SlideShare a Scribd company logo
IEEE STANDARDS
Dr R Jegadeesan Prof & Head
Jyothishmathi Institute of Technology and Science,
karimnagar
IEEE STANDARDS
➢ In 1985, the Computer Society of the IEEE
started a project, called Project 802, to set
standards and to enable inter communication
among equipment from a variety of
manufacturers.
➢ Project 802 is a way of specifying functions
of the physical layer and the data link layer of
major LAN protocols.
Figure gives relationship of 802 standard to the traditional OSI
model
• IEEE 802 standard split data link layer into
two sublayers
• LLC(Logical Link Control) and MAC (Media
Access control)
• In addition to this IEEE 802 created several
physical layer standards for different LAN
protocols
• Ethernet Physical layer
• Token ring Physical layer
• Token bus physical layer
LLC(Logical Link Control)
▪ In IEEE 802 standard LLC sub layer carries
out Flow control, Error control and Framing.
▪ LLC provides one single Data link protocol for
all LANS whereas MAC provides different
protocols for different LANS as shown in
figure.
• The intent of LLC is to provide flow control
and error control for upper layers
MAC (Media Access Control)
IEEE 802 has created a sublayer called MAC
that defines specific access method for each
LAN
for example it defines CSMA/CD as Media
access method for Ethernet LAN’s and token
passing method for token ring and token bus
LAN
Ethernet
• A system for connecting a number of
computer systems to form a local area
network, with protocols to control the passing
of information and to avoid simultaneous
transmission by two or more systems.
Physical layer
• The physical layer is dependent on the
implementation and type of physical media
used
• IEEE defines detailed specifications for each
LAN implementation
Ethernet evolution through four generations
Standard Ethernet
• The original Ethernet was created in 1976 at
Xerox's Palo Alto Research Centre (PARC) in
US.
• Since then, it has gone through four
generations:
➢Standard Ethernet (10 Mbps),
➢Fast Ethernet (100 Mbps),
➢Gigabit Ethernet (1 Gbps),
➢Ten-Gigabit Ethernet (10 Gbps)
Physical Layer
• The Standard Ethernet defines several
physical layer implementations; four of the
most common are
10Base5: Thick Ethernet
• The first implementation is called 10Base5, thick
Ethernet or Thicknet.
• The nickname derives from the size of the cable,
which is roughly the size of a garden hose and
too stiff to bend with your hands.
• 10Base5 was the first Ethernet specification to
use a bus topology with an external transceiver
(transmitter/receiver) connected via a tap to a
thick coaxial cable.
10Base5 implementation
• The transceiver is responsible for transmitting,
receiving, and detecting collisions.
• The transceiver is connected to the station via a
transceiver cable that provides separate paths for
sending and receiving. This means that collision can
only happen in the coaxial cable.
• The maximum length of the coaxial cable must not
exceed 500 m, otherwise, there is excessive
degradation of the signal.
• If a length of more than 500m, each a maximum of
500-meter can be connected using repeaters
10Base2: Thin Ethernet
• The second implementation is called 10Base2, thin
Ethernet, or Cheapernet.
• 10Base2 also uses a bus topology, but the cable is
much thinner and more flexible.
• In this case, the transceiver is normally part of the
network interface card (NIC), which is installed
inside the station.
• Collision here occurs in the thin coaxial cable.
NIC(Network Interface Card )
10Base2 implementation
• This implementation is more cost effective
than 10Base5 because thin coaxial cable is
less expensive than thick coaxial and the Tee
connections are much cheaper than taps.
• Installation is simpler because the thin
coaxial cable is very flexible. However, the
length of each segment cannot exceed 185 m
(close to 200 m)
10Base-T
• The third implementation is called 10 Base-T
or twisted-pair Ethernet.
• 10Base-T uses a physical star topology. The
stations are connected to a hub via two pairs
of twisted cable.
• Note that two pairs of twisted cable create two
paths (one for sending and one for receiving)
between the station and the hub. Any
collision here happens in the hub
10 Base T implementation
• The maximum length of the twisted cable
here is defined as 100 m, to minimize the
effect of attenuation in the twisted cable
10 Base F- Fiber Ethernet
• The most commonly used optical fiber is
called 10 Base F.
• 10 Base-F uses a star topology to connect
stations to a hub.
• The stations are connected to the hub using
two fiber -optic cables.
• The maximum length of the optical cable
here is defined as 2000 m
10 Base F implementation
Addressing in standard Ethernet
• Each station on an Ethernet network (such as
a PC, workstation, or printer) has its own
network interface card (NIC).
• The NIC fits inside the station and provides
the station with a 6-byte physical address and
represented in hexadecimal notation with
colon between the bytes
Example of an Ethernet address in hexadecimal notation
• Standard Ethernet address is broadly divided
into 3 types
• Unicast
• Multicast
• Broadcast
• Source address is always a unicast address-
the frame comes from only one station.
Destination address, however, can be unicast,
multicast, or broadcast
Unicast:
• If the least significant bit of the first byte in a
destination address is 0, the address is
unicast.
• A unicast destination address defines only
one recipient. The relationship between the
sender and the receiver is one-to-one.
Multicast
• If the least significant bit of the first byte in a
destination address is 1, the address is
Multicast.
• A Multicast destination address defines a
group of addresses. The relationship between
the sender and the receiver is one-to-many.
Broadcast
• The broadcast address is a special case of the
multicast address; the recipients are all the
stations on the LAN. A broadcast destination
address is 48bits and all are 1’s.
MAC Sub layer
➢In Standard Ethernet, the MAC sub layer
governs the operation of the access method.
➢ It also frames data received from the upper
layer and passes them to the physical layer
Frame Format of Standard Ethernet.
802.3 MAC frame
• Preamble : First field of the 802.3 frame
contains 7 bytes (56 bits) of alternating 0s
and 1s
• It alerts the receiving system to the coming
frame and enables it to synchronize its input
timing to host.
• Start Frame Delimiter (SFD): The second
field (1 byte: 10101011) signals the
beginning of the frame.
• Destination address (DA). The DA field is 6
bytes and contains the physical address of the
destination station or stations to receive the
Frame.
• Source address (SA). The SA field is also 6
bytes and contains the physical address of the
sender of the Frame.
• Length or type. This field is defined as a type
field or length field. This field is used to know
number of bytes present in the data field in
the range of 0 to 1500
• Data: This field carries actual data of a
frames. It is a minimum of 46 bytes and a
maximum of 1500 bytes. If the frame is less
than 46bytes then the pad field is used to fill
out the frame to the minimum size
• CRC(cyclic redundancy check). The last field
contains error detection information.
Thank you

More Related Content

What's hot

Guided Transmission Media
Guided Transmission MediaGuided Transmission Media
Guided Transmission Media
asrabatool
 
Network layer - design Issues
Network layer - design IssuesNetwork layer - design Issues
Network layer - design Issues
قصي نسور
 
Sonet (synchronous optical networking )
Sonet (synchronous optical networking )Sonet (synchronous optical networking )
Sonet (synchronous optical networking )
Hamza Sajjad
 
Unit 3 Arithmetic building blocks and memory Design (1).pdf
Unit 3 Arithmetic building blocks and  memory Design (1).pdfUnit 3 Arithmetic building blocks and  memory Design (1).pdf
Unit 3 Arithmetic building blocks and memory Design (1).pdf
ShreyasMahesh
 
Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting Presentation
Touhidul Fahim
 
What Is Sliding Window Protocol?
What Is Sliding Window Protocol?What Is Sliding Window Protocol?
What Is Sliding Window Protocol?
Simplilearn
 
Transmission impairments(presentation)
Transmission impairments(presentation)Transmission impairments(presentation)
Transmission impairments(presentation)
Vivek Kumar
 
Attribute grammer
Attribute grammerAttribute grammer
Attribute grammer
ahmed51236
 
csma ca
 csma ca csma ca
csma ca
Haroon Khan
 
Physical layer ppt
Physical layer pptPhysical layer ppt
Physical layer ppt
Najam Khattak
 
Topic: Virtual circuit & message switching
Topic: Virtual circuit & message switchingTopic: Virtual circuit & message switching
Topic: Virtual circuit & message switching
Dr Rajiv Srivastava
 
Sliding window protocol
Sliding window protocolSliding window protocol
Sliding window protocol
Shehara Abeythunga
 
Ethernet
EthernetEthernet
Ethernet
sijil chacko
 
IEEE Standards
IEEE StandardsIEEE Standards
IEEE Standards
nareshkingster
 
Data link control protocol(1)
Data link control protocol(1)Data link control protocol(1)
Data link control protocol(1)
Jeffrey Des Binwag
 
Network Layer design Issues.pptx
Network Layer design Issues.pptxNetwork Layer design Issues.pptx
Network Layer design Issues.pptx
Acad
 
Error control
Error controlError control
Error control
selvakumar_b1985
 
Control statements in c
Control statements in cControl statements in c
Control statements in c
Sathish Narayanan
 
Transmission media
Transmission mediaTransmission media
Transmission media
Vikas Yadav
 
Fragmentation
FragmentationFragmentation
Fragmentation
Shashwat Shriparv
 

What's hot (20)

Guided Transmission Media
Guided Transmission MediaGuided Transmission Media
Guided Transmission Media
 
Network layer - design Issues
Network layer - design IssuesNetwork layer - design Issues
Network layer - design Issues
 
Sonet (synchronous optical networking )
Sonet (synchronous optical networking )Sonet (synchronous optical networking )
Sonet (synchronous optical networking )
 
Unit 3 Arithmetic building blocks and memory Design (1).pdf
Unit 3 Arithmetic building blocks and  memory Design (1).pdfUnit 3 Arithmetic building blocks and  memory Design (1).pdf
Unit 3 Arithmetic building blocks and memory Design (1).pdf
 
Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting Presentation
 
What Is Sliding Window Protocol?
What Is Sliding Window Protocol?What Is Sliding Window Protocol?
What Is Sliding Window Protocol?
 
Transmission impairments(presentation)
Transmission impairments(presentation)Transmission impairments(presentation)
Transmission impairments(presentation)
 
Attribute grammer
Attribute grammerAttribute grammer
Attribute grammer
 
csma ca
 csma ca csma ca
csma ca
 
Physical layer ppt
Physical layer pptPhysical layer ppt
Physical layer ppt
 
Topic: Virtual circuit & message switching
Topic: Virtual circuit & message switchingTopic: Virtual circuit & message switching
Topic: Virtual circuit & message switching
 
Sliding window protocol
Sliding window protocolSliding window protocol
Sliding window protocol
 
Ethernet
EthernetEthernet
Ethernet
 
IEEE Standards
IEEE StandardsIEEE Standards
IEEE Standards
 
Data link control protocol(1)
Data link control protocol(1)Data link control protocol(1)
Data link control protocol(1)
 
Network Layer design Issues.pptx
Network Layer design Issues.pptxNetwork Layer design Issues.pptx
Network Layer design Issues.pptx
 
Error control
Error controlError control
Error control
 
Control statements in c
Control statements in cControl statements in c
Control statements in c
 
Transmission media
Transmission mediaTransmission media
Transmission media
 
Fragmentation
FragmentationFragmentation
Fragmentation
 

Similar to IEEE standard

Lan basic
Lan basicLan basic
Lan basic
Online
 
Advanced TCP/IP-based Industrial Networking for Engineers & Technicians
Advanced TCP/IP-based Industrial Networking for Engineers & TechniciansAdvanced TCP/IP-based Industrial Networking for Engineers & Technicians
Advanced TCP/IP-based Industrial Networking for Engineers & Technicians
Living Online
 
IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11
Keshav Maheshwari
 
Best fit topology - lo1 part iv
Best fit topology - lo1 part ivBest fit topology - lo1 part iv
Best fit topology - lo1 part iv
Abenezer Abiti
 
Computer Networks IEEE 802.3 standard-2021.pptx
Computer Networks IEEE 802.3 standard-2021.pptxComputer Networks IEEE 802.3 standard-2021.pptx
Computer Networks IEEE 802.3 standard-2021.pptx
najed76732
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
upamatechverse
 
Ethernet 19 20
Ethernet 19 20Ethernet 19 20
Ethernet 19 20
rajeshvbe
 
Ethernet Computer network
Ethernet Computer networkEthernet Computer network
Ethernet Computer network
miteshppt
 
Ethernet,token ring
Ethernet,token ring Ethernet,token ring
Ethernet,token ring
Hareem Naz
 
LAN Systems.pptx
LAN Systems.pptxLAN Systems.pptx
LAN Systems.pptx
Roshan86572
 
Local Area Network – Wired LAN
Local Area Network – Wired LANLocal Area Network – Wired LAN
Local Area Network – Wired LAN
Raj vardhan
 
LAN TECHNOLOGLES
 LAN TECHNOLOGLES LAN TECHNOLOGLES
LAN TECHNOLOGLES
fatma shabaen
 
Et3003 sem2-1314-3 ethernets
Et3003 sem2-1314-3 ethernetsEt3003 sem2-1314-3 ethernets
Et3003 sem2-1314-3 ethernets
Tutun Juhana
 
Ethernet 802.3.pptx
Ethernet 802.3.pptxEthernet 802.3.pptx
Ethernet 802.3.pptx
TanveerAthar1
 
Real-World Networks
Real-World NetworksReal-World Networks
Real-World Networks
zaisahil
 
Msit computer networks 2
Msit computer networks 2Msit computer networks 2
Msit computer networks 2
Sridhar Baithi
 
Chapter-10.pptx
Chapter-10.pptxChapter-10.pptx
Chapter-10.pptx
MuneebZahid10
 
01 coms 525 tcpip - networking concepts review
01   coms 525 tcpip - networking concepts review01   coms 525 tcpip - networking concepts review
01 coms 525 tcpip - networking concepts review
Palanivel Kuppusamy
 
Week 5 lan topology
Week 5 lan topologyWeek 5 lan topology
Week 5 lan topology
Robert Almazan
 
QSpiders - Dod Model
QSpiders - Dod ModelQSpiders - Dod Model

Similar to IEEE standard (20)

Lan basic
Lan basicLan basic
Lan basic
 
Advanced TCP/IP-based Industrial Networking for Engineers & Technicians
Advanced TCP/IP-based Industrial Networking for Engineers & TechniciansAdvanced TCP/IP-based Industrial Networking for Engineers & Technicians
Advanced TCP/IP-based Industrial Networking for Engineers & Technicians
 
IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11
 
Best fit topology - lo1 part iv
Best fit topology - lo1 part ivBest fit topology - lo1 part iv
Best fit topology - lo1 part iv
 
Computer Networks IEEE 802.3 standard-2021.pptx
Computer Networks IEEE 802.3 standard-2021.pptxComputer Networks IEEE 802.3 standard-2021.pptx
Computer Networks IEEE 802.3 standard-2021.pptx
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Ethernet 19 20
Ethernet 19 20Ethernet 19 20
Ethernet 19 20
 
Ethernet Computer network
Ethernet Computer networkEthernet Computer network
Ethernet Computer network
 
Ethernet,token ring
Ethernet,token ring Ethernet,token ring
Ethernet,token ring
 
LAN Systems.pptx
LAN Systems.pptxLAN Systems.pptx
LAN Systems.pptx
 
Local Area Network – Wired LAN
Local Area Network – Wired LANLocal Area Network – Wired LAN
Local Area Network – Wired LAN
 
LAN TECHNOLOGLES
 LAN TECHNOLOGLES LAN TECHNOLOGLES
LAN TECHNOLOGLES
 
Et3003 sem2-1314-3 ethernets
Et3003 sem2-1314-3 ethernetsEt3003 sem2-1314-3 ethernets
Et3003 sem2-1314-3 ethernets
 
Ethernet 802.3.pptx
Ethernet 802.3.pptxEthernet 802.3.pptx
Ethernet 802.3.pptx
 
Real-World Networks
Real-World NetworksReal-World Networks
Real-World Networks
 
Msit computer networks 2
Msit computer networks 2Msit computer networks 2
Msit computer networks 2
 
Chapter-10.pptx
Chapter-10.pptxChapter-10.pptx
Chapter-10.pptx
 
01 coms 525 tcpip - networking concepts review
01   coms 525 tcpip - networking concepts review01   coms 525 tcpip - networking concepts review
01 coms 525 tcpip - networking concepts review
 
Week 5 lan topology
Week 5 lan topologyWeek 5 lan topology
Week 5 lan topology
 
QSpiders - Dod Model
QSpiders - Dod ModelQSpiders - Dod Model
QSpiders - Dod Model
 

More from Jyothishmathi Institute of Technology and Science Karimnagar

JAVA PROGRAMMING- GUI Programming with Swing - The Swing Buttons
JAVA PROGRAMMING- GUI Programming with Swing - The Swing ButtonsJAVA PROGRAMMING- GUI Programming with Swing - The Swing Buttons
JAVA PROGRAMMING- GUI Programming with Swing - The Swing Buttons
Jyothishmathi Institute of Technology and Science Karimnagar
 
JAVA PROGRAMMING - The Collections Framework
JAVA PROGRAMMING - The Collections Framework JAVA PROGRAMMING - The Collections Framework
JAVA PROGRAMMING - The Collections Framework
Jyothishmathi Institute of Technology and Science Karimnagar
 
JAVA PROGRAMMING- Exception handling - Multithreading
JAVA PROGRAMMING- Exception handling - MultithreadingJAVA PROGRAMMING- Exception handling - Multithreading
JAVA PROGRAMMING- Exception handling - Multithreading
Jyothishmathi Institute of Technology and Science Karimnagar
 
JAVA PROGRAMMING – Packages - Stream based I/O
JAVA PROGRAMMING – Packages - Stream based I/O JAVA PROGRAMMING – Packages - Stream based I/O
JAVA PROGRAMMING – Packages - Stream based I/O
Jyothishmathi Institute of Technology and Science Karimnagar
 
Java programming -Object-Oriented Thinking- Inheritance
Java programming -Object-Oriented Thinking- InheritanceJava programming -Object-Oriented Thinking- Inheritance
Java programming -Object-Oriented Thinking- Inheritance
Jyothishmathi Institute of Technology and Science Karimnagar
 
WEB TECHNOLOGIES JavaScript
WEB TECHNOLOGIES JavaScriptWEB TECHNOLOGIES JavaScript
WEB TECHNOLOGIES JSP
WEB TECHNOLOGIES  JSPWEB TECHNOLOGIES  JSP
WEB TECHNOLOGIES Servlet
WEB TECHNOLOGIES ServletWEB TECHNOLOGIES Servlet
WEB TECHNOLOGIES XML
WEB TECHNOLOGIES XMLWEB TECHNOLOGIES XML
WEB TECHNOLOGIES- PHP Programming
WEB TECHNOLOGIES-  PHP ProgrammingWEB TECHNOLOGIES-  PHP Programming
Compiler Design- Machine Independent Optimizations
Compiler Design- Machine Independent OptimizationsCompiler Design- Machine Independent Optimizations
Compiler Design- Machine Independent Optimizations
Jyothishmathi Institute of Technology and Science Karimnagar
 
COMPILER DESIGN Run-Time Environments
COMPILER DESIGN Run-Time EnvironmentsCOMPILER DESIGN Run-Time Environments
COMPILER DESIGN- Syntax Directed Translation
COMPILER DESIGN- Syntax Directed TranslationCOMPILER DESIGN- Syntax Directed Translation
COMPILER DESIGN- Syntax Directed Translation
Jyothishmathi Institute of Technology and Science Karimnagar
 
COMPILER DESIGN- Syntax Analysis
COMPILER DESIGN- Syntax AnalysisCOMPILER DESIGN- Syntax Analysis
COMPILER DESIGN- Introduction & Lexical Analysis:
COMPILER DESIGN- Introduction & Lexical Analysis: COMPILER DESIGN- Introduction & Lexical Analysis:
COMPILER DESIGN- Introduction & Lexical Analysis:
Jyothishmathi Institute of Technology and Science Karimnagar
 
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail SecurityCRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
Jyothishmathi Institute of Technology and Science Karimnagar
 
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level SecurityCRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
Jyothishmathi Institute of Technology and Science Karimnagar
 
CRYPTOGRAPHY & NETWORK SECURITY- Cryptographic Hash Functions
CRYPTOGRAPHY & NETWORK SECURITY- Cryptographic Hash FunctionsCRYPTOGRAPHY & NETWORK SECURITY- Cryptographic Hash Functions
CRYPTOGRAPHY & NETWORK SECURITY- Cryptographic Hash Functions
Jyothishmathi Institute of Technology and Science Karimnagar
 
CRYPTOGRAPHY & NETWOK SECURITY- Symmetric key Ciphers
CRYPTOGRAPHY & NETWOK SECURITY- Symmetric key CiphersCRYPTOGRAPHY & NETWOK SECURITY- Symmetric key Ciphers
CRYPTOGRAPHY & NETWOK SECURITY- Symmetric key Ciphers
Jyothishmathi Institute of Technology and Science Karimnagar
 
CRYPTOGRAPHY & NETWORK SECURITY
CRYPTOGRAPHY & NETWORK SECURITYCRYPTOGRAPHY & NETWORK SECURITY

More from Jyothishmathi Institute of Technology and Science Karimnagar (20)

JAVA PROGRAMMING- GUI Programming with Swing - The Swing Buttons
JAVA PROGRAMMING- GUI Programming with Swing - The Swing ButtonsJAVA PROGRAMMING- GUI Programming with Swing - The Swing Buttons
JAVA PROGRAMMING- GUI Programming with Swing - The Swing Buttons
 
JAVA PROGRAMMING - The Collections Framework
JAVA PROGRAMMING - The Collections Framework JAVA PROGRAMMING - The Collections Framework
JAVA PROGRAMMING - The Collections Framework
 
JAVA PROGRAMMING- Exception handling - Multithreading
JAVA PROGRAMMING- Exception handling - MultithreadingJAVA PROGRAMMING- Exception handling - Multithreading
JAVA PROGRAMMING- Exception handling - Multithreading
 
JAVA PROGRAMMING – Packages - Stream based I/O
JAVA PROGRAMMING – Packages - Stream based I/O JAVA PROGRAMMING – Packages - Stream based I/O
JAVA PROGRAMMING – Packages - Stream based I/O
 
Java programming -Object-Oriented Thinking- Inheritance
Java programming -Object-Oriented Thinking- InheritanceJava programming -Object-Oriented Thinking- Inheritance
Java programming -Object-Oriented Thinking- Inheritance
 
WEB TECHNOLOGIES JavaScript
WEB TECHNOLOGIES JavaScriptWEB TECHNOLOGIES JavaScript
WEB TECHNOLOGIES JavaScript
 
WEB TECHNOLOGIES JSP
WEB TECHNOLOGIES  JSPWEB TECHNOLOGIES  JSP
WEB TECHNOLOGIES JSP
 
WEB TECHNOLOGIES Servlet
WEB TECHNOLOGIES ServletWEB TECHNOLOGIES Servlet
WEB TECHNOLOGIES Servlet
 
WEB TECHNOLOGIES XML
WEB TECHNOLOGIES XMLWEB TECHNOLOGIES XML
WEB TECHNOLOGIES XML
 
WEB TECHNOLOGIES- PHP Programming
WEB TECHNOLOGIES-  PHP ProgrammingWEB TECHNOLOGIES-  PHP Programming
WEB TECHNOLOGIES- PHP Programming
 
Compiler Design- Machine Independent Optimizations
Compiler Design- Machine Independent OptimizationsCompiler Design- Machine Independent Optimizations
Compiler Design- Machine Independent Optimizations
 
COMPILER DESIGN Run-Time Environments
COMPILER DESIGN Run-Time EnvironmentsCOMPILER DESIGN Run-Time Environments
COMPILER DESIGN Run-Time Environments
 
COMPILER DESIGN- Syntax Directed Translation
COMPILER DESIGN- Syntax Directed TranslationCOMPILER DESIGN- Syntax Directed Translation
COMPILER DESIGN- Syntax Directed Translation
 
COMPILER DESIGN- Syntax Analysis
COMPILER DESIGN- Syntax AnalysisCOMPILER DESIGN- Syntax Analysis
COMPILER DESIGN- Syntax Analysis
 
COMPILER DESIGN- Introduction & Lexical Analysis:
COMPILER DESIGN- Introduction & Lexical Analysis: COMPILER DESIGN- Introduction & Lexical Analysis:
COMPILER DESIGN- Introduction & Lexical Analysis:
 
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail SecurityCRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
 
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level SecurityCRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
 
CRYPTOGRAPHY & NETWORK SECURITY- Cryptographic Hash Functions
CRYPTOGRAPHY & NETWORK SECURITY- Cryptographic Hash FunctionsCRYPTOGRAPHY & NETWORK SECURITY- Cryptographic Hash Functions
CRYPTOGRAPHY & NETWORK SECURITY- Cryptographic Hash Functions
 
CRYPTOGRAPHY & NETWOK SECURITY- Symmetric key Ciphers
CRYPTOGRAPHY & NETWOK SECURITY- Symmetric key CiphersCRYPTOGRAPHY & NETWOK SECURITY- Symmetric key Ciphers
CRYPTOGRAPHY & NETWOK SECURITY- Symmetric key Ciphers
 
CRYPTOGRAPHY & NETWORK SECURITY
CRYPTOGRAPHY & NETWORK SECURITYCRYPTOGRAPHY & NETWORK SECURITY
CRYPTOGRAPHY & NETWORK SECURITY
 

Recently uploaded

Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 

Recently uploaded (20)

Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 

IEEE standard

  • 1. IEEE STANDARDS Dr R Jegadeesan Prof & Head Jyothishmathi Institute of Technology and Science, karimnagar
  • 2. IEEE STANDARDS ➢ In 1985, the Computer Society of the IEEE started a project, called Project 802, to set standards and to enable inter communication among equipment from a variety of manufacturers. ➢ Project 802 is a way of specifying functions of the physical layer and the data link layer of major LAN protocols.
  • 3. Figure gives relationship of 802 standard to the traditional OSI model
  • 4. • IEEE 802 standard split data link layer into two sublayers • LLC(Logical Link Control) and MAC (Media Access control) • In addition to this IEEE 802 created several physical layer standards for different LAN protocols • Ethernet Physical layer • Token ring Physical layer • Token bus physical layer
  • 5. LLC(Logical Link Control) ▪ In IEEE 802 standard LLC sub layer carries out Flow control, Error control and Framing. ▪ LLC provides one single Data link protocol for all LANS whereas MAC provides different protocols for different LANS as shown in figure. • The intent of LLC is to provide flow control and error control for upper layers
  • 6. MAC (Media Access Control) IEEE 802 has created a sublayer called MAC that defines specific access method for each LAN for example it defines CSMA/CD as Media access method for Ethernet LAN’s and token passing method for token ring and token bus LAN
  • 7. Ethernet • A system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems.
  • 8. Physical layer • The physical layer is dependent on the implementation and type of physical media used • IEEE defines detailed specifications for each LAN implementation
  • 9. Ethernet evolution through four generations
  • 10. Standard Ethernet • The original Ethernet was created in 1976 at Xerox's Palo Alto Research Centre (PARC) in US. • Since then, it has gone through four generations: ➢Standard Ethernet (10 Mbps), ➢Fast Ethernet (100 Mbps), ➢Gigabit Ethernet (1 Gbps), ➢Ten-Gigabit Ethernet (10 Gbps)
  • 11. Physical Layer • The Standard Ethernet defines several physical layer implementations; four of the most common are
  • 12. 10Base5: Thick Ethernet • The first implementation is called 10Base5, thick Ethernet or Thicknet. • The nickname derives from the size of the cable, which is roughly the size of a garden hose and too stiff to bend with your hands. • 10Base5 was the first Ethernet specification to use a bus topology with an external transceiver (transmitter/receiver) connected via a tap to a thick coaxial cable.
  • 14. • The transceiver is responsible for transmitting, receiving, and detecting collisions. • The transceiver is connected to the station via a transceiver cable that provides separate paths for sending and receiving. This means that collision can only happen in the coaxial cable. • The maximum length of the coaxial cable must not exceed 500 m, otherwise, there is excessive degradation of the signal. • If a length of more than 500m, each a maximum of 500-meter can be connected using repeaters
  • 15. 10Base2: Thin Ethernet • The second implementation is called 10Base2, thin Ethernet, or Cheapernet. • 10Base2 also uses a bus topology, but the cable is much thinner and more flexible. • In this case, the transceiver is normally part of the network interface card (NIC), which is installed inside the station. • Collision here occurs in the thin coaxial cable.
  • 18. • This implementation is more cost effective than 10Base5 because thin coaxial cable is less expensive than thick coaxial and the Tee connections are much cheaper than taps. • Installation is simpler because the thin coaxial cable is very flexible. However, the length of each segment cannot exceed 185 m (close to 200 m)
  • 19. 10Base-T • The third implementation is called 10 Base-T or twisted-pair Ethernet. • 10Base-T uses a physical star topology. The stations are connected to a hub via two pairs of twisted cable. • Note that two pairs of twisted cable create two paths (one for sending and one for receiving) between the station and the hub. Any collision here happens in the hub
  • 20. 10 Base T implementation
  • 21. • The maximum length of the twisted cable here is defined as 100 m, to minimize the effect of attenuation in the twisted cable
  • 22. 10 Base F- Fiber Ethernet • The most commonly used optical fiber is called 10 Base F. • 10 Base-F uses a star topology to connect stations to a hub. • The stations are connected to the hub using two fiber -optic cables. • The maximum length of the optical cable here is defined as 2000 m
  • 23. 10 Base F implementation
  • 24.
  • 25. Addressing in standard Ethernet • Each station on an Ethernet network (such as a PC, workstation, or printer) has its own network interface card (NIC). • The NIC fits inside the station and provides the station with a 6-byte physical address and represented in hexadecimal notation with colon between the bytes
  • 26. Example of an Ethernet address in hexadecimal notation
  • 27. • Standard Ethernet address is broadly divided into 3 types • Unicast • Multicast • Broadcast • Source address is always a unicast address- the frame comes from only one station. Destination address, however, can be unicast, multicast, or broadcast
  • 28. Unicast: • If the least significant bit of the first byte in a destination address is 0, the address is unicast. • A unicast destination address defines only one recipient. The relationship between the sender and the receiver is one-to-one.
  • 29. Multicast • If the least significant bit of the first byte in a destination address is 1, the address is Multicast. • A Multicast destination address defines a group of addresses. The relationship between the sender and the receiver is one-to-many.
  • 30. Broadcast • The broadcast address is a special case of the multicast address; the recipients are all the stations on the LAN. A broadcast destination address is 48bits and all are 1’s.
  • 31. MAC Sub layer ➢In Standard Ethernet, the MAC sub layer governs the operation of the access method. ➢ It also frames data received from the upper layer and passes them to the physical layer
  • 32. Frame Format of Standard Ethernet. 802.3 MAC frame
  • 33. • Preamble : First field of the 802.3 frame contains 7 bytes (56 bits) of alternating 0s and 1s • It alerts the receiving system to the coming frame and enables it to synchronize its input timing to host. • Start Frame Delimiter (SFD): The second field (1 byte: 10101011) signals the beginning of the frame.
  • 34. • Destination address (DA). The DA field is 6 bytes and contains the physical address of the destination station or stations to receive the Frame. • Source address (SA). The SA field is also 6 bytes and contains the physical address of the sender of the Frame. • Length or type. This field is defined as a type field or length field. This field is used to know number of bytes present in the data field in the range of 0 to 1500
  • 35. • Data: This field carries actual data of a frames. It is a minimum of 46 bytes and a maximum of 1500 bytes. If the frame is less than 46bytes then the pad field is used to fill out the frame to the minimum size • CRC(cyclic redundancy check). The last field contains error detection information.