/s Ethernet that means:
• The waiting time is also called collision window, the
offset (9.6µs) is called gap.
• Only after the time of the collision window has passed,
you can be certain that there will be no more collision.
Station 1 Station 2
25.6µs
25.6µs
51.2µs
SchutzvermerknachDIN34beachten
Example
• After the first collision the stations willing to send
select a random waiting time of either 9.6µs or 9.6µs
plus 51.2µs (duration of the collision window).
Condition: Only two stations are involved, no new
stations enter the scene in the collision management
phase.
Waiting time(A) waiting time(B) transmission
9.6µs 9.6µs NO
9.6µs 9.6µs+51.2µs YES
9.6µs+51.2µs 9.6µs YES
9.6µs+51.2µs 9.6µs+51.2µs NO
SchutzvermerknachDIN34beachten
Delay depending on the network load
delay
20 % 40 %30 %10 % 50 % 60 % 70 % 80 %
Network load
low
high High
throughput
Beginning
problems
Overload
SchutzvermerknachDIN34beachten
Ethernet address
• Also called "MAC address"
• Globally unique ID for each device
• Burnt into ROM, cannot be modified
• Six Bytes in which manufacturer, device model and serial
number are coded
• Readable with many auxiliary tools e.g. WINIPCFG
SchutzvermerknachDIN34beachten
Ethernet frame
Preamble SFD DA SA LEN FCSPadData
7 1 6 6 2 >=46 4
Preamble DA SA Type FCSPadData
8 6 6 2 >=46 4
Ethernet II DIX Frame:
IEEE 802.3 Frame:
SchutzvermerknachDIN34beachten
Ethernet frame
• Preamble
Trailer consisting of the bit sequence “0101010101...” serving the bit
synchronization of the receiver.
• SFD (Start Frame Delimiter)
Start character consisting of the bit pattern “10101011” showing the
recipient that the actual information will follow now.
• DA (Destination Address)
Evaluated by the recipient‘s address filter; only data frames destined for
this recipient will be passed on to the communication software.
• SA (Source Address)
Sender‘s address
• LEN (Length)
Indicates the length of the subsequent data field in Bytes according to
IEEE 802.3.
SchutzvermerknachDIN34beachten
Ethernet frame
• Data and Pad
The data field may contain 46 to 1500 user data bytes. Are there less than
46 bytes the Ethernet controller independently adds padding bytes, until the
total amount (data + pad) is 46. This miminum length is crucial for the
CSMA/CD procedure to work faultlessly. The data field can be used at will, it
only has to contain complete bytes.
• FCS (Frame Check Sequence)
A check character. It is obtained by taking the rest of the division operation
from the formula representing the wide-spread cyclic- redundancy-check
procedure. This formula is applied to the bit sequence including the address
field through to the padding field. In case of en error the whole frame is
ignored, i.e. not passed on to the application program.
SchutzvermerknachDIN34beachten
Ethernet Address
WIN-NT: ipconfig /all
SchutzvermerknachDIN34beachten
Naming of the cable types
• Example: 10base5
– 10 Transmission rate in Mbytes/s
– base Base or Broadband
– 5Segment length in 100 meters
• UTP unshielded twisted pair
• STP shielded twisted pair
• S/STP screened shielded twisted pair
SchutzvermerknachDIN34beachten
Ethernet topologies
SchutzvermerknachDIN34beachten
Ethernet Media
SchutzvermerknachDIN34beachten
Extension
• The maximum extension depends on the medium and
the transmission rate; here some examples:
– 10base5 Segment: 500m
Total: 2500m (with 4 repeaters)
– 100baseTX UTP Hub-Station: 100m
– 100baseFX Hub-Station: 400m
25km (with Mono mode fibre)
– 1000baseSX Hub-Station: 550m
SchutzvermerknachDIN34beachten
Repeater / Hub
Repeater
Hub
SchutzvermerknachDIN34beachten
Bridge
Bridge
A
B
C
D
E F
SchutzvermerknachDIN34beachten
Switch = Multiport Bridge
Bridge
Switch
SchutzvermerknachDIN34beachten
Hub - Switch
Switch
A
B
C
D
EF
G
H
Hub
A
B
C
D
E
F
G
H
Hub
A
B
C
D
E
F
G
H
Time
SchutzvermerknachDIN34beachten
Characteristics of the switches
• Cut-Trough Switch
– noc cheking of the data frames
• Store-and-Forward
– checking of the data frames
• Frames with same destination
– kept in internal short term memory thus queueing them
– discard them or create collision
• Broadcast messages
– go to all stations anyway (z.B. ARP) so switches are of
no advantage here
– there are specific approaches of different switch
manufacturers to reduce broadcast data traffic
SchutzvermerknachDIN34beachten
Typical office wiring
Hub/Switch
Hub/Switch
PatchfieldPatchfield
Network socket
Patch cable
„normal“ Cat 5 cable
RJ 45
SchutzvermerknachDIN34beachten
www
• http://www.gigabit-ethernet.org
• http://wwwhost.ots.utexas.edu/ethernet/
• http://www.3com.com/technology/tech_net/white_papers/index.html#ethernet
• http://www.iaopennetworking.com/

More Related Content

What's hot

Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.Sumutiu Marius
 
Netzwerkgrundlagen - Von Ethernet bis IP
Netzwerkgrundlagen - Von Ethernet bis IPNetzwerkgrundlagen - Von Ethernet bis IP
Netzwerkgrundlagen - Von Ethernet bis IPMaximilan Wilhelm
 
Angewandte Netzwerkgrundlagen reloaded - von Layer 1 bis 3
Angewandte Netzwerkgrundlagen reloaded - von Layer 1 bis 3Angewandte Netzwerkgrundlagen reloaded - von Layer 1 bis 3
Angewandte Netzwerkgrundlagen reloaded - von Layer 1 bis 3Maximilan Wilhelm
 
Attacking GRX - GPRS Roaming eXchange
Attacking GRX - GPRS Roaming eXchangeAttacking GRX - GPRS Roaming eXchange
Attacking GRX - GPRS Roaming eXchangeP1Security
 
Dynamische Routingprotokolle Aufzucht und Pflege - OSPF
Dynamische Routingprotokolle Aufzucht und Pflege - OSPFDynamische Routingprotokolle Aufzucht und Pflege - OSPF
Dynamische Routingprotokolle Aufzucht und Pflege - OSPFMaximilan Wilhelm
 
IP/LDP fast protection schemes
IP/LDP fast protection schemesIP/LDP fast protection schemes
IP/LDP fast protection schemesSkillFactory
 
TCP over 6LoWPAN for Industrial Applications
TCP over 6LoWPAN for Industrial ApplicationsTCP over 6LoWPAN for Industrial Applications
TCP over 6LoWPAN for Industrial ApplicationsAhmed Ayadi
 
Building your own CGN boxes with Linux
Building your own CGN boxes with LinuxBuilding your own CGN boxes with Linux
Building your own CGN boxes with LinuxMaximilan Wilhelm
 
Dynamische Routingprotokolle Aufzucht und Pflege - BGP
Dynamische Routingprotokolle Aufzucht und Pflege - BGPDynamische Routingprotokolle Aufzucht und Pflege - BGP
Dynamische Routingprotokolle Aufzucht und Pflege - BGPMaximilan Wilhelm
 
Coco co-desing and co-verification of masked software implementations on cp us
Coco   co-desing and co-verification of masked software implementations on cp usCoco   co-desing and co-verification of masked software implementations on cp us
Coco co-desing and co-verification of masked software implementations on cp usRISC-V International
 
Kernel Recipes 2019 - Suricata and XDP
Kernel Recipes 2019 - Suricata and XDPKernel Recipes 2019 - Suricata and XDP
Kernel Recipes 2019 - Suricata and XDPAnne Nicolas
 
Silverlight Wireshark Analysis
Silverlight Wireshark AnalysisSilverlight Wireshark Analysis
Silverlight Wireshark AnalysisYoss Cohen
 
Time Sensitive Networking in the Linux Kernel
Time Sensitive Networking in the Linux KernelTime Sensitive Networking in the Linux Kernel
Time Sensitive Networking in the Linux Kernelhenrikau
 
BPF & Cilium - Turning Linux into a Microservices-aware Operating System
BPF  & Cilium - Turning Linux into a Microservices-aware Operating SystemBPF  & Cilium - Turning Linux into a Microservices-aware Operating System
BPF & Cilium - Turning Linux into a Microservices-aware Operating SystemThomas Graf
 
ComNet NWKED Data Sheet
ComNet NWKED Data SheetComNet NWKED Data Sheet
ComNet NWKED Data SheetJMAC Supply
 
Klessydra-T: Designing Configurable Vector Co-Processors for Multi-Threaded E...
Klessydra-T: Designing Configurable Vector Co-Processors for Multi-Threaded E...Klessydra-T: Designing Configurable Vector Co-Processors for Multi-Threaded E...
Klessydra-T: Designing Configurable Vector Co-Processors for Multi-Threaded E...RISC-V International
 
Kernel Recipes 2013 - Nftables, what motivations and what solutions
Kernel Recipes 2013 - Nftables, what motivations and what solutionsKernel Recipes 2013 - Nftables, what motivations and what solutions
Kernel Recipes 2013 - Nftables, what motivations and what solutionsAnne Nicolas
 

What's hot (20)

Ethernet copper physical layer finally unveiled - Frederic Depuydt, KU Leuven
Ethernet copper physical layer finally unveiled -  Frederic Depuydt, KU LeuvenEthernet copper physical layer finally unveiled -  Frederic Depuydt, KU Leuven
Ethernet copper physical layer finally unveiled - Frederic Depuydt, KU Leuven
 
IPv6 im Jahre 2018
IPv6 im Jahre 2018IPv6 im Jahre 2018
IPv6 im Jahre 2018
 
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.
 
Netzwerkgrundlagen - Von Ethernet bis IP
Netzwerkgrundlagen - Von Ethernet bis IPNetzwerkgrundlagen - Von Ethernet bis IP
Netzwerkgrundlagen - Von Ethernet bis IP
 
Angewandte Netzwerkgrundlagen reloaded - von Layer 1 bis 3
Angewandte Netzwerkgrundlagen reloaded - von Layer 1 bis 3Angewandte Netzwerkgrundlagen reloaded - von Layer 1 bis 3
Angewandte Netzwerkgrundlagen reloaded - von Layer 1 bis 3
 
Attacking GRX - GPRS Roaming eXchange
Attacking GRX - GPRS Roaming eXchangeAttacking GRX - GPRS Roaming eXchange
Attacking GRX - GPRS Roaming eXchange
 
Dynamische Routingprotokolle Aufzucht und Pflege - OSPF
Dynamische Routingprotokolle Aufzucht und Pflege - OSPFDynamische Routingprotokolle Aufzucht und Pflege - OSPF
Dynamische Routingprotokolle Aufzucht und Pflege - OSPF
 
IP/LDP fast protection schemes
IP/LDP fast protection schemesIP/LDP fast protection schemes
IP/LDP fast protection schemes
 
TCP over 6LoWPAN for Industrial Applications
TCP over 6LoWPAN for Industrial ApplicationsTCP over 6LoWPAN for Industrial Applications
TCP over 6LoWPAN for Industrial Applications
 
Building your own CGN boxes with Linux
Building your own CGN boxes with LinuxBuilding your own CGN boxes with Linux
Building your own CGN boxes with Linux
 
Dynamische Routingprotokolle Aufzucht und Pflege - BGP
Dynamische Routingprotokolle Aufzucht und Pflege - BGPDynamische Routingprotokolle Aufzucht und Pflege - BGP
Dynamische Routingprotokolle Aufzucht und Pflege - BGP
 
Coco co-desing and co-verification of masked software implementations on cp us
Coco   co-desing and co-verification of masked software implementations on cp usCoco   co-desing and co-verification of masked software implementations on cp us
Coco co-desing and co-verification of masked software implementations on cp us
 
Kernel Recipes 2019 - Suricata and XDP
Kernel Recipes 2019 - Suricata and XDPKernel Recipes 2019 - Suricata and XDP
Kernel Recipes 2019 - Suricata and XDP
 
Exploiting Layer 2
Exploiting Layer 2Exploiting Layer 2
Exploiting Layer 2
 
Silverlight Wireshark Analysis
Silverlight Wireshark AnalysisSilverlight Wireshark Analysis
Silverlight Wireshark Analysis
 
Time Sensitive Networking in the Linux Kernel
Time Sensitive Networking in the Linux KernelTime Sensitive Networking in the Linux Kernel
Time Sensitive Networking in the Linux Kernel
 
BPF & Cilium - Turning Linux into a Microservices-aware Operating System
BPF  & Cilium - Turning Linux into a Microservices-aware Operating SystemBPF  & Cilium - Turning Linux into a Microservices-aware Operating System
BPF & Cilium - Turning Linux into a Microservices-aware Operating System
 
ComNet NWKED Data Sheet
ComNet NWKED Data SheetComNet NWKED Data Sheet
ComNet NWKED Data Sheet
 
Klessydra-T: Designing Configurable Vector Co-Processors for Multi-Threaded E...
Klessydra-T: Designing Configurable Vector Co-Processors for Multi-Threaded E...Klessydra-T: Designing Configurable Vector Co-Processors for Multi-Threaded E...
Klessydra-T: Designing Configurable Vector Co-Processors for Multi-Threaded E...
 
Kernel Recipes 2013 - Nftables, what motivations and what solutions
Kernel Recipes 2013 - Nftables, what motivations and what solutionsKernel Recipes 2013 - Nftables, what motivations and what solutions
Kernel Recipes 2013 - Nftables, what motivations and what solutions
 

Similar to Ethernet Basics Explained

2018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 72018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 7FRSecure
 
CCNA Exam 640-802 Version 9.3
CCNA Exam 640-802 Version 9.3CCNA Exam 640-802 Version 9.3
CCNA Exam 640-802 Version 9.3Ravi Yasas
 
Webinar: Comunicação TCP/IP segura
Webinar: Comunicação TCP/IP seguraWebinar: Comunicação TCP/IP segura
Webinar: Comunicação TCP/IP seguraEmbarcados
 
Advanced TCP/IP-based Industrial Networking for Engineers & Technicians
Advanced TCP/IP-based Industrial Networking for Engineers & TechniciansAdvanced TCP/IP-based Industrial Networking for Engineers & Technicians
Advanced TCP/IP-based Industrial Networking for Engineers & TechniciansLiving Online
 
Chap.1 ethernet introduction
Chap.1 ethernet introductionChap.1 ethernet introduction
Chap.1 ethernet introduction東原 李
 
Videoconferencing Technology
Videoconferencing TechnologyVideoconferencing Technology
Videoconferencing TechnologyVideoguy
 
Bitm2003 802.11g
Bitm2003 802.11gBitm2003 802.11g
Bitm2003 802.11gArpan Pal
 
Protecting Data In Motion with MACsec - Gijs Willemse - Rambus Design Summit ...
Protecting Data In Motion with MACsec - Gijs Willemse - Rambus Design Summit ...Protecting Data In Motion with MACsec - Gijs Willemse - Rambus Design Summit ...
Protecting Data In Motion with MACsec - Gijs Willemse - Rambus Design Summit ...Rambus
 
Bezprzewodowa komunikacja ethernet w obszarach przemysłowych
Bezprzewodowa komunikacja ethernet w obszarach przemysłowychBezprzewodowa komunikacja ethernet w obszarach przemysłowych
Bezprzewodowa komunikacja ethernet w obszarach przemysłowychAgnieszka Kuba
 
Wireless Troubleshooting Tips using AirPcaps DFS Module Debugging
Wireless Troubleshooting Tips using AirPcaps DFS Module DebuggingWireless Troubleshooting Tips using AirPcaps DFS Module Debugging
Wireless Troubleshooting Tips using AirPcaps DFS Module DebuggingMegumi Takeshita
 
A better connected world - Beijer Sales Kit 2017
A better connected world - Beijer Sales Kit 2017A better connected world - Beijer Sales Kit 2017
A better connected world - Beijer Sales Kit 2017Jiunn-Jer Sun
 
zigbee technology
zigbee technology zigbee technology
zigbee technology N.CH Karthik
 
Kordik fundamental guidtoindustrialnetworking -v_imp
Kordik fundamental guidtoindustrialnetworking -v_impKordik fundamental guidtoindustrialnetworking -v_imp
Kordik fundamental guidtoindustrialnetworking -v_impamsubramanyam
 
Local Area Network – Wired LAN
Local Area Network – Wired LANLocal Area Network – Wired LAN
Local Area Network – Wired LANRaj vardhan
 
Chapter 10 network for PG PAWSN
Chapter 10 network for PG PAWSNChapter 10 network for PG PAWSN
Chapter 10 network for PG PAWSNDhaya kanthavel
 

Similar to Ethernet Basics Explained (20)

Ethernet 802.3.pptx
Ethernet 802.3.pptxEthernet 802.3.pptx
Ethernet 802.3.pptx
 
2018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 72018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 7
 
CCNA Exam 640-802 Version 9.3
CCNA Exam 640-802 Version 9.3CCNA Exam 640-802 Version 9.3
CCNA Exam 640-802 Version 9.3
 
Webinar: Comunicação TCP/IP segura
Webinar: Comunicação TCP/IP seguraWebinar: Comunicação TCP/IP segura
Webinar: Comunicação TCP/IP segura
 
Advanced TCP/IP-based Industrial Networking for Engineers & Technicians
Advanced TCP/IP-based Industrial Networking for Engineers & TechniciansAdvanced TCP/IP-based Industrial Networking for Engineers & Technicians
Advanced TCP/IP-based Industrial Networking for Engineers & Technicians
 
Chap.1 ethernet introduction
Chap.1 ethernet introductionChap.1 ethernet introduction
Chap.1 ethernet introduction
 
Ccna pres
Ccna presCcna pres
Ccna pres
 
Videoconferencing Technology
Videoconferencing TechnologyVideoconferencing Technology
Videoconferencing Technology
 
Bitm2003 802.11g
Bitm2003 802.11gBitm2003 802.11g
Bitm2003 802.11g
 
Protecting Data In Motion with MACsec - Gijs Willemse - Rambus Design Summit ...
Protecting Data In Motion with MACsec - Gijs Willemse - Rambus Design Summit ...Protecting Data In Motion with MACsec - Gijs Willemse - Rambus Design Summit ...
Protecting Data In Motion with MACsec - Gijs Willemse - Rambus Design Summit ...
 
Fundamentals and Basics
Fundamentals and BasicsFundamentals and Basics
Fundamentals and Basics
 
Bezprzewodowa komunikacja ethernet w obszarach przemysłowych
Bezprzewodowa komunikacja ethernet w obszarach przemysłowychBezprzewodowa komunikacja ethernet w obszarach przemysłowych
Bezprzewodowa komunikacja ethernet w obszarach przemysłowych
 
Wireless Troubleshooting Tips using AirPcaps DFS Module Debugging
Wireless Troubleshooting Tips using AirPcaps DFS Module DebuggingWireless Troubleshooting Tips using AirPcaps DFS Module Debugging
Wireless Troubleshooting Tips using AirPcaps DFS Module Debugging
 
A new perspective on Network Visibility - RISK 2015
A new perspective on Network Visibility - RISK 2015A new perspective on Network Visibility - RISK 2015
A new perspective on Network Visibility - RISK 2015
 
Distributed IP-PBX
Distributed IP-PBX Distributed IP-PBX
Distributed IP-PBX
 
A better connected world - Beijer Sales Kit 2017
A better connected world - Beijer Sales Kit 2017A better connected world - Beijer Sales Kit 2017
A better connected world - Beijer Sales Kit 2017
 
zigbee technology
zigbee technology zigbee technology
zigbee technology
 
Kordik fundamental guidtoindustrialnetworking -v_imp
Kordik fundamental guidtoindustrialnetworking -v_impKordik fundamental guidtoindustrialnetworking -v_imp
Kordik fundamental guidtoindustrialnetworking -v_imp
 
Local Area Network – Wired LAN
Local Area Network – Wired LANLocal Area Network – Wired LAN
Local Area Network – Wired LAN
 
Chapter 10 network for PG PAWSN
Chapter 10 network for PG PAWSNChapter 10 network for PG PAWSN
Chapter 10 network for PG PAWSN
 

Recently uploaded

THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxPoojaSen20
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 

Recently uploaded (20)

THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 

Ethernet Basics Explained

Editor's Notes

  1. After the second collision all station choose a random waiting time of 9,6µs plus [0, 1, 2, or 3] times 51,2µs. With two stations having created the collision the probability for success will now be 75%. All stations memorize the number of consecutive collisions and double the number of waiting times to randomly choose from. After the third collision that means 9,6µs plus [0, 1, 2, 3, 4, 5, 6 or 7] times 51,2µs. After 15 consecutive collisions the algorithms cancels the transmission. Now it is the task of the superior communications software to decide further actions (e.g. renewed transmission).
  2. The algorithm descibed is called “Truncated Binary Exponential Backoff Algorithm, BEB”, short „Back-Off Algorithm“. The desciption of the algorithm makes clear, that in extreme cases there can be substantial delays in the transmission, it can even happen that the telegram is not transmitted after all.
  3. Repeater The repeater does not regard any protocol information, but simply amplifies the signal to allow longer distances for networks. It can also be used to switch between media, e.g. from copper to fibre optics. A repeater with several ports is called hub.
  4. Bridges A bridge connects two or more networks and exchanges data packages between them. Since a bridge operates on level 2 of the OSI model it is independent from higher level protocols (e.g. TCP/IP). Bridges are intelligent devices, which are monitoring the complete traffic. Depending on the telegrams MAC address in combination with internal address tables they decide if the telegram will be forwarded or ignored.
  5. Switch Switches, also named “Switching Hubs” or “Layer 2 Switches”, are improved brigdes. Switches are nothing but Bridges with several ports, why they are also called “Multiport-Bridge”. Each port of a switch can be regrded as a collision domain of its own. Collision between devices connected to a switch can so be excluded. As opposed to the hub, which reads, amplifies and then distributes the telegrams on all ports, the switch reads the telegrams, checks the destination address and then forwards the telegram only to the port the destination device is attached to.Defective telegrams will not be forwarded at all.
  6. The information, which device is located on which port, is gathered by the switch by analyzing the telegrams‘ source addresses. Thus it creates a table containing the relevant information about each station‘s location. Switches are capable of dealing with a bigger amount of data without experiencing the collisions-related delays that occur when using hubs. Hubs can be replaced by switches in order to enhance the performance of the network. To be able to maintain several connections at the same time a switch internally processes data much faster than they are arriving at the ports or being sent out. A switch that is labeled “Nonblocking” has an internal transmission rate corresponding to the sum of all maximum transmission speeds at the ports. For a 10/100MBit/s Switch (suitable for 10 as well as 100MBit/s) with 8 ports that means that – taking into account the full-duplex mode (will be explained later-on) - it has to offer an internal transmission speed of 1600MBit/s (100MBit/s * 8 Ports *2 [due to full-duplex]). This level of performance is normally not required and also too expensive. An internal speed of 800MBit/s is normally sufficient for such a switch, which will then be called “Blocking Switch”. In addition to the high internal apeed the switches offer a short-term memory to temporarily buffer telegrams arriving at the same time and determined for the same destination port.
  7. Nowadays most STP and UTP-wirings are realized with RJ45 connectors, also called Western connectors. The pinning of those connectors is standardized (compliant to IEC, DIN etc.), where the pairs are identical in each standard, but the colours can differ.