SlideShare a Scribd company logo
Ethernet Frame Format




                        1
Objectives




• Ethernet characteristics



• Ethernet Frame Format




                   9EC606A.35   2
Ethernet

• Trade mark of Xerox Corporation

• Invented at Xerox PARC in 1976

• Standardised by IEEE in 1978

• Popular for LAN

• Uses Packet Switching Technology


                                     3
Ethernet

• Xerox PARC
  • CSMA / CD
  • 2.94 Mbps
  • No length field in Packet Header


• IEEE
  • 1 – Persistent CSMA / CD
  • 1 – 10 Mbps
  • Length field in Packet Header

                                       4
Ethernet

• Ether refers to the ‘Cable’. Its variants are

       • 10 base 5

       • 10 base 2

       • 10 base T

       • 10 base F


                                                  5
10 Base 5 – Called Thick Ethernet4

• Resembles yellow garden hose


• Marking for every 2.5 meters


• Connections are made using vampire taps


• Can run for 500 meters


• Can handle 100 machines


                                            6
10 Base 2 – Called Thin Ethernet

• Bends easily

• Connections can be made using BNC to for
  T-junction

• Can run over 100 meters

• Can handle 30 machines


• Cheaper and Easier to install

                       9EC606A.35            7
10 Base T – Twisted Pair

• Easy maintenance



• Can run over 100 meters



• Can handle 1024 machines




                             8
10 Base F – Fibre Optics

• Best choice of using between two buildings or
  widely separated Hubs

• Run over 2000 meters

• Can handle 1024 machines

• Excellent Noise Immunity

• More Expensive

                                                  9
ETHERNET CONNECTIONS

      Fig.1

                       10
Encoding


• Is a way to determine the start, end, or middle of each bit


• There are two approaches


       • Manchester encoding


       • Differential Manchester encoding


                                                          11
Manchester Encoding

• Each bit period is divided into two equal intervals

• Binary 1 is sent by having the voltage set high during the
  first interval & low in the second interval

• Binary 0 is just reverse

  Disadvantage
      – Requires twice the Band width than straight
        binary encoding

                                                           12
Differential Manchester Encoding

• A binary 1 is indicated by the absence of a transition at
  the start of the interval

• A binary 0 is indicated by the presence of transition at
  the start of the interval

• Advantage
     – Better noise immunity


• Disadvantage
      – Requires more complex equipment


                                                              13
IEEE 802.3 Frame Format




                          14
Preamble


• Length of the field is 7 bytes.

• Each byte contain the bit pattern of 10101010.

• Manchester encoding produces a square

  wave for this bit pattern with.

• Frequency of 10 MHz.

• Time period of 5.6 µsec.

                                                   15
IEEE 802.3 Frame Format

Preamble   SFD    D Address   S Address


•   Start of Frame delimiter
          – Contains 10101011 to indicate the start of Frame

•   Source Address
        – Contains either 2 bytes or 6 bytes

•   Destination Address
         – Contains either 2 bytes or 6 bytes
         –    For ordinary addressing the higher order bit is 0
         –    For group addressing the higher order bit is 1
              i.e Multicasting
         –    For Broadcasting of the frame in the network all the
               bits are made as 1’s
                                                                     16
IEEE 802.3 Frame Format
Preamble     SFD   D Address   S Address   Length

  Length
           – Tells how many bytes are present in the data field
             0 to a maximum of 1500

           – A data field of 0 bytes is legal, it causes a problem

           – When a computer detects a collision, it truncates the
             current frame which means that corrupted frames
             appear on the cable all the time

           – To make it easier to distinguish valid frames from
             corrupted frames (due to collisions), 802.3 states that
             valid frames to be at least 64 bytes long from destination
             address to checksum
                                                                          17
IEEE 802.3 Frame Format
Preamble   SFD   D Address   S Address   Length   Data   Pad   Checksum



     • Pad field
          If the data portion is less than 46 bytes, the pad
          field is used to fill out the frame to the minimum
          size of 64 bytes

     • Checksum
          The Checksum is used to detect if any data bits
          have been corrupted during transmission

                                                                          18
IEEE 802.3 Ethernet LANs

When a computer wants to receive a frame it


   • Listens to all frames traveling on the cable

   • If the frame address is the same as the computer’s
      address
                           or
      the same as the group address of the computers of
      which it is a member, it copies the frame from the cable

   • Otherwise it just ignores the frame
                                                          19
Summary

In this class, you have learnt about

    • Different types of Ethernet cables

    • Encoding

    • All the fields of Frame Format




                                           20
Summary
• Unicast a frame from one computer to any other
  computer connected to the same cable



• Broadcast a frame from one computer to all other
  computers connected to the same cable



• Multicast a frame from one computer to a subset of the
  computers connected to the same cable



                                                           21
Quiz

1. In Ethernet the valid frame size is


     (a) 64 bytes


     (b) 16 bytes


     (c) 46 bytes


     (d) 32 bytes

                                         22
Quiz

2. A frame containing all 1’s in the destination field
  is for


      (a) Unicasting

      (b) Broadcasting

      (c) Multicasting



                                                     23
Frequently Asked Questions


1. Explain Ethernet frame format?

2. List the various types of Ethernet cables




                                               24

More Related Content

What's hot

Spanning tree protocol (stp)
Spanning tree protocol (stp)Spanning tree protocol (stp)
Spanning tree protocol (stp)
RaghulR21
 
Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocolasimnawaz54
 
Token bus
Token busToken bus
Token bus
Denver Rockfreak
 
IPv4 Addressing
 IPv4 Addressing   IPv4 Addressing
IPv4 Addressing
TheGodfather HA
 
Switching Concepts presentation
Switching Concepts presentationSwitching Concepts presentation
Switching Concepts presentation
zameer Abbas
 
HDLC
HDLCHDLC
ETHERNET
ETHERNETETHERNET
ETHERNET
AKSHIT KOHLI
 
What is Ethernet
What is EthernetWhat is Ethernet
What is Ethernet
Simplilearn
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Dr. SELVAGANESAN S
 
Carrier-sense multiple access with collision avoidance CSMA/CA
Carrier-sense multiple access with collision avoidance CSMA/CACarrier-sense multiple access with collision avoidance CSMA/CA
Carrier-sense multiple access with collision avoidance CSMA/CA
Soumen Santra
 
Tcp ip
Tcp ipTcp ip
Tcp ip
Dhani Ahmad
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
guesta81d4b
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
Mukesh Tekwani
 
Ethernet
EthernetEthernet
Ethernet
Jaya Yadav
 
TCP and UDP
TCP and UDP TCP and UDP
TCP and UDP
Ramesh Giri
 
Static Routing
Static RoutingStatic Routing
Static Routing
Kishore Kumar
 
Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer
Dr. SELVAGANESAN S
 
Ca npp t
Ca npp tCa npp t
Ca npp t
Darshan k s
 

What's hot (20)

Spanning tree protocol (stp)
Spanning tree protocol (stp)Spanning tree protocol (stp)
Spanning tree protocol (stp)
 
Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocol
 
Token bus
Token busToken bus
Token bus
 
IPv4 Addressing
 IPv4 Addressing   IPv4 Addressing
IPv4 Addressing
 
Switching Concepts presentation
Switching Concepts presentationSwitching Concepts presentation
Switching Concepts presentation
 
HDLC
HDLCHDLC
HDLC
 
Control Area Network
Control Area NetworkControl Area Network
Control Area Network
 
TCP Vs UDP
TCP Vs UDP TCP Vs UDP
TCP Vs UDP
 
ETHERNET
ETHERNETETHERNET
ETHERNET
 
What is Ethernet
What is EthernetWhat is Ethernet
What is Ethernet
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
 
Carrier-sense multiple access with collision avoidance CSMA/CA
Carrier-sense multiple access with collision avoidance CSMA/CACarrier-sense multiple access with collision avoidance CSMA/CA
Carrier-sense multiple access with collision avoidance CSMA/CA
 
Tcp ip
Tcp ipTcp ip
Tcp ip
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
 
Ethernet
EthernetEthernet
Ethernet
 
TCP and UDP
TCP and UDP TCP and UDP
TCP and UDP
 
Static Routing
Static RoutingStatic Routing
Static Routing
 
Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer
 
Ca npp t
Ca npp tCa npp t
Ca npp t
 

Similar to Ethernet frame format

Ethernet 19 20
Ethernet 19 20Ethernet 19 20
Ethernet 19 20
rajeshvbe
 
Computer Networks IEEE 802.3 standard-2021.pptx
Computer Networks IEEE 802.3 standard-2021.pptxComputer Networks IEEE 802.3 standard-2021.pptx
Computer Networks IEEE 802.3 standard-2021.pptx
najed76732
 
IEEE standard
IEEE standardIEEE standard
Lan basic
Lan basicLan basic
Lan basic
Online
 
Fast ethernet
Fast ethernetFast ethernet
Fast ethernet
sureshjeva
 
Ethernet_Networking2.ppt
Ethernet_Networking2.pptEthernet_Networking2.ppt
Ethernet_Networking2.ppt
KowsalyaJayakumar2
 
Et3003 sem2-1314-3 ethernets
Et3003 sem2-1314-3 ethernetsEt3003 sem2-1314-3 ethernets
Et3003 sem2-1314-3 ethernets
Tutun Juhana
 
Fddi
FddiFddi
Network architecture
Network architectureNetwork architecture
Network architecture
Online
 
ETHERNET IEEE802.pptx
ETHERNET IEEE802.pptxETHERNET IEEE802.pptx
ETHERNET IEEE802.pptx
ssuserf49c5a
 
Fast_Ethernet.ppt
Fast_Ethernet.pptFast_Ethernet.ppt
Fast_Ethernet.ppt
HimansuShekharPradha1
 
Ethernet 802.3.pptx
Ethernet 802.3.pptxEthernet 802.3.pptx
Ethernet 802.3.pptx
TanveerAthar1
 
Week16 lec2
Week16 lec2Week16 lec2
Week16 lec2
syedhaiderraza
 
Internet protocol
Internet protocolInternet protocol
Internet protocol
Online
 
Chapter 3 Networking
Chapter 3 NetworkingChapter 3 Networking
Chapter 3 Networkingmlrbrown
 
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)
Sam Bowne
 
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)
Tutun Juhana
 

Similar to Ethernet frame format (20)

Ethernet 19 20
Ethernet 19 20Ethernet 19 20
Ethernet 19 20
 
Computer Networks IEEE 802.3 standard-2021.pptx
Computer Networks IEEE 802.3 standard-2021.pptxComputer Networks IEEE 802.3 standard-2021.pptx
Computer Networks IEEE 802.3 standard-2021.pptx
 
IEEE standard
IEEE standardIEEE standard
IEEE standard
 
Lan basic
Lan basicLan basic
Lan basic
 
Fast ethernet
Fast ethernetFast ethernet
Fast ethernet
 
Ethernet_Networking2.ppt
Ethernet_Networking2.pptEthernet_Networking2.ppt
Ethernet_Networking2.ppt
 
Et3003 sem2-1314-3 ethernets
Et3003 sem2-1314-3 ethernetsEt3003 sem2-1314-3 ethernets
Et3003 sem2-1314-3 ethernets
 
Lan technologies
Lan technologiesLan technologies
Lan technologies
 
IEEE Standards
IEEE StandardsIEEE Standards
IEEE Standards
 
Fddi
FddiFddi
Fddi
 
Network architecture
Network architectureNetwork architecture
Network architecture
 
ETHERNET IEEE802.pptx
ETHERNET IEEE802.pptxETHERNET IEEE802.pptx
ETHERNET IEEE802.pptx
 
Mod9
Mod9Mod9
Mod9
 
Fast_Ethernet.ppt
Fast_Ethernet.pptFast_Ethernet.ppt
Fast_Ethernet.ppt
 
Ethernet 802.3.pptx
Ethernet 802.3.pptxEthernet 802.3.pptx
Ethernet 802.3.pptx
 
Week16 lec2
Week16 lec2Week16 lec2
Week16 lec2
 
Internet protocol
Internet protocolInternet protocol
Internet protocol
 
Chapter 3 Networking
Chapter 3 NetworkingChapter 3 Networking
Chapter 3 Networking
 
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)
 
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)
 

More from myrajendra

Fundamentals
FundamentalsFundamentals
Fundamentals
myrajendra
 
Data type
Data typeData type
Data type
myrajendra
 
Hibernate example1
Hibernate example1Hibernate example1
Hibernate example1
myrajendra
 
Jdbc workflow
Jdbc workflowJdbc workflow
Jdbc workflow
myrajendra
 
2 jdbc drivers
2 jdbc drivers2 jdbc drivers
2 jdbc drivers
myrajendra
 
3 jdbc api
3 jdbc api3 jdbc api
3 jdbc api
myrajendra
 
4 jdbc step1
4 jdbc step14 jdbc step1
4 jdbc step1
myrajendra
 
Dao example
Dao exampleDao example
Dao example
myrajendra
 
Sessionex1
Sessionex1Sessionex1
Sessionex1
myrajendra
 
1 introduction to html
1 introduction to html1 introduction to html
1 introduction to htmlmyrajendra
 
Views
ViewsViews
Views
myrajendra
 

More from myrajendra (20)

Fundamentals
FundamentalsFundamentals
Fundamentals
 
Data type
Data typeData type
Data type
 
Hibernate example1
Hibernate example1Hibernate example1
Hibernate example1
 
Jdbc workflow
Jdbc workflowJdbc workflow
Jdbc workflow
 
2 jdbc drivers
2 jdbc drivers2 jdbc drivers
2 jdbc drivers
 
3 jdbc api
3 jdbc api3 jdbc api
3 jdbc api
 
4 jdbc step1
4 jdbc step14 jdbc step1
4 jdbc step1
 
Dao example
Dao exampleDao example
Dao example
 
Sessionex1
Sessionex1Sessionex1
Sessionex1
 
Internal
InternalInternal
Internal
 
3. elements
3. elements3. elements
3. elements
 
2. attributes
2. attributes2. attributes
2. attributes
 
1 introduction to html
1 introduction to html1 introduction to html
1 introduction to html
 
Headings
HeadingsHeadings
Headings
 
Forms
FormsForms
Forms
 
Css
CssCss
Css
 
Views
ViewsViews
Views
 
Views
ViewsViews
Views
 
Views
ViewsViews
Views
 
Starting jdbc
Starting jdbcStarting jdbc
Starting jdbc
 

Recently uploaded

Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 

Recently uploaded (20)

Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 

Ethernet frame format

  • 2. Objectives • Ethernet characteristics • Ethernet Frame Format 9EC606A.35 2
  • 3. Ethernet • Trade mark of Xerox Corporation • Invented at Xerox PARC in 1976 • Standardised by IEEE in 1978 • Popular for LAN • Uses Packet Switching Technology 3
  • 4. Ethernet • Xerox PARC • CSMA / CD • 2.94 Mbps • No length field in Packet Header • IEEE • 1 – Persistent CSMA / CD • 1 – 10 Mbps • Length field in Packet Header 4
  • 5. Ethernet • Ether refers to the ‘Cable’. Its variants are • 10 base 5 • 10 base 2 • 10 base T • 10 base F 5
  • 6. 10 Base 5 – Called Thick Ethernet4 • Resembles yellow garden hose • Marking for every 2.5 meters • Connections are made using vampire taps • Can run for 500 meters • Can handle 100 machines 6
  • 7. 10 Base 2 – Called Thin Ethernet • Bends easily • Connections can be made using BNC to for T-junction • Can run over 100 meters • Can handle 30 machines • Cheaper and Easier to install 9EC606A.35 7
  • 8. 10 Base T – Twisted Pair • Easy maintenance • Can run over 100 meters • Can handle 1024 machines 8
  • 9. 10 Base F – Fibre Optics • Best choice of using between two buildings or widely separated Hubs • Run over 2000 meters • Can handle 1024 machines • Excellent Noise Immunity • More Expensive 9
  • 11. Encoding • Is a way to determine the start, end, or middle of each bit • There are two approaches • Manchester encoding • Differential Manchester encoding 11
  • 12. Manchester Encoding • Each bit period is divided into two equal intervals • Binary 1 is sent by having the voltage set high during the first interval & low in the second interval • Binary 0 is just reverse Disadvantage – Requires twice the Band width than straight binary encoding 12
  • 13. Differential Manchester Encoding • A binary 1 is indicated by the absence of a transition at the start of the interval • A binary 0 is indicated by the presence of transition at the start of the interval • Advantage – Better noise immunity • Disadvantage – Requires more complex equipment 13
  • 14. IEEE 802.3 Frame Format 14
  • 15. Preamble • Length of the field is 7 bytes. • Each byte contain the bit pattern of 10101010. • Manchester encoding produces a square wave for this bit pattern with. • Frequency of 10 MHz. • Time period of 5.6 µsec. 15
  • 16. IEEE 802.3 Frame Format Preamble SFD D Address S Address • Start of Frame delimiter – Contains 10101011 to indicate the start of Frame • Source Address – Contains either 2 bytes or 6 bytes • Destination Address – Contains either 2 bytes or 6 bytes – For ordinary addressing the higher order bit is 0 – For group addressing the higher order bit is 1 i.e Multicasting – For Broadcasting of the frame in the network all the bits are made as 1’s 16
  • 17. IEEE 802.3 Frame Format Preamble SFD D Address S Address Length Length – Tells how many bytes are present in the data field 0 to a maximum of 1500 – A data field of 0 bytes is legal, it causes a problem – When a computer detects a collision, it truncates the current frame which means that corrupted frames appear on the cable all the time – To make it easier to distinguish valid frames from corrupted frames (due to collisions), 802.3 states that valid frames to be at least 64 bytes long from destination address to checksum 17
  • 18. IEEE 802.3 Frame Format Preamble SFD D Address S Address Length Data Pad Checksum • Pad field If the data portion is less than 46 bytes, the pad field is used to fill out the frame to the minimum size of 64 bytes • Checksum The Checksum is used to detect if any data bits have been corrupted during transmission 18
  • 19. IEEE 802.3 Ethernet LANs When a computer wants to receive a frame it • Listens to all frames traveling on the cable • If the frame address is the same as the computer’s address or the same as the group address of the computers of which it is a member, it copies the frame from the cable • Otherwise it just ignores the frame 19
  • 20. Summary In this class, you have learnt about • Different types of Ethernet cables • Encoding • All the fields of Frame Format 20
  • 21. Summary • Unicast a frame from one computer to any other computer connected to the same cable • Broadcast a frame from one computer to all other computers connected to the same cable • Multicast a frame from one computer to a subset of the computers connected to the same cable 21
  • 22. Quiz 1. In Ethernet the valid frame size is (a) 64 bytes (b) 16 bytes (c) 46 bytes (d) 32 bytes 22
  • 23. Quiz 2. A frame containing all 1’s in the destination field is for (a) Unicasting (b) Broadcasting (c) Multicasting 23
  • 24. Frequently Asked Questions 1. Explain Ethernet frame format? 2. List the various types of Ethernet cables 24