This document provides information about Ethernet, switches, and their components. It discusses the Ethernet frame structure including the preamble, start of frame delimiter, destination and source addresses, length, data, and CRC fields. It also describes Ethernet cabling including twisted pair, coaxial, and fiber optic cables. The CSMA/CD protocol for Ethernet is explained. Finally, the document discusses different devices for interconnecting nodes on a network including hubs, switches, and routers as well as advantages and disadvantages of switches.
This Presentation consists of various Network Devices
Hub, Router, Repeater, Bridge, Brouter, Gateway, NIC etc. It is very helpful for B.tech, BCA, MCA, M.Tech students and for those who is interested in networking.
Advanced computer network lab manual (practicals in Cisco Packet tracer)VrundaBhavsar
Book include how we can execute practical in cisco packet tracer.There are around 18 experiment covered .It contains topology also information about basic elements hub router.how we established
connection using HTTP and FTP protocols Also transferring Gmail and VOIP (Voice over IP) experiment. DHCP experiment included. How we create subnetmask.
The IEEE 802 is a family of IEEE standards dealing with Local Area Networks and Metropolitan Area Networks. The IEEE 802 family of standards is maintained by the IEEE 802 LAN/MAN Standards Committee (LMSC).
The most widely used standards are for the Bridging and Virtual Bridged LANs (802.1), Ethernet family (802.3), Token Ring (802.5) and Wireless LAN (802.11).
This Presentation consists of various Network Devices
Hub, Router, Repeater, Bridge, Brouter, Gateway, NIC etc. It is very helpful for B.tech, BCA, MCA, M.Tech students and for those who is interested in networking.
Advanced computer network lab manual (practicals in Cisco Packet tracer)VrundaBhavsar
Book include how we can execute practical in cisco packet tracer.There are around 18 experiment covered .It contains topology also information about basic elements hub router.how we established
connection using HTTP and FTP protocols Also transferring Gmail and VOIP (Voice over IP) experiment. DHCP experiment included. How we create subnetmask.
The IEEE 802 is a family of IEEE standards dealing with Local Area Networks and Metropolitan Area Networks. The IEEE 802 family of standards is maintained by the IEEE 802 LAN/MAN Standards Committee (LMSC).
The most widely used standards are for the Bridging and Virtual Bridged LANs (802.1), Ethernet family (802.3), Token Ring (802.5) and Wireless LAN (802.11).
It consists of switches & their structures.
Space Division Switch, Time Division switch, Time Space Time Division switch, Cross Bar Switch, Multistage switch, Banyan switch, Batcher BAnyan Switch etc.
It consists of switches & their structures.
Space Division Switch, Time Division switch, Time Space Time Division switch, Cross Bar Switch, Multistage switch, Banyan switch, Batcher BAnyan Switch etc.
LAN Technologies
Ethernet and IEEE Token Ring
IEEE Token Ring
Message transfer in OSI reference Model
Example of Message Transfer in the OSI Model
Application Layer Protocols.
This slide is very fruitful for those engineering students who give high preference to communication subject like Telecommunication, Optical Fiber Communication and even Wireless communication.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Student information management system project report ii.pdf
Ethernet and switches
1. Active Learning Assignment
Prepared by
Tejoy Vachhrajani(160110116057), Bhavik Vashi (160110116061),
Khyati Valera (160110116059)
Topic : Ethernet and Switches
Computer Networks (2140709)
2nd
Year B.E. (Information Technology) A.Y. 2017-18 Semester 4
G H Patel College of Engineering and Technology
Department of Information Technology
Date: 28th
Feb, 2018 Batch: 1D16Group No: D5
2. What Is Ethernet?
A local-area network (LAN) protocol developed by Xerox.
Corporation in cooperation with DEC and Intel in 1976.
Ethernet uses a bus or star topology and supports data transfer rates of
10/100/1000 Mbps.
The Ethernet specification served as the basis for the IEEE 802.3 standard, which
specifies the physical and lower software layers.
Ethernet uses the CSMA/CD access method to handle simultaneous demands.
Ethernet defines the lower two layers of the OSI Reference Model.
4. Ethernet Frame Structure
Preamble
Ethernet frame starts with 7-Bytes Preamble. This is pattern of
alternative 0’s and 1’s which indicates starting of the frame and allow
sender and receiver to establish bit synchronization.
Initially, PRE (Preamble) was introduced to allow for the loss of few bits
due to signal delays. But todays high-speed Ethernet don’t need
Preamble to protect the frame bits.
5. Ethernet Frame Structure
Start of frame delimiter (SFD)
This is a 1-Byte field which is always set to 10101011.
SFD indicates that upcoming bits are starting of frame, which is
destination address.
Sometimes SFD is considered the part of PRE, this is the reason
6. Ethernet Frame Structure
Destination Address – This is 6-Byte field which contains the MAC
address of machine for which data is destined.
Source Address – This is a 6-Byte field which contains the MAC
address of source machine.
As Source Address is always an individual address (Unicast), the least
significant bit of first byte is always 0..
Length – Length is a 2-Byte field, which indicates the length of entire
7. Ethernet Frame Structure
Destination Address – This is 6-Byte field which contains the MAC
address of machine for which data is destined.
Source Address – This is a 6-Byte field which contains the MAC
address of source machine.
As Source Address is always an individual address (Unicast), the least
significant bit of first byte is always 0..
Length – Length is a 2-Byte field, which indicates the length of entire
8. Ethernet Frame Structure
Data – This is the place where actual data is inserted, also known
as Payload.
Both IP header and data will be inserted here, if Internet Protocol is
used over Ethernet. The maximum data present may be as long as 1500
Bytes.
Cyclic Redundancy Check (CRC) – CRC is 4 Byte field. This field
contains 32-bits hash code of data, which is generated over Destination
Address, Source Address, Length and Data field.
9. Ethernet Frame Structure
Data – This is the place where actual data is inserted, also known
as Payload.
Both IP header and data will be inserted here, if Internet Protocol is
used over Ethernet. The maximum data present may be as long as 1500
Bytes.
Cyclic Redundancy Check (CRC) – CRC is 4 Byte field. This field
contains 32-bits hash code of data, which is generated over Destination
Address, Source Address, Length and Data field.
10. Ethernet Cabling
Twisted Pair Cables
– Pairs of wires are twisted around one another.
– Each pair consists of two insulated copper wires
twisted together.
– High quality twisted pair cables have about 1 to 3
twists per inch.
– Twisted pair cables are used with the following
Ethernet physical layers:
• 10Base-T, 100Base-TX, 100Base-T2, 100Base-T4, and
1000Base-T
12. Ethernet Cabling
Fiber Optics Cable
– Fiber optic cabling is a technology where electrical signals are converted into optical signals,
transmitted through a thin glass fiber, and re-converted into electrical signals.
– It is used on FOIRL, 10Base-FL, 10Base-FB, 10Base-FP, 100Base-FX, 1000Base-LX, and
1000Base-SX.
– Fiber optic cabling is constructed of three concentric layers:
1. The core : Is the central region of an optical fiber through
which light is transmitted.
2. The cladding: Is the material in the middle layer.
3. The protective layer: serves to protect the core and
cladding from damage.
13. CSMA / CD
CSMA/CD signifies carrier-sense multiple
access with collision detection,describes how
the Ethernet protocol regulates communication
among nodes.
Before a station transmits, it checks if another
station is transmitting. If the medium is quiet, the
station recognizes that this is an appropriate time
to transmit.
15. Limitations of Ethernet
Electrical signals propagate along a cable very quickly,
but they weaken as they travel, and electrical
interference from neighboring devices can scramble the
signal.
Distance limitation on the maximum separation between
two devices (called the network diameter) on an
Ethernet network.
In CSMA/CD only a single device can transmit at a given
time.
17. Interconnecting Devices
HUBS
Are of three types:
1. Passive Hubs:
provides a pathway for signals to travel
does not need power to operate
2. Active Hubs:
provides a pathway for signals to travel
regenerates the signals before passing it on
requires power to operate
3. Intelligent Hubs:
performs all the jobs of active and passive
helps in troubleshooting by pointing the actual
location of the problem.
19. Interconnecting Devices
SWITCHES
• forwards data packages to only the destined device
• checks the MAC address found in the NIC to do so
• by forwarding the data to only the destined device, it reduces the number
of
collision in the network
• uses three methods to deal with the data’s as they arrive:
1. Cut through:
o Begins to forward the package as soon as it arrives
o No error checking performed
o Packet is moved quickly
2. Store and forward
o Waits to receive the entire package before forwarding it
o Basic error checking is performed
3. Fragment Free
o Built on the speed advantage of cut through
o Forwards package in fragments
21. Interconnecting Devices
ROUTERS
• most commonly used to connect a home computer to an ISP
• derives it’s name from the fact that it can route data from onenetwork to
another.
• when it receives a packet of data, it reads the header of the
packet to determine the destination address.
• when address is determined, it looks in it’s routing table to see whether it knows
how to reach the destination.
•If it does know how to reach the destination it then forwards the data to the
next hop on the route.The next hop could be the final destination or another
router
23. Switches:-
• A switch is a device in a computer network that connects
together other devices.
• Multiple data cables are plugged into a switch to enable
communication between different networked devices.
• Switches manage the flow of data across a network by
transmitting a received network packet only to the one or
more devices for which the packet is intended.
• Each networked device connected to a switch can be
identified by its network address, allowing the switch to
direct the flow of traffic maximizing the security and
efficiency of the network.
24. Switches:-
• Layer 1 Switch:-
• An Ethernet hub is a simple layer 1 network device
that does not manage any of the traffic coming
through it.
• Any packet entering a port is repeated to the output of
every other port except for the port of entry.
• A repeater hub can therefore only receive and forward
at a single speed.
• Since every packet is repeated on every other port,
packet collisions affect the entire network, limiting its
overall capacity.
25. Switches:-
• Layer 2 Switch:-
• Layer 2 switch performs at the physical and data link
layer.
• It is a bridge with many ports and a design that allows
better performance.
• Layer 2 switch operates using physical network
address identify individual devices.
26. Switches:-
• Layer 3 Switch:-
• Layer 3 switches use IP address that identifies location
on the network.
• They identifies the network/IP address as well as
physical devices.
• It finds the best way to send the packet to destination.
27. Switches:-
• Layer 4 Switch:-
• Layer 4 of the OSI model co-ordinates communication
between system.
• Layer 4 switch are capable of identifying which
application protocol (http , smtp ,ftp).
• Layer 4 checks the port number and supply the data
to next level.
28. Switches:-
• Layer 7 Switch:-
• Layer-7 switches may distribute the load based on uniform
resource locators (URLs), or by using some installation-
specific technique to recognize application-level
transactions.
• A layer-7 switch may include a web cache and participate
in a content delivery network (CDN).
29. Switches:-
ADVANTAGES OF SWITCHES
Switches increase available network bandwidth.
Switches reduce the workload on individual computers.
Switches increase network performance.
Networks that include switches experience fewer frame collisions
because switches create collision domains for each connection (a
process called micro segmentation).
Switches connect directly to workstations.
30. Switches:-
DISADVANTAGES OF SWITCHES
They are more expensive compare to network bridges.
Network connectivity issues are difficult to be traced through the network switch.
Broadcast traffic may be troublesome.
If switches are in promiscuous mode, they are vulnerable to security attacks e.g.
spoofing IP address or capturing of ethernet frames.
Proper design and configuration is needed in order to handle multicast packets.
While limiting broadcasts, they are not as good as routers.