FAST
&
GIGABIT ETHERNET




   Network Security
Fast Ethernet: Goals

 Upgrade the data rate up to 100 Mbps
 Make it compatible with Standard
  Ethernet
 Keep the same 48-bit address
 Keep the same frame format
 Keep the same minimum and maximum
  frame lengths


             Network Security
New features

 Auto-negotiation:
     It allows a station or a hub a range of capabilities.
     Allows two devices to negotiate the mode or data
      rate of operation
     Allows incompatible devices to connect to one
      another




                   Network Security
Topology used

 Fast Ethernet is designed to connect two
  or more stations together either in a
  point-to-point or star topology (with a hub
  or switch in center)




              Network Security
Implementations

 It can be categorized as either two-wire
  or four-wire
 Two-wire: cat 5 UTP (100Base-TX) or
  fiber-optic cable (100Base-FX)
 Four-wire: cat 3 UTP (100Base-T4)




              Network Security
Gigabit Ethernet: Goals

 Upgrades the data rate to 1 Gbps
 Make it compatible with Standard or Fast
  Ethernet
 Use the same 48-bit address
 Keep the same frame format
 Keep the same minimum and maximum
  frame lengths
 To support auto-negotiation

             Network Security
Modes

 Implements half-duplex and full-duplex
 Full-duplex:
     A central switch connected to all computers
     Each switch has buffers for each input port
     No collision i.e. CSMA/CD is not used
     Maximum length of cable is determined by signal
      attenuation and not by collision detection process




                  Network Security
Modes (continued)

 Half-duplex:
     Rarely used, uses a hub instead of switch
     Uses CSMA/CD
     Frame Bursting Method is defined to
      determine maximum length of network
        Multiple frames are sent.
        Padding is added in between these frames to look
         like one frame, so that the channel is not idle.



                  Network Security
Topology used

 Point-to-point
 Star
 Two star
 Hierarchy of stars




              Network Security
Implementations

 Two-wire:
     Fiber-optic cable (1000Base-SX, short-wave or
      1000Base-LX, long-wave) or STP (1000Base-CX)
 Four-wire:
     5 twisted-pair cable (100Base-T)




                  Network Security
Things to do

 Encoding schemes of Fast & Gigabit Ethernet
 Switched Vs Fast Vs Gigabit Ethernet
 What is Ten-Gigabit Ethernet?
 Wireless Ethernet & its frame format
 Learn Broadband & Bluetooth architectures




                Network Security

Ethernet fast & gigabit

  • 1.
    FAST & GIGABIT ETHERNET Network Security
  • 2.
    Fast Ethernet: Goals Upgrade the data rate up to 100 Mbps  Make it compatible with Standard Ethernet  Keep the same 48-bit address  Keep the same frame format  Keep the same minimum and maximum frame lengths Network Security
  • 3.
    New features  Auto-negotiation:  It allows a station or a hub a range of capabilities.  Allows two devices to negotiate the mode or data rate of operation  Allows incompatible devices to connect to one another Network Security
  • 4.
    Topology used  FastEthernet is designed to connect two or more stations together either in a point-to-point or star topology (with a hub or switch in center) Network Security
  • 5.
    Implementations  It canbe categorized as either two-wire or four-wire  Two-wire: cat 5 UTP (100Base-TX) or fiber-optic cable (100Base-FX)  Four-wire: cat 3 UTP (100Base-T4) Network Security
  • 6.
    Gigabit Ethernet: Goals Upgrades the data rate to 1 Gbps  Make it compatible with Standard or Fast Ethernet  Use the same 48-bit address  Keep the same frame format  Keep the same minimum and maximum frame lengths  To support auto-negotiation Network Security
  • 7.
    Modes  Implements half-duplexand full-duplex  Full-duplex:  A central switch connected to all computers  Each switch has buffers for each input port  No collision i.e. CSMA/CD is not used  Maximum length of cable is determined by signal attenuation and not by collision detection process Network Security
  • 8.
    Modes (continued)  Half-duplex:  Rarely used, uses a hub instead of switch  Uses CSMA/CD  Frame Bursting Method is defined to determine maximum length of network  Multiple frames are sent.  Padding is added in between these frames to look like one frame, so that the channel is not idle. Network Security
  • 9.
    Topology used  Point-to-point Star  Two star  Hierarchy of stars Network Security
  • 10.
    Implementations  Two-wire:  Fiber-optic cable (1000Base-SX, short-wave or 1000Base-LX, long-wave) or STP (1000Base-CX)  Four-wire:  5 twisted-pair cable (100Base-T) Network Security
  • 11.
    Things to do Encoding schemes of Fast & Gigabit Ethernet  Switched Vs Fast Vs Gigabit Ethernet  What is Ten-Gigabit Ethernet?  Wireless Ethernet & its frame format  Learn Broadband & Bluetooth architectures Network Security