SlideShare a Scribd company logo
1 of 36
Download to read offline
IEEE STANDARDS
Dr R Jegadeesan Prof & Head
Jyothishmathi Institute of Technology and Science,
karimnagar
IEEE STANDARDS
➢ In 1985, the Computer Society of the IEEE
started a project, called Project 802, to set
standards and to enable inter communication
among equipment from a variety of
manufacturers.
➢ Project 802 is a way of specifying functions
of the physical layer and the data link layer of
major LAN protocols.
Figure gives relationship of 802 standard to the traditional OSI
model
• IEEE 802 standard split data link layer into
two sublayers
• LLC(Logical Link Control) and MAC (Media
Access control)
• In addition to this IEEE 802 created several
physical layer standards for different LAN
protocols
• Ethernet Physical layer
• Token ring Physical layer
• Token bus physical layer
LLC(Logical Link Control)
▪ In IEEE 802 standard LLC sub layer carries
out Flow control, Error control and Framing.
▪ LLC provides one single Data link protocol for
all LANS whereas MAC provides different
protocols for different LANS as shown in
figure.
• The intent of LLC is to provide flow control
and error control for upper layers
MAC (Media Access Control)
IEEE 802 has created a sublayer called MAC
that defines specific access method for each
LAN
for example it defines CSMA/CD as Media
access method for Ethernet LAN’s and token
passing method for token ring and token bus
LAN
Ethernet
• A system for connecting a number of
computer systems to form a local area
network, with protocols to control the passing
of information and to avoid simultaneous
transmission by two or more systems.
Physical layer
• The physical layer is dependent on the
implementation and type of physical media
used
• IEEE defines detailed specifications for each
LAN implementation
Ethernet evolution through four generations
Standard Ethernet
• The original Ethernet was created in 1976 at
Xerox's Palo Alto Research Centre (PARC) in
US.
• Since then, it has gone through four
generations:
➢Standard Ethernet (10 Mbps),
➢Fast Ethernet (100 Mbps),
➢Gigabit Ethernet (1 Gbps),
➢Ten-Gigabit Ethernet (10 Gbps)
Physical Layer
• The Standard Ethernet defines several
physical layer implementations; four of the
most common are
10Base5: Thick Ethernet
• The first implementation is called 10Base5, thick
Ethernet or Thicknet.
• The nickname derives from the size of the cable,
which is roughly the size of a garden hose and
too stiff to bend with your hands.
• 10Base5 was the first Ethernet specification to
use a bus topology with an external transceiver
(transmitter/receiver) connected via a tap to a
thick coaxial cable.
10Base5 implementation
• The transceiver is responsible for transmitting,
receiving, and detecting collisions.
• The transceiver is connected to the station via a
transceiver cable that provides separate paths for
sending and receiving. This means that collision can
only happen in the coaxial cable.
• The maximum length of the coaxial cable must not
exceed 500 m, otherwise, there is excessive
degradation of the signal.
• If a length of more than 500m, each a maximum of
500-meter can be connected using repeaters
10Base2: Thin Ethernet
• The second implementation is called 10Base2, thin
Ethernet, or Cheapernet.
• 10Base2 also uses a bus topology, but the cable is
much thinner and more flexible.
• In this case, the transceiver is normally part of the
network interface card (NIC), which is installed
inside the station.
• Collision here occurs in the thin coaxial cable.
NIC(Network Interface Card )
10Base2 implementation
• This implementation is more cost effective
than 10Base5 because thin coaxial cable is
less expensive than thick coaxial and the Tee
connections are much cheaper than taps.
• Installation is simpler because the thin
coaxial cable is very flexible. However, the
length of each segment cannot exceed 185 m
(close to 200 m)
10Base-T
• The third implementation is called 10 Base-T
or twisted-pair Ethernet.
• 10Base-T uses a physical star topology. The
stations are connected to a hub via two pairs
of twisted cable.
• Note that two pairs of twisted cable create two
paths (one for sending and one for receiving)
between the station and the hub. Any
collision here happens in the hub
10 Base T implementation
• The maximum length of the twisted cable
here is defined as 100 m, to minimize the
effect of attenuation in the twisted cable
10 Base F- Fiber Ethernet
• The most commonly used optical fiber is
called 10 Base F.
• 10 Base-F uses a star topology to connect
stations to a hub.
• The stations are connected to the hub using
two fiber -optic cables.
• The maximum length of the optical cable
here is defined as 2000 m
10 Base F implementation
Addressing in standard Ethernet
• Each station on an Ethernet network (such as
a PC, workstation, or printer) has its own
network interface card (NIC).
• The NIC fits inside the station and provides
the station with a 6-byte physical address and
represented in hexadecimal notation with
colon between the bytes
Example of an Ethernet address in hexadecimal notation
• Standard Ethernet address is broadly divided
into 3 types
• Unicast
• Multicast
• Broadcast
• Source address is always a unicast address-
the frame comes from only one station.
Destination address, however, can be unicast,
multicast, or broadcast
Unicast:
• If the least significant bit of the first byte in a
destination address is 0, the address is
unicast.
• A unicast destination address defines only
one recipient. The relationship between the
sender and the receiver is one-to-one.
Multicast
• If the least significant bit of the first byte in a
destination address is 1, the address is
Multicast.
• A Multicast destination address defines a
group of addresses. The relationship between
the sender and the receiver is one-to-many.
Broadcast
• The broadcast address is a special case of the
multicast address; the recipients are all the
stations on the LAN. A broadcast destination
address is 48bits and all are 1’s.
MAC Sub layer
➢In Standard Ethernet, the MAC sub layer
governs the operation of the access method.
➢ It also frames data received from the upper
layer and passes them to the physical layer
Frame Format of Standard Ethernet.
802.3 MAC frame
• Preamble : First field of the 802.3 frame
contains 7 bytes (56 bits) of alternating 0s
and 1s
• It alerts the receiving system to the coming
frame and enables it to synchronize its input
timing to host.
• Start Frame Delimiter (SFD): The second
field (1 byte: 10101011) signals the
beginning of the frame.
• Destination address (DA). The DA field is 6
bytes and contains the physical address of the
destination station or stations to receive the
Frame.
• Source address (SA). The SA field is also 6
bytes and contains the physical address of the
sender of the Frame.
• Length or type. This field is defined as a type
field or length field. This field is used to know
number of bytes present in the data field in
the range of 0 to 1500
• Data: This field carries actual data of a
frames. It is a minimum of 46 bytes and a
maximum of 1500 bytes. If the frame is less
than 46bytes then the pad field is used to fill
out the frame to the minimum size
• CRC(cyclic redundancy check). The last field
contains error detection information.
Thank you

More Related Content

What's hot

Routing Information Protocol
Routing Information ProtocolRouting Information Protocol
Routing Information ProtocolKashif Latif
 
Handling Missing Values for Machine Learning.pptx
Handling Missing Values for Machine Learning.pptxHandling Missing Values for Machine Learning.pptx
Handling Missing Values for Machine Learning.pptxShamimBhuiyan8
 
sql function(ppt)
sql function(ppt)sql function(ppt)
sql function(ppt)Ankit Dubey
 
Procedure and Functions in pl/sql
Procedure and Functions in pl/sqlProcedure and Functions in pl/sql
Procedure and Functions in pl/sqlÑirmal Tatiwal
 
Oop c++class(final).ppt
Oop c++class(final).pptOop c++class(final).ppt
Oop c++class(final).pptAlok Kumar
 
Oracle Collections
Oracle CollectionsOracle Collections
Oracle CollectionsTrendz Lab
 
TCP/IP Model
TCP/IP ModelTCP/IP Model
TCP/IP Modelfarhan516
 
Looping Statements and Control Statements in Python
Looping Statements and Control Statements in PythonLooping Statements and Control Statements in Python
Looping Statements and Control Statements in PythonPriyankaC44
 
Packages in PL/SQL
Packages in PL/SQLPackages in PL/SQL
Packages in PL/SQLPooja Dixit
 
for loop in java
for loop in java for loop in java
for loop in java Majid Ali
 
Control structures in Java
Control structures in JavaControl structures in Java
Control structures in JavaRavi_Kant_Sahu
 
Telnet and FTP.ppt
Telnet and FTP.pptTelnet and FTP.ppt
Telnet and FTP.pptssuser1774d3
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPTAIRTEL
 

What's hot (20)

Network layer tanenbaum
Network layer tanenbaumNetwork layer tanenbaum
Network layer tanenbaum
 
Routing Information Protocol
Routing Information ProtocolRouting Information Protocol
Routing Information Protocol
 
Handling Missing Values for Machine Learning.pptx
Handling Missing Values for Machine Learning.pptxHandling Missing Values for Machine Learning.pptx
Handling Missing Values for Machine Learning.pptx
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
 
sql function(ppt)
sql function(ppt)sql function(ppt)
sql function(ppt)
 
Tcp/ip model
Tcp/ip  modelTcp/ip  model
Tcp/ip model
 
Python ppt
Python pptPython ppt
Python ppt
 
Procedure and Functions in pl/sql
Procedure and Functions in pl/sqlProcedure and Functions in pl/sql
Procedure and Functions in pl/sql
 
Oop c++class(final).ppt
Oop c++class(final).pptOop c++class(final).ppt
Oop c++class(final).ppt
 
Oracle Collections
Oracle CollectionsOracle Collections
Oracle Collections
 
TCP/IP Model
TCP/IP ModelTCP/IP Model
TCP/IP Model
 
Looping Statements and Control Statements in Python
Looping Statements and Control Statements in PythonLooping Statements and Control Statements in Python
Looping Statements and Control Statements in Python
 
Packages in PL/SQL
Packages in PL/SQLPackages in PL/SQL
Packages in PL/SQL
 
TCP and UDP
TCP and UDP TCP and UDP
TCP and UDP
 
for loop in java
for loop in java for loop in java
for loop in java
 
TCP /IP
TCP /IPTCP /IP
TCP /IP
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
Control structures in Java
Control structures in JavaControl structures in Java
Control structures in Java
 
Telnet and FTP.ppt
Telnet and FTP.pptTelnet and FTP.ppt
Telnet and FTP.ppt
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPT
 

Similar to IEEE standard

Lan basic
Lan basicLan basic
Lan basicOnline
 
Advanced TCP/IP-based Industrial Networking for Engineers & Technicians
Advanced TCP/IP-based Industrial Networking for Engineers & TechniciansAdvanced TCP/IP-based Industrial Networking for Engineers & Technicians
Advanced TCP/IP-based Industrial Networking for Engineers & TechniciansLiving Online
 
IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11Keshav Maheshwari
 
Best fit topology - lo1 part iv
Best fit topology - lo1 part ivBest fit topology - lo1 part iv
Best fit topology - lo1 part ivAbenezer Abiti
 
Computer Networks IEEE 802.3 standard-2021.pptx
Computer Networks IEEE 802.3 standard-2021.pptxComputer Networks IEEE 802.3 standard-2021.pptx
Computer Networks IEEE 802.3 standard-2021.pptxnajed76732
 
Ethernet 19 20
Ethernet 19 20Ethernet 19 20
Ethernet 19 20rajeshvbe
 
Ethernet Computer network
Ethernet Computer networkEthernet Computer network
Ethernet Computer networkmiteshppt
 
Ethernet,token ring
Ethernet,token ring Ethernet,token ring
Ethernet,token ring Hareem Naz
 
LAN Systems.pptx
LAN Systems.pptxLAN Systems.pptx
LAN Systems.pptxRoshan86572
 
Local Area Network – Wired LAN
Local Area Network – Wired LANLocal Area Network – Wired LAN
Local Area Network – Wired LANRaj vardhan
 
Et3003 sem2-1314-3 ethernets
Et3003 sem2-1314-3 ethernetsEt3003 sem2-1314-3 ethernets
Et3003 sem2-1314-3 ethernetsTutun Juhana
 
Real-World Networks
Real-World NetworksReal-World Networks
Real-World Networkszaisahil
 
Msit computer networks 2
Msit computer networks 2Msit computer networks 2
Msit computer networks 2Sridhar Baithi
 
01 coms 525 tcpip - networking concepts review
01   coms 525 tcpip - networking concepts review01   coms 525 tcpip - networking concepts review
01 coms 525 tcpip - networking concepts reviewPalanivel Kuppusamy
 

Similar to IEEE standard (20)

Lan basic
Lan basicLan basic
Lan basic
 
Advanced TCP/IP-based Industrial Networking for Engineers & Technicians
Advanced TCP/IP-based Industrial Networking for Engineers & TechniciansAdvanced TCP/IP-based Industrial Networking for Engineers & Technicians
Advanced TCP/IP-based Industrial Networking for Engineers & Technicians
 
IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11
 
Best fit topology - lo1 part iv
Best fit topology - lo1 part ivBest fit topology - lo1 part iv
Best fit topology - lo1 part iv
 
Computer Networks IEEE 802.3 standard-2021.pptx
Computer Networks IEEE 802.3 standard-2021.pptxComputer Networks IEEE 802.3 standard-2021.pptx
Computer Networks IEEE 802.3 standard-2021.pptx
 
Ethernet 19 20
Ethernet 19 20Ethernet 19 20
Ethernet 19 20
 
Ethernet Computer network
Ethernet Computer networkEthernet Computer network
Ethernet Computer network
 
Ethernet,token ring
Ethernet,token ring Ethernet,token ring
Ethernet,token ring
 
LAN Systems.pptx
LAN Systems.pptxLAN Systems.pptx
LAN Systems.pptx
 
Local Area Network – Wired LAN
Local Area Network – Wired LANLocal Area Network – Wired LAN
Local Area Network – Wired LAN
 
LAN TECHNOLOGLES
 LAN TECHNOLOGLES LAN TECHNOLOGLES
LAN TECHNOLOGLES
 
Et3003 sem2-1314-3 ethernets
Et3003 sem2-1314-3 ethernetsEt3003 sem2-1314-3 ethernets
Et3003 sem2-1314-3 ethernets
 
IEEE Standards
IEEE StandardsIEEE Standards
IEEE Standards
 
Ethernet 802.3.pptx
Ethernet 802.3.pptxEthernet 802.3.pptx
Ethernet 802.3.pptx
 
Real-World Networks
Real-World NetworksReal-World Networks
Real-World Networks
 
Msit computer networks 2
Msit computer networks 2Msit computer networks 2
Msit computer networks 2
 
Chapter-10.pptx
Chapter-10.pptxChapter-10.pptx
Chapter-10.pptx
 
01 coms 525 tcpip - networking concepts review
01   coms 525 tcpip - networking concepts review01   coms 525 tcpip - networking concepts review
01 coms 525 tcpip - networking concepts review
 
Week 5 lan topology
Week 5 lan topologyWeek 5 lan topology
Week 5 lan topology
 
QSpiders - Dod Model
QSpiders - Dod ModelQSpiders - Dod Model
QSpiders - Dod Model
 

More from Jyothishmathi Institute of Technology and Science Karimnagar

More from Jyothishmathi Institute of Technology and Science Karimnagar (20)

JAVA PROGRAMMING- GUI Programming with Swing - The Swing Buttons
JAVA PROGRAMMING- GUI Programming with Swing - The Swing ButtonsJAVA PROGRAMMING- GUI Programming with Swing - The Swing Buttons
JAVA PROGRAMMING- GUI Programming with Swing - The Swing Buttons
 
JAVA PROGRAMMING - The Collections Framework
JAVA PROGRAMMING - The Collections Framework JAVA PROGRAMMING - The Collections Framework
JAVA PROGRAMMING - The Collections Framework
 
JAVA PROGRAMMING- Exception handling - Multithreading
JAVA PROGRAMMING- Exception handling - MultithreadingJAVA PROGRAMMING- Exception handling - Multithreading
JAVA PROGRAMMING- Exception handling - Multithreading
 
JAVA PROGRAMMING – Packages - Stream based I/O
JAVA PROGRAMMING – Packages - Stream based I/O JAVA PROGRAMMING – Packages - Stream based I/O
JAVA PROGRAMMING – Packages - Stream based I/O
 
Java programming -Object-Oriented Thinking- Inheritance
Java programming -Object-Oriented Thinking- InheritanceJava programming -Object-Oriented Thinking- Inheritance
Java programming -Object-Oriented Thinking- Inheritance
 
WEB TECHNOLOGIES JavaScript
WEB TECHNOLOGIES JavaScriptWEB TECHNOLOGIES JavaScript
WEB TECHNOLOGIES JavaScript
 
WEB TECHNOLOGIES JSP
WEB TECHNOLOGIES  JSPWEB TECHNOLOGIES  JSP
WEB TECHNOLOGIES JSP
 
WEB TECHNOLOGIES Servlet
WEB TECHNOLOGIES ServletWEB TECHNOLOGIES Servlet
WEB TECHNOLOGIES Servlet
 
WEB TECHNOLOGIES XML
WEB TECHNOLOGIES XMLWEB TECHNOLOGIES XML
WEB TECHNOLOGIES XML
 
WEB TECHNOLOGIES- PHP Programming
WEB TECHNOLOGIES-  PHP ProgrammingWEB TECHNOLOGIES-  PHP Programming
WEB TECHNOLOGIES- PHP Programming
 
Compiler Design- Machine Independent Optimizations
Compiler Design- Machine Independent OptimizationsCompiler Design- Machine Independent Optimizations
Compiler Design- Machine Independent Optimizations
 
COMPILER DESIGN Run-Time Environments
COMPILER DESIGN Run-Time EnvironmentsCOMPILER DESIGN Run-Time Environments
COMPILER DESIGN Run-Time Environments
 
COMPILER DESIGN- Syntax Directed Translation
COMPILER DESIGN- Syntax Directed TranslationCOMPILER DESIGN- Syntax Directed Translation
COMPILER DESIGN- Syntax Directed Translation
 
COMPILER DESIGN- Syntax Analysis
COMPILER DESIGN- Syntax AnalysisCOMPILER DESIGN- Syntax Analysis
COMPILER DESIGN- Syntax Analysis
 
COMPILER DESIGN- Introduction & Lexical Analysis:
COMPILER DESIGN- Introduction & Lexical Analysis: COMPILER DESIGN- Introduction & Lexical Analysis:
COMPILER DESIGN- Introduction & Lexical Analysis:
 
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail SecurityCRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
 
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level SecurityCRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
 
CRYPTOGRAPHY & NETWORK SECURITY- Cryptographic Hash Functions
CRYPTOGRAPHY & NETWORK SECURITY- Cryptographic Hash FunctionsCRYPTOGRAPHY & NETWORK SECURITY- Cryptographic Hash Functions
CRYPTOGRAPHY & NETWORK SECURITY- Cryptographic Hash Functions
 
CRYPTOGRAPHY & NETWOK SECURITY- Symmetric key Ciphers
CRYPTOGRAPHY & NETWOK SECURITY- Symmetric key CiphersCRYPTOGRAPHY & NETWOK SECURITY- Symmetric key Ciphers
CRYPTOGRAPHY & NETWOK SECURITY- Symmetric key Ciphers
 
CRYPTOGRAPHY & NETWORK SECURITY
CRYPTOGRAPHY & NETWORK SECURITYCRYPTOGRAPHY & NETWORK SECURITY
CRYPTOGRAPHY & NETWORK SECURITY
 

Recently uploaded

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 

Recently uploaded (20)

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 

IEEE standard

  • 1. IEEE STANDARDS Dr R Jegadeesan Prof & Head Jyothishmathi Institute of Technology and Science, karimnagar
  • 2. IEEE STANDARDS ➢ In 1985, the Computer Society of the IEEE started a project, called Project 802, to set standards and to enable inter communication among equipment from a variety of manufacturers. ➢ Project 802 is a way of specifying functions of the physical layer and the data link layer of major LAN protocols.
  • 3. Figure gives relationship of 802 standard to the traditional OSI model
  • 4. • IEEE 802 standard split data link layer into two sublayers • LLC(Logical Link Control) and MAC (Media Access control) • In addition to this IEEE 802 created several physical layer standards for different LAN protocols • Ethernet Physical layer • Token ring Physical layer • Token bus physical layer
  • 5. LLC(Logical Link Control) ▪ In IEEE 802 standard LLC sub layer carries out Flow control, Error control and Framing. ▪ LLC provides one single Data link protocol for all LANS whereas MAC provides different protocols for different LANS as shown in figure. • The intent of LLC is to provide flow control and error control for upper layers
  • 6. MAC (Media Access Control) IEEE 802 has created a sublayer called MAC that defines specific access method for each LAN for example it defines CSMA/CD as Media access method for Ethernet LAN’s and token passing method for token ring and token bus LAN
  • 7. Ethernet • A system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems.
  • 8. Physical layer • The physical layer is dependent on the implementation and type of physical media used • IEEE defines detailed specifications for each LAN implementation
  • 9. Ethernet evolution through four generations
  • 10. Standard Ethernet • The original Ethernet was created in 1976 at Xerox's Palo Alto Research Centre (PARC) in US. • Since then, it has gone through four generations: ➢Standard Ethernet (10 Mbps), ➢Fast Ethernet (100 Mbps), ➢Gigabit Ethernet (1 Gbps), ➢Ten-Gigabit Ethernet (10 Gbps)
  • 11. Physical Layer • The Standard Ethernet defines several physical layer implementations; four of the most common are
  • 12. 10Base5: Thick Ethernet • The first implementation is called 10Base5, thick Ethernet or Thicknet. • The nickname derives from the size of the cable, which is roughly the size of a garden hose and too stiff to bend with your hands. • 10Base5 was the first Ethernet specification to use a bus topology with an external transceiver (transmitter/receiver) connected via a tap to a thick coaxial cable.
  • 14. • The transceiver is responsible for transmitting, receiving, and detecting collisions. • The transceiver is connected to the station via a transceiver cable that provides separate paths for sending and receiving. This means that collision can only happen in the coaxial cable. • The maximum length of the coaxial cable must not exceed 500 m, otherwise, there is excessive degradation of the signal. • If a length of more than 500m, each a maximum of 500-meter can be connected using repeaters
  • 15. 10Base2: Thin Ethernet • The second implementation is called 10Base2, thin Ethernet, or Cheapernet. • 10Base2 also uses a bus topology, but the cable is much thinner and more flexible. • In this case, the transceiver is normally part of the network interface card (NIC), which is installed inside the station. • Collision here occurs in the thin coaxial cable.
  • 18. • This implementation is more cost effective than 10Base5 because thin coaxial cable is less expensive than thick coaxial and the Tee connections are much cheaper than taps. • Installation is simpler because the thin coaxial cable is very flexible. However, the length of each segment cannot exceed 185 m (close to 200 m)
  • 19. 10Base-T • The third implementation is called 10 Base-T or twisted-pair Ethernet. • 10Base-T uses a physical star topology. The stations are connected to a hub via two pairs of twisted cable. • Note that two pairs of twisted cable create two paths (one for sending and one for receiving) between the station and the hub. Any collision here happens in the hub
  • 20. 10 Base T implementation
  • 21. • The maximum length of the twisted cable here is defined as 100 m, to minimize the effect of attenuation in the twisted cable
  • 22. 10 Base F- Fiber Ethernet • The most commonly used optical fiber is called 10 Base F. • 10 Base-F uses a star topology to connect stations to a hub. • The stations are connected to the hub using two fiber -optic cables. • The maximum length of the optical cable here is defined as 2000 m
  • 23. 10 Base F implementation
  • 24.
  • 25. Addressing in standard Ethernet • Each station on an Ethernet network (such as a PC, workstation, or printer) has its own network interface card (NIC). • The NIC fits inside the station and provides the station with a 6-byte physical address and represented in hexadecimal notation with colon between the bytes
  • 26. Example of an Ethernet address in hexadecimal notation
  • 27. • Standard Ethernet address is broadly divided into 3 types • Unicast • Multicast • Broadcast • Source address is always a unicast address- the frame comes from only one station. Destination address, however, can be unicast, multicast, or broadcast
  • 28. Unicast: • If the least significant bit of the first byte in a destination address is 0, the address is unicast. • A unicast destination address defines only one recipient. The relationship between the sender and the receiver is one-to-one.
  • 29. Multicast • If the least significant bit of the first byte in a destination address is 1, the address is Multicast. • A Multicast destination address defines a group of addresses. The relationship between the sender and the receiver is one-to-many.
  • 30. Broadcast • The broadcast address is a special case of the multicast address; the recipients are all the stations on the LAN. A broadcast destination address is 48bits and all are 1’s.
  • 31. MAC Sub layer ➢In Standard Ethernet, the MAC sub layer governs the operation of the access method. ➢ It also frames data received from the upper layer and passes them to the physical layer
  • 32. Frame Format of Standard Ethernet. 802.3 MAC frame
  • 33. • Preamble : First field of the 802.3 frame contains 7 bytes (56 bits) of alternating 0s and 1s • It alerts the receiving system to the coming frame and enables it to synchronize its input timing to host. • Start Frame Delimiter (SFD): The second field (1 byte: 10101011) signals the beginning of the frame.
  • 34. • Destination address (DA). The DA field is 6 bytes and contains the physical address of the destination station or stations to receive the Frame. • Source address (SA). The SA field is also 6 bytes and contains the physical address of the sender of the Frame. • Length or type. This field is defined as a type field or length field. This field is used to know number of bytes present in the data field in the range of 0 to 1500
  • 35. • Data: This field carries actual data of a frames. It is a minimum of 46 bytes and a maximum of 1500 bytes. If the frame is less than 46bytes then the pad field is used to fill out the frame to the minimum size • CRC(cyclic redundancy check). The last field contains error detection information.